
| Attribute Discretization using a Seed Bit in a Genetic Algorithm Manuel Penaloza
|

| Symbolic Computation using Grammatical Evolution Alan Christianson and Jeff McGough
|

| Applications of Artificial Intelligence to Friction Stir Welding Antonette Logar, Edward Corwin, Enkhsaikhan Boldsaikhan, Daniel Woodward and William Arbegast
|

| Clustering and Analysis of Remotely-Sensed Imagery using the Growing Neural Gas Pattern Recognition Algorithm Karl A. Lalonde and Antonette M. Logar
|

| An Overview of Satellite Image Processing Research at SDSM&T Edward Corwin and Antonette Logar
|

| Silicon Debug of DSP Subsystem used in 3G Smart Phone Applications using Micro-Architectural Visibility Sankaran Menon and Ravi Kolagotla
|

| Faster Registration of CT and MRI Brain Images using Rigid Transformation Technique Sandeep Jain, Ankush Mittal and Manish Mittal
|

| An Improvement to the PPC –Tree Based Clustering Algorithm M. Pai Radhika and V.S. Ananthanarayana
|

| A Data Compaction Technique for Frequent Itemset Mining Ramkishore Bhattacharyya, Balaram Bhattacharyya and Atal Chaudhuri
|

| Colour Image Segmentation using Clustering Technique Byomkesh Mandal and Balaram Bhattacharyya
|

| Domain Specific Search Engine: Research and Practice Hazra Bano and Aditi Sharan
|

| XML Processing using Java Namita Mittal, Hari Shreedharan and M.C. Govil
|

| Issues and Challenges for Secured Routing in Mobile AD HOC Networks Amit Sharma and A.K. Verma
|

| A Scheme facilitating Grid Authority Enhancement Sudip Kumar Sahana, Prasun Chakrabarti and Anirban Bose
|

| Association Rule Mining in Performance Appraisals I.L. Siva Venkadesh, R. Kumaran and G.S. Mahalakshmi
|

| MatrIX — A Simple Matrimonial Information Extraction System R. Prasanna Venkatesh, C. Sanjay Raj and G.S. Mahalakshmi
|

| TCAM Based High Performance Networks A. Kavitha and D. Veena Raja
|

| Continuous Word Recognizer for Tamil Language Suvidha Rupesh Kumar and B. Bharathi
|

| Dynamic Load Balancing for the Distributed Mining of Location-Aware Service Patterns in Mobile Web Environments U. Sakthi
|

| Morphological Image Processing Algorithm on Sobel Edge Detected Medical thermograms for Fracture Identification and Quantification N. Selvarasu, D. Mythily and N.M. Nandhitha
|

| Asynchronous Wake-Up Schedules in Multihop Wireless Networks T.B. Dharmaraj, A. Usha Ruby and P. Ashok Kumar
|

| E-Commerce Security using Mobile Agent J. Suresh Kumar and S.P. Gisla Jean
|

| TCP Performance Enhancement on Data Transfer using Scheduling Algorithm A. Bharathi and R. Karthikeyan
|

| Flat Routing Techniques in Wireless Sensor Networks (WSN) V. Violet Juli and G. Nivetha
|

| Improving Secured Communication in Virtual Private Network (VPN) with Elliptic Curve Cryptography (ECC) G. Anuradha
|

| Cryptographic Active Voice Transcoding Based Congestion Control Mechanism for Voice over IP (VoIP) Transmission- A case Study P. Bhuvaneswari and A.M. Natarajan
|

| A Security-Aware Ad-Hoc Routing Protocol for Wireless AdHoc Networks N. Arumugam, P.B. Pankajavalli and K.G. Santhiya
|

| Minimum Guaranteed Bandwidth Scheduling Algorithm for Data Services in High-Speed Wireless Systems S. Selvan and D. Rajini Girinath
|

| Dual Authentication System K.R. Kashwan, P. Suganthi and H. Abdulshabeer
|

| A Digital Self – Adjusting Minimum Power Supply System based on FSM Robin Abraham and C.N. Marimuthu
|

| Active Leakage Power Reduction for FPGAs Alice K. Paul and A. Purushothaman
|

| Design of Low Complexity Space-Time Block Decoder ASIC for Wireless System K.P. Sindu and R. Parthasaradhy
|

| Computer Aided Modeling for Molecular–Nano Constructs V. Pattabiraman and K. Prabavathy
|

| Characterization and Defect Analysis of AOI for QCA Implementation A . Senthilkumar and C.N. Marimuthu
|

| Efficient Discovery of Frequent Patterns using ARM: An Attribute Oriented Framework M.Y. Sanavullah and T. Christopher
|

| A New Modified SPIHT Algorithm for Image Coders J. Karthika and R. Parthasarathy
|

| Design, Simulation & Performance Evaluation of GMSK Transceiver for GSM & GPRS R. Nandakumar
|

| Efficient High Speed Architectures for VLSI Implementation of RIPEMD-160 Crypto Processor A. Praveena, K.M. Arivu Chelvan and R. Vanitha
|

| Image Matching Algorithm for Building Recognition Kute Mangesh Shivaji, Ankush Mittal and Ashraf Kassim
|

| SVM and Multiresolution Based Texture Image Classification R.S. Sabeenian, V. Palanisamy and V. Murugappan
|

| Security on Peer to Peer Clustering of Nodes on Adhoc Smart Spaces N. Radhika and S. Arumugam
|

| Multi-Class Cancer Classification and its Subtype Identification of Microarray Gene Expression Data E. Kalaivani and S. Kavitha
|

| Non Invasive Multiplanar Image Segmentation and Compression using Levelsets and Modified S-Trees M.L. Valarmathi, P. Priya and P. Thangam
|

| Digital Image Color Features-A Glance P. Balamurugan and R. Rajesh
|

| Binarization using Multimodel Approach V. SheejaKumari and A. Suphalakshmi
|

| Protecting E-Mail Privacy using Encrypted Steganography M.M. Puri and Sunita Bawaskar
|

| Aestheticscoper – a Desktop Ambient Intelligence System N.M. Gayathri, M. Usharani and G.S. Mahalakshmi
|

| A Grid Model for Medical Image Analysis Sanjay Singh, Manish Madhava Tripathi and Rizwan Beg
|

| Communication Optimization on Distributed Memory Machine for Solving Sparse Linear System B.K. Sarkar, A. Srivastava, Shahid Jamal and B.Kumar
|

| Distributed Self Deployment Protocols for Mobile Sensors T.B. Dharmaraj and A.Usha Ruby
|

| Elliptic Curve Cryptography for Third Generation Cellular Networks M. Kalaiarasu |