Vol. 4 No. 01 (2015)

Published: 2017-12-29

Articles

  • Proficient Techniques For The Enhancement Of Horizontal Aggregations In SQL

    V Prasanti Parimala R Praveen Kumar
    209
    242
  • A Real Time Automatic License Plate Recognition Using Optical Character Recognition

    R. Ramachandran, R. Manivannan R. Ramachandiran, N. Balachandar
    183
    241
  • A Novel Combination of Encryption and Compression for Privacy Protection by Using BTC

    Kancharla Murali, Mr.B.Vishnu Vardhan
    214
    247
  • DESIGN AND IMPLEMENTATION OF USB DRIVER FOR REAL TIME APPLICATION

    Kalpavi C Y, Manasa.B.T
    205
    243
  • An Advanced BIST Architecture with Low Power LBIST and BDS Oriented March Algorithm for Intra Word Coupling Faults

    P.Ananda Babu, Jagadeesh Samudrala
    213
    285
  • Optimization Techniques For High Performance Content Downloading And Data Access In Vehicular Networks

    R. M. Kadwe, Pradnya Kamble , Yogesh Bhute
    171
    242
  • Capacity Analysis of MIMO Technology

    Yamini Devlal, Meenakshi Awasthi
    230
    294
  • Next Generation Networks (NGN) Billing and Charging System

    Amir Ahmed Omer Yousif
    230
    242
  • Enhancement of SMAC Using Clustering Approach in Wireless Sensor Networks

    Pooja Rani, Manoj Kumar Sah Anil Kumar
    205
    236
  • A Survey Paper on "Effective Navigation in Website

    Payal R. Potarkar, Mayuresh A. Hedao, Prasad M. Dandhare Samiksha D. Nakade ,Pradnya B.Kamble ,
    229
    241
  • To Improve the Power Quality by Varying the Block Parameter (KP, Ki , Kd)

    Randeep Singh Chib, Yuvraj Singh Sandeep Singh , Rakesh Gupta
    217
    250
  • A Review on Automatic Speech Recognition System

    Mukesh Rana, Er. Saloni
    220
    231
  • Android App for Meter Reading

    Jameer Kotwal, Snehal Pawar , Shraddha Pansare Madhura Khopade , Pratibha Mahalunkar
    187
    408
  • Resilient modulus of different asphalt mixtures of varying bitumen content by performing Creep test using UTM-5P

    Muhammad Hussain, Rana Faisal Tufail Kashif Riaz , Sohaib Naseer
    199
    242
  • To Study the Wireless Sensor Networks, Architecture and Design Issues Related To WSN

    Sandeep Singh, Yuvraj Singh Randeep Singh Chib , Rakesh Gupta
    205
    241
  • Introduction to technique of Soft Computing: Artificial Neural Networks

    D.P. Salapurkar
    188
    657
  • An Overview of Load balancing Techniques in Cloud Computing Environments

    Bhatt Hirenkumar, H, Prof. Hitesh A. Bheda
    228
    222
  • Secure Geographic Routing Hybrid Approach For Void Resolution In Wireless Sensor Network

    Shishir Patra, Jajati Mallick
    232
    234
  • Solar Radiation Prediction with Single Diode Photovoltaic Module

    T.Pearson, S.Bhuvaneswari S.Abish Samuel
    195
    225
  • Cancelable Template Generation Based On Imrpoved Quality Fingerrint Image For Person Authentication

    Janani.B, Dr. N. Radha
    204
    278
  • Advance Resistor Value Calculator with MATLAB

    Heera Lal Bhadrecha , Praveen Kumar Sharma
    325
    262
  • The Concept of Time and Space on the Internet Analyzed through the Pseudonymous

    Marcienne Martin, Marcienne, Martin
    221
    265
  • Deciphering The Prominent Security Tools Ofkali Linux

    Talatam.Durga Rao, Vankayalapati.Sai Madhav Konduri.Sai Ram Kiran
    198
    233
  • An Improved Steganography Technique of LSB Substitution Method

    Neha Jain, sudhir goswami
    159
    232
  • Migration to Next Generation IP Network

    Amir Ahmed Omer Yousif, Hamid Abbas Ali,UofK, Sami M. Sharif, UofK
    161
    216
  • Privacy Preserving Public Auditing and Recovery Using Backup & Restore Method for Secure Cloud Storage

    Priya Rupeja, Kalyani Waghmare
    193
    210
  • Closed loop control of curing process using Lab VIEW

    V. Radhika V.P. Priyadharshini, B. Shibila , V. Varsha
    171
    261
  • Data Cleaning System to Handle Noisy Data

    A.F Elgamal
    153
    227
  • Innovation and Knowledge Cluster in 21st century: An Economic Manifesto for e-Learning Future

    Sudhir Kumar Sharma, Vandana Lama Nidhi Goyal
    189
    210
  • Farm Monitoring Mobile Robot Speed Controlled of DC Motor Driver System Using PID Controller.

