Academic Journals Database
Disseminating quality controlled scientific knowledge

International Journal of Computer and Network Security

ISSN: 2076--2739
Publisher: International Journal of Computer and Network Security


ADD TO MY LIST
 
Overview of Detecting Stego-Content in Corporate Emails : a Web Based Steganalysis

Author(s): Ms. P. T. Anitha and Dr. M. Rajaram
Volume: 2
Issue: 9
Year: 2010
Efficient Buffer management Policy DLA for DTN Routing Protocols under Congestion

Author(s): Sulma Rashid, Qaisar Ayub
Volume: 2
Issue: 9
Year: 2010
Evaluation of Intrusion Detection Techniques for Enterprise Information Security

Author(s): Kanwarpreet Singh, Yogesh Chaba and Amritpal
Volume: 2
Issue: 9
Year: 2010
A Visual Grammar Approach for TV Program Identification

Author(s): Tarek ZLITNI and Walid MAHDI
Volume: 2
Issue: 9
Year: 2010
The Performance Analysis for MAP Selection Scheme of Hierarchical Mobile IP Networks

Author(s): Shan Zhong, Jin-yi CHANG, Dan Zhao and Hong Zhao
Volume: 2
Issue: 9
Year: 2010
Cloth Deformation Simulation Based on a simplified mass-spring model

Author(s): Yao yu-feng, Xia kai-jian and Zhou jin-cheng
Volume: 2
Issue: 9
Year: 2010
Data Aggregation Trees based Algorithm using Genetic Algorithm in Wireless Sensor Networks

Author(s): Mehdi Dabbaghian, Abolfazl Kalanaki, Hamed Taghvaei, Faezeh Sadat Babamir and Seyed Mehrdad Babamir
Volume: 2
Issue: 9
Year: 2010
Performance Evaluation of Peer–to-Peer system in Video on Demand with Load Sharing Scheduling Algorithm

Author(s): S.Nagaprasad, A.VinayaBabu, K.Madhukar, D.Marlene G Verghese, V.Mallaiah1and A.Sreelatha
Volume: 2
Issue: 9
Year: 2010
A Graph-based Testing of UML2 Sequence Diagram

Author(s): Yujian Fu and Sha Li
Volume: 2
Issue: 9
Year: 2010
A Novel design of High Speed Adders Using Quaternary Signed Digit Number System

Author(s): Reena Rani, L.K. Singh and Neelam Sharma
Volume: 2
Issue: 9
Year: 2010
Knowledge Based Computing Using Semantic Web for Grid Applications

Author(s): Dr. M. Rajaram, Mrs. S. Latha Shanmuga Vadivu
Volume: 2
Issue: 9
Year: 2010
Generating the New S-box and Analyzing the Diffusion Strength to Improve the Security of AES Algorithm

Author(s): Mohan H. S. and A Raji Reddy
Volume: 2
Issue: 9
Year: 2010
Factors that Influence Learner-Content Interaction in the Online Top-Down Modeling Model Environment

Author(s): Sha Li, Shirley King, Yujian Fu
Volume: 2
Issue: 9
Year: 2010
A Mechanism for detecting Wormhole Attacks on Wireless Ad Hoc Network

Author(s): Ajit Singh, Kunwar Singh Vaisla
Volume: 2
Issue: 9
Year: 2010
A 1.2V Fourth Order Low Pass Filter for UMTS Receivers

Author(s): Sandeep Garg, D.S. Ajnar, P.K. Jain
Volume: 2
Issue: 9
Year: 2010
Shadow Honeypots

Author(s): Kostas G. Anagnostakis, Stelios Sidiroglou, Periklis Akritidis, Michalis Polychronakis,Angelos D. Keromytis, Evangelos P. Markatos
Volume: 2
Issue: 9
Year: 2010
A Modified Hill Cipher Involving a Pair of Keys and a Permutation

Author(s): V.U.K.Sastry, Aruna Varanasi and S.Udaya Kumar
Volume: 2
Issue: 9
Year: 2010
A Modified Feistel Cipher Involving Modular Arithmetic and Interlacing

Author(s): V. U. K. Sastry, D. S. R. Murthy, S. Durga Bhavani
Volume: 2
Issue: 9
Year: 2010
Triple-Critical Graphs

Author(s): Basheer Ahamed M., and Bagyam I
Volume: 2
Issue: 9
Year: 2010
Video Streamed Acces and Use Control Using Digital Rights Management

Author(s): Morad Rafi and Mohsine Eleuldj
Volume: 2
Issue: 9
Year: 2010
Detection of Selective Forward Attack in Mobile Wireless Sensor Networks

Author(s): S.Sharmila, and G.Umamaheswari
Volume: 2
Issue: 9
Year: 2010
Evaluating Learning Objects for Students: An adaptive model

Author(s): Sonal Chawla and Dr. R.K. Singla
Volume: 2
Issue: 9
Year: 2010
Mathematical Models on Interaction between Computer Virus and Antivirus Software inside a Computer System

Author(s): Bimal Kumar Mishra and Gholam Mursalin Ansari
Volume: 2
Issue: 8
Year: 2010
Performance Evaluation of MANET Routing Protocols Under Black Hole Attack

Author(s): M.Umaparvathi and Dr. Dharmishtan K Varughese
Volume: 2
Issue: 8
Year: 2010
Pairwise Key Establishment in Hierarchical WSN Cluster Network

Author(s): G.N.Purohit, Asmita Singh Rawat
Volume: 2
Issue: 8
Year: 2010
The Electronic Intermediary and the Effect on this For Developing E-Commerce

Author(s): Sahar Kosari, Mohammadreza Banan, Hadi Fanaee Tork and Ali Broumandnia
Volume: 2
Issue: 8
Year: 2010
The Effect of Image Compression on Face Recognition Algorithms

Author(s): Qeethara Kadhim Al-Shayea, Muzhir Shaban Al-Ani and Muna Suliman Abu Teamah
Volume: 2
Issue: 8
Year: 2010
Stock Market Forecasting using Artificial Neural Network and Statistical Technique: A Comparison Report

Author(s): K S Vaisla and Dr. Ashutosh Kumar Bhatt, Dr. Shishir Kumar
Volume: 2
Issue: 8
Year: 2010
Adaptive Dual Threshold Multi-Class Scheduling for Packet Switch

Author(s): A. A. Abdul Rahman, K. Seman, K. Saadan and A. Azreen
Volume: 2
Issue: 8
Year: 2010
A Survey and Comparison of Various Routing Protocols of Wireless Sensor Network (WSN) and a Proposed New TTDD Protocol Based on LEACH

Author(s): Md. Habibe Azam, Abdullah-Al-Nahid, Md. Abdul Alim3, Md. Ziaul Amin
Volume: 2
Issue: 8
Year: 2010
Improved User-Centric ID Management Model for Privacy Protection in Cloud Computing

Author(s): Moonyoung Hwang, Jin Kwak
Volume: 2
Issue: 8
Year: 2010
A New Approach to Measure Quality of Image Encryption

Author(s): Alireza Jolfaei and Abdolrasoul Mirghadri
Volume: 2
Issue: 8
Year: 2010
Spatial Cluster Coverage of Sensor Networks

Author(s): G.N. Purohit , Megha Sharma
Volume: 2
Issue: 8
Year: 2010
Low Budget Honeynet Creation and Implementation for Nids and Nips

