CS Journals

Established Since 2008

IJITKM Volume-4 Issue-1 Jun-Dec 2010

 
SN Paper 
1 Pattern Classification of Partial Discharge in LV Winding Of 1-F Transformer Using PCA

Ganesh Rao, Dr. Mrs. Shailja Shukla

2 Interaction of Electromagnetic Radiation from CRT Monitor with Human Body

Sandeep Kumar, Santosh Kumar, Ashwani K. Vashishtha

3 Twist of Aspect Oriented and Component Oriented

Shailendra N.Singh, Dr. Manu Pratap Singh

4 Specification and Verification of Sliding Window Protocol using Predicate Logic

Sachin Kumar, Veena Bharti, Shikha Pandey

5 Overall Performance Improvement in Wireless Sensor Network System Using End-End Arguments

Preeti Khera, Ashok Kumar, Vibhuti PN Jaiswal

6 Discovering Active and Profitable patterns with RFM (Recency, Frequency and Monetary) Sequential Pattern Mining –A constraint based approach

C K Bhensdadia, Y. P. Kosta

7 ERP System for Effective Management of Co-operative Sugar Industries - A Case Study of Sahyadri SSK Ltd Shiravade Karad (M.S.)

Rajendra D Kumbhar

8 Generating Test Patterns For FPGAs Using Multi-objective Genetic Algorithm

Ms.Sangeeta, Mr.Vinay Chopra

9 Statistical approach of Social Network in community mining

Meenu Gupta, Rajeev Yadav

10 Wireless Technology and Communication: The Pacemakers for the ERP

Rajiv Sharma, Sunita Bharatwal, Monika Sharma

11 Confronts and Issues in M-Commerce [A Business on Mobile and Net Approach

Rajeev Kr.Sharma, Rupak Sharma, Mr. Shailendra Raj

12 Neutrosophic Relational Database Search Approach to capture inconsistent information

Meena Arora, Ranjit Biswas

13 An Approach for Detection and Correction of Design Defects in Object Oriented Software

Nirmal Kr. Gupta, Dr. Mukesh Kr. Rohil

14 Issues Involved in Designing of User Interfaces to Fetch Quality Data for Automation of Results in a Typical University Examination System

