Volume 1, Number 1, August 2009

  Citation Count

Ensemble Design for Intrusion Detection Systems
T. Subbulakshmi1, A.Ramamoorthi2 and S. Mercy Shalinie1, 1Thiagarajar College of Engineering, India and 2Sethu Institute of Technology, India

9

Design of a New Deterministic Algorithm for Finding Common DNA Subsequence
Bigyan Bhar and Nabendu Chaki, University Calcutta, India

1

Automatic Evolution of Ideas Through Multilayer Evolutionary System to Support Creative Thinking
Priti Srinivas Sajja1, Rajendra Akerkar2, David Camacho3, 1Sardar Patel University, India, 2Technomathematics Research Foundation, India and 3Universidad Autonoma de Madrid, Spain

0

Volume 1, Number 2, November 2009

  Citation Count

Multi-Focus Fusion Method Based on LADWT
Shwu-Huey Yen Yi-Ray Lin, Tamkang University, Taipei, Taiwan, R.O.C.

0

Effect of Variation of Separation between the Ultrasonic Transmitter and Receiver on the Accuracy of Distance Measurement
Ajay Kumar Shrivastava , Ashish Verma and S. P. Singh, Krishna Institute of Engineering and Technology, Ghaziabad (U.P.), India

05

Text Independent Speaker Recognition and Speaker Independent Speech Recognition Using Iterative Clustering Approach
A.Revathi, R.Ganapathy and Y.Venkataramani, Saranathan college of Engg., Trichy

29

Investigating the Performance of Various Vocoders for a Fair Scheduling Algorithm in WIMAX
B. Kaarthick Member IEEE, N.Nagarajan, V. J.Yeshwenth, P.M.Sudarsan, Network System Design Center, Sri Krishna College of Engineering & Technology,Coimbatore, India.

0

A Low Indexed Content Based Neural Network Approach for Natural Objects Recognition
G.Shyama Chandra Prasad and Dr. A.Govardhan, Dr. T.V.Rao ,Research Scholar, JNTUH, Hyderabad, AP. India.

02

Identification of Telugu, Devanagari and English Scripts Using Discriminating Features
M C Padma and P A Vijaya, PES College of Engineering, Mandya, India

19

Design and Implementation of 32-Bit Controller For Interfacing with reconfigurable computing systems.
Dr.Kota solomon Raju and Ashutosh Gupta,E-105, Digital System Group, CEERI,Pilani - 333031

13

Thesaurus And query Expansion
Hazra Imran and Aditi Sharan, Jamia Hamdard ,New Delhi ,India

52

Optimal Curve Fitting of Speech Signal for Disabled Children
Anandthirtha. B. GUDI, and H. C. Nagaraj, Sri Bhagawan Mahaveer Jain College of Engineering, India

05

Analysis on Deployment Cost and Network Performance for Heterogeneous Wireless Sensor Networks
Dilip Kumar1, Trilok. C Aseri2 and R. B Patel3, 1Centre for Development of Advanced Computing (C-DAC), India, 2Punjab Engineering College (PEC), India and 3Markandeshwar University (MMU), India

16

A collaborative PCE-Based mechanism for E2E recovery within MPLS-networks
EL KAMEL Ali, Youssef Habib,FSM, Monastir, Tunisia

0

Analysis of Telecommunication Management Technologies
Khalil ur rehman Laghari, Imen Grida ben Yahia, and Noel Crespi, France.

13

Volume 2, Number 1, February 2010

  Citation Count

A Model for Semantic Integration of Business Components
Larbi KZAZ1 , Hicham Elasri2 and Abderrahim.Sekkaki2, 1Groupe ISCAE, Morocco and 2University Hassan II Ain-chok, Morocco

7

Agent Based Trust Management in Distributed E-Business Environment
E.Sathiyamoorthy1, N.Ch.Sriman Narayana Iyenger1 and V.Ramachandran2, 1VIT University, India and 2Anna University,India.

7

Multi Dimensional CTL and Stratified Datalog
Theodore Andronikos1 and Vassia Pavlaki2, 1Ionian University, Greece,2 and National Technical University of Athens, Greece

0

An Efficient Gait Recognition System For Human Identification Using Modified ICA
M.Pushpa Rani1 and G.Arumugam2, 1Mother Teresa Womens University, India and 2Madurai Kamaraj University, India.

