CINXE.COM
Volume 3 Issue-2 Sept. 2012 | CS Journals
<!DOCTYPE html> <html lang="en"> <head> <meta charset="UTF-8"> <meta name="viewport" content="width=device-width"> <title>Volume 3 Issue-2 Sept. 2012 | CS Journals</title> <link rel="stylesheet" href="http://www.csjournals.com/wp-content/themes/csjournal/css/reset.css" type="text/css" media="all"> <link rel="stylesheet" href="http://www.csjournals.com/wp-content/themes/csjournal/css/style.css" type="text/css" media="all"> <link rel="stylesheet" href="http://www.csjournals.com/wp-content/themes/csjournal/style.css" type="text/css" media="all"> <script type="text/javascript" src="http://www.csjournals.com/wp-content/themes/csjournal/js/jquery-1.4.2.min.js" ></script> <script type="text/javascript" src="http://www.csjournals.com/wp-content/themes/csjournal/js/Myriad_Pro_300.font.js"></script> <script type="text/javascript" src="http://www.csjournals.com/wp-content/themes/csjournal/js/Myriad_Pro_400.font.js"></script> <script type="text/javascript" src="http://www.csjournals.com/wp-content/themes/csjournal/js/script.js"></script> <!--[if lt IE 7]> <link rel="stylesheet" href="http://www.csjournals.com/wp-content/themes/csjournal/css/ie/ie6.css" type="text/css" media="screen"> <script type="text/javascript" src="http://www.csjournals.com/wp-content/themes/csjournal/js/ie_png.js"></script> <script type="text/javascript"> ie_png.fix('.png, footer, header nav ul li a, .nav-bg, .list li img'); </script> <![endif]--> <!--[if lt IE 9]> <script type="text/javascript" src="http://www.csjournals.com/wp-content/themes/csjournaljs/html5.js"></script> <![endif]--> <script src="http://ajax.googleapis.com/ajax/libs/jquery/1.11.0/jquery.min.js"></script> <!-- optional touchswipe file to enable swipping to navigate slideshow --> <script type="text/javascript" src="jquery.touchSwipe.min.js"></script> <style> #fadeshow4 .gallerylayer img{ /* make all images inside fadeshow4 scale to 100% of slideshow width */ width: 100%; height: auto; } </style> <script type="text/javascript" src="http://www.csjournals.com/wp-content/themes/csjournal/js/fadeslideshow.js"></script> </head> <body id="page1"> <div class="wrap"> <!-- header --> <header> <div class="container"> <h1><a href="http://www.csjournals.com/">CS Journals</a></h1> <nav> <ul> <div class="menu-topmenu-container"><ul id="menu-topmenu" class="nav-menu"><li id="menu-item-168" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-home menu-item-168"><a href="http://www.csjournals.com/">Home</a></li> <li id="menu-item-33" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-33"><a href="http://www.csjournals.com/?page_id=8">Our Journals</a></li> <li id="menu-item-101" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-101"><a href="http://www.csjournals.com/?page_id=97">Indexing</a></li> <li id="menu-item-177" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-177"><a href="http://www.csjournals.com/?page_id=86">Conference</a></li> <li id="menu-item-164" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-164"><a href="http://www.csjournals.com/?page_id=160">Downloads</a></li> <li id="menu-item-104" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-104"><a href="http://www.csjournals.com/?page_id=47">Contact Us</a></li> </ul></div> </ul> </nav> <style type="text/css">.rowElem1{color: #008cc4; float: right; font-family: times new roman; font-size: 18px; margin: 0 12px 0 0; position: absolute; right: 0; text-shadow: 0 0 17px; top: 