vol2no2 Contents

IACSIT International Journal of
Engineering and Technology
IJET
Table of Contents
Volume 2 Number 2, April 2010
In-silico evaluation of malaria drug targets………………………………………………...132
Chinwe Ekenna, Segun Fatumo, Ezekiel Adebiyi
Hybrid Design of Scalable Key Distribution for Wireless Sensor Networks………………136
T. Kavitha and D.Sridharan
Transmission Cost Reduction Strategy for VoD Applications using Stochastic Approaches
..…………………………………………………………………………………………….142
M. Dakshayini and T. R. Gopalakrishnan Nair
Optimized Energy Efficient Localization Technique in Mobile Sensor Networks………...149
Mr. J. Jasper Gnana Chandran and S. P. Victor
Virtual Memory Management Techniques in 2.6 Kernel and Challenges………………….157
Archana S. Sumant , Pramila M.Chawan
A Proposed Framework for P2P Botnet Detection…………………………………………161
Hossein Rouhani Zeidanloo, Azizah Bt Abdul Manaf, Rabiah Bt Ahmad, Mazdak Zamani,
Saman Shojae Chaeikar
Signal Processing Techniques to Estimate the Speech Disability in Children……………..169
Awogbemi, Omojola and Ogunleye, I. Olusola
3D Signature for Efficient Authentication inMultimodal Biometric Security Systems
..…………………………………………………………………………………………….177
P. M. Rubesh Anand, Gaurav Bajpai, and Vidhyacharan Bhaskar
Biodiesel From Seabuckthorn Oil………………………………………………………….185
Shailendra K. Mittal, Dinesh Chandra, Bharti Dwivedi
Comparison of Modulation Techniques for Matrix Converter…………………………….189
J. Karpagam, A.Nirmal Kumar and V. Kumar Chinnaiyan
Self _USS:A Self Umpiring System for Security in Mobile Ad hoc Network
..……………………………………………………………………………………………196
Ayyaswamy Kathirvel, Rengaramanujam Srinivasan
A Computer-Aided Approach for Routh-Padé Approximation of SISO Systems Based on
Multiobjective Optimization.………………………………………………………………204
Shailendra K. Mittal, Dinesh Chandra and Bharti Dwivedi
Relationship between Season and Efficiency of Individual Selection in Six Peanut and Oval
Lines of Silkworm.…………………………………………………………………………211
Alireza Seidavi
Clustering Plasmodium falciparum Genes to their Functional Roles Using k-means
...…………………………………………………………………………………………...215
Victor Chukwudi Osamor, Ezekiel Femi Adebiyi, and Seydou Doumbia
Performance analysis of AODV, DSR & TORA Routing Protocols……………………….226
Anuj K. Gupta, Harsh Sadawarti, Anil K. Verma