1 |
Optimization of Handoff Performance Containing Relay within 3GPP Long Term Evolution (LTE) Networks |
5 |
New Algorithm for Sensitive Rule Hiding using Data Distortion Technique Kasthuri S1 and Meyyappan T2. 1Swami Dayananda College of Arts and Science,India 2Alagappa University, India |
7 |
A Novel Recommendation Framework Based on Resource Flow on User-Object Network. Wang Heyu, Harbin Institute of Technology(Wei Hai),China. |
10 |
Secured Text Message Transmission with Implementation of Concatenated CFB Cryptographic Algorithm S.Saravanakumar, R.Senthil Kumar, B.S.Praviya Bharathi and H.Manju Priya. Panimalar Institute of Technology, Chennai. |
11 |
Automatically Estimating Software Effort and Cost using Computing Intelligence Techniques SJin-Cherng Lin , Han-Yuan Tzeng, and Yueh-Ting Lin Tatung University,Taiwan |
12 |
Next Generation 4G WiMAX Networks - IEEE 802.16 Standard : Shantanu Pathak and Shagun Batra. SRM University,India |
16 |
.Medical Image Compression based on Contourlet Transform Preserving
Region of Interest (ROI)
Sherin Jabbar and Shaiju Panchikkil MES Engineering College, India. |
17 |
An Efficient Hand Gesture Recognition Technique For Human-Computer Interface Intelligent Systems Elakkiya R1, Selvamani K1, Kanimozhi S2 and Kannan A1, 1Anna University, India. 2Ramco Systems, India. |
18 |
Applying Analytics Beyond Education: A Data Mining Approach Rashmita Jena and Chinmaya Sahu ,National Institute of Science and Technology,India |
19 |
Efficient Traffic Controlled AODV Routing Protocol for Wireless Sensor Networks A.Fiona Sharon and A.Mangaiyarkarasi, Thiagarajar College of Engineering, India |
20 |
A Fuzzy Logic Based Channel Allocation Scheme for Cognitive Radio Networks O. G. Dennis . Makerere University, Uganda. |
22 |
Backpropagation Learning Algorithm Based on Levenberg Marquardt Algorithm S.Sapna1, A.Tamilarasi2 and M.Pravin Kumar1 1 K.S.R College of Engineering, India. 2 Kongu Engineering College, India |
23 |
Web Log Preprocessing based on Partial Ancestral Graph Technique for Session Construction S. Chitra1 and .B. Kalpana2 1 Government Arts College,Coimbatore, India. 2 Avinashilingam Institute of Home Science and HigherEducation for Women,India |
24 |
Advanced Techniques for Preventing Selective Jamming Attacks Abhimanyu.V ,Muthu Hariharan.R.M and Vijayashankar.J SNS College of Technology,India. |
25 |
Data aware Searching using Content Query Language A.J.Khanapure Walchand Institute of Technology,India |
26 |
Medical Image Compression Based on Contourlet Transform Preserving Region of Interest (ROI) Sherin Jabbar and Shaiju Panchikkil MES Engineering College, India. |
27 |
Data Forwarding in Opportunistic Networks using Mobile Traces B.Poonguzharselvi and V.Vetriselvi Anna university Chennai,India |
28 |
A Review on Wireless Network Security Sandeep Sharma, Rajesh Mishra and Karan Singh Gautam Buddha University,India |
29 |
A Registry Based Discovery Mechanism for E-Learning Web Services Demian Antony D'Mello, Pramod Prabhu, Naveen Baliga, Nikhil Misquith and Flexon Fernandes St. Joseph Engineering College, India. |
30 |
Top Down Approach to Find Maximal Frequent Item Set First using Subset Creation Jnanamurthy HK , Vishesh HV ,Vishruth Jain and Preetham Kumar Manipal Institute of Technology, India. |
31 |
Designing a Tool for Image Cataloguing in Live Forensics using Descriptor Ms. Shubhangi T Patil and Ms. Nikita A Chavan GHRCE , India. |
32 |
Need of Programming Models, Tools and Algorithms for New Generation HPC (EXASCALE System) Abbas Mohammed1 and Niraj Updhyaya2 1VIFCET,India 2 JBIT, India |
33 |
Designing of TCP Based Hybrid Covert Channel Rajeshwari Goudar and Pournima More .University of Pune ,India |
36 |
Enhanced Replica Selection Technique for Binding Replica Sites in Data Grids Rafah M. Almuttairi 1, Mahdi S. Almahana1, Rajeev Wankar2, Atul Negi2, C. R. Rao2 1University of Babylon, Iraq. 2 University of Hyderabad , India. |
38 |
Broadcasting Suppression: A Broadcasting Scheme for Vehicular Ad-Hoc Networks Tejas Talele, Gauresh Pandit and Parimal Deshmukh. Pune University, India |
39 |
The Unified Operation Structure for Symmetric-Key Algorithm Kuo-Tsang Huang1 and Sung-Shiou Shen2 1Chang Gung University, Taiwan 2DE LIN Institute of Technology, Taiwan |
40 |
Effectiveness Prediction of Memory Based Classifiers for the Classification of Multivariate Data Set C. Lakshmi Devasena. Sphoorthy Engineering College, India |
41 |
Creation of a Test Bed Environment for Core Java Applications using White Box Testing Approaches Dhanamma Jagli and Priya R. L .V. E. S. Institute of Technology, India. |
42 |
Models for the Specification of the Decision-Maker Needs to Discover Useful Knowledge in Databases Rachid Chalal1, Fahima Nader1 and Nora Taibouni2. 1 LMCS Laboratory, Algeria 2 Department Studies & Development" of the Algerian national Company SONTRACH division "business" |
43 |
Performance Analysis of Spatial Color Interpolation Algorithms Vikas Gupta and Milind Mushrif Yeshwantrao. Chavan College of Engineering, India. |
45 |
Rule Based Structured Data Extraction from HTML Web Pages using Semantic Web Technologies A.M.Abirami 1, T.M.Aishwarya 1, K.S.Eswari 1 and A.Askarunisa 2 . 1Thiagarajar College of Engineering, India 2 Vickram College of Engg. ,India. |
48 |
Evolution of Wireless Mobilecommunication Networks and Future Ofcellular Market in India Arjun Kondur, Mayur Rao, Pavan Kumar B S and Rajeshwari Hegde. BMS College of Engineering, Bangalore, India |
50 |
iHoneycol:A Distributed Collaborative Technique for Mitigation of DDOS Attack M.Buvaneswari and .T.Subha. Srisairam engineering college ,India. |
51 |
A Novel Approach for Energy Efficient Hierarchy based Routing in Wireless Sensor Networks S.Karthikeyan1 and S.Jayashri2 . 1 Sathyabama university,India 2 Adhiparasakthi engineering college,India |
52 |
A New Hybrid Approach CrypSteg of Data Hiding in Images using Cryptography and Steganography Pria Bharti and Roopali Soni OCT , Bhopal, India . |