1. IMPROVED FUZZY C-MEANS CLUSTERS WITH ANT COLONY OPTIMIZATION
C.Immaculate Mary, Dr. S.V. Kasmir Raja
2. BLOOD VESSEL EXTRACTION USING WIENER FILTER AND MORPHOLOGICAL OPERATION
V. Vijaya Kumari, Dr. N. Suriyanarayanan
3. ANALYSIS OF NEWTON'S FORWARD INTERPOLATION FORMULA
Nasrin Akter Ripa
4. CREATING AN EFFICIENT PREFETCHING MECHANISM BY LEVERAGING RULE BASED AGENTS
Jyoti, A. K. Sharma, Amit Goel
5. THE DYNAMIC ANALYSIS OF INVESTMENT SYSTEM WITHTWO TIME DELAYS
H.X.Yao, K.Liu, R.Liu
6. STABILITY ANALYSIS IN A POLLUTION DEFENSIVE MODELWITH TWO TIME DELAYS
H.X. Yao, Rui Liu, Kai Liu
7. DETECTION OF SHAPES OF OBJECTS USING SOPHISTICATED IMAGE PROCESSING TECHNIQUES
Dr. T.C. Manjunath
8. ENHANCED METHOD FOR EXTRACTING FEATURES OF RESPIRATORY SIGNALS AND DETECTION OF OBSTRUCTIVE SLEEP APNEA USING THRESHOLD BASED AUTOMATIC CLASSIFICATION ALGORITHM
A.Bhavani Sankar, D.Kumar, K.Seethalakshmi
9. ARTIFICIAL NEURAL NETWORK MODELING OF LAND PRICE AT SOWCARPET IN CHENNAI CITY
Sampathkumar.V, Helen Santhi. M
10. A SURVEY ON APPLICATIONS OF WIRELESS SENSOR NETWORK USING CLOUD COMPUTING
Sanjit Kumar Dash, Subasish Mohapatra and Prasant Kumar Pattnaik
11. AN INTELLIGENT ROUTING STRATEGY FOR AD HOC NETWORKS
Shailender Gupta and C. K. Nagpal
12. A COMPARATIVE STUDY AND ANALYSIS OF POWER FACTOR CONTROL TECHNIQUES
Sanjay L. Kurkute, Pradeep M. Patil, Vinod H. Patil
13. IMPULSIVE STABILIZATION OF TWO KINDS OF THIRD-ORDER DELAY DIFFERENTIAL EQUATIONS
Hongxing Yao, Lili Qi and Hong Pan
14. IBSEAD: - A SELF-EVOLVING SELF-OBSESSED LEARNING ALGORITHM FOR MACHINE LEARNING
Jitesh Dundas and David Chik
15. USING H-ALGORITHM TO FIND THE STUDY OF MULTI-SERVER WIRELESS MULTICAST SYSTEM
Dr.A.Arul Lawrence Selvakumar, N. K.Prema
16. PROPOSING LT BASED SEARCH IN PDM SYSTEMS FOR BETTER INFORMATION RETRIEVAL
Zeeshan Ahmed
17. A SHORT HISTORY OF WEB BASED LEARNING INCLUDING GIS
Gilbert Ahamer
18. STATE-SPACE MODELLING OF DYNAMIC SYSTEMS USING HANKEL MATRIX REPRESENTATION
H. Olkkonen, S. Ahtiainen, J.T. Olkkonen and P. Pesola
19. INCIDENT RESPONSE PROCESS GUIDELINES - FOR INFORMATION SECURITY MANAGEMENT
S. P. Datta, Pranab Banerjee
20. A STEP TO EMBEDDED DATABASE: A TECHNO CHANGE
Manik Sharma
21. ELUCIDATION OF PROTEIN INTERACTION VIA GOOGLE AND GENE ONTOLGY
B.V.Subba Rao, Dr.K.V.Sambasiva Rao
22. REAP INFORMATION THROUGH A PROCEDURE FRAMEWORK IN AN ELECTRONIC PROCESS STEER