49

Cartographic Generalization (Selection) For 2D Map of Urban Area
Jagdish Lal Raheja, Umesh Kumar and K.C. Saravanan, Central Electronics Engineering Research Institute (CEERI)/ Council of Scientific & Industrial Research (CSIR), India.

02

A BPT Application: Semi-automatic Image Retrieval Tool
Shirin Ghanbari1, John C. Woods1, Simon M. Lucas1 and Hamid R. Rabiee2, 1University of Essex, United Kingdom and 2Sharif University of Technology, Iran.

0

Analyzing the P2P Traffic Using Probability Schemes
M. Sadish Sendil1 and Dr. N. Nagarajan2, 1SNS College of Technology,India and 2Coimbatore Institute of Information and Engineering Technology,India

03

Low Power VLSI Design with Resistive Feedback Logic
1C.Ashok Kumar, 2B.K.Madhavi and 3K.Lal Kishore, 1TRR Engineering College, India, 2SNIST, Hyderabad,India and 3JNTU college of Engineering,India.

0

Dynamic Probe Window Based Optimization for Surveillance in Home Security System
Bhaskar Kapoor and Anamika Chhabra, MAIT,India.

01

Human Facial Expression Detection From Detected in Captured Image using Back Propagation Neural Network
Jagdish Lal Raheja and Umesh Kumar Digital Systems Group, Central Electronics Engineering Research Institute (CEERI)/ Council of Scientific & Industrial Research (CSIR),India.

37

Performance Evaluation of Face Recognition Using Gabor Filter, Log Gabor filter and Discrete Wavelet Transform
D Murugan1, S Arumugam2, K Rajalakshmi3 and Manish T I1,1Manonmaniam Sundaranar University, India , 2Nandha College of Engineering & Technology, India and 3Francis Xavier Engineering College, India.

27

A Mobility-Based CheckPointing Protocol for Mobile Computing System
Suparna Biswas1 and Sarmistha Neogy2, 1West Bengal University of Technology, India and 2 Jadavpur University, India.

23

Volume 2, Number 2, April 2010

  Citation Count

Performance Model for a Conservative Distributed Simulation Environment Using Null Messages to Avoid Deadlock
Hemen Patel1, Syed S. Rizvi1, Laiali Almazaydeh1 and Aasia Riasat2, 1University of Bridgeport, USA and 2Institute of Business Management, Pakistan

02

High Performance and Energy Efficient Task Scheduling Algorithm for Heterogeneous Mobile Computing System
E. Ilavarasan and R. Manoharan, Pondicherry Engineering College, India

4

Identification of connection in spacecraft images and classifying them for Weather Monitoring
Ramya S Gowda, Sikkim Manipal University, India

0

Phenol Degradation: Numerical Simulation in a Stirred Tank Electrochemical Reactor
Regalado-Mendez Alejandro1, Peralta-Reyes Ever1 and Velazquez-Manzanares Miguel2, 1Universidad del Mar, Mexico and 2Universidad del Papaoloapan, Mexico

05

An Efficient Statistical Multiplexing Method for H.264 VBR Video Sources for Improved Traffic Smoothing
T.Raghuveera and K.S.Easwarakumar , Anna University, India

04

Performance Evaluation of Routing Protocols in Wireless Sensor Networks
Laiali Almazaydeh, Eman Abdelfattah, Manal Al-Bzoor, and Amer Al-Rahayfeh, University Of Bridgeport, USA

60

Improved Lossless Embedding and Extraction - A Data Hiding Mechanism
T. Venkat Narayana Rao1, A.Govardhan2 and Syed Jahangir Badashah3, 1Tirumala Engineering College, 2Jawaharlal Nehru Technological University and 3Sathyabama1 University, India

01

An Optimized Distributed Association Rule Mining Algorithm in Parallel and Distributed Data Mining with XML Data for Improved Response Time
Sujni Paul, Karunya University, India

04

CRM System Using PA-AKD Approach of D3M
Ajay kumar1, A.Tejaswi2, Lakshmi Prasad Koyi3, G.Narasinga Rao4 and S.Srinivasa Rao Illapu5 , 1Dronacharya College of Engg, India, 2GITAM University, India, 3CMR Institute Of Technology, India, 4GMR IT, India and 5Chaitanya Engineering College, India

0

Enhanced-DSR: A New Approach to Improve Performance of DSR Algorithm
Sharmin Sultana, Salma Begum, Nazma Tara and Ahsan Raja Chowdhury, University of Dhaka, Bangladesh

