CS Journals

Established Since 2008

Volume-1 Issue-1 March 2010

 
SN Paper
1 National Software Industry Development: Considerations for Government Planners

Dr.Umesh Sehgal, Ms Kuljeet Kaur, Mr.Pawan Kumar

2 Security in Virtual machine is better than Real Machine

P.Felacy Silvia, R.Karthiha, R.Aarthy and Dr. C. Suresh Gnana Das

3 Secure Web Access Model for Sensitive Data

Anil Kapil, Atul Garg

4 Wireless Sensor for Effective Network Security Mechanism

P.Felacy Silvia, R.Karthiha, R.Aarthy and  Dr. C. Suresh Gnana Das

5 Still image compression using Embedded Zerotree Wavelet Encoding

V.S.Shingate, Dr.T.R.Sontakke,  Prof. Dr. S.N. Talbar

6 Adaptive analysis of throughput in mobile ad-hoc Network (IEEE-802.11)

Vikram Bali, Rajkumar Singh Rathore  ,Amit Sirohi

7 Parallel FTP: Clusters using mirror servers in Grid

N.K.Prema , K.Prasadh , A.Arul Lawrence selvakumar

8 Risk Management Process for Information Security System

Prof. S. P. Datta, Prof. Pranab Banerjee

9 Software Patents and the Current Trends

Garima Goswami, Banasthali Vidyapeeth

10 Design and FPGA Implementation of Integer Transform and Quantization Processor and their Inverses for H.264 Video Encoder

N. Keshaveni, S. Ramachandran and K.S. Gurumurthy

11 Improving performance of Text Categorization: Using Multi Feature Co-selection Clustering Technique and Lsquare Machine Learning

Srinivas.M, K.P.Supreethi, S. Anitha Kumari

12 Design of Architecture and FPGA Implementation of a Video Encoder

Venugopal N and Dr S. Ramachandran

13 Performance Evaluation of Energy Consumption of Reactive Protocols under Self- Similar Traffic

Dhiraj Nitnaware , Ajay Verma

14 Survey of Various Number Systems and Their Applications

Satrughna Singha , Amitabha Sinha

15 Comparative analysis and Characterization of a Current Conveyor-II

 Amisha P. Naik  Nilesh K. Patel,  N.M.Devashrayee

16  A novel Boundary based Image segmentation for image classification and analysis

A. Ramaswamy Reddy, M. Sitaram Prasad, C. Nagaraju

17 A novel method for aquamarine learning environment for classification of fish database

A. Ramaswamy Reddy, B. Srinivas Rao, G. Siva Nageswara Rao, C. Nagaraju

18 Optical Character Recognition (OCR) for Printed Devnagari Script Using Artificial Neural Network

Raghuraj Singh   , C. S. Yadav, Prabhat Verma, Vibhash Yadav

19 Theory and Applications of the Double-Base Number System Using Bases 2 And 5

Satrughna Singha , Supriya Chakraborty  and Amitabha Sinha

20 Consecutive Magic Labeling of N-Copies of Generalized Petersen Graphs

J.Joy Priscilla, DR.R.Sattanathan

21 BER  Improvement using MIMO :2 x 2

 Parveen Singhal, Rajeev Sharma

22 RF Controlled Terrorist Fighting Robot

Abhinav Kumar Singh , Nilaya Mitash Shanker , Anand Prakash Yadav

23 Analysis of Energy Efficient Routing Protocols in Wireless Sensor Networks

Sanjeev Saini , Ram Sewak Singh , V.K.Gupta

24 Application of Fuzzy Logic Approach for obtaining Composite Criteria based Network Contingency Ranking for Practical Power System Networks.

