COMPUTER SCIENCE & ENGINEERING BIBLIOGRAPHY

Home

Advanced Computing: An International Journal

ISSN :2229 - 6727[Online]; 2229 - 726X[Print]

November 2012, Volume 3, Number 6

Obesity Heuristic, New Way on Artificial Immune Systems [ pdf ]
M. A. El-Dosuky, M. Z. Rashad, T. T. Hamza and A.H. EL-Bassiouny, Mansoura University, Egypt

Web Mining - A Catalyst For E-Business [ pdf ]
Abdul Rahaman Wahab Sait1 and T.Meyappan2, 1Shaqra University, Saudi Arabia and 2Alagappa University, India

A Multi - Population Based Frog - Memetic Algorithm for Job Shop Scheduling Problem [ pdf ]
Somayeh Kalantari1 and Mohammad Saniee Abadeh2, 1Islamic Azad University, Iran and 2Tarbiat Modares University, Iran

Map /Reduce Design and Implementation of Apriori Algorithm for Handling Voluminous Data - Sets [ pdf ]
Anjan K Koundinya, Srinath N K, K A K Sharma, Kiran Kumar, Madhu M N and Kiran U Shanbag, R V College of Engineering, India

Justification of Montgomery Modular Reduction [ pdf ]
Salem Sherif Elfard, University of Az-zawia, Zawia-Libya

A Study of Image Compression Based Transmission Algorithm Using Spiht for Low Bit Rate Application [ pdf ]
Ritu Chourasiya and Ajit Shrivastava, Institute of science & IT., India

A Comparative Study of Root -Based and Stem -Based Approaches for Measuring the Similarity Between Arabic Words for Arabic Text Mining Applications [ pdf ]
Hanane FROUD1, Abdelmonaim LACHKAR1 and Said ALAOUI OUATIK2, 1University Sidi Mohamed Ben Abdellah (USMBA),Fez, Morocco and 2L.I.M, FSDM, Fez, Morocco

Vector Quantization for Privacy Preserving Clustering in Data Mining [ pdf ]
D.Aruna Kumari, Rajasekhara Rao and M.Suman, K.L.University, India

Transmission Time and Throughput analysis of EEE LEACH, LEACH and Direct Transmission Protocol: A Simulation Based Approach [ pdf ]
Meenakshi Sharma1 and Anil Kumar.Shaw2, 1SMIT, India and 2NERIST, India

A Secure Key Transfer Protocol for Group Communication [ pdf ]
R. Velumadhava Rao1, K Selvamani2, R Elakkiya3, 1Rajalakshmi Institute of Technology, India, 2Anna University, India and 3Jerusalem Engineering College, India

September 2012, Volume 3, Number 5

An Integrated ERP with Web Portal [ pdf ]
Yehia M. Helmy, Mohamed I. Marie and Sara M. Mosaad, Helwan University, Egypt

Frameworks Between Components And Objects[ pdf ]
Mohamed Belal, Ayman Khedr and Ahmed Gohar,Faculty of Information and Computer , Egypt

Comparative Performance Analysis Of Rnsc And Mcl Algorithms On Power-Law Distribution[ pdf ]
Mousumi Dhara and K. K. Shukla, Banaras Hindu University, India

Enhancement Of Improved Balanced LEACH For Heterogeneous Wireless Sensor Networks[ pdf ]
Yogesh Kumar and Kanwaljit Singh, Guru Nanak Dev Engg. College, India

Generating domain specific sentiment lexicons using the Web Directory[ pdf ]
Akshay Minocha and Navjyoti Singh, International Institute of Information Technology Hyderabad, India

Dynamic Allocation Method For Efficient Load Balancing In Virtual Machines For Cloud Computing Environment[ pdf ]
Bhaskar. R, Deepu. S.R and B.S. Shylaja, Dr. Ambedkar Institute of Technology, India

Directional Based Watermarking Scheme Using A Novel Data Embedding Approach[ pdf ]
Y. RaghavenderRao1, E.Nagabhooshanam2, and P. Nikhil1, 1JNTUH College of Engineering, India and 2Muffakhamjah College of Engg, India

Autocodecovergen: Prototype Of Data Driven Unit Test Genration Tool That Guarantees 100% Code Coverage For C#[ pdf ]
Arpit Christi, New Horizon College of Engineering, India