82px;}</style> <div class="rowElem1"> Established Since 2008 </div> <div class="rowElem"> <form role="search" method="get" class="search-form" action="http://www.csjournals.com/"> <label> <span class="screen-reader-text">Search for:</span> <input type="search" class="search-field" placeholder="Search …" value="" name="s" /> </label> <input type="submit" class="search-submit" value="Search" /> </form> </div> </div> </header><div class="container"> <aside> <ul class="categories"> <nav role="navigation" class="navigation site-navigation secondary-navigation"> <div class="menu-sidemenu-container"><ul id="menu-sidemenu" class="menu"><li id="menu-item-113" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-113"><a href="http://www.csjournals.com/?page_id=89">Why CS Journals</a></li> <li id="menu-item-114" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-114"><a href="http://www.csjournals.com/?page_id=68">Call for Papers</a></li> <li id="menu-item-112" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-112"><a href="http://www.csjournals.com/?page_id=91">Author Instructions</a></li> <li id="menu-item-169" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-169"><a href="http://www.csjournals.com/?page_id=8">Journals Archives</a></li> <li id="menu-item-111" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-111"><a href="http://www.csjournals.com/?page_id=93">Paper Submission</a></li> <li id="menu-item-110" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-110"><a href="http://www.csjournals.com/?page_id=95">FAQ</a></li> </ul></div> </nav> </ul> <!-- <h2>Fresh <span>News</span></h2> <ul class="news"> <li><strong>June 30, 2010</strong> <h4><a href="#">Sed ut perspiciatis unde</a></h4> Sed ut perspiciatis unde omnis iste natus error sit voluptatem accusantium doloremque. </li> <li><strong>June 14, 2010</strong> <h4><a href="#">Neque porro quisquam est</a></h4> Nemo enim ipsam voluptatem quia voluptas sit aspernatur aut odit aut fugit consequuntur magni. </li> <li><strong>May 29, 2010</strong> <h4><a href="#">Minima veniam, quis nostrum</a></h4> Uis autem vel eum iure reprehenderit qui in ea voluptate velit esse quam nihil molestiae. </li> </ul>--> <h3>NEWS BLOG</h3> <div class="news"> <aside id="execphp-2" class="widget widget_execphp"> <div class="execphpwidget"><marquee onMouseOver="this.stop()" onMouseOut="this.start()" scrolldelay="200" direction="up"> <p>1.聽<a title="6.JackDavies" href="http://www.csjournals.com/?page_id=3244">How to Be a Successful Graduate Student?</a></p> <p>2.聽<a title="1.Joseph" href="http://www.csjournals.com/?page_id=3195">How to Choose an Essay Writing Service?</a></p> <p>3.聽<a title="2.Joseph" href="http://www.csjournals.com/?page_id=3203">How Does Homework Help Students to Improve Their Grades?</a></p> <p>4.聽<a title="3.Joseph" href="http://www.csjournals.com/?page_id=3206">Seek Confidential Paper Services to Buy an Essay Online</a></p> <p>5.聽<a title="4.Joseph" href="http://www.csjournals.com/?page_id=3208">How a Writing Tutor Might Help Understanding an Assignment</a></p> <p>6. <a title="5.Joseph" href="http://www.csjournals.com/?page_id=3210">What Is the Best Custom Essay Writing Service and How Define It?