Highlights

Call For Sepcial Issue

Submit your proposal within the scope of IJCSET through Email:
ijcset@gmail.com

Call For Editorial Board

We Invite the Reserachers and Professional for Editors in IJCSET join us through Email:
ijcset@gmail.com

Contact Info
an image
I. Khan, N.Aslam
Editor-In-Chief
Email: ijcset@gmail.com


IJCSET (Volume 1, Issue 4, 2010)


1. IMPROVED FUZZY C-MEANS CLUSTERS WITH ANT COLONY OPTIMIZATION

C.Immaculate Mary, Dr. S.V. Kasmir Raja


2. BLOOD VESSEL EXTRACTION USING WIENER FILTER AND MORPHOLOGICAL OPERATION

V. Vijaya Kumari, Dr. N. Suriyanarayanan


3. ANALYSIS OF NEWTON'S FORWARD INTERPOLATION FORMULA

Nasrin Akter Ripa


4. CREATING AN EFFICIENT PREFETCHING MECHANISM BY LEVERAGING RULE BASED AGENTS

Jyoti, A. K. Sharma, Amit Goel


5. THE DYNAMIC ANALYSIS OF INVESTMENT SYSTEM WITHTWO TIME DELAYS

H.X.Yao, K.Liu, R.Liu


6. STABILITY ANALYSIS IN A POLLUTION DEFENSIVE MODELWITH TWO TIME DELAYS

H.X. Yao, Rui Liu, Kai Liu


7. DETECTION OF SHAPES OF OBJECTS USING SOPHISTICATED IMAGE PROCESSING TECHNIQUES

Dr. T.C. Manjunath


8. ENHANCED METHOD FOR EXTRACTING FEATURES OF RESPIRATORY SIGNALS AND DETECTION OF OBSTRUCTIVE SLEEP APNEA USING THRESHOLD BASED AUTOMATIC CLASSIFICATION ALGORITHM