Author(s): Aathira K. S, Hiran V. Nath, Thulasi N. Kutty, Gireesh Kumar T
Volume: 2
Issue: 8
Year: 2010
An Adoptive Algorithm for Mining Time-Interval Sequential Patterns

Author(s): Hao-En Chueh and Yo-Hsien Lin
Volume: 2
Issue: 8
Year: 2010
An Exploration of Ad-hoc Network in a Real World builds in a Laboratory Environment

Author(s): Nitiket N Mhala and N K Choudhari
Volume: 2
Issue: 8
Year: 2010
Cryptanalysis of a Modified Hill Cipher

Author(s): Liam Keliher
Volume: 2
Issue: 7
Year: 2010
A Novel Session Based Bit Level Text Encryption and Hiding Technique Using Cross Fold Transposition and Palette Based Steganography

Author(s): Tanmay Bhattacharya, Annwesha Banerjee and S. R. Bhadra Chaudhuri
Volume: 2
Issue: 7
Year: 2010
High Performance Certificate Authority Scheme in Manet

Author(s): A.Rajaram and Dr.S.Palaniswami
Volume: 2
Issue: 7
Year: 2010
A Large Capacity Steganography Using Bit Plane Complexity Segmentation (BPCS) algorithm for MPEG-4 Video

Author(s): M.Anandkumar, K. Appathurai, P. Nagarajan and Dr.M. Hemalatha
Volume: 2
Issue: 7
Year: 2010
Algorithmic Comparison between Polynomial Base and Matrix Base NTRU Cryptosystem

Author(s): Rakesh Nayak, Dr. C.V Sastri and Dr. Jayaram Pradhan
Volume: 2
Issue: 7
Year: 2010
Novel Design of Fast RBSD Adder with Reduced NOR-NOR Logic

Author(s): Rakesh Kumar Saxena, Neelam Sharma and A. K. Wadhwani
Volume: 2
Issue: 7
Year: 2010
Effects of Nonlinear Phenomena in Performance of Wavelength Division Multiplexing (WDM) Network for Fiber to the Home Applications

Author(s): S.Sugumaran, Lakshmi Narayana K, Dr.S.K.Sudheer, Dr. P.Arulmozhi varman
Volume: 2
Issue: 7
Year: 2010
Performance of Cluster-Based Multi-Source Multicasting in Mobile Ad hoc Networks

Author(s): R. Pandi Selvam and V.Palanisamy
Volume: 2
Issue: 7
Year: 2010
Comparative Analysis for IPv4 and IPv6 Protocol to Evaluate Performance

Author(s): M.Anandkumar, K. Appathurai, P. Nagarajan and Dr.M. Hemalatha
Volume: 2
Issue: 7
Year: 2010
An Enhancement of AODV Routing Protocol for More Robust Wireless Sensor Network

Author(s): Zamree Che-aron, Wajdi Al-Khateeb and Farhat Anwar
Volume: 2
Issue: 7
Year: 2010
An Image Segmentation Based on Clustering of Spatial Patterns and Watershed Algorithm

Author(s): Kai-jian XIA, Jin-yi CHANG, Jin-cheng ZHOU
Volume: 2
Issue: 7
Year: 2010
Impedance-Based Image Reconstruction of the Field Distribution inside the Closed Phantom Using Finite Element Method

Author(s): Sarwan Kumar, Sneh Anand, Amit Sengupta
Volume: 2
Issue: 7
Year: 2010
GA based-Software Test Data Generator, Using Dynamic Repetition Frequency

Author(s): Maziyar Karbalaee Shabani, Mansour Ahmadi, Siroos Keshavarz, Faezeh Sadat Babamir and Seyed Mehrdad Babamir
Volume: 2
Issue: 7
Year: 2010
An Improved Method for Fuzzy Congestion Control in IEEE 802.11 Wireless Local Area Networks

Author(s): Arash Mohammadzadeh Gharehbaghi, M.A. Badamchizadeh
Volume: 2
Issue: 7
Year: 2010
Design and Implementation of a Hybrid Compression Technique for Ultrasound Images in Telemedicine

Author(s): Divya Mohandass, Dr.J.Janet
Volume: 2
Issue: 7
Year: 2010
Speech Compression: A Comparative Study between Discreet Wavelet and Wavelet Packet Decomposition

Author(s): Shijo M Joseph, Firoz Shah A and Babu Anto P
Volume: 2
Issue: 7
Year: 2010
Secure Source Routing Protocol for Mobile Adhoc Networks

Author(s): M.Rajesh Babu, Dr.S.Selvan
Volume: 2
Issue: 7
Year: 2010
A Performance Comparison of Multicast Routing Protocols in Ad hoc Networks

Author(s): Preeti Arora, Prof G N Purohit
Volume: 2
Issue: 7
Year: 2010
A Novel Approach for Lossy Compression using Modified Gray Scale Quantization

Author(s): V. U. K. Sastry and Ch. Samson
Volume: 2
Issue: 7
Year: 2010
A Protocol for Secret Key Infusion from Satellite Transmissions

Author(s): Mohamed Ridza Wahiddin, Noor Shamila Shanaz Noor Sham
Volume: 2
Issue: 7
Year: 2010
A Reliable Attack-Resistant Authenticated Routing Protocol for Mobile Adhoc Networks

Author(s): M.Rajesh Babu, Dr.S.Selvan
Volume: 2
Issue: 7
Year: 2010
Secured Interworking and Roaming between 3GPP LTE and Wireless Local Mesh Networks

Author(s): Faouzi Zarai, Ikbel Daly and Lotfi Kamoun
Volume: 2
Issue: 7
Year: 2010
Performance of Different Techniques for Text-Independent Speaker Identification in Noisy Environment

Author(s): Dr.S.T.Gandhe and Mr.J.H.Nirmal
Volume: 2
Issue: 7
Year: 2010
Session Based Load Optimization Techniques to Enhance Security & Efficiency of E-commerce Transactions

Author(s): R.K. Pateriya, J.L. Rana and S.C. Shrivastava
Volume: 2
Issue: 6
Year: 2010
Segmentation of MR Brain tumor using Parallel ACO

Author(s): J.Jaya and K.Thanushkodi
Volume: 2
Issue: 6
Year: 2010
An Optimization Problem for Evaluation of Image Segmentation Methods

Author(s): Javad Alikhani koupaei, Marjan Abdechiri
Volume: 2
Issue: 6
Year: 2010
Design of Scheduling Algorithm for Ad hoc Networks with Capability of Differential Service

Author(s): Seyed Hossein Hosseini Nazhad Ghazani, Jalil Jabari Lotf ,Mahsa Khayyatzadeh, R.M. Alguliev
Volume: 2
Issue: 6
Year: 2010
A New Cluster-based Routing Protocol with Maximum Lifetime for Wireless Sensor Networks

Author(s): Jalil Jabari Lotf, seyed hossein hosseini nazhad ghazani, Rasim M. Alguliev
Volume: 2
Issue: 6
Year: 2010
Experimental Comparison of Fiber Optic Link Impact on Shift Keying Modulations

Author(s): Dr. Mohammad Samir Modabbes
Volume: 2
Issue: 6
Year: 2010
Using Word Distance Based Measurement for Cross-lingual Plagiarism Detection

Author(s): Moslem mohammadi, Morteza analouei
Volume: 2
Issue: 6
Year: 2010
ICAR: Intelligent Congestion Avoidance Routing for Open Networks

