Published by Academy Publisher in cooperation with the ACEEE

Home        Author Index        Search                 Volume 1      May 2009      ISSN 1797-9617

International Journal of

Recent Trends in Engineering

Performance Analysis of Blowfish and its Modified Version using Encryption quality, Key sensitivity, Histogram and Correlation coefficient analysis

           Krishnamurthy G N and V Ramaswamy

1-4

Abstract  |  PDF

Application of Reliability Analysis in Expansion of Transmission System

           Ashok Kumar Mehta, Dipak Ray, Kesab Bhattacharya

5-10

Abstract  |  PDF

A Service Oriented Architectural Design for Building Intrusion Detection Systems

           K.V.S.N.Rama Rao , Anirban Pal , Manas Ranjan Patra

11-14

Abstract  |  PDF

Kerberos Authentication System – A Public Key Extension

           S. K. Pathan, S. N. Deshmukh, R. R. Deshmukh

15-18

Abstract  |  PDF

Machine Learning Approach for Preoperative Anaesthetic Risk Prediction

           Karpagavalli S, Jamuna KS, and Vijaya MS

19-22

Abstract  |  PDF

Comparative study of Linear and Quadratic Programming Versions of SVM on Various Real Life Data Sets

           Hemalatha.T, Sukumar.K, Mithila.T, Soman.K.P

23-25

Abstract  |  PDF

Checkpointing Using Mobile Agents for Mobile Computing System

           Chandreyee Chowdhury, Sarmistha Neogy

26-29

Abstract  |  PDF

Fringe Area Path Loss Correction Factor For Wireless Communication

           Vishal Gupta, S. C. Sharma, M.C. Bansal

30-32

Abstract  |  PDF

Performance Comparison of Features on Devanagari Hand-printed Dataset

           Satish Kumar

33-37

Abstract  |  PDF

An Approach to Design an Efficient Data Replication Algorithm in Mobile Ad hoc Networks

           M. Pushpalatha, Revathi Venkatraman, and T. Ramarao

38-41

Abstract  |  PDF

Multi-Agent Coordination in Project Scheduling: Priority Rules Based Resource Allocation

           V.Thiagarasu and T.Devi

42-46

Abstract  |  PDF

Analysis of Facial Expression using Gabor and SVM

           Praseeda Lekshmi.V.  , M.Sasikumar

47-50

Abstract  |  PDF

A Cognitive Study on DNA Based Computation

           Swarnendu Mukherjee, Debashis Ganguly, Swarnendu Bhattacharya, Partha Mukherjee

51-56

Abstract  |  PDF

Evaluation of Content Based Image Retrieval Systems Based on Color Feature

           M.Braveen, P.Dhavachelvan

57-62

Abstract  |  PDF

Robust Task Scheduling on Heterogeneous Computing Systems using Segmented MaxR-MinCT

           SenthilKumar.B, Chitra.P, Prakash.G

63-65

Abstract  |  PDF

Development of Knowledge Base Using Fuzzy Logic and Genetic Algorithm

           Luma S.Hasan and  S.A.M.Rizvi

66-68

Abstract  |  PDF

A Process Model for Software Development Amongst Students

           Madhumita Neogi , Vandana Bhattacherjee, Rupa Mahanti

69-74

Abstract  |  PDF

Key Distribution System for MANET with Minimum Prior Trust Relationship

           R. Murugan and A. Shanmugam

75-79

Abstract  |  PDF

Selecting Scalable Algorithms to Deal With Missing Values

           B. Mehala, P. Ranjit Jeba Thangaiah, and K. Vivekanandan

80-83

Abstract  |  PDF

Design of Genetically Evolved Artificial Neural Network Using Enhanced Genetic Algorithm

           M. NirmalaDevi, N. Mohankumar,M. Karthick, Nikhil Jayan, R. Nithya, S.Shobana, M.            Shyam Sundar and S.Arumugam

84-89

Abstract  |  PDF

Stent Biomechanics in Marginal coronary Stenotic Arteries

           Sanjay A. Pujari, V.R.Udupi.

90-92

Abstract  |  PDF

Features of Wavelet Packet Decomposition and Discrete Wavelet Transform for Malayalam Speech Recognition

           Vimal Krishnan V.R, Babu Anto P

93-96

Abstract  |  PDF

Cracks Inspection and Interpolation in Digitized Artistic Picture using Image Processing Approach

           Sachin V. Solanki and A. R. Mahajan

97-99

Abstract  |  PDF

Scheduler Based QoS Analysis in MANET For DSR Protocol

           Kumar Manoj, S.C. Sharma, Parmanand & S.P.Singh

100-102

Abstract  |  PDF

Audio encryption using higher dimensional chaotic map

           R.Gnanajeyaraman, K.Prasadh, Ramar

103-107

Abstract  |  PDF

User Representation in Personalized Web Search using Interest Vectors

           Sendhilkumar S., and Geetha T.V.

