Institute of Research Engineers and Doctors

Support Center
Support Center
  • E-mail: support@theired.org
  • Phone Support
    Tel : +1-(212) 901-3781
    Fax : +1-(212) 901-3786
  • IRED Headquarters
  • 42 Broadway, Suite 12-217, New York, NY 10004, USA

 Helpline: +1- (212) 901-3781
Login 
   

Search 9500+ Documents

Advance search
Search Categories
 Paper Title
 Abstract
 Publisher
 Author
 DOI
 UDI
Search Tips
Search Tips
  • Search with only the important (key)words about your topic or question (don't use sentences)
  • Search Fields: Metadata Only (not full text). Use Advanced Search to expand search to include full text.
  • Content Types: Journals, Conference Proceedings.
  • Publishers: UACEE, UAMAE.
Safe Search
Safe Search
  • A feature that lets you filter implicit web sites contents and images from your search results.
  • Content Types: Journals, Conference Proceedings.
  • Publishers: UACEE, UAMAE.
 
               

International Conference on Advances in Computer Science and Electronics Engineering - CSEE 2013

               
 

 

     

Result per page

 
  • Cover Page Page(s):
     PDF Download(s): 269
  • Table of Contents Page(s): i - iii
     PDF Download(s): 218
  • Xbee based automation for control of home appliances DOI: 10.3850/978-981-07-5461-7_01
    Page(s): 1 - 3
    Author(s):S.JAGANADHAM,M.PADMAVATHI,M.K.CHAITANYA PATNAIK,G.ANIL KUMAR, K.SRIKANTH

     ABSTRACT     PDF Download(s): 204
    Abstract View(s): 1124
  • Intrusion Detection Systems by Applying An Improvement in Apriori Algorithm DOI: 10.3850/ 978-981-07-5461-7_02
    Page(s): 4 - 8
    Author(s):SAMANEH S. ALAVIFAR,AHMAD FARAAHI, AKBAR FARHOODI NEJAD

     ABSTRACT     PDF Download(s): 183
    Abstract View(s): 1041
  • Comparison of Software Development Life Cycle Models DOI: 10.3850/978-981-07-5461-7_03
    Page(s): 9 - 12
    Author(s): RAJ KUMARI, HEENA

     ABSTRACT     PDF Download(s): 222
    Abstract View(s): 1055
  • Survey on Software Test Design Metrics DOI: 10.3850/ 978-981-07-5461-7_04
    Page(s): 13 - 17
    Author(s):JASPREET KAUR, RAJ KUMARI

     ABSTRACT     PDF Download(s): 174
    Abstract View(s): 992
  • Fingerprint Identification System in Biometric Security DOI: 10.3850/978-981-07-5461-7_05
    Page(s): 18 - 23
    Author(s): MEERA P. DOBARIA

     ABSTRACT     PDF Download(s): 173
    Abstract View(s): 1003
  • BANDWIDTH RESERVATION AND ENERGY CONSTRAIN DISTANCE VECTOR ROUTING PROTOCOL DOI: 10.3850/978-981-07-5461-7_06
    Page(s): 24 - 27
    Author(s):MOHAMMED ABDUL RAZZAK, ARSHAD AHMAD KHAN MOHAMMAD

     ABSTRACT     PDF Download(s): 207
    Abstract View(s): 971
  • A Non-Blind Hybrid Video Watermarking Scheme based on Singular Value Decomposition and Contourlet Transform DOI: 10.3850/978-981-07-5461-7_07
    Page(s): 28 - 35
    Author(s):SATYA PRASAD.K, VENKATA NARASIMHULU.C

     ABSTRACT     PDF Download(s): 180
    Abstract View(s): 977
  • Vertical Handoff Algorithms in WLAN/3G Integrated Networks DOI: 10.3850/978-981-07-5461-7_08
    Page(s): 36 - 40
    Author(s):N V R KISHORE, SANJAY DHAR ROY, S REDDY VAMSHIDHAR REDDY, NEHA SINGH

     ABSTRACT     PDF Download(s): 127
    Abstract View(s): 1010
  • Performance Impact of 2-D Codes along with Optical Hard limiter as an MAI Cancellation Techniques on O-CDMA system DOI: 10.3850/978-981-07-5461-7_09
    Page(s): 41 - 45
    Author(s): SHAILESH TONDWAL, SANDEEP SAROWA

     ABSTRACT     PDF Download(s): 208
    Abstract View(s): 1066
  • Minimization of Test Suite through Regress Analysis of Requirement Coverage DOI: 10.3850/978-981-07-5461-7_10
    Page(s): 46 - 49
    Author(s):RAJAT SHEEL JAIN,AMIT GUPTA

     ABSTRACT     PDF Download(s): 172
    Abstract View(s): 1002
  • Review of Man-in-the-Browser Attack using Security Attack Scenarios DOI: 10.3850/978-981-07-5461-7_11
    Page(s): 50 - 54
    Author(s):VIJAYALAKSHMI,MANOJ SINGH GAUR, ANIL SAINI