Author(s): Dr. P.K.Suri, Kavita Taneja
Volume: 2
Issue: 6
Year: 2010
Study the Effect of Node Distribution on QoS Multicast

Author(s): Mohammed Saghir
Volume: 2
Issue: 6
Year: 2010
Scalable ACC-DCT Based Video Compression Using Up/Down Sampling Method

Author(s): G.Suresh, P.Epsiba, Dr.M.Rajaram, Dr.S.N.Sivanandam
Volume: 2
Issue: 6
Year: 2010
Comparative Study of Continuous Density Hidden Markov Models (CDHMM) and Artificial Neural Network (ANN) In Infant’s Cry Classification System

Author(s): Yousra Abdulaziz Mohammed, Sharifah Mumtazah Syed Ahmad
Volume: 2
Issue: 6
Year: 2010
Reliable Soft-Checkpoint Based Fault Tolerance Approach for Mobile Distributed Systems

Author(s): Surender Kumar, R.K. Chauhan and Parveen Kumar
Volume: 2
Issue: 6
Year: 2010
A Specific Replication Strategy of Middleware Resources in Dense MANETs

Author(s): Anil Kumar, Parveen Gupta, Pankaj Verma & Vijay Lamba
Volume: 2
Issue: 6
Year: 2010
Clustering Based Machine Learning Approach for Detecting Database Intrusions in RBAC Enabled Databases

Author(s): Udai Pratap Rao,G. J. Sahani, Dhiren R. Patel
Volume: 2
Issue: 6
Year: 2010
Automated Detection and Recognition of Face in a Crowded Scene

Author(s): Chandrappa D N, M Ravishankar, D R RameshBabu
Volume: 2
Issue: 6
Year: 2010
Solution for Green Computing

Author(s): Rajguru P.V., Nayak S.K. More D.S.
Volume: 2
Issue: 6
Year: 2010
Power Management in Wireless ad-hoc Networks with Directional Antennas

Author(s): Mahasweta Sarkar, Ankur Gupta
Volume: 2
Issue: 6
Year: 2010
Formal Specification for Implementing Atomic Read/Write Shared Memory in Mobile Ad Hoc Networks Using the Mobile Unity

Author(s): Fatma.A.Omara, Said El Zoghdy, Reham.A.Shihata
Volume: 2
Issue: 6
Year: 2010
Universal Tool for University Course Schedule Using Genetic Algorithm

Author(s): Mohamed Tahar Ben Othman
Volume: 2
Issue: 6
Year: 2010
Proxy Blind Signature based on ECDLP

Author(s): Asis Kumar Tripathy, Ipsita Patra and Debasish Jena
Volume: 2
Issue: 6
Year: 2010
Cryptography of a Gray Level Image Using a Modified Hill Cipher

Author(s): . U. K. Sastry, D. S. R. Murthy, S. Durga Bhavani
Volume: 2
Issue: 6
Year: 2010
Secure Password Authenticated Three Party Key Agreement Protocol

Author(s): Pritiranjan Bijayasingh, Debasish Jena
Volume: 2
Issue: 6
Year: 2010
The Use of Mobile Technology In Delivering E-Learning Contents: UNITEN experience

Author(s): Mohd Hazli.M.Z, Mohd Zaliman Mohd Yusoff, Azlan Yusof
Volume: 2
Issue: 6
Year: 2010
BER Analysis of BPSK Signal in AWGN Channel

Author(s): Dr. Mohammad Samir Modabbes
Volume: 2
Issue: 6
Year: 2010
Relative Performance of Scheduling Heuristics in Heterogeneous Computing Environment

Author(s): Ehsan Ullah Munir, Shengfei Shi, Zhaonian Zou, Muhammad Wasif Nisar, Kashif Ayyub, Muhammad Waqas Anwar
Volume: 2
Issue: 6
Year: 2010
A Bidding based Resource Allocation Scheme in WiMAX

Author(s): Mahasweta Sarkar, Padmasini Chandramouli
Volume: 2
Issue: 6
Year: 2010
Phase Information Extraction of Atrial Fibrillation Using Wavelets

Author(s): V.Bindhu, G.Ranganathan, Dr.R.Rangarajan
Volume: 2
Issue: 5
Year: 2010
Color Image Segmentation Using Double Markov Random Field (DMRF) Model with Edge Penalty Function

Author(s): Sami M. Halawani, Ibrahim A. Albidewi, M. M. Sani, M. Z. Khan
Volume: 2
Issue: 5
Year: 2010
Probability of Inquiry Interference in Bluetooth Discovery: Mathematical Analysis and Modeling

Author(s): Khaled Morsi, Gao Qiang and Xiong Huagang
Volume: 2
Issue: 5
Year: 2010
Graph Matching Measure for Document Retrieval

Author(s): Amina Ghardallou Lasmar, Anis Kricha and Najoua Essoukri Ben Amara
Volume: 2
Issue: 5
Year: 2010
An improved low voltage, low power class AB operational transconductance amplifier for mobile Applications

Author(s): M.SanthanaLakshmi, Dr. P.T. Vanathi
Volume: 2
Issue: 5
Year: 2010
Analysis of Subband Speech Enhancement Technique for Digital Hearing Aids

Author(s): D. Deepa, Dr. A. Shanmugam
Volume: 2
Issue: 5
Year: 2010
Cluster Based Hierarchical Routing Protocol For Wireless Sensor Network

Author(s): Md. Golam Rashed, M. Hasnat Kabir, Muhammad Sajjadur Rahim, Shaikh Enayet Ullah
Volume: 2
Issue: 5
Year: 2010
A Critical Evaluation of Relational Database Systems for OLAP Applications

Author(s): Sami M. Halawani, Ibrahim A. Albidewi, Jahangir Alam and Zubair Khan
Volume: 2
Issue: 5
Year: 2010
A Novel Architecture for QoS Management in MANET using Mobile Agent

Author(s): A.K.Vatsa, Gaurav Kumar
Volume: 2
Issue: 5
Year: 2010
CAN Bus, an Efficient Approach for Monitoring and Controlling

Author(s): Rashmi Jain, N. G. Bawne
Volume: 2
Issue: 5
Year: 2010
An Efficient Key Management Scheme for Mobile Ad hoc Networks with Authentication

Author(s): N.Suganthi, Dr. V.Sumathy
Volume: 2
Issue: 5
Year: 2010
Factors Identification of Software Process Model – Using a Questionnaire

Author(s): Abdur Rahshid Khan, Zia Ur Rehman
Volume: 2
Issue: 5
Year: 2010
MOBINA: A Novel DBA Method Based on Second Price Auction in Ethernet Passive Optical Network

Author(s): AR. Hedayati, M.N Feshaaraki,K. Badie, A. Khademzadeh and M. Davari
Volume: 2
Issue: 5
Year: 2010
An Efficient Solution for Privacy Preserving Association Rule Mining

Author(s): Chirag N. Modi, Udai Pratap Rao and Dhiren R. Patel
Volume: 2
Issue: 5
Year: 2010
Coloring of Triangle Free Girth Graphs with Minimal k-Colors

Author(s): Dr. Mohammad Malkawi , Dr. Mohammad Al-Hajj Hasan
Volume: 2
Issue: 5
Year: 2010
An Improved Proxy Ring Signature Scheme with Revocable Anonymity

Author(s): Binayak Kar, Pritam Prava Sahoo and Ashok Kumar Das
Volume: 2
Issue: 5
Year: 2010
Route Information Update in Mobile Ad Hoc Networks

