Volume 3

December 2012, Volume 3, Number 6

A Survey of Wireless Sensor Network Architectures
Almir Davis and Hwa Chang,Tufts University, USA

Techniques and Methodologies for Recognition of Tamil Typewritten and Handwritten Characters: A Survey
C P Sumathi and S Karpagavalli, S. D. N. B Vaishnav College for Women, India

Challenges and Weaknesses of Agile Method in Enterprise Architecture
Zahra Askarinejad Amiri, Staffordshire University, UK

Automatic Facial Expression Analysis A Survey
C. P. Sumathi1, T. Santhanam2 and M. Mahadevi1, 1SDNB Vaishnav College for Women, India and 2DG Vaishnav College
for Men, India

Regression Models for 2-Dimensional Cartesian Coordinates Prediction: A Case study at University of Mines and
Technology (UMaT), Tarkwa-Ghana.

Yao Yevenyo Ziggah1, Hu Youjian1, Christian Odutola Amans1, Bernard Kumi-Boateng2, 1China University of
Geosciences, Wuhan-P.R.China and 2University of Mines and Technology, Ghana

October 2012, Volume 3, Number 5

LED-ID System: Coverage And Fast Link Recovery Technique
Muhammad Shahin Uddin1, Mst. Nargis Aktar1 and Yeong Min Jang2, 1Mawlana Bhashani Science and Technology
University, Bangladesh and 2Kookmin University, South Korea

Assessments Of Different Speeded Up Robust Features (SURF) Algorithm Resolution For Pose Estimation Of UAV
Bassem Sheta1, Mohamed Elhabiby2 and Naser El-Sheimy2 1University of Calgary, Canada and 2Ain Shams University,
Egypt

Survey On Scheduling And Allocation In High Level Synthesis
M. Chinnadurai1 and M. Joseph2,1EGS Pillay Engineering College, India and 2Mother Teresa College of Engineering & Technology, India

DVR-Based Manet Routing Protocols Taxonomy
Mrinal Kanti Debbarma1, Santanu Kumar Sen2 and Sudipta Roy1, 1Triguna Sen School of Technology, India and
2Guru Nanak Institute of Technology, India

August 2012, Volume 3, Number 4

Second Generation Curvelet Transforms Vs Wavelet transforms and Canny Edge Detector for Edge Detection from
WorldView-2 data

Mohamed Elhabiby, Ahmed Elsharkawy and Naser El-Sheimy , University of Calgary,Alberta

Weaknesses, Vulnerabilities And Elusion Strategies Against Intrusion Detection Systems
Hossein Jadidoleslamy,The University of Guilan, Iran

A Survey On Various Approaches of Text Extraction in Images
C. P. Sumathi1, T. Santhanam2 and G. Gayathri Devi1, 1SDNB Vaishnav College for Women, India and 2DG Vaishnav
College for Men, India

Hybrid Technique For Knowledge Representation & A Comparative Study
Poonam Tanwar 1, T. V. Prasad1, Kamlesh Datta2, 1 Lingaya's University, India and 2National Institute
of Technology, India

A Survey on Terrorist Network Mining: Current Trends and Opportunities
Nisha Chaurasia, Mradul Dhakar, Akhilesh Tiwari and R. K. Gupta, MITS Gwalior, India

Computer-Aided Diagnosis of Thyroid Nodule: A Review
Deepika Koundal, Savita Gupta and Sukhwinder Singh, Panjab University, India

Web Search Result Clustering- A Review
Kishwar Sadaf and Mansaf Alam, Jamia MIllia Islamia, India

A Survey on Target Tracking Techniques in Wireless Sensor Networks
K. Ramya, K. Praveen Kumar, and V. Srinivas Rao,VR Siddhartha Engineering College, India

June 2012, Volume 3, Number 3

Security In Wireless Sensor Networks - Improving The LEAP Protocol
Delan Alsoufi, Khaled Elleithy, Tariq Abuzaghleh and Ahmad Nassar, University of Bridgeport, USA

Cross Layer Protocols For Multimedia Transmission In Wireless Networks
Santhosha Rao and Kumara Shama, Manipal University, India

Complete Synchronization Of Hyperchaotic Xu And Hyperchaotic Lu Systems Via Active Control
Sundarapandian Vaidyanathan, Vel Tech Dr. RR & Dr. SR Technical University, India

