Vol. 4 No. 12 (2015)

Published: 2018-01-03

Articles

  • STUDY ON ENSURING DATA STORAGE SECURITY SYSTEM IN CLOUD COMPUTING SERVICE

    K.. Kavitha
    281
    243
  • Artifact Reduction For Visually Challenged

    Dr. B. Jai Shankar ,Mr.K.Siddharth Raju, Mr.M.Santhanaraj , Mr.S.Balamurali
    234
    260
  • Design Patterns’ Model for Application Development in Object Oriented Languages

    Gaurav Pradip Pande , Akshay Janardan Mendki
    243
    278
  • A Study on Chaos-Based System for Improved Encryption of Images

    Kukoo Anna Mathew
    264
    257
  • Development of an Efficient Hand Gesture Recognition system for human computer interaction

    Umadevi N, Divyasree I.R
    261
    251
  • Performance Measures for a three-unit compact circuit

    Ashish Namdeo ,V.K. Pathak , Anil Tiwari
    243
    284
  • A Survey on Different IP Traceback Techniques for finding The Location of Spoofers

    Amruta Kokate, Prof.Pramod Patil
    284
    290
  • A Generic Computer Tool for the Solution of Fluid Flow Problems: Case Study of a Thermal Radiative Flow of an Optically Thick Gray Gas in the Presence of Indirect Natural Convection

    Bachir Moussa Idi, Harouna Naroua, Rabé Badé
    236
    258
  • Vibrant Rule Base Erection and Continuance plot for Ailment Profecy

    Ms. M. Mythili , Mr. A.P.V.Raghavendra
    250
    247
  • Design Of Tunable Method Of PID Controller For Integrating Process

    J.Nivetha, V.Vijayan, S.Devakumar, C.Selvakumar, R.C.Panda
    286
    285
  • Proficient Pattern Selection for Supervised Tagging

    A.P.V.Raghavendra, I.Vasudevan, M.SenthilKumar
    241
    281
  • Banking Expert System”With credit card fraud detection using HMM algorithm

    Priya Ravindra Shimpi, Prof. Vijayalaxmi Kadroli
    293
    295
  • Strict Privacy With Enhanced Utility Preservation By N, T Closeness Through Microaggregation

    Ms.S.Nathiya , Mr. U.Gowrisankar , Ms. P.Jayapriya
    242
    291
  • Review of Efficient Routing In Delay Tolerant Network

    Sonia Kumari, Pratibha Yadav, Manvendra Yadav
    240
    263
  • Review on Automated Text Summarizer using Top K-Rules

    Ms.Priya J.Patel, Professor.Pravin G.Kulurkar
    234
    278
  • Study On Cardiovascular Disease Classification Using Machine Learning Approaches

    R. Subha
    235
    304
  • Map-based Multi-source Message Passing Model to find Betweenness Centrality using MapReduce

    Nikhitha Cyril, Arun Soman
    261
    271
  • NSCT DOMAIN BASED MULTIMODAL MEDICAL IMAGE FUSION APPROACH BASED ON PHASE CONGRUENCY AND DIRECTIVE CONTRAST

    SUDHEER BABU NITTA, PG Scholar [DECS] N.ANIL, M.Tech
    201
    254
  • Papr Reduction And Companding Distortion Mitigation By Piecewise Linear Companding

    Kalluri Ravi Kumar, K.V.Acharyulu
    269
    267
  • Syntactic Error Correction System

    A.D.Shah, A.D.Shah,L.D’mello
    220
    322
  • A New Digital Video Quality Enhancement Approach Based On Generalized Histogram Equalization Model

    Ramjee.Pinipe , K.V.Acharyulu
    238
    265
  • A Dual System Capture Biometric Fingerprint Scanner

    Oduah, Uzoma Ifeanyi (Dr.), Yang Wu
    287
    263
  • Refocusing Computer Engineering and Computer Sciences in Educational Institutions For Economic Sustainability And Local Input Contents Of Computer And Mobile Phones In Nigeria

    Yekini N. Asafe, Adebari F. Adebayo, Aigbokhan E. Edwin
    221
    256
  • Model For Spectral Classification

    S.R.Gedam, Dr R.A. Ingolikar
    222
    257
  • Concepts Of Serious Game In Education

