Table of Contents
Vol 2, No 5 (2011)
Articles
How Good is the DES Algorithm in Image Ciphering? | ||
Said F. El-Zoghdy, Yasser A. Nada, A. A. Abdo | ||
Vol 2, No 5 (2011), Pagination: 796-803 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 243 | PDF Views: 0 |
Heuristic Task Allocation Strategies for Computational Grid | ||
Ashish V. Chandak, Bibhudatta Sahoo, Ashok Kumar Turuk | ||
Vol 2, No 5 (2011), Pagination: 804-810 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 232 | PDF Views: 0 |
Attacking Embedded Systems Through Power Analysis | ||
JKR. Sastry, K. Subba Rao, N. Venkata Ram, J. Sasi Bhanu | ||
Vol 2, No 5 (2011), Pagination: 811-816 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 269 | PDF Views: 0 |
Silhouette Based Human Motion Detection and Recognising their Actions from the Captured Video Streams | ||
N. A. Deepak, U. N. Sinha | ||
Vol 2, No 5 (2011), Pagination: 817-823 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 260 | PDF Views: 0 |
Analysis of Users Web Browsing Behavior Using Markov Chain Model | ||
Diwakar Shukla, Rahul Singhai | ||
Vol 2, No 5 (2011), Pagination: 824-830 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 260 | PDF Views: 0 |
Novel Mobile Network Service for Road Safety | ||
J. Radhakrishnan, R. S. Rajesh | ||
Vol 2, No 5 (2011), Pagination: 831-840 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 235 | PDF Views: 0 |
An Authenticated Transmission of Medical Image with Codebase Cryptosystem Over Noisy Channel | ||
Deo Brat Ojha, Ajay Sharma, Abhishek Dwivedi, Nitin Pandey, Amit Kumar | ||
Vol 2, No 5 (2011), Pagination: 841-845 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 276 | PDF Views: 0 |
A New Method of APWM Resonant Inverter Topology for High Frequency AC Power Distribution Systems | ||
S. Arumugam, S. Ramareddy | ||
Vol 2, No 5 (2011), Pagination: 846-853 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 298 | PDF Views: 0 |
Comparison of Multidimensional MFCC Feature Vectors for Objective Assessment of Stuttered Disfluencies | ||
K. M. Ravi Kumar, S. Ganesan | ||
Vol 2, No 5 (2011), Pagination: 854-860 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 266 | PDF Views: 0 |
Watermarking Algorithm Using Sobel Edge Detection | ||
P. Ramesh Kumar, K. L. Sailaja | ||
Vol 2, No 5 (2011), Pagination: 861-867 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 255 | PDF Views: 0 |
Implementation of LSB Steganography and its Evaluation for Various File Formats | ||
V. Lokeswara Reddy, A. Subramanyam, P. Chenna Reddy | ||
Vol 2, No 5 (2011), Pagination: 868-872 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 248 | PDF Views: 0 |
An Efficient Morphological Salt-and-Pepper Noise Detector | ||
Alok Singh, Umesh Ghanekar, Chakresh Kumar, Ghanendra Kumar | ||
Vol 2, No 5 (2011), Pagination: 873-875 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 253 | PDF Views: 0 |