IJCSEE Vol 1 Issue 2 (2013) ISSN 2320-401X (Printed Version) ISSN 2320-4028 (Online Version)

    Sr. no.Title & author(s) namePage no.
    1Modeling and Simulation of Reluctance motor using digital computer

    Mostafa. A. Fellani and Daw .E. Abaid

    148
    2The Importance of Ordering the Number of Lattice Points Inside a Rational Polyhedron Using Generating Functions

    Halil Snopce

    153
    3Signal and Image recovery from random linear measurements in compressive sampling

    Sarah Mazari and Kamel Belloulata

    158
    4The Ability of Dual-baseline Interferometer to Resolve Angular Ambiguities

    Fei.Cao, Qingyun.Liu and Fan.Wu

    163
    5Design and implementation of model predictive control for a three-tank hybrid system

    Cyril Joseph, Dr. V. I. George, and Dr. P. R. Venkateswaran

    167
    6Image based Wireless Networked Lighting Control for Daylight−Artificial light Integrated scheme−A Literature Review

    Susan G Varghese, Dr.Ciji Pearl Kurian , and Dr.V I George

    172
    7Nonreciprocal Propagation in Ferrite Medium and Their Applications− Microwave Circulator

    Ghoutia. Naima. Sabri

    182
    8A Novel Approach for Classifying Medical Images Using Data Mining Techniques

    J. Alamelu Mangai, Jagadish Nayak and V. Santhosh Kumar

    188
    9The Novel Decision Tree Classifier with Distance-based Concept Hierarchy Labels

    Hsiao-Wei Hu, and Tien Chao

    193
    10Study on Influence Diffusion in Social Network

    Hsiao-Wei Hu and Shao-Yu Lee

    198
    11Data Mining Techniques for Logical Analysis of Data in Content Based Image Retrieval System

    A Nanda Gopal Reddy and Dr. Roheet Bhatnagar

    204
    12A Fast Association Rule Algorithm Based On Bitmap Computing with Multiple Minimum Supports Using Maximum Constraints

    Jyothi Patil and Dr. V.D.Mytri

    210
    13Work Flow Scheduling Modeling in Grid Computing Using Linear Switching State Space (LS3)

    H. Tabatabaee

    217
    14Information Fusion Framework (IFF)- A Deploy for the Electricity Market Domain

    Paulo Trigo and Paulo Marques

    223
    15Multi-agent Simulation of Electricity Markets economically-motivated decision-making

    Paulo Trigo, Jorge de Sousa and Paulo Marques

    228
    16Designing and Developing Performance Measurement Software Solution

    Bekim Fetaji and Majlinda Fetaji

    234
    17Development and Analyses of Mobile E-Commerce Software Application

    Majlinda Fetaji and Bekim Fetaji

    239
    18Ant Colony Optimization based Feature Selection in Rough Set Theory

    Majdi Mafarja and Derar Eleyan

    244
    19Stochastic Rendezvous Analysis on Multi Server Markovian Queueing Network

    SivaselvanKasilingam and C. VijayalakshmiSeshadhri

    248
    20Towards an Early Warning System to Combat Dengue

    Aloka Munasinghe, H.L.Premaratne and M.G.N.A.S. Fernando

    252
    21Computational Analysis of Bangla Retroflex and Dental Consonants

    Hossain. Syed Akhter, Rahman. M Lutfar, and Ahmed. Farruk

    257
    22Software Architecture of Online Personal Finance Management System

    Hossain. Syed Akhter, Akter. Nasrin, and Akhter. Maria

    262
    23Effect of Trust Model in Supply Chain Management

    Hossain. Syed Akhter and Ouzrout. Yacine

    266
    24Review of the Levitation Mass Method (LMM)

    Yusaku Fujii

    271
    25Adaptive Design Model On Heterogeneous Learning Management System (LMS) By Utilizing Multi-Agent System (MAS)

    Amir Kombo Mwinyi, S.A.R Al-Haddad, Rusli bin Hj Abdullah, and Shaiful Jahari bin Hashim

    274
    26Technology Acceptance Model of Consumer Satisfaction with the Physical and Spiritual Health with Stress-Relief and Health Industry as an Example

    Chang-Yueh Hou, Michel Plaisent, Chiang James Ming-Hsun, and Prosper Bernard

    278
    27Detecting and Correcting Transcription Discrepancies between Thai Parliament Meeting Speech Utterances and their Official Meeting Reports

    Natnarong. Puangsri, Atiwong. Suchato, Proadpran. Punyabukkana, and Chai. Wutiwiwatchai

    283
    28To Study the Internet Access and Usage Behavior in the Kingdom Of Bhutan

    Kencho Tshering

    288
    29Efficient Mechanism for Selecting and Forwarding Data for Energy Saving Using Wireless Sensor Networks

    Nandini Prasad K S, SurekhaK B, Puttamadappa C and T G Basavaraju

    298
    30Energy Efficient Genetic Algorithm Model for Wireless Sensor Networks

    N. Thangadurai, Dr. R. Dhanasekaran and R. Pradeep

    302
    31Application of Supercapacitors to Automotive Applications

    Abdeladim A Gazwi

    307
    32Visibility improvement in foggy images using POSHE algorithm

    G Srikanth and G Manoj Kumar

    312
    33Role of Multiple Encryption in Secure Voice Communication

    Himanshu Gupta and Dr. Vinod Kumar Sharma

    316
    34Upload Traffic over TCP and UDP Protocols in Different Security Algorithms in Wireless Network

    Abdalla Gheryani and Mladen Veinović

    320
    35Speech Cryptographic Key Generation

    Keerati Inthavisas and Naratorn Sungprasert

    326
    36Secured Serverless RFID With Object Oriented Approach

    Monika Sharma and Dr. P. C. Agrawal

    330
    37Network Selection Scheme for LTE Systems using Multiple Parameters

    Ramarajan. A, and Thangadurai. N

    334
    38An Analysis of LSB Image Steganography Techniques in Spatial Domain

    Mamta. Juneja, and Parvinder S. Sandhu

    339
    39Two Components based LSB and Adaptive LSB Steganography based on Hybrid Feature Detection for Color Images with improved PSNR and Capacity

    Mamta. Juneja, and Parvinder S. Sandhu

    345
    40Trends in Survivability Techniques of Optical Networks

    Neeraj Mohan, Amit Wason and Parvinder S. Sandhu

    352