ISSN:0976-5166
Vol. 1, No.4 |
Article # |
Article Title & Authors (Volume 1 Number 4 December 2010) |
Page |
1. |
AN OVERVIEW OF MPEG FAMILY AND ITS APPLICATIONS
S.Vetrivel, M.Gowri, M.Sumaiya Sultana, Dr G.Athisha
Abstract | PDF |
240-250 |
2. |
COMPARATIVE STUDY OF DIFFERENT APPROACHES FOR EFFICIENT RECTIFICATION UNDER GENERAL MOTION
V.SRINIVASA RAO, A.SATYA KALYAN
Abstract | PDF |
251-257 |
3. |
DEVELOPMENT OF HASH TABLE BASED WEB-READY DATA MINING ENGINE
SK MD OBAIDULLAH
Abstract | PDF |
258-266 |
4. |
A COMPARATIVE STUDY BASED ON OPEN SOURCE CONTENT MANAGEMENT SYSTEMS
NIRAJ SINGHAL, TANMEYA MOHAN, SUBHAM SARKAR
Abstract | PDF |
267-276 |
5. |
AN OPTIMIZED GLOBAL SYNCHRONIZATION ON SDDCN
T.SANTHA, M.SHARANYA
Abstract | PDF |
277-282 |
6. |
QOS PARAMETER ANALYSIS ON AODV AND DSDV PROTOCOLS IN A WIRELESS NETWORK
Vijayalakshmi M., Avinash Patel , Linganagouda Kulkarni
Abstract | PDF |
283-294 |
7. |
DIGITAL WATERMARKING SCHEMES FOR AUTHORIZATION AGAINST COPYING OR PIRACY OF COLOR IMAGES
Keshav S Rawat, Dheerendra S Tomar
Abstract | PDF |
295-300 |
8. |
DATA MINING TECHNIQUES AND APPLICATIONS
Bharati M. Ramageri
Abstract | PDF |
301-305 |
9. |
Classification of Uncertain Data using Gaussian Process Model
G.V.SURESH, E.V.Reddy, Shabbeer Shaik
Abstract | PDF |
306-312 |
10. |
PERCEPTIVE APPROACH FOR ROUTE OPTIMIZATION IN MOBILE IP
Sumit Kumar, Anil Kumar, Vinay Kumar Nigam, Rakesh Kumar
Abstract | PDF |
313-320 |
11. |
Modified Pixel Sieve Method for Visual Cryptography
Vaibhav Choudhary, Kishore Kumar, Pravin Kumar, D.S. Singh
Abstract | PDF |
321-326 |
12. |
A Novel Information Security Scheme using Cryptic Steganography
B.RAJA RAO, P.ANIL KUMAR, K RAMA MOHANA RAO, M.NAGU
Abstract | PDF |
327-332 |
13. |
THE GREEN GRID SAGA -- A GREEN INITIATIVE TO DATA CENTERS: A REVIEW
PARTHA PRATIM RAY
Abstract | PDF |
333-339 |
14. |
WEB BASED E-LEARNING IN INDIA: THE CUMULATIVE VIEWS OF DIFFERENT ASPECTS
PARTHA PRATIM RAY
Abstract | PDF |
340-352 |
15. |
Lab Companion : A software for laboratory management
M.Grover, V.K. Sharma, S.Marla
Abstract | PDF |
353-356 |
16. |
BER ANALYSIS OF CODED AND UNCODED MIMO-OFDM SYSTEM IN WIRELESS COMMUNICATION
M.P. CHITRA, Dr. S.K.SRIVATSA
Abstract | PDF |
357-363 |
17. |
Comparative Study of Adhoc Routing Protocol AODV, DSR and DSDV in Mobile Adhoc NETwork
KAPANG LEGO, PRANAV KUMAR SINGH, DIPANKAR SUTRADHAR
Abstract | PDF |
364-371 |
18. |
Intelligence Intrusion Detection Prevention Systems using Object Oriented Analysis method
S.MURUGAN , DR.K.KUPPUSAMY
Abstract | PDF |
372-381 |
19. |
A NOVEL ROUTING ATTACK IN MOBILE AD HOC NETWORKS
NALLAMALA SRI HARI, DR. N. SRINIVAS RAO, DR. N. SATYANARAYANA
Abstract | PDF |
382-391 |
20. |
The Anatomy of Web Search Result Clustering and Search Engines
R.SUBHASHINI, V.JAWAHAR SENTHIL KUMAR
Abstract | PDF |
392-401 |
21. |
FlyPS - A PRICING AND QOS MODEL FOR PERVASIVE COMPUTING WITH AN AIRPORT ILLUSTRATION
DR. G. RADHAMANI, K. VANITHA, R. SASIKALA
Abstract | PDF |
402-408 |
22. |
Mutant Generation for Aspect Oriented Programs
MAYANK SINGH, SHAILENDRA MISHRA
Abstract | PDF |
409-415 |
23. |
COMPARISON OF LOSSLESS DATA COMPRESSION ALGORITHMS FOR TEXT DATA
S.R. Kodituwakku, U. S.Amarasinghe
Abstract | PDF |
416-425 |
24. |
A REVIEW OF M-LEARNING MODELS
Collins N. Udanor, Thomas A. Nwodoh
Abstract | PDF |
426-435 |
|
|
|