An Efficient Integrated Approach for the Detection of Exudates and Diabetic Maculopathy in Colour fundus Images[ pdf ]
B.Ramasubramanian and G.Mahendran, Syed Ammal Engineering College, India

Justification of Montgomery Modular Reduction[ pdf ]
Salem Sherif Elfard, University of Az-zawia , Zawia-Libya

Transmission Time and Throughput analysis of EEE LEACH, LEACH and Direct Transmission Protocol: A Simulation Based Approach[ pdf ]
Meenakshi Sharma1 and Anil Kumar. Shaw2, 1SMIT, India and 2NERIST, India

July 2012, Volume 3, Number 4

Image Content in Location-Based Shopping Recommender Systems For Mobile Userspdf ]
Tranos Zuva1, Oludayo O. Olugbara2, Sunday O. Ojo1 and Seleman M. Ngwira11Tshwane University of Technology, South Africa and 2Durban University of Technology, South Africa

Study and Implementation of Advanced Neuroergonomic Techniques pdf ]
B.F.Momin1 and Mamata S.Kalas21Walchand College of Engineering, India and 2KIT'S College of Engineering, India

'CodeAliker' - Plagiarism Detection on the Cloudpdf ]
Nitish Upreti and Rishi Kumar, Amity University, India

A Modified Fault Tolerant Location-Based Service Discovery Protocol for Vehicular Networkspdf ]
Saeed Fathi Ghiri1 and Morteza Rahmani2 and Hassan Almasi21Azad University of Ghir-o-Karzin, Iran and 2Zanjan University, Iran

Analyzing the Efficient Test Order for Integration Testingpdf ]
Reena Dadhich and Sourabh Sehgal, Govt. Engineering College Ajmer, India

Named Entity Recognition in Turkish Using Association Measurespdf ]
Senem Kumova Metin1, Tarik Kisla2 and Bahar Karaoglan211Izmir University of Economics, Turkey and 2Ege University, Turkey

Freeman Code Based Online Handwritten Character Recognition for Malayalam using Backpropagation Neural Networks pdf ]
Amritha Sampath1, Tripti C1 and Govindaru V21Rajagiri School of Engineering and Technology, India and 2Centre for Development of Imaging Technology, India

Adaptive Real Time Data Mining Methodology for Wireless Body Area Network Based Healthcare Applicationspdf ]
Dipti Durgesh Patil and Vijay M. Wadhai, MAEER's MITCOE - Pune, India

A Novel Method for Obtaining a Better Quality Speech Signal for Cochlear Implants using Kalman with DRNL and SSB Technique [pdf ]
Rohini S. Hallikar1, Uttara Kumari1 and K Padmaraju21R.V. College of Engineering, India and 2JNT University, India

Implementation of AES as a Custom Hardware using NIOS II Processorpdf ]
Meghana Hasamnis1, Priyanka Jambhulkar1 and S.S. Limaye21Shri Ramdeobaba College of Engineering and Management, India and 2Jhulelal Institute of Technology, India

A New Approach to Theftware-Efficient Solutionpdf ]
Prabhat Kumar, Abhishek, Milan Jain, Niraj Upadhyay and Avinash Thakur, NIT Patna, India

Privacy Preserving through Segment-Based Visual Cryptography pdf ]
Sesha Pallavi Indrakanti1 and Avadhani P S21GVP Degree College (Autonomous), India and 2Andhra University College of Engineering (Autonomous), India

May 2012, Volume 3, Number 3

Improvement Of Loadability In Distribution System Using Genetic Algorithm pdf ]
Mojtaba Nouri, Mahdi Bayat Mokhtari, Sohrab Mirsaeidi and Mohammad Reza Miveh, Islamic Azad University, Iran

Availability Of JobTracker Machine In Hadoop/MapReduce Zookeeper Coordinated Clusters pdf ]
Ekpe Okorafor1 and Mensah Kwabena Patrick21African University of Science and Technology, Abuja, Nigeria and 2University for Development Studies, Navrongo, Ghana

New Approch For Wireless Communication Security Protocol By Using Mutual Authenticationpdf ]
Atishay Bansal, Dinesh Sharma, Gajendra Singh and Tumpa Roy, GLNAIT, India

Distance Transform Based Hand Gestures Recognition For Powerpoint Presentation Navigation pdf ]
Ram Rajesh J, Nagarjunan D, Arunachalam RM and Aarthi R, Amrita VishwaVidyapeetham, India

