Category Archives: Volume 2 Issue 1 January-2013

Volume 2 Issue 1 January-2013

S.No. Title and Authors of Paper Page.No.
1 Automated Intelligent Wireless Drip Irrigation Using Linear Programming
Manish Giri,Dnyaneshwar Natha Wavhal
001-005
2 An effective Golden Section Search Approach based Distribution Load Flow
Naveen Jain, Jai Kumar Maherchandani
006-010
3 Review of methods for secret sharing in cloud computing
Dnyaneshwar Supe, Amit Srivastav, Dr. Rajesh S. Prasad
011-017
4 DIFFERENTIATION OF TERM AND PRETERM DELIVERY GROUPS BY EHG SIGNAL ANALYSIS
Dhananjay Kumar, Kumar Gaurav Shankar, Praveen Kumar
018-020
5 Some New Steganographic Techniques using Spatial Resolution Reduction
H. Faheem Ahmed, U. Rizwan
021-026
6 Performance Comparison of ACO Algorithms for MANETs
Jubin Sebastian E
027-032
7 A Survey of Metastability Errors in CMOS Digital Circuits
Manisha Thakur, Puran Gaur, Braj Bihari soni
033-036
8 Fault identification and diagnosis using greedy Back Tracking approach in large-scale network
U.Sridhar, Dr.G.Gunasekaran
037-041
9 Optimized Surveillance Solution for Unattended Baggage Recognition
R.Karthikeyan, P.Mahalakshmi, N.GowriShankar
042-046
10 UNMANNED MULTI-FUNCTIONAL ROBOT USING ZIGBEE ADOPTER NETWORK FOR DEFENSE APPLICATION
Premkumar .M
047-055
11 On Fault Tolerance of Resources in Grid Environment
Minakshi Memoria, Mukesh Yadav
056-063
12 Reducing Routing Overhead For Multimedia Traffic in Manet Using Rebroadcast Probability
Sivakumar.P, Sivaranjani.R, Srilakshmi.G, Subashini.R
064-070
13 Electronic Mail Security
Dr. Ajit Singh, Meenakshi Gahlawat
071-076
15 A REVIEW ON OPTIMIZATION OF ENERGY BY USING PWM INVERTER
Mr. Ravindra Patil,Prof. M.H. Nerkar, Mr. Prashant Chaudhari
082-085
16 A REVIEW ON HAND GETSURE RECOGNITION SYSTEMS
Mr. Prashant Chaudhari,Prof. G. R. Phulay,Mr. Ravindra Patil
086-090
17 DATA STORAGE SECURITY IN CLOUD BY USING JAR FILES AND HIERARCHICAL ID-BASED CRYPTOGRAPHY
Ms R.PUNITHA,Mr.D.VIJAYBABU
091-096
18 A SURVEY ON SECURED WATERMARKING TECHNIQUES FOR JPEG IMAGES ON COMPRESSED-ENCRYPTED DOMAIN
Aparna Soni, Deepty Dubey
097-101
19 Feature Based Image Sequence Retargeting in the Uncompressed Video Domain
Kavitha. S
102-106
20 DDS architecture for digital frequency generation
Ms. Shruti S.Desai, Prof. A.S.Joshi
107-111
21 A Comparative Study of Fuzzy & Genetic Power System Stabilizers and Role of Static Voltage Compensation on Power System stability
Naveen Jain, Jai Kumar Maherchandani
112-115
22 ANALYZING AND EXTRACTING SOCIALMINING TRENDS THROUGH WEB OPINION DEVELOPMENTS VIA DENSITY BASED CLUSTERING
Jeswin Roy Dcouth, MohanRaj.T
116-122
23 Survey on Data Integrity in Cloud Computing
Reenu Sara George, Sabitha S
123-125
24 Integrating Heterogeneous Data Sources Using XML
Yogesh R.Rochlani , Prof. A.R. Itkikar
126-130
25 Cryptography Using Quantum Key Distribution in Wireless Networks
Srinivasa Rao Katakam,M.S.R.Lakshmi Reddy
131-135
26 My College Finder – An Android based application
Ankit Karandikar, Sameer Kalantre, Ajinkya Kohok, Deepak Ingale, Mrs. Rutuja Kulkarni
136-138
27 Health-On-The-Move based on ANDROID Operating System
Rutuja Kulkarni,Ankita Deshmukh, Manjiri Shivankar,Prajakta Gore,Tanmay Patil
139-141
28 A SURVEY ON ENHANCED APPROACH FOR CATEGORICAL LINK BASED CLUSTERING
C.M.Geetha, K.Sangeetha ,Dr S.Karthik
142-144
29 A Survey of Performance based Secure Routing Protocols in MANET
Hariom Soni,Preeti Verma
145-154
30 Survey on Live VM Migration Techniques
Anju Mohan, Shine S
155-157
31 Performance Study of Different Medical Images Based on Morphology in Noisy Environment
