IF

bh

 

VOLUME 1 ISSUE 5 NOVEMBER 2010

ISSN 0975 - 9646

1.
Design of DFE Based MIMO Communication System for Mobile Moving with High Velocity
Pages : 319-323
S.Bandopadhaya, L.P. Mishra, D.Swain , Mihir N.Mohanty
Abstract | PDFPDF
2.
An Abstract memory model describing the interaction between thread and memory with
debugger tools
Pages : 324-328
Shruti Sandal , Dr.Raghuraj Singh ,Abdul Jabbar Khilji,,Shashi Shekhar Ranga, sanjay tejasvee
Abstract | PDFPDF
3.
A noval approach for retrieving an image using CBIR
Pages : 329-331
D.Mahidhar, M.V.S.N.Maheswar
Abstract | PDFPDF
4. A comparison between Public key authority and certification authority for distribution of public key
Pages: 332-336
Gaurav Agarwal , Saurabh Singh
Abstract | PDFPDF
5. Synthesis of DSP Systems using Data Flow Graphs for Silicon Area Reduction
Pages: 337-341
Rakhi S, PremanandaB.S, Mihir Narayan Mohanty
Abstract | PDFPDF
6. Analysis of Power Amplifier by Frontier Recognition and Histograms
Pages: 342-346
Surekha Chauhan, Prof. P.K. Ghosh ,Madan Shishodia
Abstract | PDFPDF
7. Study of Security in Wireless Sensor Networks
Pages: 347-354
Pooja Kumari, Mukesh Kumar, Rahul Rishi
Abstract | PDFPDF
8. An Efficient Routing scheme for reliable path establishment among Mobile Devices in Heterogeneous Networks
Pages: 355-362
R S Shaji, R S Rajesh, B. Ramakrishnan
Abstract | PDFPDF
9. Operating System based Compliance Validation of Trusted Computing
Pages: 363-365
Madan Singh, Surekha Chauhan
Abstract | PDFPDF
10. An Enhancing approach in MEDLINE & PubMed using Text Mining
Pages: 366-370
R.Santhanalakshmi, Dr.K.Alagarsami
Abstract | PDFPDF
11. Pattern Extraction, Classification and Comparison Between Attribute Selection Measures
Pages: 371-375
Subrata Pramanik, Md. Rashedul Islam, Md. Jamal Uddin
Abstract | PDFPDF
12. Article Removed due to Plagarism
Pages: 376-384
Abstract | PDFPDF
13. Effect of User-Unknown Email addresses in spammers' lists
Pages: 385-388
Rajiv Mahajan, Dr. Surjit Singh, Pavitar Singh
Abstract | PDFPDF
14. An Approach to Shortest Path Technique for BGP Using OSPF
Pages: 389-391
K.Krishna Chaitanya, Ch.Ravi Kishore
Abstract | PDFPDF
15. Jacobi computation using mobile agent
Pages: 392-401
Cyril Dumont, Fabrice Mourlin
Abstract | PDFPDF
16 Web Services Security Architectures using Role- Based Access Control
Pages: 402-407
K.Venkateswar Rao, Dr.M.Srinivasa Rao, K.Mrunalini Devi, Dr.D.Sravan Kumar, M.Upendra Kumar
Abstract | PDFPDF
17. Software Architectures Design Patterns Mining for Security Engineering
Pages: 408-413
A.V.Krishna Prasad, Dr.S.Ramakrishna
Abstract | PDFPDF
18. Combined Text Watermarking
Pages: 414-416
Suganya Ranganathan , Ahamed Johnsha Ali, Kathirvel.K & Mohan Kumar.M
Abstract | PDFPDF
19. Unsupervised Analysis of Arrhythmias using K-means Clustering
Pages: 417-419
Manpreet Kaur, A.S.Arora
Abstract | PDFPDF
20. Performance Analysis of 802.11 and 802.11p in Cluster Based Simple Highway Model
Pages: 420-426
B. Ramakrishnan, R. S. Rajesh, R. S. Shaji
Abstract | PDFPDF
21. Genetic Algorithms and Programming-An Evolutionary Methodology
Pages: 427-437
T. Venkat Narayana Rao , Srikanth Madiraju
Abstract | PDFPDF
22. Detection of Abnormal Masses in Mammogram Images
Pages: 438-442
Samir Kumar Bandyopadhyay
Abstract | PDFPDF
23. A Multiobjective Genetic Algorithm for Feature Selection in Data Mining
Pages: 443-448
Venkatadri.M, Srinivasa Rao.K
Abstract | PDFPDF
24. Research Directions in Semantic Web on Healthcare
Pages: 449-453
S.Gnanambal. M. Thangaraj
Abstract | PDFPDF
25. Text database cleaning by filling the Missing values using Object Oriented Intelligent
Multi-Agent System Data Cleaning Architecture

Pages: 454-464
G. Arumugam,T. Joshva Devadas
Abstract | PDFPDF
   
-All rights are reserved by International Journal of Computer Science and Information Technologies-