Vol. 3 No. 09 (2014)

Published: 2017-12-29

Articles

  • Enhancement in the neighbor-based diskless checkpointing approach

    Parase Dipali B, Dr Mrs Apte S S, Shegadar A R
    206
    261
  • Gender Recognization & Age Prediction

    Mr. Raghvendra, Prof.Sandeep Sahu
    232
    1471
  • Online Identification Using RLS Algorithm and Kaczmarz’s Projection Algorithm for a Bioreactor Process

    S.Sundari, Alamelu Nachiappan
    256
    267
  • Detection & Prevention of Wormhole attack on AODV Protocol in Mobile Adhoc Networks (MANETS)

    Dimple Saharan
    214
    259
  • Energy-based Controller with Optimization Tuning by Using Nelder-Mead Algorithm for Overhead Cranes

    Nguyen Quang Hoang, Vu Van Khoa
    217
    259
  • A Wireless LAN Protocol for Initial Access Authentication

    Sandhya K, Nagaraju Rayapati
    251
    261
  • STUDY ON WEB STRUCTURE MINING AND ITS PAGE RANKING ALGORITHM

    T. Shanmugapriya, K.Kalaiselvi
    178
    274
  • Presenting of executable model of the enterprise architecture in order to evaluate the reliability

    Maryam Nazemi Ashani , Ali HarounAbadi , sayed Javad Mirabedini
    220
    252
  • Reduction of ambiguity due to synonym and Homographs in Punjabi Language

    Navdeep Kaur, Vandana Pushe
    230
    258
  • A novel approach to make NLP predictive and non-ambigious in Punjabi Language

    Parneet Kaur, Er.Vandana Pushe
    207
    273
  • Study of Public and Private Clouds in Indian Environment

    Rakesh Patel , Mili Patel, Proff. Anupam R. Chaube
    205
    259
  • Punjabi Speech Synthesis System for Android Mobile Phones

    Jagmeet Kaur, Parminder Singh
    202
    321
  • Stock Market Be¬havior Prediction Using Pattern Matching Approach

    Prakash Kumar Sarangi, Birendra Kumar Nayak
    185
    293
  • Spell Checking and Error Correcting System for text paragraphs written in Punjabi Language using Hybrid approach

    Amanjot Kaur, Dr. Paramjeet Singh, Dr. Shaveta Rani
    198
    272
  • Interactive Pick and Place Robot Control using Image Processing Method

    Mr. Raskar D. S., Prof. Mrs. Belagali P. P.
    232
    281
  • Review Based Entity Ranking using Fuzzy Logic Algorithmic Approach: Analysis

    Pratik N. Kalamkar, Anupama G. Phakatkar
    234
    244
  • Corner Defect Detection Based On Inverse Trigonometric Function Using Image of Square Ceramic Tiles

    Ravindra Singh, Gyan Chand Yadav
    233
    277
  • The Future Version of IP - IPV6

    Mr. P Ravindra, Mr. Dr.V.V.Krishna Mr. S.Srinivasulu
    191
    266
  • Usability Testing

    Purnima Bindal, Sonika Gupta, Purnima Khurana
    220
    257
  • Wavelength Assignment in Optical WDM Optical Network

    Mudasir Ali , Parminder Singh Saini
    209
    238
  • Analyze & Classify Intrusions to Detect Selective Measures to Optimize Intrusions in Virtual Network

    K. Naveen Kumar, Madan Pojala, P.Venkateswarlu Reddy
    197
    253
  • Design and implementation of dc motor speed control based on pic microcontroller

    Snehlata Sanjay Thakare, Prof.Santosh Kompelli, Snehlata Sanjay Thakare, Prof.Santosh Kompelli
    218
    315
  • Eigenface Approach For The Recognition Of Face And Detection Of The Face

    Er. Anup lal Yadav, Er. Sahil Verma, Er. Kavita
    243
    338
  • Ideas for Some Improvement in A.C.O. On The Behalf Of Presently Working A.C.O.

    Er. Anup lal Yadav, Er. Sahil Verma, Er. Kavita
    256
    250
  • A Review of Various Encryption Techniques

    Harshraj N. Shinde, Aniruddha S. Raut, Shubham R. Vidhale, Rohit V. Sawant, Vijay A. Kotkar
    215
    300
  • Search The Web Services Based On Qos Aware

    Sudhakar Murugesan, Dorcas Boateng, Nivash Thirunavukarasu
    215
    235
  • Revised Reliable Algorithm with Results & Algorithm for Thinning Numeral Pattern

    Er. Anup, Er. Sahil Verma, Dr. Kamal Sharma
    172
    242
  • Comparative analysis of image quality assessment using HVS Based Model