Author(s): Seungjin Park, Seong-Moo Yoo
Volume: 2
Issue: 5
Year: 2010
Performance of DSR Protocol over Sensor Networks

Author(s): Khushboo Tripathi, Tulika Agarwal and S. D. Dixit
Volume: 2
Issue: 5
Year: 2010
A Novel Run-Time Memory Leak Detection and Recovery (MLDR) Using Aging in Physical Memory Space

Author(s): Ahmed Otoom, Mohammad Malkawi and Mohammad Alweh
Volume: 2
Issue: 5
Year: 2010
Security Issues for Voice over IP Systems

Author(s): Ali Tahir, Asim Shahzad
Volume: 2
Issue: 5
Year: 2010
Travelling Salesman’s Problem: A Petri net Approach

Author(s): Sunita Kumawat, G.N.Purohit
Volume: 2
Issue: 5
Year: 2010
Face Recognition Using Subspace LDA

Author(s): Sheifali Gupta, O.P.Sahoo, Ajay Goel and Rupesh Gupta
Volume: 2
Issue: 5
Year: 2010
Principle Component Analysis From Multiple Data Representation

Author(s): Rakesh Kumar yadav, Abhishek K Mishra, Navin Prakash and Himanshu Sharma
Volume: 2
Issue: 5
Year: 2010
Energy-efficient Algorithm for a novel clustering approach in w/s networks

Author(s): S. Sarah, P. Kumaran, Dr. A. Arul Lawrence Selvakumar
Volume: 2
Issue: 5
Year: 2010
Centralized Framework for Real Time Traffic in Vehicular Ad hoc Networks

Author(s): Nazish Khan, Dr. Anjali Mahajan
Volume: 2
Issue: 5
Year: 2010
Energy efficient wireless networks

Author(s): Dr. Neeraj Tyagi, Awadhesh Kumar, Ajit Kumar, Er. Rati Agarwal
Volume: 2
Issue: 5
Year: 2010
Performance Evaluation of a Reed-Solomon Encoded Multi-user Direct Sequence Code Division Multiple Access (DS-CDMA) Communication System

Author(s): Nargis Parvin, Farhana Enam, Shaikh Enayet Ullah, Md. Saifur Rahman
Volume: 2
Issue: 5
Year: 2010
Information System with Interlacing, key dependent Permutation and rotation

Author(s): Prasad Reddy. P.V.G.D, K.R.Sudha, P Sanyasi Naidu
Volume: 2
Issue: 5
Year: 2010
Adaptive Modulation Techniquesfor WIMAX

Author(s): B.Chaitanya, T.Sai Ram Prasad, K.Sruthi and T.Tejaswi
Volume: 2
Issue: 5
Year: 2010
PET/CT and MR Image Registration using Normalized Cross Correlation Algorithm and Spatial Transformation Techniques

Author(s): B.Balasubramanian Dr. K. Porkumaran
Volume: 2
Issue: 5
Year: 2010
Performance Evaluation of MPEG-4 Video Transmission over IEEE802.11e

Author(s): Abdirisaq Mohammed Jama, Sinzobakwira Issa and Othman O. Khalifa
Volume: 2
Issue: 5
Year: 2010
A Model-driven Approach for Runtime Assurance of Software Architecture Model

Author(s): Yujian Fu, Xudong He, Sha Li, Zhijiang Dong and Phil Bording
Volume: 2
Issue: 5
Year: 2010
Analysis of Three Phase Four Wire Inverter for UPS Fed Unbalanced Star Connected Load

Author(s): R.Senthil Kumar, Dr. Jovitha Jerome, S.NithyaBhama
Volume: 2
Issue: 4
Year: 2010
Biometrics Based File Transmission Using RSA Cryptosystem

Author(s): Cryptography, Biometrics, RSA, DSS, KDC
Volume: 2
Issue: 4
Year: 2010
An ASes stable solution in I-Domain

Author(s): G. Mohammed Nazer, Dr.A.Arul Lawrence Selvakumar
Volume: 2
Issue: 4
Year: 2010
A Secure Iris Image Encryption Technique Using Bio-Chaotic Algorithm

Author(s): Abdullah Sharaf Alghamdi, Hanif Ullah
Volume: 2
Issue: 4
Year: 2010
Routing protocols in wireless networks

Author(s): Vineet Agrawal, Dr Yashpal Singh, Manish Varshney, Vidushi Gupta
Volume: 2
Issue: 4
Year: 2010
Analysis and Proposal of a Geocast Routing Algorithm Intended For Street Lighting System Based On Wireless Sensor Networks

Author(s): Rodrigo Palucci Pantoni , Dennis Brandão
Volume: 2
Issue: 4
Year: 2010
A Method of Access in a Dynamic Context Aware Role Based Access Control Model for Wireless Networks

Author(s): Dr. A.K. Santra, Nagarajan S
Volume: 2
Issue: 4
Year: 2010
New Power Aware Energy Adaptive protocol with Hierarchical Clustering for WSN

Author(s): Mehdi Golsorkhtabar, Mehdi Hosinzadeh, Mir Javad Heydari, Saeed Rasouli
Volume: 2
Issue: 4
Year: 2010
Design and Implementation of A GUI Based on Neural Networks for the Currency Verification

Author(s): Ajay Goel, O.P.Sahu, Rupesh Gupta, Sheifali Gupta
Volume: 2
Issue: 4
Year: 2010
Analysis of Searching Techniques and Design of Improved Search Algorithm for Unstructured Peer – to – Peer Networks

Author(s): Dr. Yash Pal Singh, Rakesh Rathi, Jyoti Gajrani, Vinesh Jain
Volume: 2
Issue: 4
Year: 2010
RD-Optimisation analysis for H.264/AVC scalable video coding

Author(s): Sinzobakwira Issa, Abdi Risaq M. Jama, Othman Omar Khalifa
Volume: 2
Issue: 4
Year: 2010
Artifact Extraction and Removal from EEG Data Using ICA

Author(s): Ashish Sasankar, Dr. N.G Bawane, Sonali Bodkhe, M.N.Bawane
Volume: 2
Issue: 4
Year: 2010
Design of a Novel Cryptographic Algorithm using Genetic Functions

Author(s): Praneeth Kumar G and Vishnu Murthy G
Volume: 2
Issue: 4
Year: 2010
Steganography Security for Copyright Protection of Digital Images Using DWT

Author(s): K.T.Talele, Dr.S.T.Gandhe, Dr.A.G.Keskar
Volume: 2
Issue: 4
Year: 2010
Self Encrypting Data Streams for Digital Signals

Author(s): A.Chandra Sekhar, Ch.Suneetha, G.Naga Lakshmi
Volume: 2
Issue: 4
Year: 2010
Cluster Management using Cluster Size Ratio in Ad Hoc Networks

Author(s): D K L V Chandra Mouly, Ch D V Subba Rao, M M Naidu
Volume: 2
Issue: 4
Year: 2010
Powers of a Graph and Associated Graph Labeling

Author(s): G. N. Purohit, Seema Verma and Usha Sharma
Volume: 2
Issue: 4
Year: 2010
Hexagonal Coverage by Mobile Sensor Nodes

Author(s): G.N. Purohit, Seema Verma, Megha Sharma
Volume: 2
Issue: 4
Year: 2010
An Approach to Protection at Peer-To-Peer Networks