Development Of Growth Models For Electronics Hardware And Software Componentspdf ]
Sarojamma B., Venkatramana Reddy S., Suresh Kumar Reddy K. and Hari Mallikarjuna Reddy B., Sri Venkateswara University,India

Semantic Plagiarism Detection System Using Ontology Mapping [ pdf ]
Manjula Shenoy K1, K.C.Shet2 and U.Dinesh Acharya11Manipal University, India and 2National Institute of Technology,India

Data Security by Preprocessing the Text with Secret Hiding pdf ]
Ajit Singh and Upasana Jauhari, BPS Mahila Vishwavidyalaya, India

A New Approach To Enhance Security In Mpls Networkpdf ]
S.Veni1 and G.M.Kadhar Nawaz21Barathiar University, India and 2Sona College of Technology, India

Detecting Phishing Attacks In Purchasing Process Through Proactive Approachpdf ]
S.Arun, D.Anandan, T.Selvaprabhu, B.Sivakumar, P.Revathi and H.Shine, Veltech Multitech Dr.Rangarajan Dr.Sakunthala Engineering College, India

Dispelling Classes Gradually to Improve Quality of Feature Reduction Approaches pdf ]
Shervan Fekri Ershad and Sattar Hashemi, Shiraz University, Iran

Alpha-Qwerty Cipher: An Extended Vigenere Cipherpdf ]
Md. Khalid Imam Rahmani, Neeta Wadhwa and Vaibhav Malhotra, Echelon Institute of Technology, Faridabad, India

Security Implementation through PCRE Signature over Cloud Network pdf ]
Gaurav Raj and Munish Katoch, Lovely Professional University, India

March 2012, Volume 3, Number 2

Quantum parity algorithms as oracle calls, and application in Grover Database search [ pdf ]
M. Z. Rashad, Mansoura University, Egypt

Securing Authentication of TCP/IP Layer Two By Modifying Challenge-Handshake Authentication Protocol[ pdf ]
M. W. Youssef1 and Hazem El-Gendy2, 1The SHOURA Assembly Cairo, Egypt and 2Ahram Canadian University in Egypt, Egypt

How To Improve Software Quality Assurance In Developing Countries [ pdf ]
Ali Javed , Muazzam Maqsood KhurramAshfaqQazi and Khurram Ali Shah , University of Engineering and Technology Taxila, Pakistan

Controlled Multimedia Cloud Architecture And Advantages [ pdf ]
Selvaraj Kesavan1, Jerome Anand2 and J.Jayakumar1, 1Karunya University, India and 2Embedded Software Architect, India

Construction of Community Web Directories based on Web usage Data [ pdf ]
Ramancha Sandhyarani, Bodakuntla Rajkumar and Jayadev Gyani, Jayamukhi Institute of Technological Sciences Narsampet, India

Edge Preserving Image Coding For High Resolution Image Representation [ pdf ]
M. Nagaraju Naik1, K. Kumar Naik2 and P. Rajesh Kumar3, 1MIST, India, 2ANITS, India and 3A.U. College of Engineering, India

Neighbor Attack And Detection Mechanism In Mobile Ad-Hoc Networks [ pdf ]
S. Parthiban1, A. Amuthan2, N.Shanmugam3, K.Suresh Joseph1, 1Pondicherry University, India, 2Pondicherry Engineering College, India and 3Kanchi Pallavan Engineering College, India

Role Of Context In Usability Evaluations: A Review [ pdf ]
Munesh Chandra Trivedi1 and Mohammadi Akheela Khanum2, 1Greater Noida, India and 2PAHER University, India

Data Load Manifestation In Process Chains In SAP Business Ware House [ pdf ]
M. Victoria Hebseeba1, T. Bhasakara Reddy2, B. Lakshma Reddy3 and T. Venkateswarulu4, 1Rayalaseema University, India, 2S.K University, India, 3Garden City College, India and 4Gate College, India

A Novel Framework using Elliptic Curve Cryptography for Extremely Secure Transmission in Distributed Privacy Preserving Data Mining [ pdf ]
Kiran P, S Sathish Kumar and Dr Kavya N P, RNS Instituite of Technology, India

Analysis of Various Symbol Detection Techniques in Multiple-Input Multiple-Output System (MIMO) [ pdf ]
Shuchi Jani1, Shrikrishan Yadav2 and B. L. Pal3, 1SITE, India, 2PAHER University, India and 3MEWAR University, India