10

Wrapper Generator using Java Native Interface
V.S.Vairale1 and K.N.Honwadkar2, 1AISSMS College of Engineering - Pune University, India and 2D.Y.Patil College of Engineering - Pune University, India

03

Memory Management Technique for Paging on Distributed Shared Memory Framework
Bal Gopal1, Rizwan Beg1 and Pankaj Kumar2, 1Integral University, India and 2Sahara Arts & Management Academy, India

04

Ontology Based Model For The ITU-T Recommendation G.805: Towards The Self-Management Of Transport Networks
Maxwell E. Monteiro, Anilton Salles Garcia, Pedro Paulo F. Barcelos, and Giancarlo Guizzardi, Federal University of Espirito Santo, Brazil

08

Volume 2, Number 3, June 2010

  Citation Count

Efficient Resource Matching in Heterogeneous Grid Using Resource Vector
Srirangam V Addepallil1, Per Andersen1and George L Barnes2, 1Texas Tech University - Texas, USA and 2University of Oregon, USA

03

Low Power Shift and Add Multiplier Design
C. N.Marimuthu1, P. Thangaraj2 and Aswathy Ramesan1, 1Maharaja Engineering College,India and 2Kongu Engineering College, India

26

Implementing and Evaluating A Wireless Body Sensor System For Automated Physiological Data Acquisition At Home
Chao Chen and Carlos Pomalaza-Raez,Indiana University - Purdue University, USA

14

A Parsing Scheme for Finding the Design Pattern and Reducing the Development Cost of Reusable Object Oriented Software
K. M. Azharul Hasan and Mohammad Sabbir Hasan, Khulna University Of Engineering and Technology(KUET), Bangladesh

01

Hybrid Scenario based Performance Analysis of DSDV and DSR
Koushik Majumder1 and Subir Kumar Sarkar2, 1West Bengal University of Technology, India and 2Jadavpur University, India

03

Interoperability, Trust Based Information Sharing Protocal and Security: Digital Government Key Issues
Md.Headayetullah and G.K. Pradhan, SOAU - Bhubaneswar, India

10

An Algorithm To Self - Extract Secondary Keywords and Their Combinations Based On Abstracts Collcted Using Primary Keywords From Online Digital Libraries
Natarajan Meghanathan, Nataliya Kostyuk, Raphael Isokpehi and Hari Cohly, Jackson State University, USA

0

A novel technique for image steganography based on Block-DCT and Huffman Encoding
A.Nag1, S. Biswas2, D. Sarkar2 and P.P. Sarkar2, 1Academy of Technology - Hoogly, India and 2University of Kalyani, India

63

Biometric Authentication Using Nonparametric Methods
S V Sheela and K R Radhika, B M S College of Engineering - Bangalore, India

01

Game Information System
Spits Warnars, Manchester Metropolitan University, United Kingdom

02

Survey on the Event Orderings Semantics Used for Distributed System
Yaser Miaji Osman Gazali and Suhaidi Hassan, University Utara Malaysia, Malaysia

02

Secret Sharing and Proactive Renewal of Shares in Hierarchical Groups
Ruchira Naskar and Indranil Sengupta, Indian Institute of Technology, India

0

Genbit Compress Tool(GBC): A Java-Based Tool To Compress DNA Sequences and Compute Compression Ratio (BITS/BASE) of Genomes
P.RAJA RAJESWARI1 and ALLAM APPARAO2 , 1Acharya Nagarjuna University, India and 2Jawaharlal Nehru Technological University, India

07

Volume 2, Number 4, August 2010

  Citation Count

An Empirical Study on the Procedure to Derive Software Quality Estimation Models
Jie Xu1, Danny Ho2 and Luiz Fernando Capretz1, 1University of Western Ontario, Canada and 2NFA Estimation Inc, Canada

10

Diphone Speech Synthesis System for Arabic Using MARY TTS
M. Z. Rashad, Hazem M. El-Bakry and Islam R. Isma'il, Mansoura University, Egypt

12

Discovering Potential User Browsing Behaviors Using Custom-Built Apriori Algorithm
Sandeep Singh Rawat1 and Lakshmi Rajamani2, 1Guru Nanak Institute of Technology, India and 2Osmania University, India