S N R K Srinivas Tanniru , Dr. K Ramesh Reddy   , Dr.V K D Devi

25 Secure Routing in Mobile Ad hoc Network

Tirthraj Rai , Ashish Jain

26 The Development & Implementation of Reed Solomon Codes for OFDM Using Software-Defined Radio Platform

Hamood shehab , Widad Ismail2

27 An approach for Concurrency Control in Distributed Database System

Arun Kumar Yadav , Dr. Ajay Agarwal

28 Analysing Latency and Link Utilization of Selfish Overlay Routing

S.Prayla Shyry ,  V.Ramachandran

29 A Study on Latency Minimization in Selfish Overlay Routing by Cost Pricing

S.Prayla Shyry, VRamachandran ,T.S. Rekha

30 Multi Step Motion Estimation Algorithm

Deepak J. Jayaswal  and Mukesh A. Zaveri

31 A Survey on Congestion Control in Wireless Sensor Networks

Rekha Chakravarthi ,Dr. C.Gomathy,Suraj K.Sebastian, Pushparaj.K, Vinu Binto Mon,

32 Anomaly Intrusion Detection System using Hamming Network Approach

Muna M. Taher Jawhar  &  Monica Mehrotra

33 System Design for Packet Sniffer using NDIS Hooking

Muna M. Taher Jawhar  &  Monica Mehrotra

34 Simplified Watershed Transformation

Manisha Bhagwat , R.K.Krishna , Vivek Pise

35 Performance evaluation of various wavelets for Image compression of Natural & Artificial images

Vinay U. Kale,  Nikkoo N. Khalsa

36 Transmit Diversity Technique for Wireless Communication over Raleigh/flat Channels using M-ary Modulation Schemes

N.S. Murthy, S. Sri Gowri, P.Satyanarayana

37 A Survey on Neighborhood Dependant Topology Control in Wireless Sensor Networks

S. Emalda Roslin , Dr. C.Gomathy , P. Bhuvaneshwari

38 Microcontroller Based Clockwise/Anticlockwise Stepper Motor Controller Using PC Keyboard via Com Port

Mandeep Singh, Rekha  and Balwinder Singh

39 Performance comparison of On Line Auto Tune PID Controller with Conventional PID Controller

Mr. S. S. Gade, Mr. S. B. Shendage, Mr. M. D. Uplane

40 Digital In-painting Based Image Restoration 

S. R. Goyal

41 A Production Lot-size Inventory Model for Weibull deteriorating item with Quadratic demand, Quadratic production and Shortages

A.Kalam, D.Samal, S.K.Sahu, M.Mishra

42 QoS Provisioning in VANETs using Mobile Agent

Shraddha Saharan, Rakesh Kumar

43 Controller based IDS architecture in distributed Nodes

Kuldeep Tomar, Anupma Sehrawat, Swati Phogaat

44 An inventory model for constant deteriorating items with Price dependent demand and time-varying holding cost

N.K.Sahoo, C.K.Sahoo, S.K.Sahoo

45 Window Based Optimization for Real-Time Surveillance

Bhaskar Kapoor and Anamika Chhabra

46 Design approach towards improving the overall Quality of Driving Experience in VANET

Suresh Kurumbanshi , Dr.Avichal Kapur ,Dr.P.R.Bajaj

47 A Tajima -NEI Method for detecting HIV

Raninder Kaur, Vijay Shakti, Shavinder Kaur

48 Separation of Tabla from Singing Voice using Percussive Feature Detection

Parveen Lehana, Neeraj Dubey, and Maitreyee Dutta

49 OGSA-DAI---Uses and Applications

Richa Batra  Ramandeep Kaur

50 Effective Secure Encryption Scheme [One Time Pad] Using Complement Approach   

Sharad Patil, Ajay Kumar

51 Dynamic Power Allocation For Transmission Of  2-D Signals Over Wireless Channels

M Padmaja , P Satyanarayana , K.Prasuna

52 Query Optimizer Model for Performance Enhancement of Data Mining Based Query

Deepak Sukheja, Umesh K Singh

53 Development of Spectral Signatures and Classification of Sugarcane Using ASTER data

Kumar Vikesh, Kumar Vinod, Jain Kamal

54 Review of Rice Crop Identification and Classification Using Hyper-spectral Image Processing System

Shwetank, Jain Kamal and Bhatia K. J.