Vol. 5 No. 9 (2016)

Published: 2017-12-30

Articles

  • Optimal PID Controller Designing for Uncertain Bioreactor Using BFO Algorithm

    Muthu Subramanian. V, Ram Venkat Srikar Reddy. B, Ramakrishnan. M, Infant Arockia Raj. M
    256
    252
  • An IOT Based Framework for Group Monitoring and Irrigation Control

    MeghaRani Raigonda, Vidyashree S Valsan Malashree S Valsang
    239
    219
  • A Cloud Based Automatic Recovery and Backup System with Video Compression

    Megha Rani Raigonda, , Tahseen Fatima
    227
    316
  • A Survey On Various Phishing Detection And Prevention Techniques

    Prof. Gayathri Naidu .
    276
    256
  • A Novel Digital Watermarking Approach for Accurate Authentication Using of Integer Wavelet Transform Coefficients

    P.Sayanna1, B. Laxmi priya
    224
    244
  • To Identify a Torque Controller System Approximating a Neural Network Based on Model Reference Technique

    Priyaranjan Mandal, Binay Biswas
    296
    245
  • New Design of Acoustic Doppler Current Profiler

    Arati Jadhav , D. G. Ganage
    279
    262
  • Solving n­Queen problem using modified Rakhya’s approach for parallel system

    Loveleen Kaur, Prateek Gupta
    213
    323
  • Neural Network based Weather Prediction Model towards Ideal Crop Selection

    Mrs. Swaroopa Shastri , Arati K Gunge
    220
    253
  • Combination of Modified Clipping Technique and Selective Mapping for PAPR Reduction

    R. SHIVAJI, PATNAM GAYATHRI
    237
    282
  • Enhancement of BER and PSD of OFDM Signals with PAPR Reduction Using Linear Companding Transform

    Kalluri Ravi Kumar K.V.Acharyulu
    281
    254
  • Optimized PAPR Reduction Approach by Partial Approximate Gradient Constellation Algorithm for Better Efficiency

    G. Swetha Sumera Afreen
    239
    230
  • Image Enhancement Approach for Digital Applications Based On Generalized Histogram Equalization Model

    C. Anusha, L. Laxmi
    248
    241
  • A Simple Clutter Canceling Circuit and Background Noise Algorithm Based On Microwave Life Detection System

    K. Anuradha , M A Zeba Tabassum
    264
    258
  • Cloud Computing for Rural Banking

    Karthigainathan. M
    3083
    2613
  • Dynamic Cluster Head Selection Mechanism For Wireless Sensor Networks

    Lakshmeesha P Dr. Shiva Murthy G
    273
    284
  • Secure Reliable Reactive Routing Enhancement In Wireless Sensor Networks

    Akash Joshi , Dr. Shiva Murthy G
    198
    262
  • Numerical Solution of Tenth Order Boundary Value Problems by Petrov-Galerkin Method with Quintic B-splines as basis functions and Septic B-Splines as weight functions

    S. M. Reddy .
    315
    275
  • Numerical Solution of Eighth Order Boundary Value Problems by Petrov-Galerkin Method with Quintic B-splines as basic functions and Septic B-Splines as weight functions

    S. M. Reddy .
    258
    241
  • Evaluating the Performance of Ant Colony Algorithm for the Solution of Constraint Based Traveling Salesman Problem

    Anil Kewat,Arvind Kumar Sharma P.C.Gupta, P. N. Srivastava
    262
    225
  • A Review on Performance of Database Systems Azfar Inayat Khan

    Azfar Inayat Khan
    197
    223
  • A DWT-DCT-SVD Based Enhancement Technique for Low Contrast Satellite Images

    Neha Gupta, Ashutosh Kharb, , Seema Kharb
    214
    313
  • Implementation of IOT Based Health Care Solution Based on Cloud Computing

    B. Padmavathi , Subia Tazeen Rana
    247
    246
  • Review on Reactive Power Compensation in Short Transmission Line

    Rachana Chavan Rakesh Singh Lodhi
    292
    289
  • Survey on Relay and Beam forming Spectrum Sharing Cognitive Radio Networks

    V. Bindusri (M.tech.) M. Vijaya Lakshmi
    248
    222
  • Mouse Control Using Image Processing

    Shridhar Kolap, Madhu Khaparkhande Pooja Latane
    233
    429
  • A Study On Cloud Robotics Architecture, Challenges and Applications

    G.Arunajyothi, .
    241
    203
  • A Survey of Energy Efficient Clustering Algorithms in Wireless Sensor Networks

    Vishal Singh .
    248
    244
  • Comparison Of Routing Protocols (DSDV, DSR and AODV) In Manets

    Shikha Sharma Manish Mahajan
    275
    229
  • MM Sort algorithms

    Mihir Narshana .
    279
    221
  • Flight Recommendation System based on user feedback, weighting technique and context aware recommendation system

    Mohit Tuteja .
    313
    414
  • Instrumentation Detailed Engineering

    Girish Santosh Bagale, , Gaurav Ballal Chiplunkar
    253
    1000
  • Numerical Solution of Fifth Order Boundary Value Problems by Petrov-Galerkin Method with Quintic B-splines as basis functions and Septic B-Splines as weight functions

    S. M. Reddy .
    252
    258
  • Numerical Solution of Fourth Order Boundary Value Problems by Petrov-Galerkin Method with Quartic B-splines as basis functions and Sextic B-Splines as weight functions