    Dr. Anil Panghal, Puja Chugh A.P
    201
    254
  • Hyperspectral Image Classification Using SVM

    CH. Bala subramanyam, G. Naga lakshmi
    195
    273
  • Car Safety using CAN Module and Multi sensors

    Prasad H. Kulkarni, C.S. Patil, R. R. Karhe
    206
    220
  • Design & Implementation of Binary Phase Shift Keying Demodulation through phase locked loop

    Roopa.V, R.Mallikarjuna Setty
    213
    329
  • Battery Capacity Management in Wireless Sensor Network Rechargeable Sensor Nodes

    Mrs. Anasuya., N. Jadagerimath
    192
    296
  • Cyborgs-Human + Machine= the Future Man

    Surbhi gupta, Vikrant dewan
    216
    252
  • Search Engine –A Demanding Advertising Tool

    Jyoti Godara, Shilpa Sharma
    241
    280
  • Switching attacks in wireless networks using denial of service phenomenon

    Srinivas Kolli, B. V. Srikanth, Dr.P.Venkateswarlu
    279
    244
  • A Comprehensive Analysis of Cloud Computing Including Security Issues and Overview of Monitoring

    Deepika Upadhyay, Sanjay Silakari, Uday Chourasia
    188
    265
  • Extended self destructing data system with data recovery

    Vinayaka R H, Dayananda P , Shwetha S
    193
    257
  • A Review of Open Access Publication in Tanzania

    Wasiwasi J. Mgonzo, Zaipuna O. Yonah
    219
    259
  • Finger Vein Detection Combining Segmentation, Gabor Filter and Matched Filter

    Amandeep kaur
    172
    232
  • A Survey on Routing Protocols Using TCP Variants over MANETs

    Manpreet Kaur, Dr. Sandeep Singh Kang
    190
    242
  • A Metric Base Calaculation for Object Oriented Software Modularization Quality Measurement

    Ruchi Kulkarni, Samidha Diwedi Sharma
    127
    212
  • Mining High Utility Items from Transactional Databases-Useing Systolic Algorithm

    C.Mamatha Devi, M. Bhargavi
    142
    200
  • Review On:Metamaterials And Their Appliations

    Isha Gupta, Munish Rattan, Ankita Tiwari
    142
    223
  • A Review On Software Testing In SDlC And Testing Tools

    T.Amruthavalli, S.MahaLAkshmi, K.HariKrishnan
    123
    222
  • Solving Knapsack Problem Using Constraint Programming

    Vaishali Cooner
    319
    247
  • A Review of Various Gesture Recognition Techniques

    Vaibhavi S. Gandhi, Akshay A. Khond, Sanket N. Raut, Vaishali A. Thakur, Shabnam S. Shaikh
    141
    238
  • Effect on Relaxation Time and Polarizability in Electric Field Induced Nucleation Processes

    N. Singh, R. S. Chauhan
    106
    232
  • Radiation absorption effect on MHD, free convection, chemically reacting visco-elastic fluid past an oscillatory vertical porous plate in slip flow regime

    M. C. Raju, B. Vidyasagar, S.V. K. Varma, S. Venkataramana
    113
    205
  • MPLI: A Novel Modified Parametric Location Identification for AODV in MANET

    Akash Karma, Jitendra Choudhary
    111
    205
  • An Overview on Hybrid Cloud as an It Service Broker

    P. Soumya Sree Laxmi
    158
    246
  • Implementation of Personalized mobile search engine based on Ontology

    Ms.Namrata G Kharate
    131
    250
  • Identification Of Malnutrition With Use Of Supervised Datamining Techniques –Decision Trees And Artificial Neural Networks

    D.Thangamani, P.Sudha
    185
    248
  • CFD Analysis & Experimental Study on Heat Transfer Enhancement by various shapes of wings and Material with Forced Convection

    Snehal C. Kapse, Dr. R.R Arakerimath
    145
    208
  • Removal of High Density Salt and Pepper Noise from Digital Images

    Sruthi Ignatious
    148
    188
  • Security Aspects in WSN: Survey and Analysis

    Swati Kakran, Sunil Kumar
    133
    222
  • A Comprehensive Paper on Performance Analysis between AODV & DSDV Routing Protocol

    Mr. Raj Kumar Singh, Mr. Rakesh Kumar Khare
    133
    207
  • Preparation of silver nanoparticles by pulsed laser ablation in liquid medium

    Leena F. Hamza, Dr.Issam M.Ibrahim
    150
    230
  • Survey on Linux Security and Vulnerabilities

    Ashvini T. Dheshmukh, Dr. Parikshit. N . Mahalle
    169
    332
  • Review On: Fractal Antenna Design Geometries and Its Applications