Author(s): Dr.G.Srinivasa Rao, Dr.G. Appa Rao, S. Venkata Lakshmi, D. Veerabhadra Rao, B. Venkateswar Reddy, P. Venkateswara Rao, K. Sanjeevulu.
Volume: 2
Issue: 4
Year: 2010
Redevelopment of Graphical User Interface for IPMS Web Portal

Author(s): Hao Shi
Volume: 2
Issue: 4
Year: 2010
Markov Based Mathematical Model of Blood Flow Pattern in Fetal Circulatory System

Author(s): Sarwan Kumar, Sneh Anand , Amit Sengupta
Volume: 2
Issue: 4
Year: 2010
Progressive Image Compression with Ridgelets and Vector Quantization

Author(s): A.Vasuki, P.T.Vanathi
Volume: 1
Issue: 3
Year: 2009
Identifying, Measuring, and Implementing Cultural Difference in Cross-Cultural User Interface Design

Author(s): Jasem M. Alostath, Laila R. Abdulhadi Abdullah
Volume: 1
Issue: 3
Year: 2009
Performance Analysis of Diversity Schemes in Multi hop Ad hoc Networks

Author(s): Meenu Khurana and C. Rama Krishna
Volume: 1
Issue: 3
Year: 2009
Optimal Channel Allocation in Wireless Sensor Network using OFDMA

Author(s): Mohd. Sabir, Rakesh Kumawat and Dr. V.S.Chouhan
Volume: 1
Issue: 3
Year: 2009
Design and Experimental Analysis of High Performance Microstrip Antenna

Author(s): Raheel M. Hashmi, Arooj M. Siddiqui, M. Jabeen , K. Shehzad, S. Muzahir Abbas, K.S.Alimgeer
Volume: 1
Issue: 3
Year: 2009
Exploring spatial information in spectral features for Texture image retrieval

Author(s): Renuka Methre and M. Ravindranath
Volume: 1
Issue: 3
Year: 2009
MOSAODV: Solution to Secure AODV against Blackhole Attack

Author(s): N. H. Mistry, D. C. Jinwala and M. A. Zaveri
Volume: 1
Issue: 3
Year: 2009
Handwritten Tamil Character Recognition Using SVM

Author(s): Prof. Dr.J.Venkatesh, C. Sureshkumar
Volume: 1
Issue: 3
Year: 2009
Choase Based Image Encryption Using Block-Based Transformation Algorithm

Author(s): Kamlesh Gupta, Sanjay Silakari
Volume: 1
Issue: 3
Year: 2009
Design of a 2.2-4.0 GHz Low Phase Noise and Low Power LC VCO

Author(s): Namrata Prasad, R. S. Gamad and C. B. Kushwah
Volume: 1
Issue: 3
Year: 2009
Statistical Analysis of Defect Amplification Index in Domain Variant Commercial Software Application Development through Fault Injection Patterns

Author(s): Mr. P Mohammed Shareef, Dr. M V Srinath and Dr.S.Balasubramanian
Volume: 1
Issue: 3
Year: 2009
Suggestion of New Core Point of Attacks on IEEE 802.16e Networks: A Survey

Author(s): Adnan Khan Akhunzada, Saeed Murtaza, Ahmad Raza Cheema and Arif Wahla
Volume: 1
Issue: 3
Year: 2009
Comprehensive Analysis and Enhancement of Steganographic Strategies for Multimedia Data Hiding and Authentication

Author(s): Ali Javed, Asim Shahzad, Romana shahzadi, Fahad Khan
Volume: 2
Issue: 3
Year: 2010
Capacity Enhancement of 3G Cellular System using Switched Beam Smart Antenna with Windowed Beam former

Author(s): Prof. T. B. Lavate, Prof. V. K. Kokate, Prof. Dr A. M. Sapkal
Volume: 2
Issue: 3
Year: 2010
Implementation of Watermarking for a Blind Image using Wavelet Tree Quantization

Author(s): S.M.Ramesh, Dr.A.Shanmugam, B.Gomathy
Volume: 2
Issue: 3
Year: 2010
Data Encryption technique using Location based key dependent Permutation and circular rotation

Author(s): Prasad Reddy. P.V.G.D, K.R.Sudha , S.Krishna Rao
Volume: 2
Issue: 3
Year: 2010
Resource Allocation in Wireless Networks

Author(s): Manish Varshney, Dr Yashpal Singh, Vidushi Gupta
Volume: 2
Issue: 3
Year: 2010
Remote Laboratory for Teaching Mobile Systems

Author(s): Adil SAYOUTI, Adil LEBBAT, Hicham MEDROMI, Fatima QRICHI ANIBA
Volume: 2
Issue: 3
Year: 2010
An Integrated Approach for Legacy Information System Evolution

Author(s): Dr. Shahanawaj Ahamad
Volume: 2
Issue: 3
Year: 2010
Towards In-Car Ad Hoc Network for Pervasive Multimedia Services

Author(s): Kamal Sharma, Hemant Sharma, Dr. A K Ramani
Volume: 2
Issue: 3
Year: 2010
New Illumination Compensation Method for Face Recognition

Author(s): Heng Fui Liau, Dino Isa
Volume: 2
Issue: 3
Year: 2010
Modeling and Simulation of Synchronous Buck Converter for PMG in Low Power Applications

Author(s): R. Bharanikumar, A. Nirmal Kumar and K.T. Maheswari.
Volume: 2
Issue: 3
Year: 2010
DDOM: The Dynamic Data Oriented Model for Image Using Binary Tree

Author(s): A.Shahrzad Khashandarag, A.Mousavi, R.Aliabadian, D. Kheirandish, A.Ranjide Rezai
Volume: 2
Issue: 3
Year: 2010
Improving Information Accessibility In Maintenance Using Wearable Computers

Author(s): Lt.Dr.S Santhosh Baboo, Nikhil Lobo
Volume: 2
Issue: 3
Year: 2010
Cryptanalysis of an efficient biometrics-based remote user authentication scheme using smart cards

Author(s): Fuw-Yi Yang, Jian-Sen Wang
Volume: 2
Issue: 3
Year: 2010
Design and VLSI implementation of Fuzzy Logic Controller

Author(s): Balwinder Singh , Rajneesh Goyal , Rakesh Kumar and R.P.P Singh
Volume: 1
Issue: 3
Year: 2009
An Approach to Apply Fuzzy Set in Classical Database

Author(s): Sadia Husain, Afshar Alam and Yasir Ahmad
Volume: 1
Issue: 3
Year: 2009
Enhancement in the Identities-Exchange Process during the Authentication Process

Author(s): Amr M. Kisk, Nagy W. Messiha, Nabil M. A. Ayad , Nawal A. Elfeshawy and Fathi E. Abdel-Samie
Volume: 1
Issue: 3
Year: 2009
Integrated Intrusion Detection using SCT

Author(s): Selvakani Kandeeban and R. S. Rajesh
Volume: 1
Issue: 2
Year: 2009
Low Memory Strip Based Visual Saliency Algorithm for Hardware Constrained Environment

Author(s): Christopher Wing Hong Ngau, Li-Minn Ang, and Kah Phooi Seng
Volume: 1
Issue: 2
Year: 2009
Lips Detection using Closed Boundary Watershed and Improved H∞ Lips Tracking System

Author(s): Siew Wen Chin, Kah Phooi Seng, Li-Minn Ang and King Hann Lim
Volume: 1
Issue: 2
Year: 2009
3D Face Recognition using Combination Rule for Horizontal and Vertical Face Contour

