Page Header

Our Associate Journal
  • Journal of Global Research in Mathematical Archives
  • Journal of Global Research in Computer Science
Author Desk
  • Submission Schedule
  • Call for paper
  • Author Guideline
  • Manuscript Template
  • Copyright Form
  • Publication Fee
  • Indexing
  • Impact Factor
Open Journal Systems
Journal Help
User
Notifications
  • View
  • Subscribe
Journal Content

Browse
  • By Issue
  • By Author
  • By Title
Font Size

  • Home
  • About
  • Login
  • Register
  • Search
  • Current
  • Archives
  • Editorial Board
  • Contact Us
Home > Archives > Vol 1, No 4 (2010)

Vol 1, No 4 (2010)

November-December 2010

DOI: https://doi.org/10.26483/ijarcs.v1i4

Table of Contents

Articles

Enhancement of Medical Repositories System: Using Clustering, Classical Genetic Algorithm and Fuzzy logic Approaches
Muhammad Shahid, Noriah Bidin ,Yacoob mat Daud, M.Inayat
PDF
1-3
Hybrid Events Joint Entropy and Conditional Entropy Based on Chance Measure
Lianlong Gao, Liang Lin, Dawang Wang
PDF
4-12
An Empirical Study on Performance Evaluation in Automatic Image Annotation and Retrieval
T. Sumathi, M. Hemalatha
PDF
13-17
Output Regulation of the Liu-Chen-Liu Chaotic System
Dr. V. Sundarapandian
PDF
18-22
An Automated Consent for Privacy Preservation in Peer to Peer Networks using Agent Technology
S. Prasanna, K.Govinda, R.Sujatha,
PDF
23-26
A Novel Approach for Identifying Intruder based on Multiple Approaches
Amit Kumar Sharma, Mr. Naveen Hemrajani
PDF
27-31
Attacks on Computer Network and Corresponding Security Measures
Gajanan D. Kurundkar, Quadri M.N., Dr.Santosh D. Khamitkar
PDF
32-34
Handoff Implementation through WAP
Prof. Jayant N. Patil, Dr. Sagar Jambhorkar
PDF
35-37
Design and Development of Data Mining on Computational Grids in Grid Miner
T. Gopalakrishnan, Dr.P. Sengottuvelan
PDF
38-41
Prediction of Middle Finger Features from its Width: A Novel Approach
Manimala S., C.N. Ravi Kumar
PDF
42-46
Identifying Grades of Glioma using Support Vector Machine Recursive Feature Elimination
N.Suresh Kumar, Dr.S.Margret Anouncia
PDF
53-55
The Process of Innovation and Implement Based on Diffusion of Innovation and Innovation Radar
Ming-Chang Lee, To Chang, Wen-Tien Chang Chien
PDF
56-64
Resolution of Heart Disease Prevision System
Mr. D .Rajesh, E. Nalini
PDF
65-68
A Comparative Study using Wavelet and SVM for Devanagri Characters Recognition
Anil Kumar N. Holambe, Dr.Ravinder C. Thool,Sushil Kumar N.Hola Ganesh K. Pakle
PDF
69-73
Image Encryption using the Standard Hill Cipher
Gaurav Agarwal, Saurabh Singh, Meeta Chaudhary
PDF
74-76
Speech Recognition Technology: Applications & Future
Pankaj Pathak
PDF
77-79
A Review on Relation Between Operation Research and Different Field of Sciences
Sawan Kumar Dubey
PDF
80-81
An analytical study of image compression algorithms for Stereoscopic images in Non Immersive virtual reality world.
T. Ramaprabha, Dr. M.Mohamed Sathik
PDF
82-86
Protocal Usage Model & An Architecture Design for Bluetooth – A Short Range Transaction System
Virparia Paresh V, Kamani Krunalkumar C,Kathiriya Dhaval, Ghodasara Yogesh
PDF
87-92
Hierarchical Clustering of Music towards Human Mood
D. Rajesh, Karpagalakshmi R. C.
PDF
93-96
Haptic Technology: An Evolution towards Naturality in Communication
Mudit Ratana Bhalla, Harsh Vardhan Bhalla, Anand Vardhan Bhalla
PDF
97-103
Analysis of Classification and Clustering Algorithms using Weka For Banking Data
G.Roch Libia Rani, K. Vanitha
PDF
104-107
A Partitioning Clustering Approach to Dynamically Cluster Materialized View
Manoj Chaudhari, Dr. C.A. Dhote
