Category Archives: Volume 1 Issue 4 June-2012

Volume 1 Issue 4 June-2012

S.No. Title and Authors of Paper Page.No.
1 64 Bit Domino Logic Adder with 180nm CMOS Technology
M.B. Damle, Dr. S. S. Limaye
001-005
2 Low-power Full Adder array-based Multiplier with Domino Logic
M.B. Damle, Dr. S. S. Limaye
006-010
3 Modular Design of Adders with Domino Logic 1
M.B. Damle, Dr. S. S. Limaye
011-015
4 A STUDY ON OVERVIEW OF STEGANOGRAPHY WITH SPECIFIC TOOLS
A.Sankara Narayanan
016-021
5 Estimation of Re-striking Transient Overvoltages in a 3-Phase 132KV Gas insulated Substation
M. Kondalu, Dr. P.S. Subramanyam
022-027
6 Calculation of Transients at Different Distances in a Single Phase 220KV Gas insulated Substation
M. Kondalu, Dr. P.S. Subramanyam
028-033
7 Text Extraction From Images
Satish Kumar, Sunil Kumar, Dr. S. Gopinath
034-036
8 TO IMPROVE BIT ERROR RATE OF OFDM TRANSMISSION USING TURBO CODES
Ms Neetu Sharma, Prof. Rajeshwar Lal Dua
037-044
9 DETECTION OF HEALTH CARE USING DATAMINING CONCEPTS THROUGH WEB
Mounika Naidu.P, C. Rajendra
045-050
10 VisualRank for Image Retrieval from Large-Scale Image Database
Suryakant P. Bhonge, Dr. D. S. Chaudhari, P. L. Paikrao
051-054
11 Current Scenario in WSNs
Vandana Jindal, Anil Kumar Verma, Seema Bawa
055-060
12 Energy efficient and Demand based Topology Maintenance for various network traffic conditions
Y.Sravana Sandhya,V.Sreenathasarma,K. V. Nagendra
061-066
13 Comparative Study on Performance Analysis of High Resolution Direction of Arrival Estimation Algorithms
Chetan.L.Srinidhi, Dr.S.A.Hariprasad
067-079
14 LEARNING BEHAVIOR OF ANALYSIS OF HIGHER STUDIES USING DATA MINING
Santosh kr. Gupta, Dr. Abhay Bansal, Mr. Ritesh Rastogi
080-084
15 Ultra Wideband Low Noise Power Amplifier
Gauri P. Borkhade,Dr.D. S. Chaudhari
085-088
16 Wireless Tire Pressure Monitoring System for Vehicles using SPI Protocol
Avinash D. Kale, Shubhada S. Thakare, Dr. D. S. Chaudhari
089-091
17 VLSI Architecture and implementation for 3D Neural Network based image compression
Deepa.S, Dr.P.Cyril Prasanna Raj, Dr.M.Z.Kurian, Manjula.Y
092-097
18 Fuzzy logic Controller for Flowing Fluids
Sahil Chandan, Rahul Agnihotri
098-101
19 Role of Artificial intelligence in MANET
Neeti Maan, Dr. Ravindra Kumar Purwar
102-104
20 Reconciling the Website Structure to Improve the Web Navigation Efficiency
Joy Shalom Sona, Asha Ambhaikar
105-108
21 Application of Unscented Kalman Filter for Sonar Signal Processing
Leela Kumari. B, Padma Raju.K
109-114
22 Performance Analysis of LDPC Coded WLAN Physical Layer under BPSK and 16-QAM
Ginni Sharma
115-118
23 Implementation of Cloud Based Query Solver System for Educational Institutes featuring Ontology
Arun Arunachalam, Prof Manasi Kulkarni
119-125
24 Design and Simulation Based Studies of a Dual Band Antenna for WLAN/WiMax Application
Shrikant Pandey, Sudeep Baudha, Rahul Singh Rathore
126-130
25 Optical Character Recognition Using Artificial Neural Network
Sameeksha Barve
131-133
26 The Blu-ray Disc Technology -An Optical Storage Medium
G. Naga Lakshmi, K. Spandana, Dr. S. Sai Satyanarayana Reddy
134-138
27 A 2.4 GHz Microstrip Patch Antenna with a Single Slot for WLAN Application
Rahul Singh Rathore, Sudeep Baudha, Shrikant Pandey
139-141
28 Performance Enhancement of CPU Scheduling by Hybrid Algorithms Using Genetic Approach
Jyotirmay Patel, A.K.Solanki
142-144
29 Model for Intrusion Detection System with Data Mining
Deepak Upadhyaya, Shubha Jain
145-148
30 Industrial Automation using Windows Presentation Foundation & Model View ViewModel Pattern
Sameer Soni, Pranali Dhete, Shirish Patil, Dr B.B. Meshram
149-152
31 Mathematical Modeling of Hot Air Drying of Spinach Leaves in Universal Hot Air Oven
A.K.Upadhyaya , Bhupendra Gupta, Sanjeev Garg , Mohan Singh, Mukesh Pandey
153-157
32 SHOE: A Platform for Semantic Web Language Usage and Analysis
Chikkala Jayaraju, Pedasanaganti.Divya, Epuru Madhavarao ,ASK Ratnam
158-162
33 Performance Comparison of Symmetric Data Encryption Techniques
Deepak Kumar Dakate, Pawan Dubey
163-166