Author(s): Wei Jen Chew, Kah Phooi Seng and Li-Minn Ang
Volume: 1
Issue: 2
Year: 2009
A modular network interface adapter design for OCP compatibles NoCs

Author(s): Brahim Attia, Abdelkrim Zitouni, Noureddine Abid and Rached Tourki
Volume: 1
Issue: 2
Year: 2009
An Efficient Adaptation Aware Caching Architecture for Multimedia Content Proxies

Author(s): B.L. Velammal and P. Anandha Kumar
Volume: 1
Issue: 2
Year: 2009
A Comprehensive Analysis of Voice Activity Detection Algorithms for Robust Speech Recognition System under Different Noisy Environment

Author(s): C.Ganesh Babu , Dr.P.T.Vanathi, R.Ramachandran, M.Senthil Rajaa and R.Vengatesh
Volume: 1
Issue: 2
Year: 2009
Mining Fuzzy Multidimensional Association Rules Using Fuzzy Decision Tree Induction Approach

Author(s): Rolly Intan, Oviliani Yenty Yuliana and Andreas Handojo
Volume: 1
Issue: 2
Year: 2009
An Assimilated Approach for Statistical Genome Streak Assay between Matriclinous Datasets

Author(s): Hassan Mathkour, Muneer Ahmad and Hassan Mehmood khan
Volume: 1
Issue: 2
Year: 2009
Wavelet based Watermarking Technique using Simple Preprocessing Methods

Author(s): S.MaruthuPerumal, B.Vijaya Kumar , L.Sumalatha and Dr. V.Vijaya Kumar
Volume: 1
Issue: 2
Year: 2009
Hybrid Content Location Failure Tolerant Protocol for Wireless Ad Hoc Networks

Author(s): Maher BEN JEMAA
Volume: 1
Issue: 2
Year: 2009
A Rough Set Model for Sequential Pattern Mining with Constraints

Author(s): Jigyasa Bisaria, Namita Srivastava and Kamal Raj Pardasani
Volume: 1
Issue: 2
Year: 2009
The Stone Cipher-192 (SC-192): A Metamorphic Cipher

Author(s): Magdy Saeb
Volume: 1
Issue: 2
Year: 2009
Automation of Data Warehouse, Extraction Transformation and Loading Update Cycle

Author(s): Atif Amin and Abdul Aziz
Volume: 2
Issue: 2
Year: 2010
Comprehensive analysis of UMTS Authentication and Key Agreement

Author(s): Engr. Mujtaba Hassan, Engr. Munaza Razzaq and Engr. Asim Shahzad
Volume: 2
Issue: 2
Year: 2010
Effect of error concealment methods on UMTS radio network capacity and coverage planning

Author(s): Dr. Bhumin H. Pathak, Dr. Geoff Childs and Dr. Maaruf Ali
Volume: 2
Issue: 2
Year: 2010
Performance analysis of Dynamic load Balancing Techniques for Parallel and Distributed Systems

Author(s): Z.Khan, R.Singh, J. Alam and R.Kumar
Volume: 2
Issue: 2
Year: 2010
Efficient Code Dissemination Reprogramming Protocol for WSN

Author(s): R.P.Shaikh , Dr. V.M. Thakare, Dr. R.V. Dharaskar
Volume: 2
Issue: 2
Year: 2010
Integration of Metaheuristic Algorithms for Minimum Spanning Tree

Author(s): R.Thamilselvan, Dr.P.Balasubramanie
Volume: 2
Issue: 2
Year: 2010
A Dynamic Trust-Based Context-Aware Authentication Framework with Privacy Preserving

Author(s): Abdallah MHAMED, Pierre E. ABI-CHAR, Bachar EL-HASSAN Mounir MOKHTARI
Volume: 2
Issue: 2
Year: 2010
Detection of Masses in Digital Mammograms

Author(s): J.Subhash Chandra bose, Marcus Karnan, and R.Sivakumar
Volume: 2
Issue: 2
Year: 2010
Browser Extensible Secured Hash Password Authentication for Multiple Websites

Author(s): T.S.Thangavel and Dr. A. Krishnan
Volume: 2
Issue: 2
Year: 2010
Partial Aggregation for Multidimensional Online Analytical Processing Structures

Author(s): Naeem Akhtar Khan and Abdul Aziz
Volume: 2
Issue: 2
Year: 2010
Impact and Performance Analysis of Mobility Models on Stressful Mobile WiMax Environments

Author(s): N Vetrivelan Dr. A V Reddy
Volume: 2
Issue: 2
Year: 2010
Column Vectorizing Algorithms for Support Vector Machines

Author(s): Chen ZhiYuan, Dino Isa and Peter Blanchfield
Volume: 2
Issue: 2
Year: 2010
Securing Digital Information using Quasigroups

Author(s): Saibal K. Pal and Shivam Kapoor
Volume: 2
Issue: 2
Year: 2010
Design of a 3.3GHz Band Application LC VCO for Low Phase noise and Low power Using Current Mirror

Author(s): Namrata Prasad, R. S. Gamad
Volume: 2
Issue: 2
Year: 2010
Segmentation Method Based On Circular Edge Magnitude for Classification of Textures

Author(s): Dr. A. Nagaraja Rao , K. Lavanya,G. Aruna Kumari, M.N. Hima Bindu
Volume: 2
Issue: 2
Year: 2010
Electrocardiogram Prediction Using Error Convergence-type Neuron Network System

Author(s): Shunsuke Kobayakawa, Hirokazu Yokoi
Volume: 2
Issue: 2
Year: 2010
Multiple region Multiple Quality ROI Encoding using Wavelet Transform

Author(s): P.Rajkumar and Madhu Shandilya
Volume: 2
Issue: 2
Year: 2010
Rough Set and BP Neural Network Optimized by GA Based Anomaly Detection

Author(s): REN Xun-yi, WANG Ru-chuan, and ZHOU He-Jun
Volume: 1
Issue: 2
Year: 2009
A Collaborative Framework for Human-Agent Systems

Author(s): Moamin Ahmed, Mohd Sharifuddin Ahmad and Mohd Zaliman Mohd Yusoff
Volume: 1
Issue: 2
Year: 2009
A New Clustering Algorithm for Increasing of Lifetime in sensor Networks

Author(s): Abbas Mirzaei Somarin, Habib Motee Ghader, Amir Masoud Rahmani and Ali Ghafar
Volume: 2
Issue: 2
Year: 2010
New method to decrease probability of failure nodes in WSNs

Author(s): Ali HosseinAlipour , Davood KeyKhosravi , Abbas Mirzaei Somarin
Volume: 2
Issue: 2
Year: 2010
New protocol to increase the reliability in WSNs

Author(s): Ali HosseinAlipour, Habib Moti Ghader, Mojtaba GorbanAlizadeh
Volume: 2
Issue: 2
Year: 2010
A Large Block Cipher Involving a Key Applied on Both the Sides of the Plain Text

Author(s): V. U. K. Sastry, D. S. R. Murthy, S. Durga Bhavani
Volume: 2
Issue: 2
Year: 2010
2- Dimension Automatic Microscope Moving Stage

Author(s): Ovasit P., Adsavakulchai S., Srinonghang W., and Ueatrongchit, P.
Volume: 2
Issue: 2
Year: 2010
Modified Feistel Cipher Involving Interlacing and Decomposition

