Volume 2 Issue 5 May-2013

S.No. Title and Authors of Paper Page.No.
1 A Verification Method Based On Petri Net for Online Student Registration Web Service Composition
A.Kumaravel, M.Merlin Mexa
1663-1669
2 An Overview of Partial Shuffle for Database Access Pattern Protection Using Reverse Encryption Algorithm
Priti V. Bhagat, Rohit Singhal
1670-1673
3 ENHANCED TECHNIQUE FOR SECURED AND RELIABLE WATERMARKING USING MFHWT
Sandeep Kaur, Rajiv Bansal
1674-1677
4 DESIGN OF WI-FI INTEGRATED SOPHISTICATED METER USING EMBEDDED SYSTEM
Iswarya.V
1678-1683
5 CLASSIFICATION BY K-MEANS CLUSTERING
MUKESH KUMAR CHOUDHAR, MANDEEP SINGH SAINI, PALVEE
1684-1688
6
Harris-Hessian Algorithm for Coin Apprehension

Saranya das.Y.M,R.Pugazhenthi
1689-1693
7 Modified Dactylogram Sifting
Geethu V S, V.Selvakumar
1694-1698
8 Preserving Privacy Using Data Perturbation in Data Stream
Neha Gupta, IndrJeet Rajput
1699-1704
9 A Study of Secure Routing in Mobile Ad-hoc Networks
Desai Piyusha P.
1705-1708
10 Secure Data Transmission using Watermarking and Image Compression
Dr. Ajit Singh, Meenakshi Gahlawat
1705-1715
11 Mitigating Denial of Service Attacks in Wireless Networks
S. Raja Ratna,R. Ravi,Dr. Beulah Shekhar
1716-1719
12 Packet Load Generator for Telecom Networks
Niranjan U, Ramacharyulu P Govardhanam, K Vijaya
1720-1724
13 Fusion of Statistic, Data Mining and Genetic Algorithm for feature selection in Intrusion Detection
MeghaAggarwal, Amrita
1725-1731
14 Efficient and Reliable Resource Management Framework for Public Cloud Computing
M.Sasitharagai, T.Rajendran, M.Malarmathi
1732-1737
15 Web Gate Keeper: Detecting Encroachment in Multi-tier Web Application
Sanaz Jafari, Prof.Dr.Suhas H. Patil
1738-1742
16 750kv Transmission Line parameter and line Efficiency calculation and the performance of High Voltage alternating current Transmission system using MATLAB program
Alka Szeerin Mansoori
1743-1748
17 Performance Analysis of IIR Digital Band Stop Filter
Subhadeep Chakraborty, Abhirup Patra
1749-1756
18 Cooperative Defense against Pollution Attack in P2P System with Network Coding
Dr Siddaraju, Chitresha Mehta
1757-1761
19 Analyzing Knowledge Based Feature Selection to Detect Remote to Local Attacks
Mya Thidar Myo Win, Kyaw Thet Khaing
1762-1765
20 A Statistical Approach to Classify and Identify DDoS Attacks using UCLA Dataset
Thwe Thwe Oo, Thandar Phyu
1766-1770
21 Design and Implementation of Structured and Unstructured Data Querying System in Heterogeneous Environment
Thu Zar Mon
1771-1775
22 Intrusion Alert Elimination on Network Attack Alerting System
Mon Mon Zaw
1776-1779
23 A Survey on Windows Component Loading Vulnerabilities
U.Haritha, V.Lokanadham Naidu
1780-1783
24 Enforcing Multi-user Security Policies in Cloud Computing
Mrs. Shubhada P. Mone, Mrs. Sunita S. Dhotre
1784-1788
25 Construction and Selection of Single Sampling Quick Switching Variables System for given Control Limits Involving Minimum Sum of Risks