    S. M. Reddy ,
    255
    240
  • Agile Testing Automation Framework

    Heet Palod , Danish Chaus
    237
    282
  • Group User Revocation and Integrity Auditing Of Shared Data in Cloud Environment

    P.Ayeesha Khan .
    272
    248
  • Optimization and Investigation of Mg-Alloy with MWCNT Nano-Composites for Connecting Rod Application

    Akash Digamber Dhane Dr. Jayakumar Jayaraman
    208
    270
  • Inference of User Image-Search Goals and Personalization Using Click Through Log

    Aditi More , P. P. Joshi
    239
    223
  • Simulation of Black Hole Attack in Manet

    Chinky Jain* Pardeep Tyagi*
    301
    207
  • Improving the Performance of Information Collection Using Social Networks with Online Sampling

    Praveen Kumar Ramtekkar Shyam P. Dubey , Mohammad Shahid Nadeem
    240
    215
  • Virtual Machine Migration in Cloud Data Centers for Resource management

    Chandramouli Reddy Suchithra R
    146
    239
  • Risk Analysis and Estimation of Schedule Using Monte Carlo Simulation

    Heena Kashyap Nitika Bansal and Meenu Gupta
    180
    235
  • A Survey on Mobile Wireless Network

    Anjali Krishnan N, Lekshmi vijayan , Priyanka P , Renya Reji Minu Lalitha Madhavu
    135
    216
  • A Voltage Controlled PV Inverter for a Certs Microgrid

    T Sateesh *, P Bapaiah**
    131
    223
  • Laws of Duality of soft mathematical morphology

    Kompella venkata ramana .
    221
    206
  • Function of big-data over data streams

    S. Mahammed Gouse , E.Amarnath Goud
    141
    190
  • Prototype for MEMS Based Assistance for Physically Disable People

    Girish Santosh Bagale , Amit Ashok Solanki
    138
    0
  • The Comparative Study on Public Key Algorithm using RSA AND OAEP

    E.Vinithra , N.Hyrunnisha
    148
    249
  • Compatibility of Border Meeting of Two Layers Protocol (BGP Version 4) With IPV6

    Yashpal Yadav, Madan singh , Vikas Kumar
    165
    214
  • Design of Advance and Robust Vehicle Security System with Accident Monitoring

    Mohammed Shakeeb Ahmed Syed Gilani Pasha
    152
    247
  • Shortest Path Detection among the Clustering Nodes

    B. Jaya Lakshmi .
    130
    195
  • Privacy Secured and Share with the Destination in Cloud

    P.Veneela , S.Vikram Phaneendra
    139
    201
  • Arduino based real time driver drowsiness detection and mobile alert system using bluetooth

    Lestin Jills Joseph Dr. Lokesha .M
    1848
    506
  • An Aggressive Scheme for Identifying Replicas in Limited Time

    K.V. Yasodha
    135
    219
  • Cluster Based Data Dissemination Protocol In VANET

    Garima Dhawan, Shilpa Nagpal
    224
    213
  • A Review on Removal of Salt And Pepper Noise From Digital Images

    Kanhaiya, Mr. Paruraj
    163
    221
  • Advanced Audio Compression For Lossless Audio Coding Using Ieee 1857.2

    Fomazou N. Auristin, Samadhan D. Mali
    202
    279
  • Ensuring Security to Data on Cloud using Cryptography

    Sabeena SK ,N Praveena ,Soumen Kumar Roy
    139
    210
  • Investigation on Microstructure and Mechanical Properties of Aluminum reinforced with MWCNT and Nano-SiC

    Pritam Wagh, Dr.J.Jayakumar
    179
    212
  • A Voltage Controlled PV Inverter for Certs Microgrid Applications

    T Sateesh , P Bapaiah
    159
    218
  • Trust Certificate Based Cluster Head Misbehaviour Detection And Isolation In Mobile Ad Hoc Networks

    R. Murugan and L. Senbagamalar
    154
    203
  • Comparative Analysis DWT and DFT Using Various Modulation Approaches to Improve BER Performance

    Bairagoni Rajinikanth ,K.V. Murali Mohan
    161
    200
  • Implementation of Fault Tolerant Filter Based On Error Correction Codes for Digital Applications

    Chilagani Sai Bhagath , Palaka Suresh
    163
    196
  • Enhanced MODLEACH Using Effective Energy Utilization Technique For Wireless Sensor Network

    Priyanka, Navjeet saini Sukhbeer singh
    127
    190
  • Big Data Processing Using Hadoop in Retail Domain G

    Goddilla NagarjunaReddy ,M.V.Jagannatha Reddy
    169
    243
  • Common Fixed Point Theorem Satisfying Implicit Relation On Menger Space.

    Dr. M Ramana Reddy .
    121
    202
  • Impact of Using E-learning Skills by Academic Staff Members in their Teaching at Some Saudi Universities

    Dr. Mishal. Okla. Al-Shammari,
    152
    212
  • Phishing Detection in Websites Using Neural Networks and Firefly

    Swetha Babu K.P, Dr.Radha Damodaram
    142
    238
  • Time and Cost Effective Web Testing on AWS

    Rajeshri Sonwane ,Manisha M. Mali
    136
    186
  • Risk Perception And Behavior Using In Mobile Security

    Dr.M.Sornamageswari , C.Bathma
    138
    211
  • Mobile Security Awareness Efforts On User Behavior

    Dr.M.Sornamageswari , C.Bathma
    157
    203
  • A Novel Metrics Based Technique for Code Clone Detection

    Sushma , Jai Bhagwan
    150
    327