A.Bhavani Sankar, D.Kumar, K.Seethalakshmi


9. ARTIFICIAL NEURAL NETWORK MODELING OF LAND PRICE AT SOWCARPET IN CHENNAI CITY

Sampathkumar.V, Helen Santhi. M


10. A SURVEY ON APPLICATIONS OF WIRELESS SENSOR NETWORK USING CLOUD COMPUTING

Sanjit Kumar Dash, Subasish Mohapatra and Prasant Kumar Pattnaik


11. AN INTELLIGENT ROUTING STRATEGY FOR AD HOC NETWORKS

Shailender Gupta and C. K. Nagpal


12. A COMPARATIVE STUDY AND ANALYSIS OF POWER FACTOR CONTROL TECHNIQUES

Sanjay L. Kurkute, Pradeep M. Patil, Vinod H. Patil


13. IMPULSIVE STABILIZATION OF TWO KINDS OF THIRD-ORDER DELAY DIFFERENTIAL EQUATIONS

Hongxing Yao, Lili Qi and Hong Pan


14. IBSEAD: - A SELF-EVOLVING SELF-OBSESSED LEARNING ALGORITHM FOR MACHINE LEARNING

Jitesh Dundas and David Chik


15. USING H-ALGORITHM TO FIND THE STUDY OF MULTI-SERVER WIRELESS MULTICAST SYSTEM

Dr.A.Arul Lawrence Selvakumar, N. K.Prema


16. PROPOSING LT BASED SEARCH IN PDM SYSTEMS FOR BETTER INFORMATION RETRIEVAL

Zeeshan Ahmed


17. A SHORT HISTORY OF WEB BASED LEARNING INCLUDING GIS

Gilbert Ahamer


18. STATE-SPACE MODELLING OF DYNAMIC SYSTEMS USING HANKEL MATRIX REPRESENTATION

H. Olkkonen, S. Ahtiainen, J.T. Olkkonen and P. Pesola


19. INCIDENT RESPONSE PROCESS GUIDELINES - FOR INFORMATION SECURITY MANAGEMENT

S. P. Datta, Pranab Banerjee


20. A STEP TO EMBEDDED DATABASE: A TECHNO CHANGE

Manik Sharma


21. ELUCIDATION OF PROTEIN INTERACTION VIA GOOGLE AND GENE ONTOLGY

B.V.Subba Rao, Dr.K.V.Sambasiva Rao


22. REAP INFORMATION THROUGH A PROCEDURE FRAMEWORK IN AN ELECTRONIC PROCESS STEER

G.Sivanageswara Rao, Dr.K.Krishna Murthy , B.V.Subba Rao


23. EVALUATING THE EFFECTIVENESS OF GLOBAL EXTREME PROGRAMMING FRAMEWORK THROUGH ITS ARTIFACTS

Ridi Ferdiana, Lukito Edi Nugroho, Paulus Insap Santoso, Ahmad Ashari


24. UNSUPERVISED SEGMENTATION OF MULTISPECTRAL TEXTURED IMAGES USING GA-GMRF MODEL

Mridula J and Dipti Patra


25. A FUZZY TYPE-2 MODEL OF IT GOVERNANCE CONCERNS

Sang-Hyun Lee, Kyung-Ii Moon


26. A GOAL PROGRAMMING MODEL FOR SOLVING ENVIRONMENTAL RISK PRODUCTION PLANNING PROBLEM IN DAIRY PRODUCTION SYSTEM

Suresh Chand Sharma, Devendra Singh Hada, Sanjay Kumar Bansal and Shilpa Bafna


27. PREDICTION OF HYPO/HYPERGLYCEMIA THROUGH SYSTEM IDENTIFICATION, MODELING AND REGULARIZATION OF ILL- POSED DATA

S.Shanthi, Dr.D.Kumar, Prof.S.Varatharaj, S.Santhana Selvi


28. AUTOMATIC THRESHOLD SELECTION BASED ON HISTOGRAM GAUSSIAN ESTIMATION METHOD IN FPGA

Deng-Yuan Huang, Ta-Wei Lin and Wu-Chih Hu


29. AN AUTOMATED SYSTEM FOR HEALTH CARE AND MONITORING DRIVEN BY INTELLIGENT AGENTS

Dr S Ram Reddy, Raviprakash, Yogesh Karunakar, N T Markad


30. PRECISE STOCK PRICE PREDICTION SYSTEM USING NEURAL NETWORKS TRAINED BY ENHANCED AND METICULOUS LEARNING

Yogesh Karunakar, Abhijeet Gole, Priti Jha


31. PERFORMANCE COMPARISON OF ELECTRONIC PRINTWHEEL SYSTEM BY PI AND PID CONTROLLER USING GENETIC ALGORITHMS

Sobuj Kumar Ray ,Diponkar Paul


32. ARCHITECTURE OF CORBA BASED P2P-NETPAY MICRO-PAYMENT SYSTEM IN PEER TO PEER NETWORKS

Kaylash Chaudhary and Xiaoling Dai


33. A STUDY ON ADJACENCY MATRIX FOR ZERO-DIVISOR GRAPHS OVER FINITE RING OF GAUSSIAN INTEGER

Pranjali, Amit Sharma and R.K.Vats


34. SQL INJECTION ATTACKS AND ITS COUNTER MEASURES

Er. Upinder Kaur, Er. Navdeep Kochhar


35. REMOVING REDUNDANCY IN DICTIONARY BASED COMPRESSION TECHNIQUES

Neha Gupta, Ranjit Kumar and Apoorv Gupta


36. A REVIEW OF SECURE ROUTING PROTOCOL IN MOBILE AD HOC NETWORK

Rajender Nath, Pankaj Kumar Sehgal


37. FLC AND NN BASED ALPHA COMPENSATION OF THREE PHASE CONTROLLED RECTIFIER FED DC-MOTOR DRIVE

P.T.Krishna Sai, K.Murali, Dr.G.R.K.Murthy


38. ANALYSIS OF A COURNOT DUOPOLY MODEL'S STABILITY

Hong-xing Yao, Jia-xiu Zu


39. ICT-BASED TEACHING AND LEARNING IN HIGHER EDUCATION - A STUDY

Dr. R. Krishnaveni, J. Meenakumari


40. SEMANTIC APPROACH TOWARDS THE SENSOR WEB ENABLEMENT

Deept Gupta, Satvika Khanna, Sakshi Bhatia


41. DESIGN OF DECENTRALIZED CONTROLLER GAIN SCHEDULING FOR POWER SYSTEM RESTORATION ASSESSMENT IN AN INTERCONNECTED POWER SYSTEM

