Vol. 4 No. 07 (2015)

Published: 2018-01-02

Articles

  • Impacts of Television Serials on Tamil Rural Women: A Data Mining Case Study of Theni District

    K. Sujitha, R. Shantha Mary Joshitta, B. Nivetha,
    303
    321
  • A Novel Ber Analysis Approach For Different Modulation Schemes For Conventional And Wavelet Based Ofdm System

    Rakesh Pathak (PG Scholar) k.Narender M.tech, Dr. B.R.Vikram Ph.D,
    298
    242
  • Increasing Coverage in Wireless Mesh Networks: Mobile mesh networks

    F Mr. Basavantraya, Mr. Kiranbabu T S,
    397
    244
  • Cloud and Virtualization: Interdependency

    Anu Gupta, Dr. R.B.Garg,
    347
    280
  • To Automate the Services Life Cycle of Cloud Using Semantic Technologies

    N.Sunanda, M.Naresh Babu,
    325
    236
  • Web Based Spatial Query System for Decision Making

    Alfisha Khan, Vinod M Bothale , K.Subba Reddy,
    342
    285
  • Event Detection in Twitter Using Mentioning Practice of the User

    Chaitra , M,
    239
    260
  • Predicting Patterns over Protein Sequences Using Apriori Algorithm

    Savitri , Dhumale,
    362
    319
  • Secure Transmission of Data Using DNA Technology

    Soumya V. , Vastrad,
    330
    274
  • Lung Cancer Identification Using CT Images

    Sunanda Biradar Kavya Agalatakatti,, Sunanda Biradar Kavya Agalatakatti,
    324
    278
  • Improved Gradient & Multiple Selection Based Sorted Switching Median Filter

    Kanchan Bali Er. Prabhpreet Kaur,
    280
    279
  • Wavelet based denoising of brain MRI images

    Sujata Desai, Lubna.M.Kazi,
    288
    264
  • Cloud ‘As -a- Service

    Anu Gupta,
    319
    250
  • Design And Development Of Algorithm To Avoid Wormhole Attacks In Wireless Networks For Proactive Algorithms

    Deepika D, Pai,
    397
    246
  • A Feasible Approach to Design a Cmos Domino Circuit at Low Power VLSI Application Design

    Pallavi Sharma, Dr Subodh Wariya,
    290
    245
  • Design Of Energy-Efficient Clustering Algorithm for Large Scale Wireless Sensor Networks

    Sridevi H N, C K Raju,
    313
    247
  • Design of Wireless Variable Gesture Control For Mobile Devices

    1Ch.Supriya, R.Prashanthi, M.Tech
    319
    255
  • ARM Based Application Of Data Hiding Process By Using Anti Forensics Technique For Authentication

    K. Jaswanthi, J. Amarendra, M.Tech(ph.d)
    286
    249
  • Quality Of Experience In Remote Virtual Desktop Services

    P.Lakshmi, S.Himabindu,
    330
    302
  • Kindiling And Perception Of Qr-Images Using Raspberry-PI

    1P.V.Vinod Kumar, K.Dhanunjaya, M.Tech
    352
    237
  • Text Mining using Ontology based Similarity Measure

    Atiya Kazi, D.T.Kurian,
    246
    191
  • Exploiting a Protocol at network frame to avoid packet failure

    Ms.Jayashree Yadannavar, Ms.Chandrakala Patil
    343
    242
  • Minimizing Time Complexity based on Parallel Processing using RNS for Audio

    Divya Jennifer Dsouza, Radhakrishna Dodmane,
    322
    259
  • Design of An Efficient Aging-Aware Reliable Multiplier Based On Adaptive Hold Logic

    T. Shireesha, P.P. Nagaraja Rao,
    325
    250
  • AID for Narcolepsy People

    S.Arunodhayan, S.Srivatsan, B.Sumathy,
    368
    243
  • Spectral _Spatial Classification For Hyper Spectral Images Based On An Effective Extended Random Walker

    P.Sreevani, Prof.B. Abdul Rahim, Fahimuddin.Shaik,
    354
    252
  • Spray Forming of Al-10Si-20Pb, Al-10Si-20Sn and Al-20Sn alloy: A Comparative study of their microstructure and wear characteristics

    Mallikarjuna Pujar, Dr.G.B.Rudrakshi,
    344
    247
  • Comparative analysis of Statistical Parameters of Finger Knuckle in Digital Image Processing

    Er. Mahak kukreja, Er. Alankrtia Aggarwal,
    278
    236
  • Comparative analysis of Statistical Parameters of Finger Knuckle in Digital Image Processing