Dr. D. SENTHILKUMAR, R. GANESAN, B. ESHA RAFFIE
1789-1800
26 Audio-based Classification of Video Genre Using Multivariate Adaptive Regression Splines
Hnin Ei Latt, Nu War
1801-1805
27 Cost Estimation Modal to find faulty Objects in Software Reusable Components
Ramadeep Kaur, Sami Anand
1806-1810
28 Overview of Impact of Requirement Metrics in Software Development Environment
Mohd.Haleem, Prof (Dr) Mohd.Rizwan Beg, Sheikh Fahad Ahmad
1811-1815
29 A KNOWLEDGE BASED APPROACH FOR AUTOMATIC DATABASE NORMALIZATION
G.Sunitha, Dr.A.Jaya
1816-1819
30 The Comparative Study of DCT and DWT in Blind Detection Based Digital Watermarking
Mya Thidar Kyaw, Dr. Kyi Soe
1820-1824
31 WEIGHT ROTATION TECHNIQUE FOR PAPR REDUCTION IN OFDM
S.P.Vijayaragavan,R.Sakthivel,B.Karthik
1825-1828
32 Key Frame Extraction for Video Summarization Using DWT Wavelet Statistics
Khin Thandar Tint, Dr. Kyi Soe
1829-1833
33 AN EFFECTIVE METHODOLOGY FOR MINUTIAE BASED FINGERPRINT MATCHING USING SINGULARITIES INDEXING
M.Sivapriya, S.Pushpa
1834-1840
34 A Maintainability Estimation Model and Metrics for Object-Oriented Design (MOOD)
Kiranjit Kaur,Sami Anand
1841-1843
35 The optimize load balancing in cluster computing
Mr. Sunil Kumar Pandey, Prof. Rajesh Tiwari
1844-1849
36 Important Roles Of Data Mining Techniques For Anomaly Intrusion Detection System
Phyu Thi Htun, Kyaw Thet Khaing
1850-1854
37 Detection Model for Daniel-of-Service Attacks using Random Forest and k-Nearest Neighbors
Phyu Thi Htun, Kyaw Thet Khaing
1855-1860
38 Fuzzy RDBMS Design: SQL Add-On
Subita Kumari, Sonia
1861-1865
39 Performance Study of Interweave Spectrum Sharing Method in Cognitive Radio
Pinki Yadav, Partha Pratim Bhattacharya
1866-1872
40 Simulative analysis for Image Denoising using wavelet thresholding techniques
Virendra Kumar, Dr. Ajay Kumar
1873-1878
41 Human Identification Based Biometric Gait Features using MSRC
Nyo Nyo Htwe, Nu War
1879-1885
42 MEMS ACCELEROMETER BASED HAND GESTURE RECOGNITION
Meenaakumari.M, M.Muthulakshmi
1886-1892
43 Security Analysis of Fair E-cash Payment System
Thae Nu Nge
1893-1896
44 Fairness of Optimistic ID-Based Concurrent Signature Schemes
Pearl Ei Phyu
1897-1900
45 Analysis and Improvement on a Single Unit Cyclic Fair Exchange Protocol for Multi-party
Nay Chi Htun, Khin Khat Khat Kyaw
1901-1903
46 Reconfiguration of Memory for High Speed Matrix Multiplication
Ms. Shamshad Shirgeri,Ms. Pallavi Umesh Naik, Mrs. Rohini, Prof. Krishnananda Shet
1904-1908
47 A Survey on Algorithms for Cluster Head Selection in WSN
Srie Vidhya Janani. E, Ganeshkumar.P, Vasantha Suganthi.G, Sultan.M, Kaleeswaran. D
1909-1913
48 STUDY OF QUANTUM CRYPTOGRAPHY
Swapnika,Rajani bala,Kavita
1914-1917
49 Advanced Technique of Digital Watermarking based on SVD-DWT-DCT and Arnold Transform
Sangeeta Madhesiya, Shakil Ahmed
1918-1923
50 Energy Enhancement in AOMDV
Alpesh chauhan, Prof.B.V.Buddhdev
1924-1929