A Survey Of Dimensionality Reduction And Classification Methods
Nebu Varghese, Vinay Verghese, Gayathri. P and N. Jaisankar, VIT University, India

A Survey Of Sql Injection Countermeasures
R.P.Mahapatra and Subi Khan, SRM University, India

April 2012, Volume 3, Number 2

The necessities for building a model to evaluate Business Intelligence projects- Literature Rev
Vahid Farrokhi and Laszlo Pokoradi, University of Debrecen, Hungary

Energy Efficient Recognition Protocol for Ad Hoc Networks
Taresh Singh1 and S Qamar2,1 College of Engineering Roorkee, India and 2 SRM University, NCR Campus Modinagar
(U. p.)- India

The Study On Load Balancing Strategies In Distributed Computing System
Md. Firoj Ali and Rafiqul Zaman Khan, Aligarh Muslim University, India

The Proposal Of Hybrid Intrusion Detection For Defence Of Sync Flood Attack In Wireless Sensor Network
Ruchi Bhatnagar and Udai Shankar , IIMT Engineering College, India

Error Analysis of 3D Polygonal Model:A Survey
Devendra Singh Rajput1 and R Rama Kishore2, 1CSC India Pvt. Ltd. , India and 2 USIT, GGS Indraprastha University, India

Single Image Improvement using Superresolution
Shwetambari Shinde and Meeta Dewangan, CSIT-Bhilai,India

Nymble Blocking System
Anand Joshi, Arshiya Shaikh, Aruna Kadam and Vasudha Sahu, MAE Alandi (D), India

Inclusion Of Road Network In The Spatial Database For Features Searching Using Dynamic Index
S. Sivasubramanian and M.Samundeeswari, Bharath University , India

Performance Analysis of Coiflet-type Wavelets for a Fingerprint Image Compression by Using Wavelet and Wavelet
Packet Transform

Md. Rafiqul Islam1, Farhad Bulbul1 and Shewli Shamim Shanta2, 1Khulna University, Bangladesh and 2Rajshahi
University, Bangladesh

February 2012, Volume 3, Number 1

Adopting E-Commerce To User's Needs
Mohammad Alshehri1, Hamza Aldabbas1, James Sawle1 and Mai Abu Baqar 2, 1De Montfort University, United Kingdom
and 2Albalqa Applied University, Jordon

A comparative study analysis of materialized view for selection cost
T.Nalini, A.Kumaravel and K.Rangarajan, Bharath University, India

Energy Saving in Wireless Sensor Networks
Zahra Rezaei and Shima Mobininejad, Islamic Azad University, Iran

Spatiotemporal Data Mining: Issues, Tasks And Applications
K.Venkateswara Rao1, A.Govardhan2 and K.V.Chalapati Rao2, 1CVR College of Engineering, Ibrahimpatnam RR District,
India and 2JNTUH, India

Secure And Reliable Routing In Mobile Adhoc Networks
Rachid Haboub and Mohammed Ouzzif, ENSEM - ESTC - UH2C, Casablanca, Morocco

Watermarking Schemes For Copy Protection : A Survey
Dolley Shukla1 and Manisha Sharma2, 1 Shri Shankaracharya College of Engineering & Technology, India and
2Bhilai Institute of Technology, India

A Survey On Detect - Discovering And Evaluating Trust Using Efficient Clustering Technique For Manets
K.Sudharson and N.Partheeban, S.A.Engineering College, India

Fault Based Techniques For Testing Boolean Expressions: A Survey
Usha Badhera, Purohit G.N and S.Taruna, Banasthali University, India

Graph Partitioning Advance Clustering Technique
T. Soni Madhulatha, Alluri Institute of Management Sciences, India

Segment Based Visual Cryptography For Key Distribution
Sesha Pallavi Indrakanti1 and Avadhani P S2, 1 GVP Degree College, India and 2 Andhra University College
of Engineering, India

Secure Key Agreement And Authentication Protocols
B.Maheshwari, Alluri Institute of Management Sciences, India

Pattern Association For Character Recognition By Back-Propagation Algorithm Using Neural Network Approach
S.P.Kosbatwar and S.K.Pathan, Smt.Kashibai Navale College of Engineering, India