Category Archives: Volume 2 Issue 2 February-2013

Volume 2 Issue 2 February-2013

S.No. Title and Authors of Paper Page.No.
1 A Review on Energy Efficient Modulation and Coding Techniques for Clustered Wireless Sensor Networks
M. Sheik Dawood,R. Aiswaryalakshmi, R Abdul Sikkandhar,G. Athisha
319-322
2 A Combined Approach to Part-of-Speech Tagging Using Features Extraction and Hidden Markov Model
Bhairab Sarma,Prajadhip Sinha,Dr. Bipul Shyam Purkayastha
323-329
3 Trends in High Performance Operation of Electro Absorption Integrated Laser Modulators in Advanced Optical Switching Transmission Networks
Ahmed Nabih Zaki Rashed
330-336
4 A Review on Concurrency Fault Detection Techniques
C. Revathi, M. Mythily
337-341
5 DOCUMENT FAXING THROUGH MOBICLOUD USING ANDROID
Swapnali Gharat , Prajakta Rajput, Jayashree Patil, Snehal Sonavane
342-346
6 Energy Renewal Approach in Wireless Sensor Networks
G.Lilly Evangeline,G.Josemin Bala
347-351
7 A New Optimization Method for Dynamic Travelling Salesman Problem with Hybrid Ant Colony Optimization Algorithm and Particle Swarm Optimization
Farhad Soleimanian Gharehchopogh, Isa Maleki, Seyyed Reza Khaze
352-358
8 Survey on Ant Colony Algorithm
Sony V Johny, Sakhi S Anand
359-361
9 Survey on Routing in Multihop Wireless Networks Using Micropayment Schemes
Presty Kasmir, Sakhi S Anand
362-364
10 A Survey on Image Mosaicing Techniques
Hemlata Joshi,Mr.KhomLal Sinha
365-369
11 UseofJMEforStudentInformationAcquisition
Rohini Misal, Varsha Rathi, Zimil Patel,Prof. Nikita J Kulkarni
370-373
12 A New Proposed Technique to Prevent NAV attack in MACA Protocol
Vivek Pathak, Ambrish Gangal
374-378
13 Identifying the Quality of Object Oriented Software System using Modularization Approach
Ms. Pragati D. Chowhan, Prof. S. S. Dhande
379-382
14 NOVEL REMOTE RENDERING AND MONITORING ON PERSISTENT MOBILE CLOUD
R. Baskarane, R. Vijayalakshmi
383-386
15 A Review on Otsu Image Segmentation Algorithm
Miss Hetal J. Vala, Prof. Astha Baxi
387-389
16 A Comparative Study On Some New Steganographic Techniques
H. Faheem Ahmed, U. Rizwan
390-398
17 Image segmentation based on kernel fuzzy C means clustering using edge detection method on noisy images
Saritha A K,Ameera P.M
399-406
18 A New Algorithm For The Detection and Removal Of Impulse Noise Using Cellular Automata
Christylda Angelin Hannah .J, Natheldha Mary Navina .S
407-411
19 Data-warehousing on Cloud Computing
Hemlata Verma
411-416
20 Percentage Based Trust Model with Bandwidth Reservation Technique for Privacy Preserving Routing in MANETs
Raghu. R, Gopinathan. B
417-423
21 Grid Based Multiple Features Based On Image Mosaicing
Richa Shukla, Rohit Raja
424-427
22 Secure Secret Key (SSK) Generation Algorithm for Multimedia Multicast Networks
Sathya S,Ajay Kumar
428-433
23 Routing Issues for Trust Based Framework in Mobile Ad Hoc Networks
Mukesh Kumar Garg, Dr. Ela Kumar
434-435
24 Web Text Classification Using Genetic Algorithm and a Dynamic Neural Network Model
Revathi N, Anjana Peter, Prof.S.J.K.Jagadeesh Kumar
436-442
25 Efficient Broadcast Algorithms To Reduce number of transmission Based on Probability Scheme
S.Tharani, R.Santhosh
443-447
26 Security and Privacy in Emerging Wireless Networks with Mobile Sinks
S.Rajeshwari, R.Santhosh
448-451
27 Combating Sybil Attacks using SybilGuard
Abhijeet B. Potey,Prof.Anjali B.Raut
452-455
28 DISCRIMINATION OF HEART RATE VARIABILITY USING DECISION TREES AND MLP NETWORKS
Gomathi.S, Mohan Raj.T, Saranya Sri.R
456-461
29 Correlation Preserved Indexing Based Approach For Document Clustering
Meena.S.U, P.Parthasarathi
462-470
30 MEDICAL IMAGING FOR THE SEGMENTATION OF ABDOMINAL ORGANS USING PARALLELIZATION AND ORIENTED ACTIVE APPEARANCE MODELS
Brahmya Joseph, P.Madhavan
471-476
31 Survey on Data Sharing and Re-Encryption in Cloud
Renjith P , Sabitha S
477-480
32 An Efficient Face Recognition under Varying Image Conditions
C.Kanimozhi,V.Nirmala
481-485
33 Link Stability and Energy Optimization by Excluding Self node for Mobile and Wireless Networks
T .Parameswaran, K. Thamarai Selvi, Mani Deepak Choudhry