25

Improvement in Delay of Information flow in Energy Efficiency Organization
Elham Hasanzadeh and Reza Askari moghadam, Payam Noor University faculty of engineering, Iran

0

An Applied Study on Educational Use of Facebook as a Web 2.0 Tool: The Sample Lesson of Computer Networks and Communication
Murat Kayri1 and Ozlem cakır2, 1Yuzuncu Yil University, Turkey and 2Ankara University, Turkey

48

Efficient Web Log Mining Using Enhanced Apriori Algorithm with Hash Tree and Fuzzy
S.Veeramalai, N.Jaisankar and A.Kannan, Anna University - Chennai, India

22

M-Learning: A New Paradigm of Learning Mathematics in Malaysia
Saipunidzam Mahamad, Mohammad Noor Ibrahim and Shakirah Mohd Taib, Universiti Teknologi Petronas, Malaysia

45

Utilizing Diagnosing Problems in a Probabilistic Domain to Build Student Models
Nabila Khodeir1, Nayer Wanas1,2 Nevin Darwish3 and Nadia Hegazy1, 1Electronics Research Institute, Egypt, 2Cairo Microsoft Innovation Lab, Egypt and 3Cairo University, Egypt

05

Clustering and Feature Specific Sentence Extraction Based Summarization of Multiple Documents
A.Kogilavani and P.Balasubramani, Kongu Engineering College, India

28

Mining Target-Oriented Sequential Patterns With Time-Intervals
Hao-En Chueh, Yuanpei University, Taiwan

09

A Survey of QOS Routing Protocols For Mobile Ad Hoc Networks
G. Santhi and Alamelu Nachiappan, Pondicherry Engineering College, India

40

Spiking Neurons With ASNN Based-Methods for the Neural Block Cipher
Saleh Ali K. Al-Omari and Putra Sumari, University Sains Malaysia, Malaysia

04

A Modified Structure for Feed Forward Active Noise Control Systems With Improved Performa
P.Babu and A.Krishnan, K.S.Rangasamy College of Technology, India

0

Clustering High Dimensional Data Using Subspace and Projected Clustering Algorithms
Rahmat Widia Sembiring, Jasni Mohamad Zain and Abdullah Embong, Universiti Malaysia Pahang, Malaysia

19

A Generalized Hybrid Real-Coded Quantum Evolutionary Algorithm Based on Particle Swarm Theory With Arithmetic Crossover
Md. Amjad Hossain, Md. Kowsar Hossain and M.M.A Hashem, Khulna University of Engineering & Technology (KUET), Bangladesh

09

Volume 2, Number 5, October 2010

  Citation Count

Performance Analysis of Multimedia Compression Algorithms
Eman Abdelfattah and Asif Mohiuddin, University of Bridgeport, USA

13

Ontology-Based Quality Attributes Prediction in Component-Based Development
Chengpu Li1, Rob Pooley2 and Xiaodong Liu1, 1Edinburgh Napier University, UK and 2Heriot-Watt University, UK

04

Performance Analysis of Contention Window Cheating Misbehaviors in Mobile Adhoc Networks
R. Kalaiarasi, Getsy S. Sara, S. Neelavathy Pari and D. Sridharan, Anna university - Chennai, India

08

A New Email Retrivel Ranking Approach
Samir AbdelRahman1, Basma Hassan2 and Reem Bahgat1, 1Cairo University, Egypt and 2Fayoum University, Egypt

0

Design and Evaluation of XACML Conflict Policies Detection Mechanism
Kamalbir Singh and Sarbjeet Singh, Panjab University, India

05

Potential Security Attacks on Wireless Networks and their Countermeasure
Sreedhar. C1, S. Madhusudhana Verma2 and N. Kasiviswanath1, 1G. Pulla Reddy Engineering College, India and 2Rayalaseema University, India

02

A New DCT-Based Watermarking Method for Copyright Protection of Digital Audio
Pranab Kumar Dhar, Mohammad Ibrahim Khan and Saif Ahmad, Chittagong University of Engineering and Technology, Bangladesh

26

A Multi -Perspective Evaluation of MA and GA for Collaborative Filtering Recommender System
Hema Banati and Shikha Mehta, University of Delhi, India

15

Level Shifter Design for Low Power Applications
Manoj Kumar1, Sandeep K. Arya1 and Sujata Pandey2, 1Guru Jambheshwar University of Science & Technology, India and 2Amity University, India