    Namdev K.Barhate, Krishana S.Ingle
    181
    202
  • Development of a Timed Coloured Petri Nets Model for Health Centre Patient Care Flow Processes

    R. A.Ganiyu, S. O. Olabiyisi T. A. Badmus , O. Y. Akingbade
    202
  • Evolution of Hand Gesture Recognition : A Review

    Praveen Kumar Sharma, Shreya Sharma
    205
    619
  • Double Threshold Based Load Balancing Approach by Using VM Migration for the Cloud Computing Environment

    Rajyashree, Vineet Richhariya
    233
    227
  • Predicting Student Performance Using MapReduce

    N. Tajunisha, M. Anjal
    190
    223
  • A Review on Distributed Application Processing Framework – Clone Cloud

    Prajakta R. Mali, Gayatri D. Naik
    187
    224
  • Retrieving Of Images Using Pseudo Zernike Moments

    Nasreen, K.Durga Prasad
    179
    211
  • A Configurable Bus-Tracer For Errorreproduction In Post-Silicon Validation

    E.Deepthi, Cha.Swamy, S.Prabhakar
    173
    226
  • Improving Security and Reduce Overhead in Mobile Health Monitoring

    N.Tajunisha, V.Archana
    194
    227
  • Achieving MAC Fairness Using Binary Exponential Backoff (BEB) Algorithm in Wireless Adhoc Network

    Varsha Pandey, Mr. Neelmani Verma Deepak Kumar Xaxa, Devendra Kumar
    206
    249
  • Survey on Different types of Neural Network Techniques to Classify Human Face

    Akshay Patil, Saurabh Wagh Abhishek Sahay
    173
    250
  • ECC Based Prevention for Side Channel Attack: A Survey

    Anuja S. Deoghare , K. N. Hande
    148
    252
  • A brief study on different operating system

    Poonam Singh, Shweta Yadav, Savita Agrawal
    185
    301
  • iOS Based Multipurpose Application for Task Scheduling with Voice Command Handling

    Pratik R. Sardar, R. A. Kulkarni, S. M. Kolekar
    147
    217
  • Constructing Horizontal layout and Clustering Horizontal layout by applying Fuzzy Concepts for Data mining Reasoning

    Kalluri N V Satya Naresh, Divya Vani .Y
    148
  • Maximum Power Point Tracking System for Wind Generator Using MATLAB.

    Krishnat R. Dubal, dattatray S. Chavan
    157
    215
  • Embedded Based System for the Fruit Quality Management Using PIC Micro Controller

    J.Ramprabhu S.Nandhini
    143
    234
  • Evaluation of Network Performance Using Upper Threshold RED

    Jai Mungi, Aishwarya Mishra
    105
    213
  • An Intrusion Detection System Based On Support Vector Machine Using Hierarchical Clustering And Genetic Algorithm

    Minakshi Bisen, Amit Dubey
    117
    0 214
  • A Survey on Different Methods for Hiding Information behind an Image

    Deepali G. Singhavi, P. N. Chatur
    130
    208
  • Mining Educational Data for Predicting Higher Secondary School Student’s Grade Using ID3 Algorithm

    Nirmala Devi.R, Deepa.R , Kalaiarasi. P
    123
    215
  • A Novel Fusion Approach by Non-Sub Sampled Contourlet Transform

    Patil. Sujatha, N.Nagaraja Kumar
    139
  • Context-Aware Approach for enhancing security and privacy of RFID

    Nisha R. Wartha, Vaishali Londhe
    120
    231
  • To propose a new algorithm for improving software architecture with clustering algorithm

    Jyoti Godara, Shilpa Sharma
    184
    230
  • Dual Tree Complex Wavelet Transform Based On Noise Reduction Using Partial Reference

    Somabattini Venkata Nagaraju, Ch.Ramesh
    129
    237
  • Examplar Based Inpainting Mechanism Based On Sr Algorithm