    Ankita Tiwari, Dr. Munish Rattan, Isha Gupta
    142
    264
  • Smart Home Implementation Using Data Mining

    Gayatri D. Kulkarni, Priyanka V. Gode, Jadi Pratapreddy,Madhura H. Deshmukh, Nitin R. Talhar
    107
    199
  • Enhanced Cluster Based Distributer Fault Tolerance Algorithm For Mobile Node In WSN

    Avrinderpal Kaur , Er. Upasna Garg
    215
    253
  • Modelling Reservoir Operation Using Multiple Regression & Artificial Neural Network

    S.S.Khare, Dr. A.R.Gajbhiye
    149
    252
  • A Review of Load Balancing Algorithms for Cloud Computing

    Dr.G.N.K.Sureshbabu, Dr.S.K.Srivatsa
    123
    206
  • Impact of Mobile Applications on Health Care Information System

    R. Anand, Dr. S. K. Srivatsa
    147
    202
  • 0.18um based 6T SRAM to Reduced Power

    Mrs. J.N. Ingole , Miss. Poonam A. Mirge
    138
    225
  • Detection of TCP/IP Covert Channel based on Naïve-Bayesian Classifier

    Vibhor Kumar Vishnoi, Sunil Kumar
    137
    209
  • Classification of Human Action in a Controlled Environment

    Asmeet Bhosale, Geetanjali Kale
    112
    236
  • Mapreduce & Comparison of HDFS And GFS

    Ameya Daphalapurkar, Manali Shimpi, Priyal Newalkar
    182
    688
  • Proficient Secret Transmission of Images And Message

    S.Uma, V.Valarmathi
    146
    224
  • Defense Mechanism for Denial of Service Attack to UMTS Networks Using Sim-Less Devices

    V. Palaniyappan , M.Duraipandian , K.Malarvizhi
    125
    210
  • UW-Hybrid Architecture of Underwater Acoustic Sensor Networks

    Tanu Singh, Manu Singh
    141
    246
  • Combination of Markov and MultiDamping Techniques for Web Page Ranking

    Sandeep Nagpure
    116
    200
  • Performance analysis of Neural Network Algorithms on Stock Market Forecasting

    Manasi Shah, Nandana Prabhu, Jyothi Rao
    143
    234
  • License Plate Character Recognition

    Rintu Tom, Jinson Devis
    105
    224
  • New level of Security in ATM System Using Brain Fingerprinting

    N. Geethanjali
    115
    235
  • Study and Analysis of Edge Detection Techniques for Segmentation using Dental Radiograph

    N.P.Ansingkar, M.G.Dhopeshwarkar
    134
    220
  • Diagnosis and Correction of tear in films with Optimization of Motion Estimation Technique

    Jilfy James, Jobi Jose
    149
    209
  • Survey of Visual Cryptography Schemes without Pixel Expansion

    Asst. Prof. Jyoti Rao, Dr. Vikram Patil, Ms. Smita Patil
    211
    239
  • Improving Edge Based Color Constancy for Multiple Light Sources

    Ancy Varghese, Darsana Vijay
    147
    268
  • Direct Single Stage Power Converter (AC/DC).

    Md. Jahid Hasan, Pritam Dutta, Md. Shafayet Ahmmad Khan
    144
    197
  • Fuzzy Logic Enforced Traffic Management for High Speed Networks

    T. Hari, P. Hemanth Kumar
    145
    215
  • Comparative Analysis of Secure and Energy Efficient routing protocols in Wireless sensor network

    Amanpreet Kaur, Dr. Sandeep Singh Kang
    126
    153
  • Analysing Performance of Companding Technique For PAPR Reduction in OFDM System

    Rikhee Ram, Manoj Gabhel
    113
    220
  • New refined Model for Mechatronics design of solar differential drive mobile robotic platforms

    Farhan A. Salem
    119
    219
  • Modeling and Control Solutions for Mechatronics Design of Solar Battery Electric Vehicles

    Farhan A. Salem , Ali S. Alosaimy
    125
    212
  • Diabetes Prediction in Women Based On Soft Computing Techniques

    S.Karthikeyeni, S.Saranya
    155
    204
  • A Study of Existing Cross Site Scripting Detection and Prevention Techniques in Web Applications

    Neha Gupta
    164
    227
  • IPV6 SLAAC related security issues and removal of those security issues

    Priya Tayal
    126
    242
  • Implementing Big Data Management on Grid Computing Environment

    Lawal Muhammad Aminu
    122
    232
  • Performance Evaluation of Secure Key Distribution Based on Quantum Mechanics Principles Over Free Space

    Lawal Muhammad Aminu
    117
    223