Highlights

Call For Sepcial Issue

Submit your proposal within the scope of IJCSET through Email:
ijcset@gmail.com

Call For Editorial Board

We Invite the Reserachers and Professional for Editors in IJCSET join us through Email:
ijcset@gmail.com

Contact Info
an image
I. Khan, N.Aslam
Editor-In-Chief
Email: ijcset@gmail.com



The Journal is shifted to a new online submission system. All the authors are advised to submit their article through the online system.Click here to visit the IJCSET Online Journal submission page

IJCSET (Volume 2. Issue 3. June, 2011)

S.no Paper Title Author Status
1. DANCE - Data Accordance by Nodal Cloud Emission SarathChand P.V.,
Dr.Balraju M.,
Benarji T.,
Vishvapathi P.
PDF
2. Localize Individuals in Spaces of Interaction – Analysis of Online Review Processes Gilbert Ahamer Accepted (Payment Awaiting)
3. A Case for Operating Systems Dr. D. Subbarao,
Kantipudi MVV Prasad
Accepted (Payment Awaiting)
4. An Investigation of 8 Bit Architectures with MYOMA Dr. D. Subbarao,
Kantipudi MVV Prasad
Accepted (Payment Awaiting)
5. An Understanding of Evolutionary Programming Kantipudi MVV Prasad,
Dr. D. Subbarao
Accepted (Payment Awaiting)
6. Authenticated, Wearable Theory Dr. D. Subbarao,
Kantipudi MVV Prasad
Accepted (Payment Awaiting)
7. Deconstructing Agents Kantipudi MVV Prasad,
Dr. D. Subbarao
Accepted (Payment Awaiting)
8. Decoupling I/O Automata from 802.11B in SMPs Kantipudi MVV Prasad,
Dr. D. Subbarao
Accepted (Payment Awaiting)
9. DevexJay: A Methodology for the Simulation of Smalltalk that Would Allow for Further Study into Local-Area Networks Dr. D. Subbarao,
Kantipudi MVV Prasad
Accepted (Payment Awaiting)
10. Evaluating Systems and Massive Multiplayer Online Role-Playing Games Dr. D. Subbarao,
Kantipudi MVV Prasad
Accepted (Payment Awaiting)
11. On the Theoretical Unification of Markov Models and Boolean Logic Dr. D. Subbarao,
Kantipudi MVV Prasad
Accepted (Payment Awaiting)
12. Towards the Synthesis of Virtual Machines Dr. D. Subbarao,
Kantipudi MVV Prasad
Accepted (Payment Awaiting)
13. WASH: Compact, Secure Information Kantipudi MVV Prasad,
Dr. D. Subbarao
Accepted (Payment Awaiting)
14. Optimisation of Buffer Size for Enhancing QoS of Video Traffic using Cross Layered Hybrid Transport Layer Protocol approach Matilda.S,
B.Palaniappan
Accepted (Payment Awaiting)
15. Moving from AMBA AHB to AXI Bus in SoC Designs: A Comparative Study Priyanka Gandhani,
Charu Patel
Accepted (Payment Awaiting)
16. Policy Levels Concerning Database Security Khaleel Ahmad,
Jayant Shekhar,
Nitesh Kumar,
K.P. Yadav
Accepted (Payment Awaiting)
17. LMI condition for synchronization of neural network with parameter Lu Dianchen,
Qi Qiaoxia
Accepted (Payment Awaiting)
18. Active Networks Considered Harmful Justin Sophia. I,
N.Rama
Accepted (Payment Awaiting)
19. A Methodology for the Development of Thin Clients Dr.D.subbarao,
Kantipudi .M.V.V.Prasad
Accepted (Payment Awaiting)
20. Enabling Model Checking and Telephony Using NaresReft Kantipudi .M.V.V.Prasad,
Dr.D.subbarao
Accepted (Payment Awaiting)
21. Emulating Virtual Machines Using Replicated Communication Kantipudi .M.V.V.Prasad,
Dr.D.subbarao
Accepted (Payment Awaiting)
22. Decoupling Virtual Machines from Architecture in Architecture Dr.D.subbarao,
Kantipudi .M.V.V.Prasad
Accepted (Payment Awaiting)
23. Decoupling Randomized Algorithms from 802.11 Mesh Networks in the Partition Table Dr.D.subbarao,
Kantipudi .M.V.V.Prasad
Accepted (Payment Awaiting)
24. Deconstructing Expert Systems Dr.D.subbarao,
Kantipudi .M.V.V.Prasad
Accepted (Payment Awaiting)
25. Deconstructing Agents Dr.D.subbarao,
Kantipudi .M.V.V.Prasad
Accepted (Payment Awaiting)