G.Sivanageswara Rao, Dr.K.Krishna Murthy , B.V.Subba Rao
23. EVALUATING THE EFFECTIVENESS OF GLOBAL EXTREME PROGRAMMING FRAMEWORK THROUGH ITS ARTIFACTS
Ridi Ferdiana, Lukito Edi Nugroho, Paulus Insap Santoso, Ahmad Ashari
24. UNSUPERVISED SEGMENTATION OF MULTISPECTRAL TEXTURED IMAGES USING GA-GMRF MODEL
Mridula J and Dipti Patra
25. A FUZZY TYPE-2 MODEL OF IT GOVERNANCE CONCERNS
Sang-Hyun Lee, Kyung-Ii Moon
26. A GOAL PROGRAMMING MODEL FOR SOLVING ENVIRONMENTAL RISK PRODUCTION PLANNING PROBLEM IN DAIRY PRODUCTION SYSTEM
Suresh Chand Sharma, Devendra Singh Hada, Sanjay Kumar Bansal and Shilpa Bafna
27. PREDICTION OF HYPO/HYPERGLYCEMIA THROUGH SYSTEM IDENTIFICATION, MODELING AND REGULARIZATION OF ILL- POSED DATA
S.Shanthi, Dr.D.Kumar, Prof.S.Varatharaj, S.Santhana Selvi
28. AUTOMATIC THRESHOLD SELECTION BASED ON HISTOGRAM GAUSSIAN ESTIMATION METHOD IN FPGA
Deng-Yuan Huang, Ta-Wei Lin and Wu-Chih Hu
29. AN AUTOMATED SYSTEM FOR HEALTH CARE AND MONITORING DRIVEN BY INTELLIGENT AGENTS
Dr S Ram Reddy, Raviprakash, Yogesh Karunakar, N T Markad
30. PRECISE STOCK PRICE PREDICTION SYSTEM USING NEURAL NETWORKS TRAINED BY ENHANCED AND METICULOUS LEARNING
Yogesh Karunakar, Abhijeet Gole, Priti Jha
31. PERFORMANCE COMPARISON OF ELECTRONIC PRINTWHEEL SYSTEM BY PI AND PID CONTROLLER USING GENETIC ALGORITHMS
Sobuj Kumar Ray ,Diponkar Paul
32. ARCHITECTURE OF CORBA BASED P2P-NETPAY MICRO-PAYMENT SYSTEM IN PEER TO PEER NETWORKS
Kaylash Chaudhary and Xiaoling Dai
33. A STUDY ON ADJACENCY MATRIX FOR ZERO-DIVISOR GRAPHS OVER FINITE RING OF GAUSSIAN INTEGER
Pranjali, Amit Sharma and R.K.Vats
34. SQL INJECTION ATTACKS AND ITS COUNTER MEASURES
Er. Upinder Kaur, Er. Navdeep Kochhar
35. REMOVING REDUNDANCY IN DICTIONARY BASED COMPRESSION TECHNIQUES
Neha Gupta, Ranjit Kumar and Apoorv Gupta
36. A REVIEW OF SECURE ROUTING PROTOCOL IN MOBILE AD HOC NETWORK
Rajender Nath, Pankaj Kumar Sehgal
37. FLC AND NN BASED ALPHA COMPENSATION OF THREE PHASE CONTROLLED RECTIFIER FED DC-MOTOR DRIVE
P.T.Krishna Sai, K.Murali, Dr.G.R.K.Murthy
38. ANALYSIS OF A COURNOT DUOPOLY MODEL'S STABILITY
Hong-xing Yao, Jia-xiu Zu
39. ICT-BASED TEACHING AND LEARNING IN HIGHER EDUCATION - A STUDY
Dr. R. Krishnaveni, J. Meenakumari
40. SEMANTIC APPROACH TOWARDS THE SENSOR WEB ENABLEMENT
Deept Gupta, Satvika Khanna, Sakshi Bhatia
41. DESIGN OF DECENTRALIZED CONTROLLER GAIN SCHEDULING FOR POWER SYSTEM RESTORATION ASSESSMENT IN AN INTERCONNECTED POWER SYSTEM