     ABSTRACT     PDF Download(s): 174
    Abstract View(s): 1003
  • Validation of RNA-FINNT for Reduction in Error Percentage DOI: 10.3850/ 978-981-07-5461-7_12
    Page(s): 55 - 59
    Author(s):G.GEETHA, KULJEET KAUR

     ABSTRACT     PDF Download(s): 114
    Abstract View(s): 961
  • Cloud Database Management System Architecture DOI: 10.3850/978-981-07-5461-7_13
    Page(s): 60 - 64
    Author(s): MANSAF ALAM, KASHISH ARA SHAKIL

     ABSTRACT     PDF Download(s): 294
    Abstract View(s): 1089
  • Identifying solar suitability of a region using Fuzzy logic DOI: 10.3850/978-981-07-5461-7_14
    Page(s): 65 - 69
    Author(s):DHANYA SUNIL, SHIPRA JAIN

     ABSTRACT     PDF Download(s): 151
    Abstract View(s): 956
  • A Comparative Study on Oracle and IBM-DB2 Databases DOI: 10.3850/978-981-07-5461-7_15
    Page(s): 70 - 75
    Author(s):T.PRAVEEN KUMAR, P.VIJAYA BABU VARMA, LAVANYA PAMULAPARTY

     ABSTRACT     PDF Download(s): 176
    Abstract View(s): 981
  • Six Sigma In Software Engineering: Turning a Dream Into Reality DOI: 10.3850/978-981-07-5461-7_16
    Page(s): 76 - 80
    Author(s): KALAIMAGAL SIVAMUNI, JAGAN AMGOTH

     ABSTRACT     PDF Download(s): 191
    Abstract View(s): 1061
  • Re-engineering Legacy Systems for Modernization:The Role of Software Reuse DOI: 10.3850/978-981-07-5461-7_17
    Page(s): 81 - 86
    Author(s): MEENA JHA, LIAM O’BRIEN

     ABSTRACT     PDF Download(s): 113
    Abstract View(s): 1005
  • Clusters of Ayurvedic Medicines Using Improved K-means Algorithm DOI: 10.3850/978-981-07-5461-7_18
    Page(s): 87 - 93
    Author(s): MEGHANA NAGORI, KAJAL C. AGRAWAL

     ABSTRACT     PDF Download(s): 135
    Abstract View(s): 1009
  • The Use of Fuzzy Logic for effective gate opening control in Dams DOI: 10.3850/978-981-07-5461-7_19
    Page(s): 94 - 96
    Author(s): PURVA SONTAKKE, AMEYA CHOUDHARY

     ABSTRACT     PDF Download(s): 114
    Abstract View(s): 1043
  • Software Reusability : Possibilities From The Exisiting Software DOI: 10.3850/ 978-981-07-5461-7_20
    Page(s): 97 - 99
    Author(s): NISHA AGNIHOTRI, MINAKSHI HOODA, KAVITA SHARMA

     ABSTRACT     PDF Download(s): 187
    Abstract View(s): 1018
  • Container Architecture for Detection and Prevention of Intrusions using virtualization technique DOI: 10.3850/ 978-981-07-5461-7_21
    Page(s): 100 - 104
    Author(s): S.SARAVANAN, M.RAMAKRISHNAN, GNANASEKARAN.T, BASKAR.M

     ABSTRACT     PDF Download(s): 137
    Abstract View(s): 1024
  • Biometrics in India : An Overview DOI: 10.3850/978-981-07-5461-7_22
    Page(s): 105 - 108
    Author(s): MRIDULA SINGH, M. HANMADLU, B K CHAUHAN

     ABSTRACT     PDF Download(s): 121
    Abstract View(s): 907
  • Face Identification Using Wavelet Transform & PCA DOI: 10.3850/978-981-07-5461-7_23
    Page(s): 109 - 113
    Author(s):JASLEEN KAUR, PURNIMA K SHARMA, NAINA GOEL, DINESH SHARMA

     ABSTRACT     PDF Download(s): 158
    Abstract View(s): 1029

CSEE-2013

  • CHIEF EDITOR:
    Dr. R.K. Singh
  • ISBN:
    978-981-07-5461-7
  • CONFERENCE DATE:
    February 24, 2013
  • ASSOCIATED NETWORK:
    UACEE
  • RELATED SUBJECTS:
    Computer Networks
    Network Security
    Computer Science Applications
    Neural Networks
    Digital Signal Processing
    Satellite Communication
    Electronics Engineering and related areas
  • CONFERENCE VENUE:
    Hotel Clarks Inn Suites - New Delhi - NCR
  • RELATED LINKS:
    Conference Calender
  • CONTACT DETAILS:
    conferences@theired.org
  • Recently Viewed Publications