26. Constructing Online Algorithms and Reinforcement Learning Using Lyre Kantipudi .M.V.V.Prasad,
Dr.D.subbarao
Accepted (Payment Awaiting)
27. Cooperative Configurations for Telephony Dr.D.subbarao,
Kantipudi .M.V.V.Prasad
Accepted (Payment Awaiting)
28. Constructing Cache Coherence and Access Points Dr.D.subbarao,
Kantipudi .M.V.V.Prasad
Accepted (Payment Awaiting)
29. Classical Configurations for IPv7 Kantipudi .M.V.V.Prasad,
Dr.D.subbarao
Accepted (Payment Awaiting)
30. BudgyPinniped: A Methodology for the Investigation of the Ethernet Dr.D.subbarao,
Kantipudi .M.V.V.Prasad
Accepted (Payment Awaiting)
31. An Improvement of Multicast Algorithms with Las Dr.D.subbarao,
Kantipudi .M.V.V.Prasad
Accepted (Payment Awaiting)
32. A Methodology for the Visualization of Wide-Area Networks Kantipudi .M.V.V.Prasad,
Dr.D.subbarao
Accepted (Payment Awaiting)
33. A Methodology for the Simulation of Robots Dr.D.subbarao,
Kantipudi .M.V.V.Prasad
Accepted (Payment Awaiting)
34. A Methodology for the Refinement of the World Wide Web Kantipudi .M.V.V.Prasad,
Dr.D.subbarao
Accepted (Payment Awaiting)
35. A Deployment of Neural Networks with Ammonal Dr.D.subbarao,
Kantipudi .M.V.V.Prasad
Accepted (Payment Awaiting)
36. A Case for Interrupts Kantipudi .M.V.V.Prasad,
Dr.D.subbarao
Accepted (Payment Awaiting)
37. Emulating Virtual Machines Using Replicated Communication Kantipudi .M.V.V.Prasad,
Dr.D.subbarao
Accepted (Payment Awaiting)
38. Harnessing Public-Private Key Pairs Using Encrypted Modalities Dr.D.subbarao,
Kantipudi .M.V.V.Prasad
Accepted (Payment Awaiting)
39. Debt: Distributed, Amphibious Information Dr.D.subbarao,
Kantipudi .M.V.V.Prasad
Accepted (Payment Awaiting)
40. The Evaluation of Efficient IP Trace Back with Specified Probability by Inattentive Network Model Babu.S,
Kranthi Kumar.G,
V N V Phani Kumar .V
Accepted (Payment Awaiting)
41. Content Filtering using Internet Proxy Servers Nitesh Kaushik,
Ashish Verma,
Vivek Sharma
Accepted (Payment Awaiting)
42. Growing Hierarchical Adaptive Self-Organizing Map for Phoneme Classification Chiraz Jlassi,
Najet Arous,
Noureddine Ellouze
Accepted (Payment Awaiting)
43. A Novel Dangerous Vehicle Detection Protocol For Safety Application K. Prema Kumar,
B. M. Kusuma Kumari,
M. Kanti Kiran,
Dr. K. Sri Ramakrishna
Accepted (Payment Awaiting)
44. Fractional Partition M.P.Chaudhary Accepted (Payment Awaiting)
45. Performance Comparison of Features Reduction Techniques for Intrusion Detection System Rupali Datti,
Shilpa lakhina,
Bhupendra verma
Accepted (Payment Awaiting)
46. A New Scheme for Detecting CMFs and Excluding Faulty Sensor Nodes from the Network Hamideh Jafarian,
Shahram Babaie,
Ali Hosseinalipour
Accepted (Payment Awaiting)
47. Contemporary Technology for Hearing Conservation Audiometric Monitoring Amol U. Khobragade,
V. T. Gaikwad
Accepted (Payment Awaiting)
48. Desgin issues in developing a common GUI for Operating Systems Chandramouli Choudhary,
Rohit Gautam,
Abhimanyu Garg,
Anmol Mehrotra,
Jitendra Kr. Seth
Accepted (Payment Awaiting)
49. Context Aware Health Care Application Shankari Bhattacharyya,
RA.K Saravanaguru,
Arunkumar Thangavelu
Accepted (Payment Awaiting)
50. A Novel Expert System for PC Network Troubleshooting and Maintenance Akhil Kaushik,
Manoj Barnela,
Satvika Khanna,
Harish Kumar,
Accepted (Payment Awaiting)
51. Improving Speech Recognition with the help of compression using Vector Quantization Namrata Pachori,
M. Rajasekhara Babu
Accepted (Payment Awaiting)
52. Total Power-Speed Optimization using Multi-Threshold voltage (Mvt) Library and Vt Swapping Flow Miloni Ganatra,
Niraj Jani,
Jigneshpanwala
Accepted (Payment Awaiting)
53. An Efficient Key Agreement Scheme in Multilevel Security Model for Wireless Sensor Network Kapil Kumar,
