Sunteți pe pagina 1din 3

International Journal of Computational Intelligence and Information Security

ISSN: 1837-7823

October 2011 Vol. 2 No. 10 IJCIIS Publication

International Journal of Computational Intelligence and Information Security, October 2011 Vol. 2, No. 10

IJCIIS Editor and Publisher P Kulkarni Publishers Address: 5 Belmar Crescent, Canadian Victoria, Australia Phone: +61 3 5330 3647 E-mail Address: Publishing Date: October 25, 2011 Members of IJCIIS Editorial Board
Prof. A Govardhan, Jawaharlal Nehru Technological University, India Dr. A V Senthil Kumar, Hindusthan College of Arts and Science, India Dr. Awadhesh Kumar Sharma, Madan Mohan Malviya Engineering College, India Prof. Ayyaswamy Kathirvel, BS Abdur Rehman University, India Dr. Binod Kumar, Lakshmi Narayan College of Technology, India Prof. Deepankar Sharma, D. J. College of Engineering and Technology, India Dr. D. R. Prince Williams, Sohar College of Applied Sciences, Oman Prof. Durgesh Kumar Mishra, Acropolis Institute of Technology and Research, India Dr. Imen Grida Ben Yahia, Telecom SudParis, France Dr. Himanshu Aggarwal, Punjabi University, India Dr. Jagdish Lal Raheja, Central Electronics Engineering Research Institute, India Prof. Natarajan Meghanathan, Jackson State University, USA Dr. Oluwaseyitanfunmi Osunade, University of Ibadan, Nigeria Dr. Ousmane Thiare, Gaston Berger University, Senegal Dr. K. D. Verma, S. V. College of Postgraduate Studies and Research, India Prof. M. Thiyagarajan, Sastra University, India Dr. Manjaiah D. H., Mangalore University, India Dr.N.Ch.Sriman Narayana Iyengar, VIT University ,India Prof. Nirmalendu Bikas Sinha, College of Engineering and Management, Kolaghat, India Dr. Rajesh Kumar, National University of Singapore, Singapore Dr. Raman Maini, University College of Engineering, Punjabi University, India Dr. Seema Verma, Banasthali University, India Dr. Shahram Jamali, University of Mohaghegh Ardabili, Iran Dr. Shishir Kumar, Jaypee University of Engineering and Technology, India Dr. Sujisunadaram Sundaram, Anna University, India Dr. Sukumar Senthilkumar, National Institute of Technology, India Prof. V. Umakanta Sastry, Sreenidhi Institute of Science and Technology, India Dr. Venkatesh Prasad, Lingaya's University, India

Journal Website:

International Journal of Computational Intelligence and Information Security, October 2011 Vol. 2, No. 10

[Paper-1] Classification Analysis of Anonymization for Privacy Data (pages 4-10) [Full Paper PDF] [Paper-2] A Novel Compression Technique for JPEG Error Analysis and For Digital Image Applications (pages 11-18) [Full Paper PDF] [Paper-3] A Block Cipher using Feistals Approach Involving Permutation and Mixing of the Plaintext with Interlacing and Decomposition and Additive Inverse of Key Matrix (pages 1930) [Full Paper PDF] [Paper-4] A Review of Watermarking Techniques for Copy Protection of Digital Images & Methods (pages 31-35) [Full Paper PDF] [Paper-5] Solution of Securing TCP Congestion Window from Blackhole Attack (pages 3643) [Full Paper PDF] [Paper-6] A novel neural cluster approach to select the most efficient feature set in digital mammograms (pages 44-53) [Full Paper PDF] [Paper-7] ONTOLOGY BUILDING WEB INFORMATION RETRIEVAL SYSTEM USING

ASSOCIATION RULE MINING (pages 54-66) [Full Paper PDF] [Paper-8] Service Brokering In Semantic Service Oriented Environments Considering Quality of Service (pages 67-70) [Full Paper PDF] [Paper-9] Leveraging the Capabilities of Centralized GIS Environments on a Service Oriented Infrastructure to Form a Common Operational Picture (pages 71-76) [Full Paper PDF] [Paper-10] Novel Protocol Technique For Energy Efficient Routing Conservation in Wireless Ad-hoc Networks (pages 77-85) [Full Paper PDF] [Paper-11] Web mining approach to develop virtual museums (pages 86-92) [Full Paper PDF] [Paper-12] Analysis of WiMAX & Survey on Bandwidth Recycling On IEE Networks (pages 93100) [Full Paper PDF] [Paper-13] MANET- Analysis of Routing Stability under the Random Direcion (pages 101108) [Full Paper PDF] [Paper-14] SOA- Internet of Things & A Novel Query Selection Provisionin of Web services (pages 109-116) [Full Paper PDF] [Paper-15] DDoS Attacks Monitoring the Application- Layer With Popular Datasets (pages 117-122) [Full Paper PDF]