Vol 3, No 2 (2010)

Table of Contents

Vol 3, No 2 (2010)

Articles

The EVAS Model:Solving E-Voting Problems in Nigeria
O. S. Ogunseye, O. Folorunso, J. O. Okesola, J. R. Woodward
 Vol 3, No 2 (2010), Pagination: 219-226
ABSTRACT |  PDF Abstract Views: 223  |  PDF Views: 0
Mining Intelligent e-Voting Data:A Framework
Julius O. Okesola, Oluwafemi S. Ogunseye, Kazeem I. Rufai, Olusegun Folorunso
 Vol 3, No 2 (2010), Pagination: 227-231
ABSTRACT |  PDF Abstract Views: 228  |  PDF Views: 0
Living of Student in the Internet Age
K. K. Dwivedi, Mayaram Atal, Ashish Rastogi, H. C. Katariya, R. K. Shrivastava
 Vol 3, No 2 (2010), Pagination: 233-244
ABSTRACT |  PDF Abstract Views: 241  |  PDF Views: 0
Study of Assembly Line Scheduling, an Application of Dynamic Programming
Sanjukta Mohanty, Prafulla K. Behera
 Vol 3, No 2 (2010), Pagination: 245-254
ABSTRACT |  PDF Abstract Views: 259  |  PDF Views: 0
Logical Study of Passwords
Mushtaq Ahmad Rather, Tariq Ahamad Ahanger
 Vol 3, No 2 (2010), Pagination: 255-259
ABSTRACT |  PDF Abstract Views: 248  |  PDF Views: 0
Comparative Analysis on Speckle Noise Reduction Techniques on Computed Tomographic Images
Hitesh H. Vandra, H. N. Pandya
 Vol 3, No 2 (2010), Pagination: 261-264
ABSTRACT |  PDF Abstract Views: 226  |  PDF Views: 0
Identifying Some Problems with Selection of Software Testing Techniques
Sheikh Umar Farooq, S. M. K. Quadri
 Vol 3, No 2 (2010), Pagination: 265-268
ABSTRACT |  PDF Abstract Views: 275  |  PDF Views: 0
Some Notable Reliability Techniques for Disk File Systems
Wasim Ahmad Bhat, S. M. K. Quadri
 Vol 3, No 2 (2010), Pagination: 269-271
ABSTRACT |  PDF Abstract Views: 224  |  PDF Views: 1
IRIS Template Classification Using Selective Sub Bands of Wavelets
V. Narayana, P. S. R. Chandra Murty, E. Sreenivasa Reddy
 Vol 3, No 2 (2010), Pagination: 273-282
ABSTRACT |  PDF Abstract Views: 243  |  PDF Views: 4
A New Intelligent Predictive Caching Algorithm for Internet Web Servers
B. V. Pawar, J. B. Patil
 Vol 3, No 2 (2010), Pagination: 283-290
ABSTRACT |  PDF Abstract Views: 225  |  PDF Views: 0
Secure and Auditable Agent-Based Communication Protocol for e-Health System Framework
M. Aramudhan, K. Mohan
 Vol 3, No 2 (2010), Pagination: 291-298
ABSTRACT |  PDF Abstract Views: 244  |  PDF Views: 0
Key Management with Cryptography
Syed Minhaj Ali, Satish V. Reve, Roohi Ali, Sana Iqbal
 Vol 3, No 2 (2010), Pagination: 299-304
ABSTRACT |  PDF Abstract Views: 206  |  PDF Views: 2
A Novel Approach to Construct Decision Tree Using Quick C4.5 Algorithm
Deepti Juneja, Sachin Sharma, Anupriya Jain, Seema Sharma
 Vol 3, No 2 (2010), Pagination: 305-310
ABSTRACT |  PDF Abstract Views: 236  |  PDF Views: 2
Multiple Classifiers System for Medical Diagnosis
M. Solomon Pushparaj, P. J. Kulkarni
 Vol 3, No 2 (2010), Pagination: 311-316
ABSTRACT |  PDF Abstract Views: 205  |  PDF Views: 0
Rule Based Approach for English to Sanskrit Machine Translation and Synthesizer System
D. T. Mane, P. R. Devale, S. D. Suryawanshi
 Vol 3, No 2 (2010), Pagination: 317-322
ABSTRACT |  PDF Abstract Views: 238  |  PDF Views: 0
Boundary Value Analysis for Non-Numerical Variables:Strings
Anupriya Jain, Sachin Sharma, Seema Sharma, Deepti Juneja
 Vol 3, No 2 (2010), Pagination: 323-330
ABSTRACT |  PDF Abstract Views: 225  |  PDF Views: 0
Detecting Terror-Related Activities on the Web Using Neural Network
Deepak Tinguriya, Binod Kumar
 Vol 3, No 2 (2010), Pagination: 331-336
ABSTRACT |  PDF Abstract Views: 211  |  PDF Views: 4
Establishment of Evaluation Scheme of Model Driven Architecture
R. Vinodani Katiyar, Rohit Chandra
 Vol 3, No 2 (2010), Pagination: 337-341
ABSTRACT |  PDF Abstract Views: 210  |  PDF Views: 0
Application of Cloud Computing for the Better E-Governance in Developing Countries
Ashish Rastogi
 Vol 3, No 2 (2010), Pagination: 343-348
ABSTRACT |  PDF Abstract Views: 232  |  PDF Views: 2
Analysis of Routing Attacks in Peer to Peer overlay Networks
Anil Saroliya, Vishal Shrivastava
 Vol 3, No 2 (2010), Pagination: 349-353
ABSTRACT |  PDF Abstract Views: 226  |  PDF Views: 3
Common Fixed Point Theorems for the Pair of Mappings in Hilbert Space
Durdana Lateef, A. Bhattacharya
 Vol 3, No 2 (2010), Pagination: 355-357
ABSTRACT |  PDF Abstract Views: 197  |  PDF Views: 4
Security Management System for Oilfield Based on Embedded Wireless Communications:A Design Approach
Syed Minhaj Ali, Satish V. Reve, Roohi Ali, Sana Iqbal
 Vol 3, No 2 (2010), Pagination: 359-363
ABSTRACT |  PDF Abstract Views: 230  |  PDF Views: 3
User Interface Modeling
Ravinder G. Reddy
 Vol 3, No 2 (2010), Pagination: 365-368
ABSTRACT |  PDF Abstract Views: 193  |  PDF Views: 3