486-492
34 A Study of Decision Support System (With reference to Indian Retail Industry)
Dr. Mini Amit Arrawatia, Mr. Pankaj Meel
493-498
35 E-Commerce Applications: Vulnerabilities, Attacks and Countermeasures
P. S. Lokhande ,B. B. Meshram
499-509
36 A cost effective Online Examinations model using server virtualization with virtual machine clusters
Balaji Kandregula
510-513
37 Review on an Underwater Acoustic Networks
Amanpreet Singh Mann, Reena Aggarwal
514-518
38 A Survey on Different Fingerprint Recognition Systems
Mr Parth BPathak,Prof Mrs A G Andurkar
519-523
39 DVS Scheduling in Multi Core Real Time System
X.JUDE ROY JEYASEELAN
524-529
40 Query Optimization: Finding the Optimal Execution Strategy
Vinod S.Gangwani,Prof.P.L.Ramteke
530-533
41 Fast distribution of Data in Wireless Sensor Network using Concurrency Operation
Geetha N, Janani V
534-538
42 REVIEW OF PASSWORD PROTECTING MECHANISM
Ms.K.Banu priya, Dr.P.Venkateswari
539-545
43 Concert augmentation in Cognitive Radio System with OFDM and Beamforming technique for Data communication
A. Suban, K.Mangayarkarasi
546-550
44 Improving P2P Performance by Applying Proper Replica Placement Strategies
Thara R J, Kala Karun A, Shine S
551-554
45 Interference Mitigation in LTE- Advanced MU-MIMO through Beamforming Technique
A.Suban , V. S. Priyanka , S. Atchaya
555-558
46 Performance Enhancement of Data Communication through Visible Light Communication Using On Off Keying
Prabu.P,Manikandan.R, Pradeep.M
559-563
47 Enhanced audit services for the correctness of outsourced data in cloud storage
V.Venkatesh, P.Parthasarathi
564-567
48 5G Mobile Technology
Ms. Reshma S. Sapakal,Ms. Sonali S. Kadam
568-571
49 Android Application to get Word Meaning through Voice
Miss. Priyanka V. Mhamunkar, Mr. Krishna S. Bansode, Prof. Laxman S. Naik
572-575
50 Review on Data Dissemination over Wireless Sensor Networks
Madhu Rani, Arvind kumar
576-581
51 Selfishness of Discriminate Node in Caching Based Wireless Sensor Network
Poonam Bisht, Arvind kumar
582-586
52 AOMDV with improved Energy Function
Alpesh chauhan,Prof.B.V.Buddhdev
587-591
53 Dynamic Pattern Matching: Efficient Pattern Matching using Data Preprocessing with help of One time look indexing method
S.Hrushikesava Raju,Dr. T. Swarna Latha
592-599
54 Privacy Requirement Engineering Based on Modified Evidence Combination Approach
Nithya V. P., R. Subha
600-605
55 A Survey on Various Median Filtering Techniques for Removal of Impulse Noise from Digital Images
Ms. Rohini R. Varade, Prof. M. R. Dhotre, Ms. Archana B. Pahurkar
606-609
56 A Survey on Migration of Task between Cloud and Mobile Device
Mrs. Minal Zaa,Prof.J.P.Gabhane,Prof.A.V.Dehankar
610-613
57 TOP K ANSWERS FOR KEYWORD QUERIES USING INDEXES
Sharmili C, Rexie J. A. M
614-618
58 NEURAL NETWORK BASED MATCHING APPROACH FOR IRIS RECOGNITION
Anjana Peter, Revathi N, Ms. Merlin Mercy
618-623
59 Position-based Opportunistic Routing for Highly Dynamic MANETS
S.Sharon Ranjini,G.ShineLet
624-627
60 The Content Summarization system
A.Pearline Divya, S.Leela
628-635
61 Design of Dynamic Error Handling Tool
Komal R. Patel, Harshita C. Kanani
636-638
62 An Intercluster-Chaining Protocol with Neighbour Node for Energy Efficient Data Collection in Wireless Sensor Networks
M.Govindarajan, P.Balamurugan
639-646
63 Design of RC5 Algorithm using Pipelined Architecture
R.Sanju Abraham, A.Arun
647-651
64 Security Issues with Possible Solutions in Cloud Computing-A Survey
Abhinay B.Angadi, Akshata B.Angadi, Karuna C.Gull
652-661
65 Cloud based Intra-College Communication Information System using Mobile Clients
Swapnil S. Bangare, Atul S. Mhaske, Sagar A. Sune, Harshal D. Pranjale
662-665
66 Design of a Cost Effective and environment friendly Off-Grid Wind-Diesel Hybrid Power System in Kutubdia Island of Bangladesh
Sham Datto,Md. Harun OrRoshid, MafinMuntasir Rahman
666-669
67 Stochastic Based Optimal Resource Provisioning in Cloud Computing
P. Arun pandian, S. Anto
670-675
68 Interpreting Inference Engine for Semantic Web
MS. PRIYANKA PATEL, MS. PRIYANKA TRIKHA