R.Jayanthi, I.A.Chidambaram


42. THE COMPARATIVE STUDY AND PERFORMANCE OF HCM AND MFPCM ALGORITHMS ON IRIS DATA SET

Vuda Sreenivasarao


43. LMI APPROACH FOR STABILITY OF NEURAL NETWORKS

K. Ratchagit


44. INTELLIGENT MESSAGING SERVICE IN AN INFOSTATION-BASED UNIVERSITY NETWORK

Liam Merwick, Ivan Ganchev, Máirtín O?Droma


45. OPTIMIZED BLOOD PRESSURE CONTROL DURING SURGERY

Mrinmoy Chakraborty, Achintya Das, P.P.Sarker


46. CLASSIFYING SQUINT RISK LEVEL OF SQUINT EYE PATIENTS FROM PATTERN VISUAL EVOKED POTENTIAL SIGNALS

R.Kalaivaazhi and Dr.D.Kumar


47. PRIME NUMBER COST ESTIMATION CRITERION

Kavita Agrawal, Dr. S. K. Bajpai


48. IMAGE FUSION TECHNIQUE: FOR RESTORATION OF IMAGES

Prof. Vanisha. P. Vaidya, Prof. V.K. Shandilya


49. IMPLEMENTATION OF ADVANCED ENCRYPTION STANDARD USING FPGA

Prof. Shilpa.A. Ingole, Prof.V.T. Gaikwad


50. SECURITY CONSTRAINTS FOR SEQUENCE DIAGRAM AND CODE GENERATION

Abdeslam Jakimi and Mohammed Elkoutbi


51. INTERACTION AND INTEGRATION OF AGENT MINING IN DISTRIBUTED DATA ENVIRONMENT

K.Raghava Rao, M. Nagabhushnam Rao, Y.Siva Prasad & K.Ruth Ramya


52. SEMI-CENTRALIZED MULTI-AUTHENTICATED RSSI BASED SOLUTION TO SYBIL ATTACK

Himadri Nath Saha, Dr. Debika Bhattacharyya, Dr. P. K.Banerjee


53. A MATHEMATICAL FORMULA FOR THE SEARCH ENGINE RANKING EFFICIENCY EVALUATION TOOL S.E.R.E.E.T

Moiez Tapia, Wadee S. Alhalabi, Miroslav Kubat


54. APPLICATION OF GA AND PSO TO THE ANALYSIS OF DIGITAL IMAGE WATERMARKING PROCESSES

Surekha P and S.Sumathi


55. STEGANOGRAPHY AND IMAGE ENHANCEMENT- A PROPOSED METHOD

Nitika Phull, Aashima and Navneet Malik


56. ON DECOMPOSITION OF BITOPOLOGICAL (1,2)* - A-CONTINUITY

O. Ravi, K. Mahaboob Hassain Sherieff and M. Krishnamoorthy


57. DESIGNING ROBUST HYBRID WIRELESS SENSOR NETWORK: DUAL TECHNOLOGY ASPECT

Ajay Jangra, Rajesh Verma, Priyanka


58. APPLICATION OF ARTIFICIAL INTELLIGENT IN LOAD FREQUENCY CONTROL OF INTERCONNECTED POWER SYSTEM

Surya Prakash, S K Sinha


59. IN SEARCH OF A SUITABLE INDIAN LANGUAGE FOR HUFFMAN DATA COMPRESSION ALGORITHM

Satyendra Nath Mandal, Md. Iqbal Quraishi, Kuntal Bhowmick, J. Pal Chaudhuri


60. HANDWRITTEN ENGLISH CHARACTER RECOGNITION USING NEW QUADRANT SPLITTING FEATURE EXTRACTION TECHNIQUE

Dayashankar Singh, Maitreyee Dutta, Sarvpal H. Singh, P. K. Singh


61. A BINARY TREE BASED APPROACH TO DISCOVER MULTIPLE TYPES OF RESOURCES IN GRID COMPUTING

Leyli Mohammad khanli, Ali Kazemi Niari, Saeed Kargar