108-112

Abstract  |  PDF

Digital Watermarking using Image Fusion Method

           S. C. Tamane, R. R. Manza and R. R. Deshmukh

113-116

Abstract  |  PDF

Test Case Design Using Conditioned Slicing of Activity Diagram

           Mitrabinda Ray, Soubhagya Sankar Barpanda, Durga Prasad Mohapatra

117-120

Abstract  |  PDF

Artificial Neural Network Technique for Forecasting: Neural Tree and Necessary Number of Hidden Units

           J. Kumaran, Poonguzhali

121-124

Abstract  |  PDF

Biomedical Engineering

           S.S.Patil and V.V.Mane

125-127

Abstract  |  PDF

A Survey on Hybrid Mobile Sensor Networks

           Gandhiya Vendhan.S, S.V Manisekaran

128-130

Abstract  |  PDF

Ripple Effect in Software Architectures: en route avoidance

           A.V.Sriharsha, A. Rama Mohan Reddy

131-133

Abstract  |  PDF

Cluttered Background Removal in Static Images with Mild Occlusions

           B. Nagarajan and P. Balasubramanie

134-136

Abstract  |  PDF

Enhancing Theory of Computation Teaching Through Integration with other Courses

           Mukta Goyal, Shelly Sachdeva

137-140

 

Abstract  |  PDF

An Approach for UML based Scenario Oriented Slicing

           R. Senthil Kumar, M. Gokul Nath, U. Raaghul

141-143

Abstract  |  PDF

PROS - An Omnipresent Operating System

           Monika Shah, Rakshit Trivedi, Priyank Mehta, and Pratik Pattani

144-148

Abstract  |  PDF

EduSat- E-learning Through Satellite –Reaching the Unreached

           Mamta Garg , Manoj Kumar Jindal

149-151

Abstract  |  PDF

Operating Systems for Tiny Networked Sensors: A Survey

           A. K. Dwivedi, M. K. Tiwari, O. P. Vyas

152-157

Abstract  |  PDF

Motion Based Foreground Segmentation using Block Matching Algorithm (BMA)

           K . Sasi Bhushan, T.Vineela, N.Venkateswara Reddy, K.Vamsi Krishna, Joseph Abilash Rao

158-160

Abstract  |  PDF

A Novel Fuzzy Clustering Method for Outlier Detection in Data Mining

           Binu Thomas and Raju G

161-165

Abstract  |  PDF

Tamil POS Tagging using Linear Programming

           Dhanalakshmi V, Anand Kumar, Shivapratap G, Soman KP and Rajendran S

166-169

Abstract  |  PDF

English to Malayalam Transliteration Using Sequence Labeling Approach

           Sumaja Sasidharan, Loganathan R, and Soman K P

170-172

Abstract  |  PDF

A Note On Visualization Of Brain Information From fMRI Images

           J. Satheeshkumar, S. Arumugaperumal, R. Rajesh,  C. Kesavadas

173-175

Abstract  |  PDF

Correction of Logical Errors in C programs using Genetic Algorithm Techniques

           Prakash Murali, Atul Sandur, Abhay Ashok Patil

176-178

Abstract  |  PDF

Singular Value Decomposition A Classroom Approach

           Soumya T Soman, Soumya V.J, Soman K.P

179-182

Abstract  |  PDF

A SVM based approach to Telugu Parts Of Speech Tagging using SVMTool

           G.Sindhiya Binulal, P. Anand Goud, K.P.Soman

183-185

Abstract  |  PDF

Reverse Engineering – Roadmap to Effective software Design

           Mamta Garg , Manoj Kumar Jindal

186-188

Abstract  |  PDF

Bluetooth-Roadmap to Wireless Communication

           Mamta Garg , Manoj Kumar Jindal

189-191

Abstract  |  PDF

Peer To Peer Network For Mobile Communication

           Debopriyo Ghosh

192-195

Abstract  |  PDF

Reliability Assessment of Elementary COTS Software Component

           Tirthankar Gayen, R.B Misra

196-200

Abstract  |  PDF

International Journal of Recent Trends in Engineering (IJRTE)

ISSN 1797-9617

Volume 1, Number 2, May 2009

Issue on Computer Science

 

Table of Contents                                                                      View : 1-50  |  51-76

View : 1-50  |  51-76  |  Back to top