    Azmath Akheela, Hina Naz,
    264
    244
  • Performance Evaluation of LMS, DLMS and TVLMS Digital Adaptive FIR filters by using MATLAB

    Ashwini Ramteke , Prof. N.P.Bodane
    379
    281
  • Reactive Power Compensation In Distribution Systems Using SAPF

    Mandeep Paposa, Mr. Shailendra Kumar Verma
    297
    239
  • Cloud-Computing: A milestone in Information Technology

    Kumari Seema Rani ,
    436
    266
  • Design of Query Recommendation System using Clustering & Rank Updater

    Priyanka Rani, Mrs. Annu Mor
    244
    238
  • Abnormality Detection in Kidney Ultrasound Imaging

    Prema T. Akkasalgar Shruti S. karakalmani
    340
    240
  • Simulation Of High Voltage Gain Boost Converter For Battery Charging With PV System In A Single Stage Conversion

    Praneetha Tummala, Amarendra Alluri
    297
    233
  • Acoustic Analysis of voice samples to differentiate Healthy and Asthmatic persons

    Khushboo Batra , Swati Bhasin , Amandeep Singh
    406
    349
  • Pitch, Formant Frequencies, Intensities as Speech Cue to preceived age

    Tarunam Chaudhary Sawati Bhasin, Saloni
    273
    266
  • Running Costminimization Of An Electric Power Sector

    Osita Oputa .
    307
    220
  • Implementation of ERP module for the key processes of hull production in shipbuilding industry

    Kairav Bhatt .
    367
    236
  • Duplicate Detection In Hierarchical XML Multimedia Data Using Improved Multidup Method

    Prof. Pramod. B. Gosavi Mrs. M. A. Patel
    321
    229
  • Multidomain Optimised Hidden Web Crawler

    Khushboo Gupta , Ankush Goyal
    118
    205
  • On Improving Side channel Attack defence mechanism using ECPM technique under Elliptic curve Cryptography

    Mrs. Sweta Nigam, Mr. K.N. Hande
    167
    208
  • To Study the Nonlinear Effects Related To PAPR and PAS in Wireless System

    Rajvansh Sehamby , Dr. Jyoteesh Malhotra
    145
    211
  • Optimized Distributed Association Mining (ODAM) Algorithm for detecting Web Robots

    Akshata Dilip Jagtap, Prof. Vijayalaxmi Kadroli
    164
    204
  • Classification of underwater objects using acoustic techniques

    Pooja Gavande Dr. R.S. Kawitkar, , M. Selva Balan
    148
    218
  • A Survey of Military Application of Wireless Sensor Networks For Soldiers

    Farkhonde Khakestani , Saeed balochian
    136
    211
  • Recognition Of Indian Currency Note Using Grid Technique

    Sneha Talikoti1 , Prof S.S.Panchal
    248
    233
  • WSN Based Cluster Head Fault Tolerance Mechanism

    J.Rajprabaharan .
    130
    202
  • Information Security with the help of MLMS and HLSB

    Ms. Ekata S. Bele, Prof. Chetan Bawankar
    159
    184
  • An Efficient Denial-of-Service Attack Detection System Based on Multivariate Correlation Analysis

    Binil Anto Thampi C., Syed Farook K.
    128
    206
  • Enhance Distribution of Load in Cloud

    Rashi Saxena, Tarun Gupta
    145
    208
  • Bank Cheque Identification and Classification using ANN

    Savita Biradar , S.S.Panchal
    170
    227
  • Survey of Routing Protocols in MANET

    Tejeswara Raju V Vineeth V , Sneha R, Suhas Chadha
    141
    230
  • Design Of Embedded Virtual System By Using Human Machine Interaction (HMI)

    Tiyyagura. Sneha , M. Kezia Aruna Jyoth
    140
    242
  • Optimization Of Cmos Circuits By Using Quaternary Logic LUT

    V.Narasimhulu, K.V. Bhanu Prasanth, C.Md.Aslam
    142
    184
  • A Review on Annotation Process

    Sabna N S, Jayalekshmi S
    152
    202
  • Detection and Prevention of Black Hole & Gray hole attack in MANET using Digital signature Techniques

    Monika , Swati Gupta
    163
    216
  • Assessing Version Consistency by Identifying systematic Code Changes during Runtime

    P.Swapna Shankar , P.Niranjan, P.Shireesha
    147
    202
  • Offline Signature Identification Using Adaptive Window Position Technique

    Chaitra Kulkarni .
    156
    196
  • Cloud Database Storage Model by Using Key-as-a-Service (KaaS)