PDF
108-112
The Next Generation Computing Brainwave-Quantum Computing
T. Venkat Narayana Rao, Shirish Pathania
PDF
113-119
Global Chaos Synchronization of Hyperchaotic Liu and Cai Systems by Active Nonlinear Control
Dr. V. Sundarapandian, R. Suresh
PDF
120-127
ID-based Directed Serial Multisignature Scheme from Bilinear Pairings
Dr.P.Vasudeva Reddy, B.Umaprasada Rao
PDF
128-133
Nonlinear Observer Design for the Undamped Oscillator
Dr. V. Sundarapandian
PDF
134-140
Advanced Hill Cipher Involving Permutation and Iteration
V.U.K. Sastry, Aruna Varanasi, S.Udaya Kumar
PDF
141-145
Raaga Recognition System using Gaussian Mixture Model for Gender Dependence and Independence: Melakartha Raagas
Tarakeswara Rao B, Dr. Prasad P.V.G.D, Reddy
PDF
146-149
Output Regulation of the Chen Chaotic System
Dr. V. Sundarapandian
PDF
150-155
A Survey on DoS Attacks and Countermeasures in Mobile Ad Hoc Networks
M. Gunasekaran, K. Premalatha, B. Gopalakrishnan
PDF
156-164
Rising Standards for Data Mining
N.V. Kalyankar
PDF
165-169
Prediction of Stroke Risk through Stacked Topology of ANN Model
Sabibullah M, Kasmir Raja S.V
PDF
170-179
Advanced Hill Cipher Handling the Entire Plaintext as a Single Block
V.U.K. Sastry, Aruna Varanasi, S.Udaya Kumar
PDF
180-184
Service Discovery Protocols For Infra-Structureless Networks- A Survey
Mrs S. Thangam, Dr.E. Kirubhakaran,
PDF
185-188
Fuzzy Clustering in Web Content Mining
Mr.Ranjit R. Keole, Dr. G.R. Bamnote
PDF
189-193
Distributed Learning Predictors through Web Log Mining using Bayesian Networks
Dr (Mrs) Sujni Paul, Mr. Suresh, Mrs.Beulah Christalin Latha
PDF
194-198
Semantic Web–A Conceptual Model for Heterogeneous Ontology Environment
Vasavi Bande, Keerthi Manchikanti, M.V.N Bhargava
PDF
199-206
Evaluating Effectiveness of “Internet Marketing” Techniques with special refrence to Viral Marketing
Avadhesh kumar Gupta, Dr. Pankaj Nagar, V.P.Gupta
PDF
207-210
A Competent Approach for Protected Communication with Double EHDES (ACAPCD-E)
Ramveer Singh, Awakash Mishra, Deo Brat Ojha
PDF
211-213
Output Regulation of the Lü Chaotic System
Dr. V. Sundarapandian
PDF
214-219
Some Advantages on Monte Carlo Integration using Variance Reduction Procedures
Behrouz Fathi Vajargah, Farshid Mehrdoust,Ahmad Pourdarvish, Forough Norouzi Saziroud
PDF
220-224
Clustering Techniques in Web Content Mining
Mr.Ranjit R. Keole, Dr.G.R. Bamnote
PDF
225-228
Remote Desktop Access using Mobile Phones and an Enhancement for Intra-Mobile Search
Dr.N.Ch.S.N. Iyengar, R.Padma Priya,Vijayasherly, H.Mohamed Ameer Irshad
PDF
229-232
A Modus to Secure Data with Authentication & Integrity using EHDES
Ramveer Singh, Sanjive Tyagi,Ajay Agarwal, Deo Brat Ojha,
PDF
233-236
A Large Block Cipher Having a Key on One Side of the Plain Text Matrix and its Inverse on the Other Side as Multiplicants
Dr. V. Umakanta Sastry, D. S. R. Murthy, Dr. S. Durga Bhavani
PDF
237-241
Energy Efficient Optimized Hybrid Approach for Time Synchronization in Wireless Sensor Networks
Neeta S. Bosamiya, Devesh C. Jinwala,
PDF
242-250
“GRAB A JOB” Messenger Implementation for Making the Job Search Easier using the Secured XML Technologies
Pamini Priya Chandra, Balamurugan Balusamy, Venkatakrishna.P
251-255
Experimenting Oriya Text Chunking with Divide-Conquer Strategy
Rakesh Chandra Balabantaray, Manoj kumar Jena
PDF
256-260
Classification of Breast Cancer Using SVM Classifier Technique
B.Senthil Murugan
PDF
261-263
Secured Authentication for Online Banking using Mobile Phones
Prof. S Sumathy, R Hemalatha, V Jayashree
PDF
264-268
Nonlinear Observer Design for the Lienard System
