Vol 3, No 2 (2010)

Table of Contents

Vol 3, No 2 (2010)

Articles

The EVAS Model:Solving E-Voting Problems in Nigeria
O. S. Ogunseye, O. Folorunso, J. O. Okesola, J. R. Woodward
 Vol 3, No 2 (2010), Pagination: 219-226
ABSTRACT |  PDF Abstract Views: 165  |  PDF Views: 0
Mining Intelligent e-Voting Data:A Framework
Julius O. Okesola, Oluwafemi S. Ogunseye, Kazeem I. Rufai, Olusegun Folorunso
 Vol 3, No 2 (2010), Pagination: 227-231
ABSTRACT |  PDF Abstract Views: 171  |  PDF Views: 0
Living of Student in the Internet Age
K. K. Dwivedi, Mayaram Atal, Ashish Rastogi, H. C. Katariya, R. K. Shrivastava
 Vol 3, No 2 (2010), Pagination: 233-244
ABSTRACT |  PDF Abstract Views: 186  |  PDF Views: 0
Study of Assembly Line Scheduling, an Application of Dynamic Programming
Sanjukta Mohanty, Prafulla K. Behera
 Vol 3, No 2 (2010), Pagination: 245-254
ABSTRACT |  PDF Abstract Views: 183  |  PDF Views: 0
Logical Study of Passwords
Mushtaq Ahmad Rather, Tariq Ahamad Ahanger
 Vol 3, No 2 (2010), Pagination: 255-259
ABSTRACT |  PDF Abstract Views: 186  |  PDF Views: 0
Comparative Analysis on Speckle Noise Reduction Techniques on Computed Tomographic Images
Hitesh H. Vandra, H. N. Pandya
 Vol 3, No 2 (2010), Pagination: 261-264
ABSTRACT |  PDF Abstract Views: 170  |  PDF Views: 0
Identifying Some Problems with Selection of Software Testing Techniques
Sheikh Umar Farooq, S. M. K. Quadri
 Vol 3, No 2 (2010), Pagination: 265-268
ABSTRACT |  PDF Abstract Views: 216  |  PDF Views: 0
Some Notable Reliability Techniques for Disk File Systems
Wasim Ahmad Bhat, S. M. K. Quadri
 Vol 3, No 2 (2010), Pagination: 269-271
ABSTRACT |  PDF Abstract Views: 169  |  PDF Views: 1
IRIS Template Classification Using Selective Sub Bands of Wavelets
V. Narayana, P. S. R. Chandra Murty, E. Sreenivasa Reddy
 Vol 3, No 2 (2010), Pagination: 273-282
ABSTRACT |  PDF Abstract Views: 183  |  PDF Views: 4
A New Intelligent Predictive Caching Algorithm for Internet Web Servers
B. V. Pawar, J. B. Patil
 Vol 3, No 2 (2010), Pagination: 283-290
ABSTRACT |  PDF Abstract Views: 171  |  PDF Views: 0
Secure and Auditable Agent-Based Communication Protocol for e-Health System Framework
M. Aramudhan, K. Mohan
 Vol 3, No 2 (2010), Pagination: 291-298
ABSTRACT |  PDF Abstract Views: 183  |  PDF Views: 0
Key Management with Cryptography
Syed Minhaj Ali, Satish V. Reve, Roohi Ali, Sana Iqbal
 Vol 3, No 2 (2010), Pagination: 299-304
ABSTRACT |  PDF Abstract Views: 151  |  PDF Views: 2
A Novel Approach to Construct Decision Tree Using Quick C4.5 Algorithm
Deepti Juneja, Sachin Sharma, Anupriya Jain, Seema Sharma
 Vol 3, No 2 (2010), Pagination: 305-310
ABSTRACT |  PDF Abstract Views: 177  |  PDF Views: 2
Multiple Classifiers System for Medical Diagnosis
M. Solomon Pushparaj, P. J. Kulkarni
 Vol 3, No 2 (2010), Pagination: 311-316
ABSTRACT |  PDF Abstract Views: 150  |  PDF Views: 0
Rule Based Approach for English to Sanskrit Machine Translation and Synthesizer System
D. T. Mane, P. R. Devale, S. D. Suryawanshi
 Vol 3, No 2 (2010), Pagination: 317-322
ABSTRACT |  PDF Abstract Views: 178  |  PDF Views: 0
Boundary Value Analysis for Non-Numerical Variables:Strings
Anupriya Jain, Sachin Sharma, Seema Sharma, Deepti Juneja
 Vol 3, No 2 (2010), Pagination: 323-330
ABSTRACT |  PDF Abstract Views: 166  |  PDF Views: 0
Detecting Terror-Related Activities on the Web Using Neural Network
Deepak Tinguriya, Binod Kumar
 Vol 3, No 2 (2010), Pagination: 331-336
ABSTRACT |  PDF Abstract Views: 158  |  PDF Views: 4
Establishment of Evaluation Scheme of Model Driven Architecture
R. Vinodani Katiyar, Rohit Chandra
 Vol 3, No 2 (2010), Pagination: 337-341
ABSTRACT |  PDF Abstract Views: 155  |  PDF Views: 0
Application of Cloud Computing for the Better E-Governance in Developing Countries
Ashish Rastogi
 Vol 3, No 2 (2010), Pagination: 343-348
ABSTRACT |  PDF Abstract Views: 178  |  PDF Views: 2
Analysis of Routing Attacks in Peer to Peer overlay Networks
Anil Saroliya, Vishal Shrivastava
 Vol 3, No 2 (2010), Pagination: 349-353
ABSTRACT |  PDF Abstract Views: 172  |  PDF Views: 3
Common Fixed Point Theorems for the Pair of Mappings in Hilbert Space
Durdana Lateef, A. Bhattacharya
 Vol 3, No 2 (2010), Pagination: 355-357
ABSTRACT |  PDF Abstract Views: 149  |  PDF Views: 4
Security Management System for Oilfield Based on Embedded Wireless Communications:A Design Approach
Syed Minhaj Ali, Satish V. Reve, Roohi Ali, Sana Iqbal
 Vol 3, No 2 (2010), Pagination: 359-363
ABSTRACT |  PDF Abstract Views: 182  |  PDF Views: 3
User Interface Modeling
Ravinder G. Reddy
 Vol 3, No 2 (2010), Pagination: 365-368
ABSTRACT |  PDF Abstract Views: 145  |  PDF Views: 3