Dr. Vikas Sharma , Anjana Sharma

15 Normalizer Based Encryption Technique [NBET] Using the Proposed Concept of Rubicryption

Rajdeep Chowdhury, Saikat Ghosh

16 Survey of Double Based Number System and Their Application

Rajdeep Chowdhury, Mousumi Basak

17 Metamaterial Properties and Applications

Shridhar E. Mendhe

18 Enhancement of Wired Equivalent privacy

Rajnesh Singh, Vipin Rai, Amit Kumar

19 Analysis and Design of Z-RAM for low leakage Current

Sukhvinder kaur, Priya darshni, Shivani Badoni, Seema Rani

20 Metrics, Tools and Scientific Applications: Revolutionizing Engineering Design

Anisha Gupta, Dr. Deepshikha Jamwal

21 Performance of Genetic Algorithms for Solving Flexible Job-Shop Scheduling Problem

Amit Kumar, Rajnesh Singh

22 THR : A Two-Hop look ahead with Packet Buffering protocol for MANET

Dr.Ela Kumar, Ravinder N.Rajotiya

23 AES: A Symmetric Key Cryptographic System

Punita Meelu, Sitender Malik

24 Project Proposal on Impact Assessment of Village Resource Centres(VRC) in achieving millennium development goals

Sanjay Jamwal

25 Security & Privacy Preservation in VANET

Yogesh A. S., Dr. Avichal Kapur

26 CBIR based on Color & Texture

P. B. Thawari, N. J. Janwe

27 Comparative Analysis of Data Security Techniques in Network Environment

Kanwaljit Singh, Tejpreet Singh

28 Gayatri – A Fast Hindi Text To Speech System With Input Support For English Language

Danish Chopra

29 Association Rule Mining Based on Image Content

Deepa S. Deshpande

30 SCRUM: An Agile Framework

Rashmi Popli, Dr. Naresh Chauhan

31 Congestion Control in Diffi-Serv using Fuzzy & Neural Methodology

Aastha, Tarun Aggarwal, Sachin Garg

32 Study of Cardiovascular Dynamics with Recursive Simulator Generation Approach

Biswarup Neogi, Soumya Ghosal, Soumyajit Mukherjee, Sinchan Ghosh, Achintya Das

33 Reduction of Leakage by Input Vectors with Constrained NBTI Degradation

Ram Rakesh, K.S.Yadav, Jaipal

 
34 Measurement of bottleneck using pathneck

Gouri M. Patil, Ajay Kumar

35 Artificial Intelligence – Man or Machine

Sandeep Rajani

36 Comparative Analysis of Gabor Filter & FTT Filter Based Fingerprint Recognition System

Ruchi Rai, Abhishek Rai, Ashish Bagla, Ankit Singhal

37 Consumerism and Deceptive Advertisement Claim: An Experimental Investigation

Dr. Joshua O. Miluwi

38 Impact of Information Technology on the Development of Rural Economy of India

Parveen Sharma

39 Biological Computer Model to solve NP Complete problem

Shalini Rajawat, Vijay Singh Rathore, Naveen Hemrajani

40 Segmentation & Analysis of Osteosarcoma Cancerous Bone Micro Array Images - 1

Anand Jatti

41 Knowledge Management with Information Technology

Daisy kansal, Deepak Sengar

42 Modular Neural Network based Arrhythmia Classification System using ECG Signal Data

Shivajirao M. Jadhav, Sanjay L. Nalbalwar, Ashok A. Ghatol

43 Web Content Mining Tools: A Comparative Study

V. Bharanipriya, V. Kamakshi Prasad

44 Wearable computing and Related Issues

Inderdeep Kaur, Arshpreet Kaur

45 Testing Hyperion Database Systems

Jyoti Duhan

46 Performance Evaluation of Cluster-based Routing Protocols used in Heterogeneous Wireless Sensor Networks

Rajni Meelu, Rohit Anand

47 Investigation on security in LMS MOODLE

Sheo Kumar, Kamlesh Dutta

48 Simulation techniques for biologically active Prosthetic Feet -An Overview

Biswarup Neogi, Soumyajit Mukherjee, Soumya Ghosal, Sinchan Ghoshd, Achintya Dase

49 Macroscopic View on the Structure of the e-Management Control and Evaluation System for the University of Technology, Jamaica

Ashok B. Kulkarni, Valeri Pougatchev

50 Building of e-Management Control and Evaluation System for an Educational Institution: The University of Technology, Jamaica solutions

Ashok B. Kulkarni, Valeri Pougatchev

51 Training Need Assessment: A Critical Study

Sunita Dahiya, Ajeya Jha

52 Traffic Grooming, Routing, and Wavelength Assignment in Optical WDM Mesh Networks

K.SHEKAR, D. Sreenivasa Rao

53 An efficient partitioning algorithm to find un-expected behavioural data points

K.Subramanian, E.Ramaraj

54 Analysis, Comparison and Performance Evaluation of BNP Scheduling Algorithms In Parallel Processing

Parneet Kaur, Dheerendra Singh, Gurvinder Singh, Navneet Singh

55 AMBA dedicated DMA controller with multiple masters using VHDL

Archana Tiwai, D.J.Dahigaonkar

56 Implementation of Single Sign-on and Delegation Mechanisms in Alchemi.NET based Grid Computing Framework

Manisha Bhardwaj, Sarbjeet Singh, Makhan Singh

57 Liveness Detection of Biometric Traits

Mohmad Kashif Qureshi

58 Exploring Testing Strategies

Ajay Jangra, Gurbaj Singh, Jasbir Singh, Rajesh Verma

59 Analyzing WLANs standards for Wireless Sensor Network

Ajay Jangra, Rajesh Verma

 
60 Estimation by Analogy in the Perspective Educational Web Hypermedia Applications

Dheerendra Singh, K. S. Dhindsa

61 A Genetic Algorithm for Management Data Stream in VANET

S. Raghay, S. El Hadaj, T. Noel

62 Enhanced Goal Based Modeling Technique

Kavita, Shikha, Sunila

63 X-Log Authentication Technique to Prevent SQL Injection Attacks 

B. Indrani , Dr. E. Ramaraj