Volume 2

December 2012, Volume 2, Number 6

Study on Reconstruction Accuracy using shapiness index of morphological transformations
P.Radhakrishnan,King Khalid University, Kingdom of Saudi Arabia

Efficient Schema Based Keyword Search in Relational Databases
Myint Myint Thein and Mie Mie Su Thwin,University of Computer Studies, Myanmar

A Strategic Hybrid Technique to Develop a Game Player
Randle O.A, Tshwane University of Technology, South Africa

Identification and Investigation of the User Session for Lan Connectivity Via Enhanced Partition Approach of Clustering Techniques
K.Gunasekaran,Pavendar Bharathidasan College of Engineering & Technology,India.

Measurement of Semantic Similarity Between Words: A Survey
Ankush Maind, Anil Deorankar and Prashant Chatur,Government College of Engineering, Amravati,India

October 2012, Volume 2, Number 5

Design and Implementation of Multistage Interconnection Networks for SoC Networks
Mahsa Moazez1, Farshad Safaei2 and Majid Rezazadeh2, 1QIAU, Iran and 2Shahid Beheshti University G.C., Iran

Application Whitelisting: Approaches and Challenges
Himanshu Pareek, Sandeep Romana and P R L Eswari,Centre for Development of Advanced Computing, India

Data Mining: A prediction Technique for the workers in the PR Department of Orissa (Block and Panchayat)
Neelamadhab Padhy and Rasmita Panigrahi, Gandhi Institute of Engineering and Technology, India

Differentiated Services Ensuring QoS on Internet
Pawansupreet Kaur, Monika Sachdeva and Gurjeet Kaur, SBS State Technical Campus, India

Recommendation System Using Social Networking
Yoti Pareek1, Maitri Jhaveri2, Abbas Kapasi2 and Malhar Trivedi2, 1Gujarat University , India and 2Gujarat Technological University, India

Performance Analysis of Parallel Algorithms on Multi-core System using OpenMP
Sanjay Kumar Sharma and Dr. Kusum Gupta ,Banasthali University, India

Criterion based Two Dimensional Protein Folding Using Extended GA
T.Kalaichelvi1 and P.Rangarajan2, 1Sathyabama University, India and 2R.M.K.Engineering College,India

August 2012, Volume 2, Number 4

Distributed Coverage and Connectivity Preserving Algorithm with Support of Different Sensing Coverage Degrees in 3D
Mobile Sensor Actor Networks

Mohammad Javad Heydari and Saeid Pashazadeh ,University of Tabriz, Iran

Meta Data Quality Control Architecture in Data Warehousing
Ramesh Babu Palepu1 and K V Sambasiva Rao2, 1Amrita Sai Institute of Science & Technology,India and 2MVR College
of Engineering,India

June 2012, Volume 2, Number 3

Adaptable Fingerprint Minutiae Extraction Algorithm Based-on Crossing Number Method for Hardware Implementation
using FPGA Device

Sunny Arief Sudiro1 and Rudi Trisno Yuwono2, 1STMIK Jakarta STI&K, Indonesia , 2Gunadarma University, Indonesia.

A General Session Based Bit Level Block Encoding Technique using Symmetric Key Cryptography to Enhance
the Security of Network Based Transmission

Manas Paul1 and Jyotsna Kumar Mandal2, 1JIS College of Engineering, India, 2Kalyani University, India.

The Survey of Data Mining Applications and Feature Scope
Neelamadhab Padhy, Pragnyaban Mishra and Rasmita Panigrahi,GIET ,India.

Energy Efficient Multicast Routing in Manet
Sankar M S, and Suganthi B,Dhanalakshmi Srinivasan Engineering College, India.

Talash: A Semantic and Context Based Optimized Hindi Search Engine
Nandkishor Vasnik, Shriya Sahu, and Devshri Roy,MANIT, India.

Anti-Synchronization of Hyperchaotic Bao and Hyperchaotic Xu Systems via Active Control
Sundarapandian Vaidyanathan,Vel Tech Dr. RR & Dr. SR Technical University, India.

An Optimal Solution for Image Edge Detection Problem using Simplified Gabor Wavelet
C.Sujatha1 and D. Selvathi2,1Sethu Institute of Technology, India , 2Mepco Schlenk Engineering College, India.

A Review on Blind Still Image Steganalysis Techniques Using Features Extraction and Pattern Classification Method
Monisha Sharma and Swagota Bera, CSVT University,India

April 2012, Volume 2, Number 2

The Reduction in Computation Time in the Color Image Decomposition with the Bidimensional Empirical Mode
Decomposition Approach

Faten Ben Arfia1, Abdelouahed Sabri2, Mohamed Ben Messaoud1 and Mohamed Abid1, 1National Engineering
School of Sfax, Tunisia and 2Dhar El mahraz FES. Morocco.

Security Vigilance System through Level Driven Security Maturity Model
S. K. Pandey, The Institute of Chartered Accountants of India, India.

