Vol. 3 No. 06 (2014)

Published: 2014-06-28

Articles

  • Novel Cache Replacement Algorithm

    Namrata Dafre, Deepak Kapgate
    175
    224
  • Design and Analysis of Integrated Electronic Ballast for HID Lamps Featuring HPF

    M Vijay Shanthil, Dr M Sushama
    204
    235
  • Review paper on securing the PKI using the ECDS

    Sheetal sharma , Harwant Singh Arri
    179
    212
  • Data dissemination Issue and protocol in WSN a survey

    Savita Saini, Arvind Kumar
    177
    208
  • Generation Of A Scenic Image By Tacking Multiple Images

    G R Suma , Dr. V.Venkatesh
    201
    226
  • ENHANCING SECURITY IN PALM PRINT RECOGNITION SYSTEMS USING ENCRYPTION ALGORITHMS

    Shikha Wadhwa, Monika Malhotra
    159
    198
  • Vibration Analysis of Smart Beam

    J. R. Chaudhari, Dr. C. R. Patil
    152
    209
  • Water Quality Prediction Using Data Mining techniques: A Survey

    Shoba G, Dr. Shobha G
    223
    255
  • Design of 2.5 GHz Phase locked loop using 32nm CMOS technology.

    Miss.A.V.Manwatkar, Assistant Prof.V.B.Padole
    167
    230
  • Analysis and comparison of various edge detection technique

    Ashish Chaudhary, Mr. Sahil Raheja, Mayank Pandey
    214
    275
  • Assessment of the Effects of Surface And Subsurface Moisture On ADO-AFAO Road Pavement Failure In Ekiti-State, Nigeria

    Abe, O.E., Olulope, O.R
    174
    247
  • Friction Stir Welding – Process Parameters and its Variables: A Review

    G.C.Jadhav, R.S.Dalu
    231
    443
  • Comparative Evaluation of Wireless Ad-Hoc Networks Routing Approach

    Singh Shalini , Rajpoot Jyoti
    172
    204
  • Effective Resource Management Based on Flexible Workload Technique in Cloud

    V.RakeshDevi M.E.
    191
    215
  • E-Learning Training of Teachers

    V. Krishnamurthy, Nilima Bargal, Kirti Bhakkad
    192
    225
  • Analysis of Three Level Diode Clamped Multilevel Fed Induction Motor Drive

    Sadhana pandey, Sulochana Wadhwani, Praveen Bansal
    182
    435
  • Tamper Detection in Database using Forensic Analysis

    Suraj Dhanawe, D.B Hanchate
    156
    198
  • A Combine Approach of Compression And Encryption For Image Transmission

    Suchitra Dubey
    150
    199
  • DNA Samples Processing Using Dry Block Heating System

    Pratima Bhalerao, Sharad Jogdand
    192
    211
  • Importance of String Matching in Real World Problems

    Kapil Kumar Soni, Rohit Vyas, Amit Sinhal
    1701
    279
  • A survey on Filtering Annoying Posts From OSN User Walls

    Ms. Sonali M. Khairnar, Prof. Sanchika Bajpai, Shital Salve, Vijayshri Ingale
    188
    217
  • Enhancement of lifetime using different Protocols in wireless sensor network

    Amandeep Kaur, Jatinder Singh
    143
    193
  • Layer Based Secure Data Aggregation for Wireless Sensor Network

    Deepitha, Manjunath C.R
    157
    196
  • Comparative Analysis of Various Fingerprint Image Enhancement Algorithms

    Navjot Kaur, Gagandeep Singh, Sahil Vashist
    161
    187
  • Implementation of Neural Network based Hand Gesture Recognition System

    Neha V. Tavari, Prof. A. V. Deorankar
    177
    202
  • Proposed Algorithm for HCRUsing K-Means Clustering Algorithm

    Meha Mathur, Anil Saroliya, Varun Sharma
    190
    220
  • Advance Encryption Standard implementation

    Sher jung , Shikha Kumari, Gagan Thakral
    195
    203
  • Intelligent Course Timetable Scheduling Using Memetics

    Pooja Ghadiali, Prachi Mehta, Sachin Nagda, Dharit Shah, Prof. Purva Raut, Prof. Anuja Nagare
    156
    194
  • RIAs AT ODDs WITH SEOs?

