CONTENTS

Sr. No.
Title
1

intrusion detection for ICMP- Flood attack

2

An Analysis Of E-Banking Services Offered By Public Sector Banks In India

3

Cyber Law & Information Technology

4

Object Motion Estimation and Detection for Satellite Imagery

5

Separation of Concerns
“Component Based Software Engineering”

6

Empirical Results of the Study for Mobile Agent Technology

7

Role of QoS in Web Services

8

PAM: An Efficient and Privacy-Aware Monitoring Framework for Continuously Moving Objects

9

PIC Microcontroller Based Speed Control of Three Phase Induction Motor Using Single Phase Supply

10

A Study of Edge Detection and Image Segmentation by Using Thresholding

11

Person Detection and Tracking System for
Visual Surveillance

12

Microprocessor Based Single Phase Speed Control of Induction Motor Drive

13

Marathi Handwritten Character Recognition by using Probabilistic Neural Network Classification

14

Importance of Specifications in Designing of Protocols

15

Agricultural Extension through Knowledge Based Expert Systems

16

Design and Development of Wireless Single Phase Induction Drive using DTMF Technology

17

Technological Growth and the Impact of Anti-Trust Violation in Relevant Market

18

Cloud Computing: T echnology Analysed

19

Testing Based On Object Oriented Software

20

Specifying the Standard Guidelines to Normalize the EERD Up to Best Normal Form

21

Employee Challenges in Information Technology Industry

22

Automatic Vehicle Detection using Dynamic Bayesian Networks for Aerial Surveillance

23
24

Online Learning – CBR Approach

25

Evaluating Critical Success Factors in Distributive Software Projects: Implementation Efforts

26

Data Allocation Strategies for Data Leakage Detection Tool

27

A Fuzzy Self-Constructing Feature Clustering Algorithm for Text Classification

28

A Resourceful IP Traceback via Probabilistic Packet Marking Algorithm

29

Categorization of Documents using ROCCHIO Feedback Algorithm with TFIDF Classifier using Entropy for Web Mining

30

Pipelined Architecture of 2D-DCT,
Quantization and Zigzag Process for JPEG Image Compression using Verilog

31

Instant Fuel Payment - An Application of RFID

32

Text Mining and Its Applications

33

The Awareness of E-Business Technologies with Reference to Baramati Region

34

A Study of Mobile Banking System with    Reference to Selected Banks

35

Towards Secure Cloud Computing Phase: Information Possession

36

Using Robust Hash over DIGITA Watermarking for Message Authentication