    J.Sivaiah , Dr.K.Venkataramana
    142
    196
  • Smart Home System Control Using GSM

    A.C.Kaveri, T.Jyothi
    142
    207
  • Review of Evolutionary Optimization Algorithms for Test Case Minimization

    Aditya Vikram Sharma .
    140
    215
  • Investigation of The Effect Of Water-Cement Ratio On The Modulus Of Rupture Of Concrete

    Onwuka. D. Oa, Awodiji C.T.Gb and Onwuka, S.U
    157
    213
  • An effective Research Paper Recommender System based on Subspace Clustering

    K. Naga Neeraja, Dr. B. Prajna
    168
    226
  • Improving Classification Accuracy Using Weighted Multiple Regression

    Sonali S. Salunke, Swati Deshpande
    151
    209
  • Probabilistic Determination of Class for an Unbalanced Dataset

    Samadhan B. Patil, Vaishali Ghate Dhanashree Tarodmalle
    122
    209
  • Comparitive Analysis of Watermarking in Digital Images Using 3-Level DWT & LBP

    Jyoti Joshi , Pawan Kumar Mishra
    121
    195
  • Social Group-Based Routing in Delay Tolerant Networks using Fuzzy Logic

    Shadha K., Sherikh K. K.
    144
    214
  • Ant Colony Optimization Algorithm for Software Project Scheduling Using Critical Chain Project Management

    Haseeba N, Sajeer K.
    165
    222
  • A Fast and Efficient RBTRC-MAC Protocol for Event-Driven Wireless Sensor Networks

    Hasna P., Annes Philip
    139
    217
  • A Review on image compression technique

    Er. Sonia Er. Jujhar Singh
    144
    235
  • Enhancing Security of MANETs by Implementing Elliptical Curve based Threshold Cryptography

    Ms. Bhavna Sharma , Mrs Vandana Madaan
    186
    208
  • Establishing a Multi-Application ADHOC Network for Smart city Design

    M.Annapurna , S.Himabindu
    154
    177
  • Efficient Design Of Binary Adders Using Cellular Automata

    G.Divya, Mr. S.Venkata Kiran
    164
    208
  • Comparative Study of Various Scheduling Algorithms in Cloud Computing

    Kavyasri M N, Dr. Ramesh B
    162
    222
  • Programmable Direct Memory Access Controller Design Using Advanced High Performance Bus Protocol

    Ms. Sarojini Hoogar S, Mrs. Sapna M K
    152
    592
  • Implementation of FPGA Architecture for OFDM-SDR with an optimized Direct Digital Frequency Synthesizer

    Aluru Koteswara Rao, A.Anasuyamma, M.Tech
    144
    225
  • Design and FPGA-Based Implementation of A High Performance 64-Bit DSP Processor

    Jadapalli Pavani, K.Dhanunjaya(phd)
    208
    270
  • An Efficient FPGA Implementation Of Multifunction Residue Architectures

    Chembeti silpa, G.Mukesh,, M.Tech
    158
    207
  • Optimized Analytical Study to Show the Impact of CFO on the Performance of LTE Uplink

    Punugoti Asritha .
    160
    208
  • Evaluation of Energy Efficient Low Power Listening MAC Protocols in WSN

    Komaldeep Kaur, Dr. Jyoteesh Malhotra
    167
    211
  • Review on Security Issues of SaaS Clouds

    Ritesh Mahendra Ahire Prof.Ganesh Kadam
    155
    219
  • A Fast and Reliable Tree based Proactive Source Routing in Mobile Adhoc Network

    1Haseena M. K., Annes Philip.
    134
    223
  • A Survey on Techniques of Critical Infrastructure Monitoring

    Madhuri Unde, Borkar Bharat
    129
    204
  • Dealing With Concept Drifts In Process Mining Using Event Logs

    Maddu. Uma Lavanya , Mr. Sunil Kumar Talluri
    164
    219
  • Challenges of Big Data: Current Analysis

    Mr. A. Jamaludeen Mr. C. Senthil Kumaran Ms. R. Suriya
    160
    209
  • A Study on Weibull Distribution for Estimating the Reliability

    Dr. P. K. Suri , Parul Raheja
    221
    444
  • Cost Effective Method for Detecting Clone Nodes in Wireless Sensor Network

    Dilna V., Sajitha M.
    139
    202
  • EBHEAL: Distributed and Localized Mechanism for Coverage Hole Detection and Healing

    Soumya P. V., Shreeja R.
    150
    200
  • Anonymous Routing Protocols in MANETs - A Survey