    Baiju A S
    171
    224
  • Performance Analysis of Routing Protocols in Vehicular Ad Hoc Networks for Cbr Applications Over Udp Connections

    Parul Gupta, Yogesh Chaba
    201
    217
  • Analysis of Performance for Data Center under for Private Cloud through Cloud Computing

    Ankush Dhiman, Mauli Joshi
    208
    224
  • Design and fabrication of low cost intelligent wheelchair

    Pradeep Kumar Rattewal, Parteek Kumar
    200
    216
  • Distributed Segment Tree Using MapReduce

    Seyed Vahid Sanei Mehri, Ehsan Akhtarkavan, Saeed Erfanian
    188
    223
  • A Genetic Algorithm Approach for Clustering

    Mamta Mor, Poonam Gupta, Priyanka Sharma
    169
    200
  • Enhancement of Blur Detection for Digital Images using Circular Averaging Filter

    Landge Rupali Yashwant, Rakesh Sharma
    155
    162
  • Role of Fault Current Limiter in Power System Network

    Poornima G P., Yashaswini T2 Kavitha K.M, T.R.Narasimhegowd
    212
    222
  • An Effective Algorithm For Image Compression Using SCWP

    Mrs. Malashree G, Mrs.Rehna V J
    192
    213
  • Study of Perfect Difference Network: Review

    Ms. Jyotsana Nandagaoli, Dr.Jagdish W.Bakal
    168
    193
  • Image compression using Thresholding Techniques

    Meenakshi Sharma, Priyanka Mangla
    160
    182
  • Consortium based Biosurfactant development for degradation and emulsification of oils and Petroleum Hydrocarbons

    Jyotsna Kiran Peter, Abhishek Kumar Rao, Ritu Kumari
    215
    0
  • Design and simulation of dual stacked microstrip patch antenna used in wireless communication

    Ayushi Aggarwal, Sarika Khurana, Wazir
    152
    185
  • GOOD PAYLOAD DEFORMATION FOR REVERSIBLE DATA HIDING IN MILITARY AND MEDICAL APPLCATION

    Pavithrra.S, Regina.B
    133
    170
  • Islanding Detection Analysis in Wind Turbine Units Based On Voltage, Frequency and Negative Sequence Components

    Shwetha C , kavitha K. M , Satyanarayan rao R.D
    107
    193
  • Implementation of Unsupervised Clustering Using Geometric Approach

    Ms. Ayushi Laud, Prof. Ritesh Shah
    125
    185
  • Near Field Communication for Transferring Files between Pair of Supported Devices

    Mr. Pritesh Upadhyaya, Ms. Foram Gandhi
    121
    167
  • Novel Technique to Detect and Isolate Black hole Attack in MANET

    Barleen Shinh
    135
    183
  • Rushing attack prevention algorithm for manet using random route selection to make DSR and AODV more efficient

    Aakanksha Jain, Dr. Samidha Dwivedi Sharma
    119
    162
  • Determining K-most demanding products using data mining technique

    Sonal K. Bang, Prof. P. N. Kalavadekar
    121
    164
  • Issues and Challenges in Simulation and Modeling

    Miss.M.V.Mawale, Dr. Vinay Chavan
    136
    267
  • SPIHT ALGORITHM BASED COLOR IMAGE COMPRESSION

    Mrs. Pimpalshende A.N
    136
    183
  • Development of Image Processing Algorithm for Array processor

    Sangeeta C. Vetal , Prof. A.S. Shirsat
    134
    174
  • A Review on Multiband OFDM Based UWB System

    Jaspreet kaur, P.S. Sharma
    109
    206
  • Analysis of Load Flow Study Using Pso And Compensate The System Using Facts Device

    Sushil Kumar, Seraj Ahmad , Aziz Ahmad
    138
    186
  • To Enhance the Biometric Image using Binarization

    Harpreet Kaur, Aashima Bansal
    122
    177
  • A Smart Energy Efficient Scheme for Dynamic Clustering in Wireless Sensor Network using Neural Networks

    Sandeep Dhillon, Amandeep Singh
    138
    145
  • Analysis on Emotional Intelligence Among Telecom Employees

    Dr. Vikas Sharma, Rakesh Chib
    221
    183
  • Design and implementation of High performance Bus Architecture using FPGA

    Muhammed Asharaf.T.P, Manu Ramesh, Sankarnarayana Bhat.M
    239
    200
  • Soft Computing Techniques ABC, IABC and SFL Optimization Algorithms for 15 Unit Thermal Generating Systems

    Mr. Ram Kumar Denjare, Mr. Amit goswami
    145
    171
  • Performance Analysis of Mesh, Torus and Folded Torus under Broadcasting, using Distance Vector Algorithm

    Pradeep Kumar Keshwani, Ravi Sankar Shukla, Apurva Agarwal
    171
    220
  • Constraint Satisfaction Algorithm to Improve Energy Loss & Ber for Indoor Mobile Network

    Monika Rani, Mrs. Tulika Das
    148
    183
  • Wavelet-Based Image Compression and its Application

    Prerna Maheshwari, Pooja Chaturvedi
    121
    179
  • Tracking Algorithm for Augmented Reality System

    Mayank Pandey, Dr. Manoj Wadhwa , Ms. Prabha Nair
    134
    168
  • Critical Analysis of Various Parallel Scheduling Algorithms

    Shreya Sharma
    125
    173
  • A Pattern Recognition System To Improve Quality Assurance For Manufacturing Industries Using Image Processing