Dr. V. Sundarapandian
PDF
269-274
Fuzzy Commitment Scheme On Polynomials Over Division Semi Ring
Deo Brat Ojha, Nitin Pandey,
PDF
275-277
Global Hyperchaos Synchronization of Hyperchaotic Chen and Lorenz Systems by Active Nonlinear Control
Dr. V. Sundarapandian
PDF
278-282
Robust Application with RoR
Prof. P. Karthikeyan, Rama Pandian M
PDF
283-286
Nailing Network Partition in Ad Hoc Network
S. Vijayalakshmi, S. Albert Rabara
PDF
287-291
Working of Web Services using SOA
Mrs. Aarti M. Karande, Prof. Vaibhav N. Chunekar, Dr. B.B. Meshram
PDF
292-296
Enhanced Two-Way Directional Routing for MANETs
N.J aisankar, R. Saravanan
PDF
297-301
Image Processing and Pattern Classification Technique in a Machine Vision System that Identifies and Classifies the Plant Diseases Based on the Visual Symptoms.
M. Prabukumar, Balamurali Krishna, J. Kamalakannan
PDF
302-307
Web Effort and Defect Prediction using Bayseian Model
Nandakumar .P, Magesh, Anitha Kumari.A
PDF
308-314
Managing Risk in E-commerce Security
Abhishek Khare
PDF
315-317
A Comprehensive Survey on Frequent Pattern Mining from Web Logs
Mrs. Poonam Mishra
PDF
318-322
“Technology that Changes the Nature of Learning”
Ekta Agrawal
PDF
323-329
“Usage of Firewall Technology in Web Application Security”
Kamlesh Malpani
PDF
330-332
IT Trends in Business from Desktop Applications to Web Based Applications
Kiran Parwani
PDF
333-336
A Novel Clustering Based Segmentation of Multispectral Magnetic Resonance Images
D.Janaki Sathya, Dr. K. Geetha
PDF
337-342
Global Chaos Synchronization of Liu and Lü Systems by Nonlinear Control
Dr. V. Sundarapandian
PDF
343-349
Striking the Security Issues in E-commerce: A Conceptual Framework
Shreeram Gupta, Umesh Kumar Singh
PDF
350-353
Re-Engineering for GUI Conversion from Markup Language to Programming Language
S Manimekalai, Dr. E. Kirubakaran
PDF
354-359
E-Learning for Simulating the Web Server Functionality
S. Arulselvarani, Dr. E. Kirubakaran
PDF
360-364
Automation of Attendance Posting System Using Messaging Services
Prof.P. Kalyanaraman, Kappagantula Aditya
PDF
365-369
CSTuEPM: An Efficient Clustering Algorithm for Micro Array Gene Expression Data
Muhammad Rukunuddin Ghalib
PDF
370-377
Anti-synchronization of T and Cai Systems by Active Nonlinear Control
Dr. V. Sundarapandian
PDF
378-383
A Trust Management Scheme for Service Discovery in Wireless Ad-hoc Network
Prof. S. Sumathy, N. Kavitha, M. Kumudini
PDF
384-389
A Dynamic user Dependent Security Policy Framework for Mobile Commerce Applications
V. Shanmugasundaram, M. Jawahar
PDF
390-392
Secured Information Transfer in Networked Multi-Party Computation
Hemant Pal
PDF
393-395
IP MASQUERADING: A Network Address Translation Technique
Chiranji Lal Chowdhary, Prashant P.J.
PDF
396-407
Anti-synchronization of Liu-Chen-Liu and Liu-Su-Liu Chaotic Systems by Active Nonlinear Control
Dr. V. Sundarapandian
PDF
408-413
Dynamic Routing of Data with Secure Cryptographic Techniques
V. Soumya, S. Durgaprasad,Ma.Jabbar, T. Nagalakshmi
PDF
414-419
Performance and Analysis of AES, DES and Triple DES against Brute Force Attack to protect MPLS Network
Gurpreet Kaur, Dinesh Kumar
PDF
420-424
Enhancement of Aodv Protocol Performance by reducing the delay
R. Thandeeswaran, Vinithra J, N Hima Bindu
PDF
425-430
Medical Image Indexing using Attributed Relational Graphs and Rectangular Trees
Natarajan Meghanathan, Sujatha Sivakumar
PDF
431-439
Secure E-Alliance Model for E-Communication
Deo Brat Ojha, Meenu Sahni, Abhishek Shukla
PDF
440-443
Facial Expression Recognition by Multiple Feature Extraction under Highly Corrupted Noisy Environment