Author(s): K.Anup Kumar , V.U.K. Sastry
Volume: 1
Issue: 2
Year: 2009
Forward Collision and Delay Avoidance Using Energy Efficient Collision Sets in WSN

Author(s): Bhushan N. Mahajan , Dr. R. V. Dharaskar and Dr. V. M. Thakare
Volume: 2
Issue: 2
Year: 2010
Efficient Coverage and Connectivity with Minimized Power Consumption in Wireless Sensor Networks

Author(s): A.Balamurugan, T.Purushothaman, and S.UmaMaheswari
Volume: 2
Issue: 10
Year: 2010
Comparison of Congestion Control Schemes in Wireless LAN using Satellite link and ATM Networks

Author(s): Dr.R.Seshadri and Prof.N.Penchalaiah
Volume: 2
Issue: 10
Year: 2010
Modeling a Balanced Score Card systems in IT departments using a fuzzy AHP and non linear regression approach regarding to mindset of evaluators

Author(s): Mohammad Mehdi Farhangian, Foad Marzoughi, and Alex Tze Hiang Sim
Volume: 2
Issue: 10
Year: 2010
Providing a model to estimate the probability of the complexity of software projects

Author(s): Foad Marzoughi, Mohammad Mehdi Farhangian and Alex Tze Hiang Sim
Volume: 2
Issue: 10
Year: 2010
Adoption OF Business Continuity Planning In IT Services Case Study: MyLinE

Author(s): Parvaneh Sarshar and Mohd Zaidi Abd Rozan
Volume: 2
Issue: 10
Year: 2010
Evaluation and improvement of resource retrieving method, using reinforcement learning in Grid Network

Author(s): Erfan Shams, Abolfazl Toroghi Haghighat and Ehsan Ghamari
Volume: 2
Issue: 10
Year: 2010
Design of CMOS Active-RC Low Pass Filter Using 0.18 µm

Author(s): Dilip Singar, D.S. Ajnar and Pramod Kumar Jain
Volume: 2
Issue: 10
Year: 2010
A Modified Framework of Knowledge Management System Components for Collaborative Software Maintenance

Author(s): Mohd Zali Mohd Nor, Rusli Abdullah, Masrah Azrifah Azmi Murad and Mohd Hasan Selamat
Volume: 2
Issue: 10
Year: 2010
Evolution Of FTTH As A Novel Subscriber’s Broadband Service Access Technology

Author(s): P. Rajeswari1, N. Lavanya and Shankar Duraikannan
Volume: 2
Issue: 10
Year: 2010
A Robustness Steganographic Method Against Noise For RGB Images Based On PCA

Author(s): Hamid Dehghani, Majid Gohari
Volume: 2
Issue: 10
Year: 2010
Hybrid Portable Document Format Protection Scheme based on Public key and Digital Watermarking

Author(s): Karim Shamekh, Ashraf Darwish and Mohamed Kouta
Volume: 2
Issue: 10
Year: 2010
An Efficient Intrusion Detection System for Mobile Ad Hoc Networks

Author(s): B.V. Ram Naresh Yadav, B.Satyanarayana, O.B.V.Ramanaiah
Volume: 2
Issue: 10
Year: 2010
Optimization of DTN routing protocols by using forwarding strategy (TSMF) and queuing drop policy (DLA)

Author(s): Sulma Rashid, Qaisar Ayub, M. Soperi Mohd Zahid , A.Hanan. Abdullah
Volume: 2
Issue: 10
Year: 2010
Protecting Consumers from the Menace of Phishing

Author(s): Vivian Ogochukwu Nwaocha
Volume: 2
Issue: 10
Year: 2010
Active Constellation Extension combined with Particle Swarm Optimization for PAPR Reduction in OFDM Signals

Author(s): A. Ouqour. Y. Jabrane, B. Ait Es Said, A. Ait Ouahman
Volume: 2
Issue: 10
Year: 2010
Object Handling Using Artificial Tactile Affordance System

Author(s): Naoto Hoshikawa, Masahiro Ohka and Hanafiah Bin Yussof
Volume: 2
Issue: 10
Year: 2010
Development of Smart Antennas for Wireless Communication System

Author(s): T. B. Lavate, Prof. V. K. Kokate and Prof. Dr. M.S. Sutaone
Volume: 2
Issue: 10
Year: 2010
A Novel Data Imputing Algorithm

Author(s): Ahmed sobhy, Hany Harb, Sherif Zaky and Helmi Mahran
Volume: 2
Issue: 10
Year: 2010
Denoising of Magnetic Resonance Images using Wavelets- A Comparative Study

Author(s): S Satheesh, Dr.KVSVR Prasad, and P.Vasuda
Volume: 2
Issue: 10
Year: 2010
Node Realization: Proposed techniques of random walk, statistical and clustering

Author(s): A.Kumar, P.Chakrabarti and P.Saini
Volume: 2
Issue: 10
Year: 2010
Optimizing AODV routing protocols through queuing creation and converting flow model into packet model in wireless sensor networks

Author(s): Ehsan Kharati , Alireza Baharizadeh, Meysam Chegini and Mohsen Amerion
Volume: 2
Issue: 10
Year: 2010
A Modified Hill Cipher Involving Permutation, Iteration and the Key in a Specified Position

Author(s): V.U.K.Sastry and Aruna Varanasi
Volume: 2
Issue: 10
Year: 2010
Security Architecture Objectives for Beyond 3G Mobile Networks: A Survey and Critical Evaluation

Author(s): Mana Yazdani, and Majid Naderi
Volume: 2
Issue: 10
Year: 2010
An Empirical Study to Investigate the Effectiveness of Masquerade Detection

Author(s): Jung Y. Kim, Charlie Y. Shim and Daniel McDonald
Volume: 2
Issue: 10
Year: 2010
An Intelligent Bidirectional Authentication Method

Author(s): Nabil EL KADHI and Hazem EL GENDY
Volume: 2
Issue: 10
Year: 2010
Semi-deflection Routing: A Non-minimal Fully-adaptive Routing for Virtual Cut-through Switching Network

Author(s): Yuri Nishikawa, Michihiro Koibuchi, Hiroki Matsutani and Hideharu Amano
Volume: 2
Issue: 10
Year: 2010
Knowledge Based Computing Using Semantic Web for Grid Applications

Author(s): M. Basheer Ahamed and J.Michael Anna Spinneli
Volume: 2
Issue: 10
Year: 2010
Combined Tactile Display Mounted on a Mouse

Author(s): Yiru Zhou, Cheng-Xue Yin, Masahiro Ohka and Tetsu Miyaoka
Volume: 2
Issue: 10
Year: 2010
Accumulation Point Model: Towards Robust and Reliable Deployment

Author(s): Yong Lin, Zhengyi Le and Fillia Makedon
Volume: 2
Issue: 10
Year: 2010
Analysis of Statistical Path Loss Models for Mobile Communications

Author(s): Y. Ramakrishna, Dr. P. V. Subbaiah and V. Ratnakumari
Volume: 2
Issue: 10
Year: 2010
Intelligent Online Course evaluation system Using NLP Approach

Author(s): Behrang Parhizkar | Kerfalla Kourouma | Siti Fazilah | Yap Sing Nian | Sujata Navartnam | Edmund Ng Giap Wen
Volume: 2
Issue: 10
Year: 2010
Design of Cryptographic Hash Algorithm using Genetic Algorithms

Author(s): Siva Prashanth J, Vishnu Murthy G and Praneeth Kumar Gunda
Volume: 2
Issue: 10
Year: 2010
Effect of Handoff on End-to-End Delay over Mobile IP Networks