    Madhu Thapa
    142
    183
  • A Review paper on compressive modulation in digital communication using OFDM

    Lokendra Singh, Anuj Sharma
    124
    169
  • Android Based Patient Critical Health Monitoring and Notification System

    Yashashwini Mathad, Sandeep Karnam
    127
    169
  • PID-Controllers Tuning Optimization with PSO Algorithm for Nonlinear Gantry Crane System

    Diep D.V., Khoa V.V
    217
    198
  • Gauss Legendre Quadrature Formulas for Polygons Using an All Quadrilateral Finite Element Mesh of Triangular Surfaces

    H. T. Rathod, K.V.Vijayakumar, A. S. Hariprasad
    143
    187
  • Fuzzy Based Efficient Routing Protocol For Route Recovery In MANET

    Ritu Dahiya, Ajay Dureja
    126
    178
  • Performance Analysis of RSA Algorithm Using Elliptic Curve Cryptography, Diffie Hellman And OAEP

    Neha Garg, Partibha Yadav
    159
    182
  • Remote Client Administration

    Vinay R, Sandeep Karanam
    145
    169
  • Hosting Files Using Android Web Server

    K.Siva Kumar , M.Srikanth , T.Anusha
    132
    189
  • Reducing Routing Overhead In MANET Using NCPR

    Mattapati RenukaDevi, Stevenraj.N
    117
    183
  • Trust Decision Making Scheme for Wireless Sensor Networks

    Veena A, Kavyashree S C
    136
    177
  • A Reduced Switch Count Dual Output Single Phase Inverter

    Parikshit Bajpai, Amita mahor, Rahul Arora
    131
    183
  • Reduction Of Ground Current In A Transformerless Photo Voltic Inverter Connected To Grid

    Arvind Jain, Amita Mahor, Rahul Arora
    114
    169
  • Application of Data Mining Techniques on Software Engineering Data for Software Quality

    Pooja Arora
    117
    164
  • Avoid personal data presumption attacks on social networks

    T. Swetha, V. Balaji, P.Nirupama
    116
    184
  • Fault Removal Effectiveness On Software Requirements Specification Using Non-Preemptive Relocation Technique

    R. Saranya
    130
    199
  • Black Hole Attack Prevention Techniques in MANET: A Review

    Deepak Mishra, Mr. Srinivas Arukonda
    130
    174
  • Web Usage Behavior and Navigational Structure mining

    Mr.Sujeet Kumar Tiwari, Mrs. Neelu Tiwari
    109
    169
  • Review on Software Testing Metrics

    Ms. Neha Thapar , Mr. Anil K Mishra
    117
    187
  • Effect of Voltage on Metallic Particle Movement in 3φ Pahse Gas Insulated Busduct Using Analytical Method, Fem & Csm

    A. Giriprasad, J.Amarnath, PoonamUpadhyay
    123
    189
  • Research Work on Network Intrusion Detection Using Artificial Immune System

    Vijeta, Mr. Vivek Sharma
    118
    168
  • Effectiveness of Power flow by Shunt Compensation on Power Transmission

    Mr.Arvind A.Agane, Prof. Sunil K. Patil
    163
    200
  • Image Segmentation Using Modified K- Means Algorithm and JSEG Method

    Amritpal Kaur, Dr.Yogeshwar Randhawa
    145
    181
  • Brief overview of VANET routing protocols and their security attacks

    S.I.S.Jaffarvalli, D.Ganesh
    153
    177
  • Data Hiding using difference between adjacent pixels and bit plane swapping

    Shalini Singh, Satakshi Sharma
    134
    185
  • A Dual Sink Based Bubbling Mechanism for Clusters

    Indu, Sunita Bhardwaj
    134
    175
  • Energy Adaptive Approach for Node Inclusion and Exclusion in Dynamic Clustered WSN

    Ranjita joon, Dr. MD Yusuf Mulge
    125
    170
  • Human Gait Identification using Depth Gradient Histogram Energy Image

    Sonal N. Kharecha, C. Nandini
    124
    163
  • Mobile Tourism Application BasedOn Situation Awareness

    Ms. Komal M. Dhule , Prof. R. V. Shahabade
    108
    181
  • Adaptive Energy Optimized Minimum Hop Routing In Sensor Network

    Neha gupta, Dr. Md. Yusuf Mulge
    96
    164
  • An Improved Approach of Digital Watermarking in Frequency Domain

    Kirti, Vikram Nandal
    111
    151
  • Route Trace Reduction Based Leader Election Approach to Improve Communication in Mobile WSN

    Seema Balhara, Kavita Khanna
    119
    170
  • Distinctive Multipath Based Data Chunk Sequencing Scheme

    Jyoti Chhikara, Sunita Dixit
    135
    186
  • A Review of Reliable Multipath Routing Techniques

    Arjun Solanki, Ms. Pooja Jain
    137
    170