</a></p> <h5>March-2020</h5> <p>___________________________________________________</p> <p><a title="Services" href="http://www.csjournals.com/?page_id=3180">Online Assignment, Thesis etc. Services</a></p> <h5>Feb-2020</h5> <p>__________________________________________________<br /> <a title="7 Motivational Books about Writing to Help You Reach Your Academic Success" href="http://www.csjournals.com/?page_id=3171">Motivational Books to Help You Reach Your Academic Success</a></p> <h5>Feb-2020</h5> <p>__________________________________________________</p> <p><a title="Maybach" href="http://www.csjournals.com/?page_id=3191">Write My Business Assignment and Help Me to Overcome the Challenges</a></p> <h5>March-2020</h5> <p>_________________________________________________</p> </marquee></div> </aside> </div> </aside> <section id="content"> <div id="main-content" class="main-content"> <div id="primary" class="content-area"> <div id="content" class="site-content" role="main"> <h3>Volume-3 Issue-2 September 2012</h3> <table width="97%"> <tbody> <tr> <td width="42"><strong>SN</strong></td> <td width="581"><strong>Paper</strong></td> </tr> <tr> <td width="42"><strong>1</strong></td> <td width="581"><a href="http://csjournals.com/IJCSC/PDF3-2/Article_1.pdf" target="_blank"><strong>A Novel Approach of Simulation Tools for Mobile Ad-Hoc Networks</strong></a> <p style="text-align: left;">Sujata V. Mallapur, Dr. Siddarama R. Patil</p> </td> </tr> <tr> <td width="42"><strong>2</strong></td> <td width="581"><a href="http://csjournals.com/IJCSC/PDF3-2/Article_2.pdf" target="_blank"><strong>An Analysis of Developing Turbulent Flow聽聽</strong></a> <p style="text-align: left;">Sabah Tamimi</p> </td> </tr> <tr> <td width="42"><strong>3</strong></td> <td width="581"><a href="http://csjournals.com/IJCSC/PDF3-2/Article_3.pdf" target="_blank"><strong>Implementation of Digital Watermarking using VHDL</strong></a> <p style="text-align: left;">Mohammad I.Khan, Samiksha Soni, Bibhudendra Acharya, Shrish Verma</p> </td> </tr> <tr> <td width="42"><strong>4</strong></td> <td width="581"><a href="http://csjournals.com/IJCSC/PDF3-2/Article_4.pdf" target="_blank"><strong>Performance Improvement of OFDM System Using PAPR Reduction</strong></a> <p style="text-align: left;">Mohit Pant, Dr.Dhiiraj Nitnawwre</p> </td> </tr> <tr> <td width="42"><strong>5</strong></td> <td width="581"><a href="http://csjournals.com/IJCSC/PDF3-2/Article_5.pdf" target="_blank"><strong>Information Retrieval using Page Relevancy</strong></a> <p style="text-align: left;">Jaswinder singh, Jyoti godara</p> </td> </tr> <tr> <td width="42"><strong>6</strong></td> <td width="581"><a href="http://csjournals.com/IJCSC/PDF3-2/Article_6.pdf" target="_blank"><strong>Optimizing Energy Consumption of Wireless Sensor Network Based on Hop Distance</strong></a> <p style="text-align: left;">Anshul Shrotriya, Dr. Dhiiraj Nitnawwre</p> </td> </tr> <tr> <td width="42"><strong>7</strong></td> <td width="581"><a href="http://csjournals.com/IJCSC/PDF3-2/Article_7.pdf" target="_blank"><strong>Object tracking by adaptive mean shift with kernel based centroid method</strong></a> <p style="text-align: left;">Rahul Mishra, Mahesh K. Chouhan, Dr.Dhiiraj Nitnawwre</p> </td> </tr> <tr> <td width="42"><strong>8</strong></td> <td width="581"><a href="http://csjournals.com/IJCSC/PDF3-2/Article_8.pdf" target="_blank"><strong>Electromyography Based Hand Control Signals: A Review</strong></a> <p style="text-align: left;">Ruchika, Aarti Malik</p> </td> </tr> <tr> <td width="42"><strong>9</strong></td> <td width="581"><a href="http://csjournals.com/IJCSC/PDF3-2/Article_9.pdf" target="_blank"><strong>A Novel Approach for Congestion Control in Healthcare Wireless Sensor