R.Jayanthi, I.A.Chidambaram
42. THE COMPARATIVE STUDY AND PERFORMANCE OF HCM AND MFPCM ALGORITHMS ON IRIS DATA SET
Vuda Sreenivasarao
43. LMI APPROACH FOR STABILITY OF NEURAL NETWORKS
K. Ratchagit
44. INTELLIGENT MESSAGING SERVICE IN AN INFOSTATION-BASED UNIVERSITY NETWORK
Liam Merwick, Ivan Ganchev, Máirtín O?Droma
45. OPTIMIZED BLOOD PRESSURE CONTROL DURING SURGERY
Mrinmoy Chakraborty, Achintya Das, P.P.Sarker
46. CLASSIFYING SQUINT RISK LEVEL OF SQUINT EYE PATIENTS FROM PATTERN VISUAL EVOKED POTENTIAL SIGNALS
R.Kalaivaazhi and Dr.D.Kumar
47. PRIME NUMBER COST ESTIMATION CRITERION
Kavita Agrawal, Dr. S. K. Bajpai
48. IMAGE FUSION TECHNIQUE: FOR RESTORATION OF IMAGES
Prof. Vanisha. P. Vaidya, Prof. V.K. Shandilya
49. IMPLEMENTATION OF ADVANCED ENCRYPTION STANDARD USING FPGA
Prof. Shilpa.A. Ingole, Prof.V.T. Gaikwad
50. SECURITY CONSTRAINTS FOR SEQUENCE DIAGRAM AND CODE GENERATION
Abdeslam Jakimi and Mohammed Elkoutbi
51. INTERACTION AND INTEGRATION OF AGENT MINING IN DISTRIBUTED DATA ENVIRONMENT
K.Raghava Rao, M. Nagabhushnam Rao, Y.Siva Prasad & K.Ruth Ramya
52. SEMI-CENTRALIZED MULTI-AUTHENTICATED RSSI BASED SOLUTION TO SYBIL ATTACK
Himadri Nath Saha, Dr. Debika Bhattacharyya, Dr. P. K.Banerjee
53. A MATHEMATICAL FORMULA FOR THE SEARCH ENGINE RANKING EFFICIENCY EVALUATION TOOL S.E.R.E.E.T
Moiez Tapia, Wadee S. Alhalabi, Miroslav Kubat
54. APPLICATION OF GA AND PSO TO THE ANALYSIS OF DIGITAL IMAGE WATERMARKING PROCESSES
Surekha P and S.Sumathi
55. STEGANOGRAPHY AND IMAGE ENHANCEMENT- A PROPOSED METHOD Nitika Phull, Aashima and Navneet Malik
56. ON DECOMPOSITION OF BITOPOLOGICAL (1,2)* - A-CONTINUITY O. Ravi, K. Mahaboob Hassain Sherieff and M. Krishnamoorthy
57. DESIGNING ROBUST HYBRID WIRELESS SENSOR NETWORK: DUAL TECHNOLOGY ASPECT Ajay Jangra, Rajesh Verma, Priyanka
58. APPLICATION OF ARTIFICIAL INTELLIGENT IN LOAD FREQUENCY CONTROL OF INTERCONNECTED POWER SYSTEM Surya Prakash, S K Sinha
59. IN SEARCH OF A SUITABLE INDIAN LANGUAGE FOR HUFFMAN DATA COMPRESSION ALGORITHM Satyendra Nath Mandal, Md. Iqbal Quraishi, Kuntal Bhowmick, J. Pal Chaudhuri
60. HANDWRITTEN ENGLISH CHARACTER RECOGNITION USING NEW QUADRANT SPLITTING FEATURE EXTRACTION TECHNIQUE Dayashankar Singh, Maitreyee Dutta, Sarvpal H. Singh, P. K. Singh
61. A BINARY TREE BASED APPROACH TO DISCOVER MULTIPLE TYPES OF RESOURCES IN GRID COMPUTING Leyli Mohammad khanli, Ali Kazemi Niari, Saeed Kargar