Author(s): Reza Malekian, Abdul Hanan Abdullah and Elmarie Biermann
Volume: 2
Issue: 10
Year: 2010
The Online Scaffolding in the Project-Based Learning

Author(s): Sha Li
Volume: 2
Issue: 10
Year: 2010
Veracity Finding From Information Provided on the Web

Author(s): D.Vijayakumar, B.srinivasarao, M.Ananda Ranjit Kumar
Volume: 2
Issue: 10
Year: 2010
The Effect of Public String on Extracted String in A Fuzzy Extractor

Author(s): Yang Bo, Li Ximing and Zhang Wenzheng
Volume: 2
Issue: 10
Year: 2010
Novel Approach for High Secure Data Hidden in the MPEG Video Using Public Key Infrastructure

Author(s): A.A Zaidan, B.B Zaidan
Volume: 1
Issue: 1
Year: 2009
Evidence Gathering System for Input Attacks

Author(s): Deepak Singh Tomar, J.L.Rana and S.C.Shrivastava
Volume: 1
Issue: 1
Year: 2009
An Economical Model for Optimal Distribution of Loads for Grid Applications

Author(s): G. Murugesan, Dr.C. Chellappan
Volume: 1
Issue: 1
Year: 2009
Implementing Fuzzy-Genetic Algorithm in Mental Health Diagnostic Expert System

Author(s): Rozita Yati Masri, Dr. Hajar Mat Jani, Alicia Tang Yee Chong
Volume: 1
Issue: 1
Year: 2009
Monitoring Data on Internet

Volume: 1
Issue: 1
Year: 2009
Identity Application Fraud Detection using Web Mining and Rule-based Decision Tree

Author(s): Amany Abdelhalim and Issa Traore
Volume: 1
Issue: 1
Year: 2009
A Block Cipher Involving a Key Applied on Both the Sides of the Plain Text

Author(s): V. U. K. Sastry, D. S. R. Murthy, S. Durga Bhavani
Volume: 1
Issue: 1
Year: 2009
New Dynamic Approach for LZW Data Compression

Author(s): Dr.Bhupendra varma, Dushyant Chawara, Balwant Singh, Sonali Jain
Volume: 1
Issue: 1
Year: 2009
Karnaugh Map Model for Mining Association Rules in Large Databases

Author(s): Neelu Khare, Neeru Adlakha and K. R. Pardasani
Volume: 1
Issue: 1
Year: 2009
Using a Novel Intelligent Location Management Strategy in Wireless Networks

Author(s): J. Amar Pratap Singh, Marcus Karnan
Volume: 1
Issue: 1
Year: 2009
Distributed Optical Raman Amplifiers in Ultra High Speed Long Haul Transmission Optical Fiber Telecommunication Networks

Author(s): Abd El Naser A. Mohammed, Mohamed A. Metawe'e, Ahmed Nabih Zaki Rashed, and Mahmoud M. A. Eid
Volume: 1
Issue: 1
Year: 2009
An Investigation of Information Security Issues in the Indian Institutes of Higher Education: Current Security State and Practices

Author(s): D.S. Bhilare, Dr. A.K. Ramani, Dr. S. Tanwani
Volume: 2
Issue: 1
Year: 2010
NUMERIC TO NUMERIC ENCRYPTION OF DATABASES: Comparison of Standard Encryption and the Proposed 3Kdec Algorithms

Author(s): Dr. Himanshu Aggarwal, Kamaljit Kaur, Kanwalvir Singh Dhindsa, Ghanaya Singh
Volume: 2
Issue: 1
Year: 2010
Uniform Crossover Genetic Algorithm to Determine Base-Stock Levels in a Serial Supply Chain

Author(s): S.Narmadha, Dr.V.Selladurai and G.Sathis
Volume: 2
Issue: 1
Year: 2010
New Frame Work of Hidden Data with in Non Multimedia File

Author(s): Hamdan.O.Alanazi , Hamid A.Jalab , A.A Zaidan and B.B Zaidan
Volume: 2
Issue: 1
Year: 2010
Improving Computing Efficiency of a Wavelet Method Using ECG as a Biometric Modality

Author(s): Jianchu Yao, Yongbo Wan
Volume: 2
Issue: 1
Year: 2010
Performance of TCP/IP over wireless Networks using unaware Approach

Author(s): Kanwalvir Singh Dhindsa , Parminder Singh and Dr. Himanshu Aggarwal
Volume: 2
Issue: 1
Year: 2010
An Improved Biometric Remote User Authentication Scheme Based on Nonce

Author(s): Keerti Srivastava, Amit K Awasthi, R.C.Mittal
Volume: 2
Issue: 1
Year: 2010
An Image Classification Scheme For Increasing Reliability Of Least Square Method And Sample Pair Method

Author(s): Shreelekshmi R, M Wilscy, C E Veni Madhavan
Volume: 2
Issue: 1
Year: 2010
Finding Shortest Path on Probabilistic Fuzzy Networks Using Measure of Fuzziness Approach

Author(s): Seyedmohsen Hosseini
Volume: 2
Issue: 1
Year: 2010
Video Quality Enhancements with Implementation of NEWPRED method for MPEG-4 over simulated UMTS Channel Propagation Environments

Author(s): Dr. Bhumin Pathak, Dr. Geoff Childs, Dr. Maaruf Ali
Volume: 2
Issue: 1
Year: 2010
DNS cache-record coordination Using Adaptive Cache TTL Adjustment

Author(s): Isihara Tomohiro, Yuji Sekiya
Volume: 2
Issue: 1
Year: 2010
Load Balancing For Unstructured Peer to Peer Systems in Heterogeneous Network

Author(s): Havinash.P.H, M.Azath, K.Prasadh
Volume: 2
Issue: 1
Year: 2010
Robust Power Optimized Secured Routing Protocol for Wireless ADHOC Network

Author(s): E.V.Reddy, J.A. Kumar
Volume: 2
Issue: 1
Year: 2010
70MHz CMOS Gm-C 2nd Order Band Pass Filter for Wireless Systems

Author(s): Sampath.P and Dr.Gunavathi.K
Volume: 2
Issue: 1
Year: 2010
Analyzing Roberts Edge Detector for Digital Images Corrupted with Noise

Author(s): Raman Maini, Himanshu Aggarwal
Volume: 2
Issue: 1
Year: 2010
Digital Simulation of Electronic Transformer based Single-phase Induction Motor Drive

Author(s): K.Samidurai, Dr. K.Thanushkodi
Volume: 2
Issue: 1
Year: 2010
New Clustering protocol for increasing Wireless Sensor Networks Lifetime

Author(s): Ahmad Khadem Zadeh, Ali Hosseinalipour, Shahram Babaie
Volume: 2
Issue: 1
Year: 2010
MCDMfJ : Mining Creational Design Motifs from Java source code

Author(s): Praneeth Kumar G, Aditya Kumar K
Volume: 2
Issue: 1
Year: 2010
An Improved Implementation of Brain Tumor Detection using Soft Computing

Author(s): Marcus karnan, T.logeswari
Volume: 2
Issue: 1
Year: 2010
Comprehensive and Relatively Fast Web Archiving Application for Offline Browsing

Author(s): Mr. B.Vijaya Babu, Prof M.S.Prasad Babu
Volume: 2
Issue: 1
Year: 2010
Think You Can Teach Abroad