    Sethulekshmi C G, Manoj Kumar G
    1993
    255
  • Contrast Enhancement Detection on Digital Images - A Survey

    Geethu N Nadh, Sreelatha S.H
    115
    203
  • Video Compression – from Fundamentals to H.264 and H.265 Standards

    Sruthi S, Dr. Shreelekshmi R
    136
    281
  • Model for User’s Trust in Cloud Service Providers in Cloud Environment

    Kavita Rathi, Sudesh Kumari
    122
    203
  • Effects On Human Cells Due To RF And Electromagnetic Field

    V. S. Nimbalkar .
    138
    199
  • Comparative Analysis of Different Technique for Detection of Noise in Restored Image

    Puneet Kaushik Mridul Chawla * Gyanender Kumar
    153
    229
  • A Survey over Various Variants of RS and Similar Cryptography Techniques

    Pramila Patidar Namrata Sharma
    134
    203
  • A Novel Approach for Enhancing Security of MANET Using Trust Based Method

    1Shabana M. L., Anil K. Jacob
    122
    209
  • Using Genetic Algorithm For Optimization Of Mobile Agent In Wireless Sensor Network: A Survey

    Harveen Kaur, Mandeep Singh Sra
    125
    187
  • Implementation of Systematic Error Correcting Codes for Matching Of Data Encoded

    Amala A , Jasmine M
    151
    225
  • Breast Cancer Using KMSVM Techniques In Wisconsin Detect Prognostic Breast Cancer Data Sets

    D. Rajakumari, C. Jayanthi
    131
    204
  • A Novel Human Opinion Dynamics Based Optimization for Software Cost Estimation

    Kriti Changle, Nisha Singh Sumit Kumar Bola
    113
    205
  • An High Equipped Data Hiding Algorithm Based On Secret Fragment Visible Mosaic Images And Pixel Color Transformations For Secure Image Transmission

    Pathan Mohd Aziz Khan .Praveen Kumar M.Tech Hod
    157
    193
  • An High Equipped Power Constrained Algorithm For OLEDS Based On MSR

    Dayaker S Yakub M.Tech
    110
    213
  • Downloading and performance analyzing of WMV and MPEG files in Cloud Computing.

    Manoj Kumar Tiwari .
    153
    195
  • M-Commerce: A Revolution in E-Business

    Kumari Seema Rani Pratibha Yadav
    488
    249
  • Experimental design of adaptive algorithms to reduce SER in M-ary QAM System

    Preetika Gupta , Ankur Singhal
    127
    205
  • Online Community of Open Code Development Project

    Rehan Khan .
    129
    190
  • Text Watermarking Approaches for Copyright Protection

    Gagandeep kaur, Sukhwinderbir .
    134
    189
  • DDR3 Based Lookup Circuit For High Performance Network Processing

    C.Jayachandra , Vali Babu
    146
    222
  • “Study of Performance Enhancement and Optimizing Various Parameters of Lateral IMOS”

    Mr.Hira lal Dhruw Mr.Ravi Mohan , Mr.Divyanshu Rao
    142
    224
  • A Study on Various Image Segmentation Techniques: Merits and Demerits

    Abin Jose Joy, Meenu K Mathew
    148
    228
  • Efficient Authentication Technique Based On Virtual Password

    1Sufyan Panginikkadan ,Zainul Abid T.P.
    129
    202
  • Information Retrieval

    Mukta Airon .
    128
    216
  • A Controlled Approach for Multicast Routing Protocol Using Branching Router

    Anishma N , Sajitha M
    166
    234
  • Implementation Of Clock Gating Logic By Matching Factored Forms

    A.kirankumari, P.P. Nagaraja Rao
    190
    198
  • “Dynamic Soil Structure Interaction Analysis for Piled Raft Foundation”

    Chaithra T P, Manogna H N
    156
    260
  • Group Authentication Using Threshold Secret Sharing

    1Parvathy Sudheer Zainul Abid T. P
    142
    190
  • Study of Software Quality and Risk Estimation and Quality Cost Analysis using empirical study

    Dr. P. K. Suri , Pooja
    132
    292
  • Efficient Publish/Subscribe System Using Identity Based Encryption

    Prathyusha M. Kumar., Mumthas T.K.
    116
    196
  • Scalable and Efficient Data acquisition in Service Oriented Vehicular Adhoc Networks

    Nishi K.M. , Indu P
    145
    201
  • Survey on String Transformation - A Query Based Approach

    Shijina J Salim , Diliya M Khan
    159
    292