Networks</strong></a> <p style="text-align: left;">Padmashree T, Dr.N.K.Cauvery</p> </td> </tr> <tr> <td width="42"><strong>10</strong></td> <td width="581"><a href="http://csjournals.com/IJCSC/PDF3-2/Article_10.pdf" target="_blank"><strong>New Features for Language Identification Using GMM</strong></a> <p style="text-align: left;">A.Nagesh, Dr V.Kamakshi Prasad, M. Sadanadam</p> </td> </tr> <tr> <td width="42"><strong>11</strong></td> <td width="581"><a href="http://csjournals.com/IJCSC/PDF3-2/Article_11.pdf" target="_blank"><strong>Comparative Analysis of Various Image Edge Detection Techniques for Two Dimensional CT Scan Neck Disc Image</strong></a> <p style="text-align: left;">J. Preetha, S. Selvarajan, P. Suresh</p> </td> </tr> <tr> <td width="42"><strong>12</strong></td> <td width="581"><a href="http://csjournals.com/IJCSC/PDF3-2/Article_12.pdf" target="_blank"><strong>Detecting and Preventing assaults on Network & Transport Layers for Linux Systems</strong></a> <p style="text-align: left;">Prof.G.R.Koteswara Rao</p> </td> </tr> <tr> <td width="42"><strong>13</strong></td> <td width="581"><a href="http://csjournals.com/IJCSC/PDF3-2/Article_13.pdf" target="_blank"><strong>Classification: A holistic view</strong></a> <p style="text-align: left;">Dr. Mandeep Singh, Bharti Chauhan</p> </td> </tr> <tr> <td width="42"><strong>14</strong></td> <td width="581"><a href="http://csjournals.com/IJCSC/PDF3-2/Article_14.pdf" target="_blank"><strong>High Pitta Detection using Finger Photoplethysmograph based Features: A Feasibility Study</strong></a> <p style="text-align: left;">Dr. Mandeep Singh, Bharti Chauhan</p> </td> </tr> <tr> <td width="42"><strong>15</strong></td> <td width="581"><a href="http://csjournals.com/IJCSC/PDF3-2/Article_15.pdf" target="_blank"><strong>Proposal for exploring possibilities for Finger Photoplethysmography as a substitute for Pulse Diagnosis in Ayurveda</strong></a> <p style="text-align: left;">Dr. Mandeep Singh, Tanushree Sharma</p> </td> </tr> <tr> <td width="42"><strong>16</strong></td> <td width="581"><a href="http://csjournals.com/IJCSC/PDF3-2/Article_16.pdf" target="_blank"><strong>Feature Extraction from Finger Pulse Photoplethysmograph for determining pitta level in human body</strong></a> <p style="text-align: left;">Dr. Mandeep Singh, Tanushree Sharma</p> </td> </tr> <tr> <td width="42"><strong>17</strong></td> <td width="581"><a href="http://csjournals.com/IJCSC/PDF3-2/Article_17.pdf" target="_blank"><strong>Finger Pulse Plethysmograph Feature Selection for Pitta Detection in Human Body</strong></a> <p style="text-align: left;">Dr. Mandeep Singh, Tanushree Sharma</p> </td> </tr> <tr> <td width="42"><strong>18</strong></td> <td width="581"><a href="http://csjournals.com/IJCSC/PDF3-2/Article_18.pdf" target="_blank"><strong>The Impact of Knowledge Based Conceptual Model in Evaluating Software Architecture</strong></a> <p style="text-align: left;">P.Shanmugapriya, R.M.Suresh</p> </td> </tr> <tr> <td width="42"><strong>19</strong></td> <td width="581"><a href="http://csjournals.com/IJCSC/PDF3-2/Article_19.pdf" target="_blank"><strong>A Dynamic Approach to Detection and Mis-configuration in Firewall Policy Rules</strong></a> <p style="text-align: left;">Omid Mahdi Ebadati E., Harleen Kaur, M. Afshar Alam</p> </td> </tr> <tr> <td width="42"><strong>20</strong></td> <td width="581"><a href="http://csjournals.com/IJCSC/PDF3-2/Article_20.pdf" target="_blank"><strong>Routing in MANETS using ACO with