Renu Nagpal, Sumeet Kaur, Pooja Nagpal
PDF
444-450
A Novel Approach to the Performance and Security Enhancement Using Blowfish Algorithm
Manikandan G, Krishnan G, Vaidhyanathan V
PDF
451-454
Improvising Heart Attack Prediction System using Feature Selection and Data Mining Methods
B. Kavitha, R.Naveen Kumar
PDF
455-461
Multicategory Classification Using Relevance Vector Machine for Microarray Gene Expression Cancer Diagnosis
Mrs. S. Sasikala, Dr. S. Santhosh Baboo
PDF
462-473
An Approach to find Trustworthiness among Different Domains in a Grid Environment
Dolly Sharma
PDF
474-482
A Simple Neural Network Approach to Implementing Technical Institute Student Feedback System in Spreadsheet
Sumit A. Khandelwal, Mahip M. Bartere, Vijay S. Gulhane
PDF
483-488
The Extended Security in Mobile Ad-hoc Network with Modified PKI
Er.Harjivan Singh Brar, Er. Mandeep Singh Sandhu
PDF
489-492
A Performance based Multi-relational Data Mining Technique
Santosh Shakya, Gopal Patidar
PDF
493-497
A Real Time on Demand Mobile Mapping System for Vit University – An Approach for Java Enabled Mobile Devices
Kauser Ahmed P, Iyengar. N. Ch.S.N
PDF
498-503
A Crossover Probability Distribution in Genetic Algorithm Under process Scheduling Problem
Er.Rajiv Kumar, Er Sanjeev Gill, Er. Ashwani Kaushik
PDF
504-508
Role of Simulation tools towards the adoption of Routing protocols in VANETs
Pranav Kumar Singh
PDF
509-513
Undesired Sidetracking in Virtual Classroom Systems
Mrs.Rachana S. Jaiswal, Prof. A. S. Alvi
PDF
514-517
An Efficient Weather Forecasting System using a Hybrid Neural Network SOFM–MLP
I.Kadar Shereef, Dr. S. Santhosh Baboo
PDF
518-525
Adaptive SLA enforcement for SOA Applications Using a Middleware
Prof. P. Karthikeyan, Moorthy, S.Senthil Ganesh
PDF
526-529
An Effect of Single Point Inversion Operator on the Performance of Genetic Algorithm for Operating System Process Scheduling Problem
Er. Rajiv Kumar, Er. Sanjeev Gill, Er. Ashwani Kaushik
PDF
530-534
A Study on Service Procedure in Clustered Vehicular CommunicationVehicular ad-hoc network is a new technology to achieve intelligent inter-vehicular communications. Vehicular ad-hoc network is highly dynamic due to the high speed of the vehicles, building and trees in the city areas that causes frequent changes in the network topology. Therefore it requires an efficient routing protocol and service architecture. This paper focuses a new cluster based highway model with 802.11p technology in which the service request and service update procedure for various protocols are studied and their performances have been analyzed and the results are presented in this paper. Here a new service request and service response procedure is introduced in the cluster based highway model that increases the performance of the service reply time and broadcasting time of warning messages. Keywords: VANET, MANET, DSDV, AODV, DSR, OBU, GPS
B. Ramakrishnan, Dr. R. S. Rajesh, C. Namesh
PDF
535-542
Overview of Application Performance on Multicore Environment
M.Narayana Moorthi.
PDF
543-547
A Comparative Analysis of Issues Affecting ERP Implementation in Developed and Developing Countries
Rana Basu, Parijat Upadhyay,Pranab K Dan, M C Das
PDF
548-554
An Anti-Spoofing Method:Reducing Router Memory
Er.Divyendu Kumar Mishra, Kulvinder Singh Handa
PDF
555-563
Message Passing between Data Point on Clustering Algorithm for Gene Leukemia Dataset
D. Napoleon, G. Baskar
PDF
564-567
TCP-LP: Low-Priority Service via End-Point Congestion Control
P. Swarnalatha, H. Parveen Sultana, M. Pounambal
PDF
47-52