676-678
69 Detection of Colluding Collision and Identity Delegation Attacks in Wireless Ad Hoc Networks via SADEC
Angel Mary Alex, M. Ashwin
679-683
70 Cluster Based Energy Efficient Sensory Data Collection With Mobile Sink
G. Sunil, Mrs. D. Jasmine David
684-687
71 Pre Layout And Post Layout Analysis Of Parallel Counter Architecture Based On State Look-Ahead Logic
Ulala N Ch Mouli Yadav, J.Samson Immanuel
688-693
72 A Design of Ultra Low Power and High Speed 64 Bit Error Tolerant Adder for MAC
R.Arun Kumar, D.AbrahamChandy
694-697
73 EFFICIENT LOCALIZED DEPLOYMENT ALGORITHM WITH BALANCED ENERGY CONSUMPTION IN WIRELESS SENSOR NETWORKS
Shamily C., P. Anitha Christy Angelin
698-702
74 DISTANCE BASED RANGE QUERIES
Josepin Dayana T, J. A. M Rexie
703-706
75 Analysis of local and global techniques for disparity map generation in stereo vision
Vrushali Baxi, Ms. Priyanka Tirkha, Bilav I. Prajapati
707-710
76 A Survey on the different text data compression techniques
Rajinder Kaur, Mrs. Monica Goyal
711-714
77 A Review of a Goal Directed Visual Perception System using Object based Top down Attention
Aniket D. Pathak, Priti Subramanium
715-718
78 Determination of optimum coefficients of IIR Digital Butterworth Band-Stop Filter
Subhadeep Chakraborty, Abhirup Patra
719-725
79 DIVERSITY IMPROVEMENT IN RECOMMENDER SYSTEM
Antony Taurshia.A,S.Deepa Kanmani
726-728
80 Design of Wireless Monitor System Based On S3C2440 and GPRS
CH.SREEDHAR, SRIDHAR.V,G.NAGENDRA,M.ZUBAIR
729-738
81 QARS for Self Reconfiguration Mechanism in Wireless Mesh Networks
A.Melveena, D.Ramya Dorai
739-743
82 RANKING ADAPTATION SVM FOR TARGET DOMAIN SEARCH
M.S.Gayathri, S.Leela
744-749
83 A Survey on Routing Protocol for Wireless Sensor Network
Sitender Kumar, Arvind Kumar, Rohit kumar vishwkarma
750-755
84 A Survey on Energy-Efficient protocol for Wireless Sensor Networks
Rohit kumar vishwkarma, Arvind kumar, Sitender arora
756-760
85 A Three-Layer Architecture based Approach for Data Access Layer in the Information Systems Production
Farhad Soleimanian Gharehchopogh, Esmail Amini, Behnam Zebardast
761-766
86 Simulation and evaluation of convolution encoder for different noisy channel over wireless communication network in CDMA environment
Jai Kumar,Anita Suman
767-772
87 A Survey on Preserving Privacy towards Location Proof
Senthilguru S, Blessed prince P
773-776
88 Energy-Aware Duty Cycle Scheduling for Efficient Data Collection in Wireless Sensor Networks
Jerrin T John, S. R. Jino Ramson
777-783
89 Plant Recognition through Leaf Features Mapping
Ms. Pushpinder Kaur, Ms. Janhavi Mane, Ms Sonali Sawant
784-786
90 Data mining with Improved and efficient mechanism to detect the Vulnerabilities using intrusion detection system
Awan Dhawan
787-791
91 An Enhanced and efficient mechanism to detect Sybil attack in Wireless Sensor Networks
Heena Sharma, Awan Dhawan
792-796
92 Highly Secure Distributed Authentication and Intrusion Detection with DataFusion in MANET
S.Jeyashree
797-801
93 Wavelet Based Classification of Multispectral Satellite Image Using Fuzzy Incorporated Hierarchical Clustering With SVM Classifier
S.Sindhu, Dr.S.Vasuki
802-807
94 Identification of diabetic retinopathy stages in human retinal image
A.Alaimahal, Dr.S.Vasuki
808-811
95 Non-Stationary Power Quality Signals Classification using Fuzzy C-means Algorithm
M.Venkata Subbarao, N.Sayedu.Khasim,Jagadeesh Thati, M.H.H.Sastry
812-816
96 Low and mid-level features for target detection in satellite images
Rajani.D.C
817-825
97 Performance analysis of Meandered loop and Top loaded monopole antenna for Wireless Applications
M. Ilakkia, T. Anita Jones Mary, Dr. C. S. Ravichandran
826-830
98 Study of Wireless Optical CDMA LAN in Indoor Environment
R.KANMANI, K. SANKARANARAYANAN
831-838
99 Power Optimized MAC Protocol in Ad-Hoc Network’s
Rahul Mukherjee
839-847
100 A cryptographic Image Encryption technique based on the RGB PIXEL shuffling
Quist-Aphetsi Kester
848-854
101 AUTOMATIC IMAGE ANNOTATION USING WEAKLY SUPERVISED GRAPH PROPAGATION
Kalaivani.R,Thamaraiselvi.K
855-860