Highlights

Call For Sepcial Issue

Submit your proposal within the scope of IJCSET through Email:
ijcset@gmail.com

Call For Editorial Board

We Invite the Reserachers and Professional for Editors in IJCSET join us through Email:
ijcset@gmail.com

Contact Info
an image
I. Khan, N.Aslam
Editor-In-Chief
Email: ijcset@gmail.com


IJCSET (Volume 2, Issue 1, 2011)


1. SEMANTIC QUERY EXPANSION USING KNOWLEDGE BASED FOR IMAGES SEARCH AND RETRIEVAL

Roohullah Khan, J. Jaafar


2. TWO-LAYERED FUZZY LOGIC BASED FREQUENCY MODULATION CONTROLLER FOR A TWO-AREA THERMAL REHEAT POWER SYSTEM INTERCONNECTED WITH AN AC/DC HYBRID TRANSMISSION SYSTEM

V.Adhimoorthy, Dr.I.A.Chidambaram


3. EFFECT OF RADIO PLATFORM NOISE ON EXISTING MAC PROTOCOLS IN USE IN AD HOC WIRELESS NETWORKS AND ITS SOLUTION

Prabir Banerjee, D.K.Basu, M.Nasipuri


4. VARIATIONAL ITERATION METHOD FOR SOLVING NONLINEAR FRACTIONAL INTEGRO-DIFFERENTIAL EQUATIONS

Muhammet Kurulay, Aydin SECER


5. PHISHING E-MAIL ANALYSIS

Shamal Firake, Pravin Soni, Dr. B.B.Meshram


6. A STUDY ON SEARCHING MECHANISMS IN SEMANTIC WEB

M.Thangaraj, G.Sujatha


7. BRIDGING THE GAP BETWEEN UML AND HARDWARE DESCRIPTION LANGUAGES AT EARLY STAGES OF EMBEDDED SYSTEMS DEVELOPMENT

Fateh Boutekkouk


8. AN ENERGY-EFFICIENT UNICAST ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKS

Young-Jun Chung


9. THE IMPACT OF THE DIGITAL DIVIDE ON EDUCATION AND HEALTH

Veena Paliwal, Vaibhav Sharma


10. A NEW NARROW-BLOCK MODE OF OPERATION FOR DISK ENCOMPRESSION WITH TWEAKED BLOCK CHAINING

Debasis Gountia, Dipanwita Roy Chowdhury


11. IMPACT OF WORMHOLE ATTACKS ON MANETS

Saurabh Upadhyay, Brijesh Kumar Chaurasia


12. CONTENT ANALYSIS OF MATHEMATICS WEBSITES IN TAIWAN

Hsiu-fei Lee


13. ANTICIPATING FEATURES OF RING FINGER FROM MIDDLE FINGER WIDTH: A NOVEL METHOD

Manimala.S, C.N.Ravi Kumar


14. INFORMATION EXTRACTION FROM REMOTE SENSING IMAGE (RSI) FOR A COASTAL ENVIRONMENT ALONG A SELECTED COASTLINE OF TAMILNADU

K. Bhuvaneswari, R. Dhamotharan, N. Radhakrishnan


15. DESIGNING FLEXIBLE GUI TO INCREASE THE ACCEPTANCE RATE OF PRODUCT DATA MANAGEMENT SYSTEMS IN INDUSTRY

Zeeshan Ahmed


16. PROCESS ORCHESTRATION FOR INTRUSION DETECTION SYSTEM BASED ON SOA AND EVENT DRIVEN ARCHITECTURE PRINCIPLES

K.V.S.N.Rama Rao, Pandu Prudhvi, Manas Ranjan Patra


17. PERFORMANCE ANALYSIS OF PARALLEL MINING FOR ASSOCIATION RULES ON HETEROGENEOUS SYSTEM

Rakhi Garg, P.K.Mishra


18. COMPARATIVE GENOME ANALYSIS USING COMPUTATIONAL APPROACH IN HIV-1 AND HIV-2

Dr. DSVGK Kaladhar, A.Krishna Chaitanya


19. A STUDY OF NEUTROSOPHIC TECHNOLOGY TO RETRIEVE QUERIES IN RELATIONAL DATABASE

Ashit Kumar Dutta, Ranjit Biswas, Nasser Saad AL-Arifi


20. AUTOMATIC DECIPHERMENT OF ANCIENT INDIAN EPIGRAPHICAL SCRIPTS - A BRIEF REVIEW

Soumya A, G Hemantha Kumar


21. AN ANALYSIS OF SOFTWARE COST ESTIMATION TRADITIONAL MODELS WITH NEURAL NETWORK BASED APPROACH

Manpreet Kaur, Sushil Garg, Mamta Sharma


22. CONTENT BASED RECOMMENDER SYSTEMS

P. Deivendran, Dr. T. Mala, B.Shanmugasundaram


23. GENERIC TRUST-BASED RESOURCE BROKER ARCHITECTURE FOR GRID

Damandeep Kaur, Dr Jyotsna Sengupta


24. EFFECTIVE CLASSIFICATION TECHNIQUE ENHANCED USING GENETIC ALGORITHM:FOR DATA MINING DISEASE IN THE INCUMBENTS TO THE HEALTH CENTRE

Manaswini Pradhan, Dr. Ranjit Kumar Sahu


25. SPEECH ENHANCEMENT USING GRADIENT BASED VARIABLE STEP SIZE ADAPTIVE FILTERING TECHNIQUES

G.V.S.Karthik , M. Ajay Kumar, Md. Zia Ur Rahman


26. HIGH PERFORMANCE HUMAN FACE RECOGNITION USING INDEPENDENT HIGH INTENSITY GABOR WAVELET RESPONSES: A STATISTICAL APPROACH

Arindam Kar, Debotosh Bhattacharjee, Dipak Kumar Basu, Mita Nasipuri, Mahantapas Kundu


27. A NEW PROTOCOL FOR ADVANCED ENCRYPTION/DECRYPTION USING ECC & PHAL

Yogendra Kumar Jain, Nitin


28. HIGH DIMENSIONAL DATA CLASSIFICATION THROUGH ATTRIBUTE REDUCTION USING RPCA APPROACH

Rajashree Dash, Rasmita Dash


29. STEGANOGRAPHIC TOOLS FOR BMP IMAGE FORMAT

Prof.Sumedha Sirsikar, Prof. Asavari Deshpande