    Dr. Aso Mohammad Darwesh
    241
    300
  • Power Aware and Energy Efficient Multipath Routing Scheme for WSNs

    Dr.S.Saira Banu, J.Shafiq Mansoor
    213
    227
  • Design and Implementation of UART using Verilog

    Kavyashree S
    618
    748
  • Performance Analysis in Dynamic Social Networks

    Sonia Kumari, Pratibha Yadav, Manvendra Yadav
    225
    251
  • Analysis of a Semi-Markov Model for Software Reliability

    Ashish Namdeo ,V.K. Pathak, Anil Tiwari
    253
    246
  • A New Approach For Text Detection In Natural Scene Images

    Sonia Jenifer Rayen
    208
    247
  • Practical Energy Saving Techniques For Multi-Storey Office Buildings In Accra, Ghana

    Barbara SIMONS, Christian KORANTENG, Joshua AYARKWA
    230
    270
  • Http Streaming Based Ajax Player

    Hina Rani, Khushboo Bansal
    200
    259
  • Intrusion Detection Alarms Filtering System Based On Ant Clustering Approach

    Xiao-long XU, Zhong-he GAO, Li-juan HAN
    205
    244
  • The Role Of E-Learning In Producing Independent Students With Critical Thinking

    Mazen Ismaeel Ghareb , Saman Ali Mohammed
    258
    262
  • Speech Enhancement Using Modified Spectral Subtraction Algorithm

    Pinki, Sahil Gupta
    246
    242
  • Overview of Hidden Markov Model for Test-To-Speech Synthesis Methods

    Sangramsing N. Kayte , Monica Mundada
    200
    253
  • An Automated Guided Model For Integrating News Into Stock Trading Strategies

    Pallavi Parshuram Katke, Ass.Prof. B.R.Solunke
    214
    290
  • Fake Currency Verification Using Blue Pixel Region Analysis And Image Difference

    Rajarshi Paul, Dr. Sanjib Kalita
    214
    260
  • Efficient Storage of Defect Maps for Nanoscale Memory

    Md. Masud Parvez
    223
    226
  • NOVEL INDUSTRIAL WIRELESS SENSOR NETWORK FOR MACHINE CONDITION MONITORING

    LINGAMPALLY NEERAJA , B.LOKESHWARA RAO , B.SURESH RAM
    232
    257
  • DETECTION OF LICENSE PLATE NUMBER USING DYNAMIC IMAGE PROCESSING TECHNIQUE

    KUMMARI BHIKSHAPATHI , DAMA HARIBABU
    180
    218
  • An Enhanced Blue Light Emitting Diode

    Oduah, Uzoma Ifeanyi (Dr.), Yang Wu
    237
    243
  • Dos Resistant Cloud Based Secure Authentication Protocol

    Dr. Kalavathi, Ms. Y. Haritha
    160
    192
  • Speech Classification Using Mfcc, Power Spectrum And Neural Networkand.

    Mr. Ashish Gadewar, Mahesh Navale
    140
    212
  • Decision Forecast Modelling For Effective Execution Of Research Projects In R&D Labs Through Bi Models

    R.Sivakami, G.Radhakrishnan, G.Anna Poorani
    138
    246
  • Comparative Study Of Different User Authentication Schemes

    Aakansha S Wani, Komal Vanjari, Deepika Shinde ,Prof. Rajasree R.S
    163
    214
  • Design And Analysis Of Xy Positioning Table

    Mr.Sagar Patil, Prof.M.V.Kulkarni
    178
    210
  • Efficient Content Based Image Retrieval Using Combination Of Dominant-Color, Shape And Texture Features And K-Means Clustering

    Bhagyashri Amrutkar, Lokesh Singh
    155
    192
  • Prediction Search Of Topics Based On Timestamp And Interest Of Domain With Advertising

    Annamalai.R , Srikanth.JPrakash.M
    204
    210
  • Providing Multi Security In Privacy Preserving Data Mining

    s.Nathiya, c. Kuyin, j.D.Sundari
    171
    222
  • Implementing Radix Sort With Linked Buckets Using Lsd & Msd And Their Comparitive Analysis And Discussion On Applications

    Mr. Murali Krishna Senapaty, Mrs. Padmaja Patel , Mr. Ranjeet Panigrahi
    183
    373
  • A Review Paper on Effective AES Implementation

    Ayushi Arya
    232
    214