    Kodi.Meena, Ch.Ramesh
    149
    185
  • A Review On Palmprint Recognition Using Features From Principle Lines

    Ramandeep Kaur, Meenakshi Garg
    141
    215
  • Review on Xml Tree Pattern Matching Using Holistic Algorithms

    Bharti D. Wanjari, Kapil N. Hande
    154
    188
  • Review on Performance of MANET Using Different Routing Algorithm

    . Bobby R. Sarode, A. A. Nikose
    136
    212
  • Scalable Push Pull architecture for retrieving student information request and response with data wrappers

    J.Saravanesh, E.Ramaraj
    131
    223
  • A Survey of Various Scheduling Algorithms and types of Resources Provisioning in Cloud Environment

    Jeni Patel, Jignesh Prajapati ,
    140
    209
  • Introduction of “Internet of Things” its Application and Challenges

    Vikash K Singh, Devendra Singh Kushwaha, Shaibya Singh, Sonal Sharma
    131
    212
  • Data Privacy in Multi Cloud Environment using Third Party Key Providence in Public Clouds

    S.V Satish Kumar Reddy, K.Narayana
    126
    209
  • Integration of Wireless Network in WiMAX and Wi-Fi Wireless Technology Communication

    Lekh Raj, Sata Nand , Manoj Kumar Ravinder Mohan Jindal , Leekha Jindal
    125
    185
  • A Novel And Improved Technique For Clustering Uncertain Data

    Vandana Dubey, A A Nikose
    106
    186
  • Improved Energy Consumption and Resource Utilization through Sensor Virtualization in Smart home

    Monali G.Sonule, Swati Nikam
    114
    219
  • Cab Tracking And Personal Security System

    Aditya Sisode, PallaviPalande ,Vinay Puranik , KunalPurandare, Rahul Akhouri
    128
    213
  • Automation of Electricity Management

    Sayali Gore, Anmol Bhegade , Priyanka Dhaybar
    124
    186
  • Analysis and Simulation of Orthogonal UWB Pulse for Modulation Scheme and Transmission

    Suvarna R. Patil, Vishal Raskar
    146
    186
  • Enhancing Information Management System performance by specializing the concept of Indexing

    A. S. Dhanadhya, P. N. Chatur
    120
    210
  • Search Results Clustering using TF-IDF Based Apriori Approach: A Survey Paper

    Hetal C. Chaudhar K. P.Wagh P.N.Chatur
    162
    217
  • Different Methods of Classification of Documents A Survey Paper

    Sneha K.Dehankar, K. P.Wagh P.N.Chatur
    170
    185
  • Identity Based Secured Distributed Data Storage Schemes

    Dhanshri Patil, Tejal Pardeshi , Nikita Mane , Akshaykumar Thakur
    133
    209
  • A Compressive Survey on Active and Passive Methods for Image Forgery Detection

    Nikhilkumar P. Joglekar, P. N. Chatur
    133
    202
  • An Application Deployment to Openshift Cloud Using Existing Git Repository From Local Client

    Mr. Nishant Kumar, Mayank Aggrawal , Dr. Raj Kumar Spandan Singh , Mr. Chirag Goel
    135
    232
  • Single-Stage Reconfigurable Solar Converter for Grid-Linked System by using a fuzzy logic

    Reena Jain, Neelesh Kumar
    123
    193
  • Passive Optical LAN as an emerging LAN Architecture

    Shubha Chaturvedi, Gautam Chaturvedi
    175
    231
  • Software Testing as a Service (STaaS) using Cloud Computing

    Khushwant Virdi Radhika Kalyan Navjot Kaur
    120
    218
  • Software Project Risk Assessment based on Neuro-Fuzzy Technique

    S. W. Jadhao R. V. Mante . P. N. Chatur
    125
    232
  • IVR System for three phase motor protection, Control and Alert system using GSM

    Wani Suraj R, Ghaywat Vivek V , Naik Akshay D Mandlik Sachin B
    266
    395
  • Improving Cloud Data Storage Using Data Partition and Recovery

    A.R.Zade, Shaikh Umar, Potghan Rahul Rale Sagar and Borade Sagar
    120
    194
  • A Study on Mobile Networks and 3d Self-Deployment Algorithm

    Muskan sharma
    147
    189
  • Metals in E Waste Causing Concerns in Bihar

    Umesh Kumar, dr. Ramesh Kumar, Sushil Kumar
    136
    185