Mobility Assistance</strong></a> <p style="text-align: left;">Praveen Biradar, Sowmya K.S</p> </td> </tr> <tr> <td width="42"><strong>21</strong></td> <td width="581"><a href="http://csjournals.com/IJCSC/PDF3-2/Article_21.pdf" target="_blank"><strong>A Compact Microstrip Antenna for WiMAX Applications</strong></a> <p style="text-align: left;">Barun Mazumdar</p> </td> </tr> <tr> <td width="42"><strong>22</strong></td> <td width="581"><a href="http://csjournals.com/IJCSC/PDF3-2/Article_22.pdf" target="_blank"><strong>Effect on Range of Bluetooth Class 1 Adapter using External Omni Antenna</strong></a> <p style="text-align: left;">Kapil Kumar, Prateek Sharma, Ajay Kumar Singh</p> </td> </tr> <tr> <td width="42"><strong>23</strong></td> <td width="581"><a href="http://csjournals.com/IJCSC/PDF3-2/Article_23.pdf" target="_blank"><strong>An Efficient Identity Based Self Proxy Signature Scheme with Warrant</strong></a> <p style="text-align: left;">Vandani Verma</p> </td> </tr> <tr> <td width="42"><strong>24</strong></td> <td width="581"><a href="http://csjournals.com/IJCSC/PDF3-2/Article_24.pdf" target="_blank"><strong>Handover In IPv6 & In Its Optimization Techniques: A Survey</strong></a> <p style="text-align: left;">Ritu Sehgal Makhija, Neha Gupta, Mitu Sehgal</p> </td> </tr> <tr> <td width="42"><strong>25</strong></td> <td width="581"><a href="http://csjournals.com/IJCSC/PDF3-2/Article_25.pdf" target="_blank"><strong>Design and Implementation of Adaptive Public Transport system with low cost wireless link and specialized protocol</strong></a> <p style="text-align: left;">Ranjana D. Raut, Vineet Kumar Goyal, Nikhil Arora</p> </td> </tr> <tr> <td width="42"><strong>26</strong></td> <td width="581"><a href="http://csjournals.com/IJCSC/PDF3-2/Article_26.pdf" target="_blank"><strong>Embedding A Software Watermark Using Poisson Distribution</strong></a> <p style="text-align: left;">D.Seetha Mahalaxmi, Dr. S. Viswanadha Raju, Dr. A. Vinay Babu</p> </td> </tr> <tr> <td width="42"><strong>27</strong></td> <td width="581"><a href="http://csjournals.com/IJCSC/PDF3-2/Article_27.pdf" target="_blank"><strong>An Analysis of Hand Gesture Recognition Technique Using Finger Movement Detection Based on Color Marker</strong></a> <p style="text-align: left;">Nancy, Gianetan Singh Sekhon</p> </td> </tr> <tr> <td width="42"><strong>28</strong></td> <td width="581"><a href="http://csjournals.com/IJCSC/PDF3-2/Article_28.pdf" target="_blank"><strong>Effect of iterative multilevel thresholding on Wavelet decomposed Bio-image for its restoration</strong></a> <p style="text-align: left;">Harkirat Singh Brar, Kulvir Singh</p> </td> </tr> <tr> <td width="42"><strong>29</strong></td> <td width="581"><a href="http://csjournals.com/IJCSC/PDF3-2/Article_29.pdf" target="_blank"><strong>Creating 3D WRL Object By using 2D data</strong></a> <p style="text-align: left;">Isha, Gianetan Singh Sekhon</p> </td> </tr> <tr> <td width="42"><strong>30</strong></td> <td width="581"><a href="http://csjournals.com/IJCSC/PDF3-2/Article_30.pdf" target="_blank"><strong>Lambda tuning technique based controller design for an industrial blending process</strong></a> <p style="text-align: left;">Manik, P.K.Juneja, Dr.A K Ray, Sandeep Sunori</p> </td> </tr> <tr> <td width="42"><strong>31</strong></td> <td width="581"><a href="http://csjournals.com/IJCSC/PDF3-2/Article_31.pdf" target="_blank"><strong>Image Segmentation And Object Extraction Using Binary Partition Tree</strong></a> <p