Algorithmic and Architectural Optimization of a 3D Reconstruction Medical Images Algorithm for a Hardware
Implementation

Mili Manel1, Mahmoud Bouraoui2, Boubaker Mohamed1,Ben Abdallah Asma1, Bedoui Mohamed Hedi1 and
Akil Mohamed3, 1University of Monastir, Tunisia , 2University of Sousse, Tunisia and 3University of Paris, France.

Probabilistic Interpretation of Complex Fuzzy Set
Nilambar Sethi1, S. K. Das2 and D.C. Panda3,1Gandhi Institute of Engineering & Technology, India,
2Berhampur University,India and 3Jagannath Institute of Technology & Management, India.

Factors Affecting Acceptance of Web-Based Training System: Using Extended Utaut and Structural Equation Modeling
Thamer A. Alrawashdeh, Mohammad I. Muhairat and Sokyna M. Alqatawnah,Alzaytoonah, University of Jordan, Jordan.

Using Data Mining Techniques for Diagnosis and Prognosis of Cancer Disease
Shweta Kharya, Bhilai Institute of Technology, India.

An Efficient Implementation of Tracking Using Kalman Filter for Underwater Robot Application
Nagamani Modalavalasa1, G SasiBhushana Rao2 and K. Satya Prasad3, 1SBTET, India, 2Andhra University, India and
3Jawaharlal Nehru Technological University Kakinada, India.

CSHURI - Modified HURI Algorithm for Customer Segmentation and Transaction Profitability
Jyothi Pillai1 and O.P.Vyas2, 1Bhilai Institute of Technology, India and 2Indian Institute of Information Technology
- Allahabad, India.

A Novel Window Function Yielding Suppressed Mainlobe Width and Minimum Sidelobe Peak
Md Abdus Samad, International Islamic University Chittagong,Bangladesh.

M-Fish Karyotyping - A New Approach Based on Watershed Transform
Sreejini K S, Lijiya A and V K Govindan, National Institute of Technology-Calicut, India.

Error Performance Analysis Using Cooperative Contention-Based Routing in Wireless Adhoc Networks
G.Srimathy, S.A Engineering College, India

Page Number Problem: An Evaluation of Heuristics and its Solution Using a Hybrid Evolutionary Algorithm
Dharna Satsangi, Kamal Srivastava and Gursaran, Dayalbagh Educational Institute, India.

Grey Level Co-Occurrence Matrices: Generalisation and Some New Features
Bino Sebastian V1,A.Unnikrishnan2 and Kannan Balakrishnan1,1Cochin University of Science and Technology, India and
2Naval Physical and Oceanographic Laboratory, India.

Automatic Identification of Cloud Cover Regions Using Surf
Mohamed Mansoor Roomi, R.Bhargavi and T.M.Hajira Rahima Banu, Thiagarajar College of Engineering, India.

Meta-Heuristics Based Arf Optimization for Image Retrieval
Darsana B1 and Rajan Chattamvelli2, 1The Oxford College of Engineering-Bangalore, India and 2Periyar Maniammai
University, India.

Detection of Concealed Weapons in X-Ray Images Using Fuzzy K-NN
Mohamed Mansoor Roomi and R.Rajashankari,Thiagarajar College of Engineering,India.

February 2012, Volume 2, Number 1

Gender Recognition System Using Speech Signal
Md. Sadek Ali, Md. Shariful Islam and Md. Alamgir Hossain, Islamic University, Bangladesh

Fuzzy Weighted Associative Classifier : A Predictive Technique for Health Care Data Mining
Sunita Soni1 and O.P.Vyas2, 1Bhilai Institute of Technology, India and 2Indian Institute of Information Technology
- Allahabad, India

Effect of Interleaved FEC Code on Wavelet Based MC-CDMA System with Alamouti STBC in Different Modulation
Schemes

Rifat Ara Shams, M. Hasnat Kabir and Sheikh Enayet Ullah, University of Rajshahi, Bangladesh

A Novel Dencos Model For High Dimensional Data Using Genetic Algorithms
T. Vijayakumar1, V.Nivedhitha2, K.Deeba2 and M. Sathya Bama2, 1Dr.N.G.P College of Engineering & Technology,
India and 2Akshaya College of Engineering & Technology, India

Performance Analysis of Fingerprinting Extraction Algorithm in Video Copy Detection System
R.Gnana Rubini, P.Tamije Selvy and P.Anantha Prabha, Sri Krishna College of Technology, India

Biometrics Authentication Technique for Intrusion Detection Systems Using Fingerprint Recognition
Smita S. Mudholkar, Pradnya M. Shende and Milind V. Sarode, Amravati University, India

Face Recognition Using Different Local Features with Different Distance Techniques
M.Koteswara Rao1, K.Veera Swamy1, K.Anithasheela2 and B.Chandra Mohan3, 1QIS College of Engineering & Technology, India,2JNTUH, India and 3Bapatla Engineering College, India

Biometric Application of Intelligent Agents in Fake Document Detection of Job Applicants
Salathiel Bogle and Suresh Sankaranarayanan, University of West Indies, Jamaica

A Model for Remote Access and Protection of Smartphones Using Short Message Service
K.S. Kuppusamy, Senthilraja.R and G. Aghila, Pondicherry University, India