V. Kalpana,V. Vijaya kishore
158-168
32 Energy Ef ficient and Reliable Communication in Underwater Acoustic Sensor Networks
S.Beeno Ancy, S.Shahul Hammed
169-173
33 An Approach for Storage Security in Cloud Computing- A Survey
W. Sharon Inbarani, G. Shenbaga Moorthy, C. Kumar Charlie Paul
174-179
35 A Modified Linear Approximation Transform for Medical Image Compression
K.Shiby Angel, D.Sujitha Juliet, S.Saravanan
183-187
36 STUDY OF VARIOUS ISSUES IN VOICE TRANSLATION
Aakash Nayak, Santosh Khule, Anand More, Avinash Yalgonde,Dr. Rajesh S. Prasad
188-191
37 DETECTION OF NODE CAPTURE ATTACKS IN WIRELESS SENSOR NETWORKS
S.Pavaimalar, G.ShenbagaMoorthy
192-196
38 Integration of Sound Signature and Graphical Password Authentication System
Suyog S. Nischal, Sachin Gaikwad, Kunal Singh, Prof. A. Devare
197-199
39 Modelling and Controller Design of Inverted Pendulum
Mr.Pankaj Kumar,Mr. KunalChakraborty,Mr. RabiRanjan Mukherjee,Mr.SuvobratraMukherjee
200-206
40 An efficient technique for maximization of network lifetime & minimization of delay for the performance enhancement of WSN
Priyanka M. Lokhande, Prof. A.P.Thakare
207-213
41 A Modified Stochastic Location Update Scheme In Mobile Ad-hoc Networks
Rosemary. P.J., Aneesh M Haneef
214-217
42 Data Mining in Clinical Decision Support Systems for Diagnosis, Prediction and Treatment of Heart Disease
Syed Umar Amin, Kavita Agarwal, Dr. Rizwan Beg
218-223
43 Image Steganography
Rahul Joshi,Lokesh Gagnani, Salony Pandey
224-227
44 Image Steganography With LSB
Rahul Joshi,Lokesh Gagnani, Salony Pandey
228-229
45 VirtuaGuard: Intrusion Detection System on Static and Dynamic Web Applications
AJINKYA NIKAM, BHIM BIRADAR, SAGAR DHERE, PRAHSANT SONAWANE,Prof .Ruta Kulkarni
230-232
46 MSNN based techniques for Face and Eye Recognition
Ramit Lala, Alok Kumar Singh
233-237
47 Survey on Certain Algorithms Computing Best Possible Routes for Transportation Enquiry Services
Neha Choubey,Mr. Bhupesh Kr. Gupta
238-242
48 ARM Based Fruit Grading and Management System Using Image Processing
Manoj B. Avhad, Satish M. Turkane
243-248
49 A Comprehensive Study of Data Mining and Application
Dheeraj Agrawal
249-252
50 Review of Real Time Two Phase Navigation System for Interactive Path Finding and Tracking Approach for Assisting Visually Impaired People
Sanjay M.Malode, Dr. S.K.Shriwastava
253-255
51 A Latest Method for Improving Resolution in Three Dimension Imaging Light Detection and Ranging
R. Sugunadevi, K. Shanthalakshmi
256-262
52 Frame Differencing with Simulink model for Moving Object Detection
Himanshu Goyal
263-266
53 Design of Colour and Texture Based Relevant Image Search Engine
S.Meenachi Sundaresan , Dr. K.G.Srinivasagan
267-272
54 Maximizing The Lifetime Of Wireless Sensor Node
SANGEETHA KAILAIMANI
273-281
55 A Comparative based study of Different Video-Shot Boundary Detection algorithms
Mr. Ravi Mishra, Dr. S. K. Singhai, Dr. Monisha Sharma
282-289
56 Review of Cloud Computing and Its Application
Sagar B.Jadhav, Dr. Rajesh Prasad,Shantanu S.Panhale, Chetan S. Mohture
290-292
57 Optimization of Searches on Social Networks using Graph theory and Formal Concepts Analysis
Quist-Aphetsi Kester
293-303
58 A Survey on Recent Trends in Cloud Computing and its Application for

Multimedia
M. Ramya Catherine, E.Bijolin Edwin

304-309
59 Challenges in the Cloud Application Development
B.J.D Kalyani
310-313
60 Implementation of MKD-WebServer Rating Application for Analysis of Web performance through SSL
Veereshkumar M Kolli, Vinaykumar M Kolli, Vaishakh B
314-318