style="text-align: left;">Uvika, Sumeet Kaur</p> </td> </tr> <tr> <td width="42"><strong>32</strong></td> <td width="581"><a href="http://csjournals.com/IJCSC/PDF3-2/Article_32.pdf" target="_blank"><strong>A Four Level Speech Signal Encryption Algorithm</strong></a> <p style="text-align: left;">Harjinder Kaur, Gianetan Singh Sekhon</p> </td> </tr> <tr> <td width="42"><strong>33</strong></td> <td width="581"><a href="http://csjournals.com/IJCSC/PDF3-2/Article_33.pdf" target="_blank"><strong>Hash Based Approach for Secure Image Steganography using Canny Edge Detection Method</strong></a> <p style="text-align: left;">Kritika Singla, Sumeet Kaur</p> </td> </tr> <tr> <td width="42"><strong>34</strong></td> <td width="581"><a href="http://csjournals.com/IJCSC/PDF3-2/Article_34.pdf" target="_blank"><strong>Echo Cancellation Using LMS Filter</strong></a> <p style="text-align: left;">Pankush Singla, Gianetan Singh Sekhon</p> </td> </tr> <tr> <td width="42"><strong>35</strong></td> <td width="581"><a href="http://csjournals.com/IJCSC/PDF3-2/Article_35.pdf" target="_blank"><strong>A Study Report on Finger Print Image Enhancement Methods</strong></a> <p style="text-align: left;">Dinesh Kumar Misra, Dr. S.P Tripathi</p> </td> </tr> <tr> <td width="42"><strong>36</strong></td> <td width="581"><a href="http://csjournals.com/IJCSC/PDF3-2/Article_36.pdf" target="_blank"><strong>Critical Patient Movement Monitoring and Data Logging in Real Time Using Consecutive Frames Analysis Method</strong></a> <p style="text-align: left;">Mukesh, Gianetan Singh Sekhon</p> </td> </tr> <tr> <td width="42"><strong>37</strong></td> <td width="581"><a href="http://csjournals.com/IJCSC/PDF3-2/Article_37.pdf" target="_blank"><strong>Text Fusion in Medical Images at Noisy Positions</strong></a> <p style="text-align: left;">Naveen Kumar, Sukhwinder Singh</p> </td> </tr> <tr> <td width="42"><strong>38</strong></td> <td width="581"><a href="http://csjournals.com/IJCSC/PDF3-2/Article_38.pdf" target="_blank"><strong>Relative analysis of different edge operators</strong></a> <p style="text-align: left;">Hardeep Saini, Danveer Mandal</p> </td> </tr> <tr> <td width="42"><strong>39</strong></td> <td width="581"><a href="http://csjournals.com/IJCSC/PDF3-2/Article_39.pdf" target="_blank"><strong>Acoustic Noise Cancellation Using Block LMS Filter In MATLAB Simulink</strong></a> <p style="text-align: left;">Sukhpreet Singh, Sukhwinder Singh Sran</p> </td> </tr> <tr> <td width="42"><strong>40</strong></td> <td width="581"><a href="http://csjournals.com/IJCSC/PDF3-2/Article_40.pdf" target="_blank"><strong>Four Level Image Encryption Using Scrambling and Key Based Methods</strong></a> <p style="text-align: left;">Sandeep Kaur, Sumeet Kaur</p> </td> </tr> <tr> <td width="42"><strong>41</strong></td> <td width="581"><a href="http://csjournals.com/IJCSC/PDF3-2/Article_41.pdf" target="_blank"><strong>Extracting proverb from hindi Sentence and translating it into Equivalent punjabi meaning</strong></a> <p style="text-align: left;">Jagatjit Singh Sekhon</p> </td> </tr> <tr> <td width="42"><strong>42</strong></td> <td width="581"><a href="http://csjournals.com/IJCSC/PDF3-2/Article_42.pdf" target="_blank"><strong>Natural Language Processing and Its Main Areas: Introduction</strong></a> <p style="text-align: left;">Jimmy single, Rishideep singh Jagatjit singh sekhon</p> </td> </tr> <tr> <td width="42"><strong>43</strong></td> <td width="581"><a