Vol. 3 No. 01 (2014)

Published: 2014-01-28

Articles

  • A Prototype of a Wirelessly Controlled Nuclear Centrifuge

    Jacqueline J.George, Managib N. Abdelgader
    3584-3587
    210
    196
  • Graphical User Interface for Capacity Planning in Long Term Evolution

    Jacqueline J.George, Sheemaa Ali Mohamed Hashim
    3588-3592
    197
    220
  • Protein Secondary Structure Prediction Using Improved Support Vector Machine And Neural Networks

    Anureet Kaur Johal, Prof. Rajbir Singh
    3593-3597
    164
    205
  • A survey on Software as a service (SaaS) using quality model in cloud computing

    Sarbojit Banerjee, Shivam Jain
    3598-3602
    249
    212
  • Denoising of Gaussian and Speckle Noise from XRay Scans using Haar Wavelet Transform

    Satish Kumar Banal, Randhir Singh
    3603-3606
    202
    216
  • Influence of Fine Glass Aggregate On Cement Mortar

    Mrs. Bhandari P.S., Mr. Dhale S.A., Mr. Ghutke V.S , Mrs. Pathan V.G.
    3607-3610
    240
    227
  • Oblique Decision Tree Learning Approaches : A survey

    Ms.Sonal Patil, Ms. Sonal V. Badhe, Ms.Sonal Patil, Ms. Sonal V. Badhe
    3611-3616
    204
    203
  • Performance Improvement Technique for Multiple User Detection in DS-CDMA System using Groupwise Successive Interference Cancellation (GSIC)

    Vinita Sharma, Savita Shiwani
    3617-3623
    194
    194
  • Effect of Different Component Values on 3- Stage Type-B Pulse Forming Network

    Ramnik Kour, Randeep Singh Chib
    171
    270
  • A review paper on investigation on feasibility of biogas as fuel for automobile/vehicle engine

    Jayesh D.Vaghmashi, Mr.D.R.Shah, Mr.D.C.Gosai
    177
    212
  • New Technology for Mobility Based Wireless Sensor Networks

    Dr. S Anitha, Mr. Veerbushana Belkeri
    167
    200
  • MEDICAL IMAGE COMPRESSION BASED ON AUTOMATED ROI SELECTION FOR TELEMEDICINE APPLICATION

    Sathish Kumar.S, Ellappan.V
    187
    216
  • Network Security: Security in Cloud Computing

    Mr. Vikas Malik, Srishti Gupta, Jyoti Kaushik
    202
    404
  • Survey of Optimizing Link Sleeping Reconfigurations in ISP Networks

    T.Narmatha, Mr. M. Prabakaran
    209
    198
  • A RESEARCH REVIEW ON DIFFERENT DATA HIDING TECHNIQUES

    Dr.K.Sathiyasekar, S.Karthick Swathy Krishna K S
    234
    1005
  • Survey of Defense-In-Depth Intrusion Detection Framework in Virtual Network System

    Rohini, Ratnavel Dr. M. Kamarajan
    162
    207
  • A Secure Communication Model to Detect Flooding Attacks in Disruption Tolerant Networks

    J.Iswariya, Mr.J.Lourdu Xavier
    214
    181
  • Analysis of New-Fangled Mandelbrot Sets Controlled by TAN Function

    Suraj Singh, Panwar
    209
    209
  • Network Security: Li-Fi: Data Onlight Instead of Online

    Mr. Vinod Saroha, Ritu Mehta
    183
    192
  • Review & Proposal for a Cloud based Framework for Indian Higher Education

    Sreevidya Subramanian, Dr.Ananthi Seshasaayee
    212
    208
  • An Approach to Detect and Prevent Tautology Type SQL Injection in Web Service Based on XSchema validation

    R. Joseph Manoj, Dr.A.Chandrasekhar, M.D.Anto Praveena
    170
    257
  • A Novel Approach to Construct Deterministic Finite State Automata

    Amrita Bhattacharjee, Bipul Syam Purkayastha
    184
    196
  • Graphical Interpreter

    Prof. A.Nagesh,A.Chiranjeevi, jayanth vangari, Malyala.Madhu shyam
    186
    194
  • Fraud Detection in credit Card Transaction Using Hybrid Model

    Ashish Gupta , Jagdish Raikwal
    253
    0
  • Assessment of Service Composition Plan using Colored Petri Nets

    Dr.A.Bhuvaneswari, S.Uma, S.Sakthitharan, G.Srinivasan
    191
    175
  • SCADA: SUPERVISORY CONTROL AND DATA ACQUISITION

    Mrs. Kirti
    206
    232
  • SOA enabled e-administration for institutes providing higher education

    Mr. Ajit R Pandey, Dr V M Thakare
    171
    204
  • On some Security aspect of HPC Environment

    Subrata Paul, Anirban Mitra, Ramanuja Nayak
    223
    206
  • Defect Forecasting In Software System - Mining Approach

    Priyank Dineshkumar Patel
    221
    277
  • A SURVEY ON: UNDERWATER VIDEO PROCESSING FOR DETECTING AND TRACKING MOVING OBJECTS

    Srividya M. S., Shobha G
    174
    195
  • Hybridization Of Web Page Recommender Systems

    Mr. S. R. Patil, Prof. S.K. Shirgave
    194
    188
  • Pattern Recognition and Their Different Approach

    Ajit Kumar, Rajeev Ranjan, Dr. B.Mishra
    190
    191
  • A Review of Method of Stream data classification through Optimized Feature Evolution Process

    Archana Bopche, Malti Nagle, Hitesh Gupta
    178
    172
  • COMPARATIVE ANALYSIS of LINEARLY POLARIZED PATCH ANTENNA for WI-FI and WLAN APPLICATIONS

    Meghna Kucheria, ijendra Maurya, Parikshit Vasisht Taruna Sharma, Dr. Neela Chattoraj
    192
    174
  • Energy Efficient Data Gathering Mechanism In Wireless Sensor Networks Using Mobile Collectors

    K.Revanth Kumar Reddy, H.Usha Rani, K.Rubesh Kumar
    210
    175
  • RECOGNITION OF FACIAL EXPESSION USING FACIAL MOVEMENT FEATURES

    D. Rama Krishna Reddy, D. Hema Latha, K. Sudha
    188
    178
  • Literature Survey On Fingerprint Recognition Using Level 3 Feature Extraction Method

    Chandra Prakash Singh, Susheel Jain, Anurag Jain
    212
    217
  • Design and Modeling of Parallel Rectangular Patch Based Microwave Antenna

    Rajvir Singh, Randhir Singh
    183
    205