Aspect-Oriented Software Quality Model: The AOSQ Model [ pdf ]
Pankaj Kumar, Noida Institute of Engineering & Technology, India

A Survey for Load Balancing in Mobile WiMAX Networks [ pdf ]
Camellia Askarian and Hamid Beigy, Sharif University of Technology, Iran

Physical Unclonable Function (PUF) Based Random Number Generator [ pdf ]
Ali Sadr and Mostafa Zolfaghari-Nejad, Iran University of Science and Technology Tehran, Iran

Feature Extraction Methods For Color Image Similarity [ pdf ]
R.Venkata Ramana Chary1,D.Rajya Lakshmi2 and K.V.N Sunitha3, 1Padmasri Dr.B.V Raju Institute of Technology, India, 2GITAM Institute of Technology, India and 3G. Narayanamma Institute of Technology and Science Hyderabad, India

Cloud Computing And Privacy Regulations: An Exploratory Study On Issues And Implications [ pdf ]
Mohammed A. T. AlSudiari and TGK Vasista, King Saud University, KSA

Survey And Taxonomy Of Key Management Protocols For Wired And Wireless Networks [ pdf ]
Adarsh Kumar, Alok Aggarwal and Charu, Jaypee Institute of Information and Technology,India

Anonymity And Accountability In Web Based Transactions [ pdf ]
H.Jayasree and A.Damodaram, ATRI, India and JNTUH, India

January 2012, Volume 3, Number 1

Breaking A Feistel-Type Block Cipher by Bacteria Engineering[ pdf ]
Arash Karimi and Hadi Shahriar Shahhoseini, Iran University of Science and Technology-Tehran, Iran

Multi-Agents Simulation of Human Behavior in a Situation of Emergency[ pdf ]
Benkhedda Samira and Bendella Fatima, University of Science and Technology of Oran-USTO, Algeria

Presenting a hybrid method in order to predict the2009 pandemic influenza A (H1N1)[ pdf ]
Reza Boostani, Mojtaba Rismanchi,Abbas Khosravani, Lida Rashidi, Samaneh Kouchaki,Payam Peymani, Seyed Taghi Heydari, B. Sabayan and K. B.Lankarani, Shiraz University, Iran

Embedded pH Data Acquisition and Logging[ pdf ]
V.Ramya and B.Palaniappan, Annamalai University, India

Collaboration for Enhancing the System Development Process in Open Source Diligence[ pdf ]
Murtaza Hussain Shaikh, Norwegian University of Science and Technology (NTNU), Trondheim - Norway

A Novel Image Retrieval Method Using Segmentation and Color Moments[ pdf ]
T.V. Saikrishna1, A.Yesubabu2, A.Anandarao3 and T.Sudha Rani4, 1QIS College of Engineering & Technology, India, 2SIR C R Reddy College of Engineering, India, 3JNTU College of Engineering, India and 4Aditya Engineering College, India

A New Trend for E-Learning in KSA Using Educational Clouds[ pdf ]
Abdullah Alshwaier, Ahmed Youssef and Ahmed Emam, King Saud University-Riyadh, KSA

Exploiting Logical Structures to Reduce Quorum Sizes of Replicated Databases[ pdf ]
Parul Pandey and Maheshwari Tripathi, Jain University, IET, Lucknow

GPGPU Processing in CUDA Architecture[ pdf ]
Jayshree Ghorpade1, Jitendra Parande2, Madhura Kulkarni1 and Amit Bawaskar1, 1MITCOE, Pune University, India and 2SunGard Global Technologies, India

Multiclass Classifier Designed Using Stepwise Crossover and Special Mutation Technique[ pdf ]
Pankaj Patidar1, Bhupendra Verma1 and Arpit Bhardwaj2, 1TIT- Bhopal, India and 2SDITS-Khandwa, India

Modeling of Packet Switched Network over TCP Veno: TCP Improvement for Transmission over Wireless Access Networks[ pdf ]
Baswaraj1, D.C. Tomar2 and K.Prasad Rao1, 1CMR Institute of Technology, India and 2MNM Jain Engineering College, India

Effect of Symlet Filter Order on Denoising of Still Images[ pdf ]
S. Kumari and R. Vijay, Banasthali University, India

 

 

 

Copyright 2010 AIRCC. All rights reserved.

Maintained by NnN