href="http://csjournals.com/IJCSC/PDF3-2/Article_43.pdf" target="_blank"><strong>Token Based Security in MIPv6, HMIPv6 and in Dynamic MAP Management HMIPv6</strong></a> <p style="text-align: left;">Prof. M. N. Doja, Ravish Saggar</p> </td> </tr> <tr> <td width="42"><strong>44</strong></td> <td width="581"><a href="http://csjournals.com/IJCSC/PDF3-2/Article_44.pdf" target="_blank"><strong>Consecutive Frame Scanning Algorithm For Multi Vehicle Velocity Detection</strong></a> <p style="text-align: left;">Karishma Malhotra, G.S. Sekhon</p> </td> </tr> <tr> <td width="42"><strong>45</strong></td> <td width="581"><a href="http://csjournals.com/IJCSC/PDF3-2/Article_45.pdf" target="_blank"><strong>Multi-input IFLC for motion control of BLDC motors</strong></a> <p style="text-align: left;">Bharathi. Y. H, Prof. A. B. Kulkarni</p> </td> </tr> <tr> <td width="42"><strong>46</strong></td> <td width="581"><a href="http://csjournals.com/IJCSC/PDF3-2/Article_46.pdf" target="_blank"><strong>Browser Prevention Against Phishing Website Security Risk</strong></a> <p style="text-align: left;">Aanchal Malhotra, Navdeep Kaur</p> </td> </tr> <tr> <td width="42"><strong>47</strong></td> <td width="581"><a href="http://csjournals.com/IJCSC/PDF3-2/Article_47.pdf" target="_blank"><strong>Visual Cryptography Using Color Images</strong></a> <p style="text-align: left;">G.R.S.Murthy, D.T.V.Dharmajee Rao</p> </td> </tr> <tr> <td width="42"><strong>48</strong></td> <td width="581"><a href="http://csjournals.com/IJCSC/PDF3-2/Article_48.pdf" target="_blank"><strong>Challenges in Securing Ad hoc Networks</strong></a> <p style="text-align: left;">Budesh Kanwer</p> </td> </tr> <tr> <td width="42"><strong>49</strong></td> <td width="581"><a href="http://csjournals.com/IJCSC/PDF3-2/Article_49.pdf" target="_blank"><strong>Identification of the Most Adaptable Quality Meta-Model</strong></a> <p style="text-align: left;">Mandeep Singh, Rishma Chawla</p> </td> </tr> <tr> <td width="42"><strong>50</strong></td> <td width="581"><a href="http://csjournals.com/IJCSC/PDF3-2/Article_50.pdf" target="_blank"><strong>Scheduling Of Precedence Constrained Task Graphs on Multiprocessor Systems</strong></a> <p style="text-align: left;">Shailza Kamal, Sukhwinder Sharma</p> </td> </tr> <tr> <td width="42"><strong>51</strong></td> <td width="581"><a href="http://csjournals.com/IJCSC/PDF3-2/Article_51.pdf" target="_blank"><strong>Risk Management in Networked Information System</strong></a> <p style="text-align: left;">Puja Gupta</p> </td> </tr> <tr> <td width="42"><strong>52</strong></td> <td width="581"><a href="http://csjournals.com/IJCSC/PDF3-2/Article_52.pdf" target="_blank"><strong>Mobile ad-hoc networks for wireless systems</strong></a> <p style="text-align: left;">Niki Devi</p> </td> </tr> <tr> <td width="42"><strong>53</strong></td> <td width="581"><a href="http://csjournals.com/IJCSC/PDF3-2/Article_53.pdf" target="_blank"><strong>Analysis on Checkpointing Scheme Paradigms for Mobile Ad-hoc Network: A Review</strong></a> <p style="text-align: left;">Anup Patnaik, Lalit Kumar Awasthi, Kamlesh Dutta</p> </td> </tr> <tr> <td width="42"><strong>54</strong></td> <td width="581"><a href="http://csjournals.com/IJCSC/PDF3-2/Article_54.pdf" target="_blank"><strong>Retrieval of better results by using shape techniques for content based retrieval</strong></a> <p style="text-align: left;">Pooja Verma, Manish Mahajan</p> </td> </tr> <tr> <td width="42"><strong>55</strong></td> <td width="581"><a href="http://csjournals.com/IJCSC/PDF3-2/Article_55.pdf" target="_blank"><strong>A Genetic Approach to improve the Performance Index by Using Artificial Neural Networks</strong></a> <p style="text-align: left;">Kanaka Durga R., Dr. Radhika Y.