17

A Plant Documentation Information System Design
Bing Wang1 and Ma Feicheng2, 1University of Hull, UK and 2Wuhan University, China

03

Energy Efficient Data Processing in Visual Sensor Network
Harish. H. Kenchannavar1, Sushma. S. Kudtarkar2 and U. P. Kulkarni2, 1Gogte Institute of Technology, India and 2SDMCET, India

06

Identifying Bank Frauds Using CRISP-DM and Decision Trees
Bruno Carneiro da Rocha1,2 and Rafael Timoteo de Sousa Junior2, 1Bank of Brazil, Brazil and 2University of Brasilia (UnB), Brazil

14

A Clustering Heuristic for Multiprocessor Environments Using Computation and Communication Loads of Modules
Pramod Kumar Mishra1, Kamal Sheel Mishra2, and Abhishek Mishra1, 1Banaras Hindu University, India and 2School of Management Sciences, India

06

Soil Classification Using GATREE
P.Bhargavi1 and S.Jyothi2, 1Madanapalli Institue of Tecnology and Science, India and 2Sri Padmavathi Mahila VisvaVidyalayam, India

09

A Performance Comparison Study of the Location Prediction Based Routing Protocol with Position Based Routing Protocols for Mobile Ad Hoc Networks
Natarajan Meghanathan, Jackson State University, USA

0

Volume 2, Number 6, December 2010

  Citation Count

Manipulating Multistage Interconnection Networks Using Fundamental Arrangements
E. Gur1 and Z. Zalevsky2, 1Shenkar College of Eng. & Design, Israel and 2Bar Ilan University, Isreal

01

Inheritance Metrics for Object-Oriented Design
Kumar Rajnish, Arbind Kumar Choudhary and Anand Mohan Agrawal, BITIC - Muscat, Sultanate of Oman

08

Comparison of Class Inheritance and Interface Usage in Object Oriented Programming through Complexity Measures
V. Krishnapriya1 and K. Ramar2, 1Sri Ramakrishna College of Arts & Science for Women, India and 2Sri Vidya College of Engineering and Technology, India

01

Adaptive Block Pinning Based: Dynamic Cache Partitioning for Multi-core Architectures
Nitin Chaturvedi, Jithin Thomas and S Gurunarayanan, Birla Institute of Technology and Science, India

0

Use of Smart Antennas In Ad Hoc Networks
Mohammed Ali Hussain1, P.Suresh Varma2, K. Satya Rajesh3, Hussain Basha Pathan3 and Leela Madhav Sarraju4, 1Sri Sai Madhavi Institute of Science & Technology, India, 2Adikavi Nannaya University, 3Rayalaseema University, India and 4Dravidian University, India

10

A Novel Embedded Statistical Scheduler for Realising High System-QoS
Suman Paul, A. K. Jana and M. K. Pandit, Haldia Institute of Technology (HIT), India

0

Security Enhencement & Solution for Authentication Frame work in IEEE 802.16
A.K.M. Nazmus Sakib, Chittagong University of Engineering & Technology, Bangladesh

02

Security In Wireless Sensor Networks Using Key Management Schemes
Soundarya.P and Varalakshmi .L.M, Sri Manakula Vinayagar Engineering College, India

02

Pattern Recognition Using Neural Networks
Santaji Ghorpade, Jayshree Ghorpade and Shamla Mantri, Pune University, India

16

Dynamic Scheduling of Skippable Periodic Tasks With Energy Efficiency In Weakly Hard Real-Time System
Santhi Baskaran and P. Thambidurai, Pondicherry Engineering College, India

02

Some Observations On Open Source Software Development On Software Engineering Perspectives
Vinay Tiwari, R.D. University - Jabalpur, India

10

Data Mining Algorithms And Medical Sciences
Irshad Ullah, City university of Science and information Technology, Pakistan

13

Network Intrusion Detection System Based On Machine Learning Algorithms
Vipin Das, Vijaya Pathak, Sattvik Sharma, Sreevathsan, MVVNS.Srikanth, Gireesh Kumar T, Amrita Vishwa Vidyapeetham, India

16

Segmentation And Object Recognition Using Edge Detection Techniques
Y.Ramadevi, T.Sridevi, B.Poornima and B.Kalyani, Chaitanya Bharathi Institute of Technology, India

70

Automatic Induction of Rule Based Text Categorization
D.Maghesh Kumar, AVC Polytechnic College, India

03