Ashwani Kumar,
Ravindara Bhatt
Accepted (Payment Awaiting)
54. Issues in Developing Open Source Licensing Tool for Controllers in the Context of BA (Building Automation) Shah Ujval,
M Rajasekhara Babu,
M Khalid
Accepted (Payment Awaiting)
55. Self-Stabilizing Leader Election Algorithm in Highly Dynamic Ad-hoc Mobile Networks K Ranganath,
L.Naveen Kumar,
Y.V.Sreevani
Accepted (Payment Awaiting)
56. Representing Function Blocks Using PRET-C Vinu E.V,
Dr.N.Ch.Sriman Narayana Iyengar
Accepted (Payment Awaiting)
57. Assessment of Mobile Agent Frameworks based on Security Dr.Shuchita Upadhyaya,
Pooja
Accepted (Payment Awaiting)
58. Survey of Web Usage Mining Rakesh kumar malviya,
Mahesh Chandra malviya,
Ritesh joshi,
Preetesh purohit,
vinay soni
Accepted (Payment Awaiting)
59. Comparison Three Resource Discovery Algorithms in Grid Computing Leyli Mohammad Khanli,
Parisa Falahati ,
shahram babaie
Accepted (Payment Awaiting)
60. Applying Hidden Markov Model to Protein Sequence Alignment Er. Neeshu Sharma,
Er. Dinesh Kumar,
Er. Reet kamal Kaur
Accepted (Payment Awaiting)
61. Biological Sequence Matching using Boolean Algebra Nivit Gill,
Shailendera Singh
Accepted (Payment Awaiting)
62. RCause - A Root Cause Analysis Model to Identify the Root Causes of Software Reengineering Problems Er. Anand Rajavat,
Dr. (Mrs.) Vrinda Tokekar
Accepted (Payment Awaiting)
63. ISBWSM-Identifying Similarity between web Services Using Metrics D.Chandramohan Accepted (Payment Awaiting)
64. Reconfiguring High Speed Networks Naresh Kumar,
Renu Vig,
Deepak Bagai
Accepted (Payment Awaiting)
65. Development Strategies for e-LMSs Vibha Ojha,
Neha Sharma,
Anand Sharma,
Sandesh Jain
Accepted (Payment Awaiting)
66. Enhanced Block Truncation Coding for Gray Scale Image Aditya Kumar,
Pardeep Singh
Accepted (Payment Awaiting)
67. Design of Generalized Predictive Controller Using Multi-Objective Optimization Faten Ben Aicha,
Faouzi Bouani,
Mekki Ksouri
Accepted (Payment Awaiting)
68. An Optical Neural Network Technique for Mining Frequent Maximal Itemsets In Large Databases Divya Bhatnagar,
A. S. Saxena
Accepted (Payment Awaiting)
69. A Representation Framework of University Lecture Scheduling for a Multi-Phase Heuristic Sequential Greedy Solver Zhenquan Li,
Vivnesh Prasad
Accepted (Payment Awaiting)
70. A Heuristic Multi-Phase Sequential Greedy Solver for Constrained University Lecture Scheduling Zhenquan Li,
Vivnesh Prasad
Accepted (Payment Awaiting)
71. Model Order Reduction using Bio-inspired PSO and BFO Soft -Computing for Comparative Study Sudhir Y Kumar,
PK.Ghosh,
S Mukherjee
Accepted (Payment Awaiting)
72. Implementation of Educational Decision Support System Prof. Rajeshkumar Chavan,
Mahesh Kokate,
Dr. B.B.Meshram
Accepted (Payment Awaiting)
73. Performance Assessment of AMRR and ADCG Metrics in MLIR and IR Systems Raju Korra,
Pothula Sujatha,
Madarapu Naresh Kumar
Accepted (Payment Awaiting)
74. Authentication Using Quantum Cryptography Darnasi Veeraiah,
P.Shanthi Bala,
G.Aghila
Accepted (Payment Awaiting)
75. Secure Routing Based on ECC in Cluster Wireless Sensor Networks Rayala Upendar Rao,
K Palanivel
Accepted (Payment Awaiting)
76. Secure Routing in Cluster based Wireless Sensor Networks by Symmetric Cryptography with Session Keys Rayala Upendar Rao,
K.Palanivel
Accepted (Payment Awaiting)
77. Vertical Perimeter Based Enhancement of Streaming Application P.Manikandan,
R.Kathiresan,
Marie Stanislas Ashok
Accepted (Payment Awaiting)
78. Spanning trees recursions for crosses maps D. Lot,
M. El Marraki
Accepted (Payment Awaiting)
79. g-Closed Sets in Topology O. Ravi,
S. Ganesan
PDF
80. Decomposition of Continuity Using g#-Closed Sets O. Ravi,
S. Ganesan,
R. Latha
PDF