</p> </td> </tr> <tr> <td width="42"><strong>56</strong></td> <td width="581"><a href="http://csjournals.com/IJCSC/PDF3-2/Article_56.pdf" target="_blank"><strong>Ethics and Applications of Web Mining</strong></a> <p style="text-align: left;">Davinder Singh, G.N. Singh</p> </td> </tr> <tr> <td width="42"><strong>57</strong></td> <td width="581"><a href="http://csjournals.com/IJCSC/PDF3-2/Article_57.pdf" target="_blank"><strong>Classification using Association Rule Mining</strong></a> <p style="text-align: left;">Sheela Singhal, Dr. G.N. Singh</p> </td> </tr> <tr> <td width="42"><strong>58</strong></td> <td width="581"><a href="http://csjournals.com/IJCSC/PDF3-2/Article_58.pdf" target="_blank"><strong>Comprehensive Procedure for Knowledge Refinement</strong></a> <p style="text-align: left;">Asheem Datta</p> </td> </tr> <tr> <td width="42"><strong>59</strong></td> <td width="581"><a href="http://csjournals.com/IJCSC/PDF3-2/Article_59.pdf" target="_blank"><strong>Cartography Using Data Warehousing and Mining</strong></a> <p style="text-align: left;">Narinderjit Kaur, Dr. Vivek Chandra</p> </td> </tr> <tr> <td width="42"><strong>60</strong></td> <td width="581"><a href="http://csjournals.com/IJCSC/PDF3-2/Article_60.pdf" target="_blank"><strong>Handoff Process In Mobile WiMAX Networks</strong></a> <p style="text-align: left;">Anurag Kumar, Vishal Kumar, Jaydeep Kishore</p> </td> </tr> <tr> <td width="42"><strong>61</strong></td> <td width="581"><a href="http://csjournals.com/IJCSC/PDF3-2/Article_61.pdf" target="_blank"><strong>Watermark Embedding In an Image and Authentication Based On DCT</strong></a> <p style="text-align: left;">Vijaya kumar K.L.S., Sri.r.srinivas</p> </td> </tr> <tr> <td width="42"><strong>62</strong></td> <td width="581"><a href="http://csjournals.com/IJCSC/PDF3-2/Article_62.pdf" target="_blank"><strong>Cost Function Evaluation of Routing Protocols in Wireless Mesh Networks</strong></a> <p style="text-align: left;">Parveen Sharma, Akhilesh Kr Bhardwaj</p> </td> </tr> <tr> <td width="42"><strong>63</strong></td> <td width="581"><a href="http://csjournals.com/IJCSC/PDF3-2/Article_63.pdf" target="_blank"><strong>Usability Requirements Along The Structure Of Pages Dimension</strong></a> <p style="text-align: left;">Mandeep Josan, Dr. G.N. Singh</p> </td> </tr> <tr> <td width="42"><strong>64</strong></td> <td width="581"><a href="http://csjournals.com/IJCSC/PDF3-2/1.Soni.pdf" target="_blank"><strong>Optimized Multi-Casting Routing Mechanism for Network Performance Enhancement in MANET</strong></a> <p style="text-align: left;">Sunil Kumar, Dr.Vinay Kumar Singh</p> </td> </tr> </tbody> </table> </div><!-- #content --> </div><!-- #main-content --> </section> </div> <footer> <div class="container"> <div class="inside"> <div class="wrapper"> <!--<div class="fleft">24/7 Customer Service <span>+91-8053743429</span></div>--> <div class="aligncenter">Copyright @ Computer Science & Electronics Journals <!--<a class="new_window" href="http://www.behindmethods.com" target="_blank" rel="nofollow">Behind Methods - your technology partner</a>--> <br/> All rights reserved. </div> </div> </div> </div> </footer> <script type="text/javascript"> Cufon.now(); </script> </body> </html>