Volume 2 Issue 8 August-2013

S.No. Title and Authors of Paper Page.No.
1 Compression Record Based Efficient k-Medoid Algorithm to Increase Scalability and Efficiency
Archana Kumari, Hritu Bhagat
2398-2401
2 Signal Delay Control Based on Different Switching Techniques in Optical Routed Interconnection Networks
Ahmed Nabih Zaki Rashed
2402-2408
3 Semantic Knowledge at User side through Web Browser Plug in: A Review
Hitesh Kumar,Dr. Dharmender Kumar
2409-2414
4 A performance evaluation of various security assessments in WiMAX
Pankaj chouhan, S.R. Mansore
2415-2420
5 QUERY PLANNING FOR CONTINUOUS AGGREGATION QUERIES USING DATA AGGREGATORS
A. SATEESH, D. ANIL, M. KIRANKUMAR
2421-2426
6 HEURISTICS IN GRID SCHEDULING
D. Thilagavathi, Dr. Antony Selvadoss Thanamani
2427-2432
7 Role of Information Technology in Total Quality Management: A Literature Review
Suby Khanam, Jamshed Siddiqui, Faisal Talib
2433-2445
8 Development and Applications of Line Following Robot Based Health Care Management System
Deepak Punetha, Neeraj Kumar, Vartika Mehta
2446-2450
9 Implementation of Soft Handover in IEEE 802.16e
Neeraj Kumar, Deepak Punetha, Sukhraj Singh
2451-2456
10 Analysis and Design of 3 LSB Techniques for Secure Audio Steganography
Laxmi Kumari, Dinesh Goyal
2457-2460
11 Inventory Management System Software for Public Universities in Ghana (IMSSPUG)
M. O Yinyeh, S. Alhassan
2461-2464
12 SECURITY CONCERNS IN MEDIUM SIZE ENTERPRISE CLOUD COMPUTING
SHAIK.SAIDHBIMCA,IBRAHIM GASHAW
2465-2471
13 Dynamic Load Balancing in Cloud Using Live Migration of Virtual Machine
Sandeep Bhargava, Swati Goyal
2472-2477
14 A COMPARATIVE BEAMFORMING ANALYSIS OF LMS & NLMS ALGORITHMS FOR SMART ANTENNA
Priyanka Yadav, Prof. Smita Patil
2478-2481
15 DYNAMIC AUDIT SERVICE OUTSOURCING FOR DATA INTEGRITY IN CLOUDS
CH. MUTYALANNA, P. SRINIVASULU, M. KIRAN
2482-2486
16 Design and Simulation of MEMS based Microhotplate as Gas Sensor
Monika, Dr. Arti Arora
2487-2492
17 Secure Re-encryption in Unreliable Cloud using Synchronous clock
Shyam Sarania, Amit Gupta
2493-2496
18 A Study on Handwritten Signature Verification Approaches
Surabhi Garhawal, Neeraj Shukla
2497-2503
19 Comparative Performance Analysis of Different CMOS Adders Using 90nm and 180nm Technology
Jatinder Kumar, Parveen Kaur
2504-2507
20 Energy Aware Congestion Control Multipath Routing: A Survey
Varun Mishra, Gajendra Singh Chandel
2508-2513
21 SECURING DISTRIBUTED ACCOUNTABILITY FOR DATA SHARING IN CLOUD COMPUTING
N. RAMESH, D. ANIL, M. KIRAN
2514-2519
22 Analysis of Power Utilization and different Routing Protocols in Mobile Ad Hoc Network (MANET)
Neha Shinde Holkar, Latika Mehrotra
2520-2525
23 A Dynamic Approach to Optimize Energy in RIP, OLSR and Fisheye Routing Protocols using Simulator
Dharam Vir, Dr. S.K.Agarwal, Dr. S.A.Imam
2526-2532