34 Signaling Technique for Free Space Optics on the basis of Bit Error Rate
Amrita Chakraborty, Avinash Gour
167-169
35 Changing Data Rate during Handoff in GSM –ATM Networks
Brajesh Mishra,Sudeep Baudha,Shrikant Pandey
170-176
36 Network Coding based Privacy Preservation Technique for Multi-Hop Wireless Networks
Prof. Santosh kumar Bandak, Jyoti Neginal
177-181
37 AUTO MONITORING OF APPLIANCES BY INTERNET
Vivek N. Katare, Pradeep B. Dahikar, S.J. Dhoble
182-185
38 Design & Implementation of 64 bit ALU for Instruction Set Architecture & Comparison between Speed/Power Consumption on FPGA
Rajeev Kumar,Manpreet Kaur
186-193
39 Etching of Metallic & Dielectric Films in VLSI Technology
Rajeev Kumar,Mandeep Singh Saini,Dr.Mukesh Kumar
194-195
40 Implementation of Pitch Control Of wind Turbine Using Simulink (Matlab)
Sachin Khajuria, Jaspreet Kaur
196-200
41 BER AND SIMULATION OF OFDM MODULATOR AND DEMODULATOR FOR WIRELESS BROADBAND APPLICATIONS
V.SRIDHAR,M.V BRAMHANANDA REDDY ,M.NAGALAXMI,G.NAGENDRA,M.RENUKA
201-209
42 13.5 MHz RFID(NFC) ANTENNA DESIGN FOR DEDICATED MOBILE APPLICATIONS WITH IMPROVED RESULTS
Amit Gupta, Sudeep Baudha, Shrikant Pandey
210-214
43 A comparative study of Level II fuzzy sets and Type II fuzzy sets
GANDHI SUPRIYA KANHAIYA,DR.S.B.NIMSE
215-219
44 Mathematical Model for Bicriteria in Constrained Three Stage Flow Shop Scheduling
Deepak Gupta, Sameer Sharma, Seema Sharma, Shefali Aggarwal
220-229
45 Behavior of mixture of Sulfamic Acid and Sodium Chloride
Dr. Rita A. Gharde, Divakar T. Chunarkar
230-233
46 ICCC: Information Correctness to the Customers in Cloud Data Storage
Gangolu Sreedevi,Prof. C. Rajendra
234-237
47 A Comparative Analysis of Feed-Forward and Elman Neural Networks for Face Recognition Using Principal Component Analysis
Amit Kumar, Mahesh Singh
238-243
48 Rule Based Technique detecting Security attack for Wireless Sensor network using fuzzy logic
Mohit Malik, Namarta kapoor, Esh naryan, Aman Preet Singh
244-251
49 Design and Implementation of Wideband Digital Down Converter on FPGA
K.S.Sushmitha, G.Vimala Kumari
252-256
50 Doctor friendly software for HRV Analysis
N.D.Thakur, M.S.Sankhe, Dr.K.D.Desai
257-266
51 Simulation and Analysis of Dropped Packets for DSR Protocol in VANETs
Avleen Kaur Malhi, A. K. Verma
267-272
52 GSM BASED POWER METER READING AND CONTROL SYSTEM
Mr.Rahul Ganesh Sarangle, Prof.Dr.Uday Pandit Khot,Prof. Jayen Modi
273-279
53 STUDY ON IMAGE BROADCAST USING WATERMARK AND SECURITY TECHNIQUES
SK.Sofia,C.Rajendra
280-284
54 IP Spoofing Attack Detection using Route Based Information
Sneha S. Rana, T. M. Bansod
285-288
55 A Proposal of Image Arrangement CAPTCHA
M.Geethanjali, R.Ramesh
289-292
56 Smart antenna for wi-max radio system
Neha shrivastava, Sudeep Baudha, Bharti tiwari
293-299
57 An Automated Mobile Applications Generator for Remote Database Access
K. Spandana, K. Shirin Bhanu, G. Loshma
300-305
58 Intrusion Detection System for Database with Dynamic Threshold Value
KHOMLAL SINHA,TRIPTI SHARMA
306-310
59 Location Fingerprinting of Mobile T erminals by Using Wi-Fi Device
Ruchi Setiya, Prof. Avinash Gaur
311-314
60 A Comprehensive Review of Image Smoothing Techniques
Aditya Goyal, Akhilesh Bijalwan, Mr. Kuntal Chowdhury
315-319
61 Parsing of HTML Document
Pranit C. Patil, Pramila M. Chawan, Prithviraj M. Chauhan
320-324
62 Security Built On Dynamic Reusable Passwords On Online Purchase
Rajeswari.P,C.Rajendra
325-330
63 Intrusion Detection Based Security Solution for Cluster Based WSN
Shilpa S.Patil,P.S.Khanagoudar
331-340
64 Detection of traditional and new types of Malware using Host-based detection scheme
Satish N.Chalurkar, Dr.B.B.Meshram
341-346
65 Fault Tolerant Environment in web crawler Using Hardware Failure Detection
Anup Garje, Prof. Bhavesh Patel, Dr. B. B. Mesharm
347-352
66 Realizing Peer-to-Peer and Distributed Web Crawler
Anup A Garje, Prof. Bhavesh Patel, Dr. B. B. Meshram
353-357
67 Refuse of Sensor’s Energy Consumption in Wireless Sensor Networks Using Routing Protocols
N.Sandeep Krishna,C.Rajendra
358-365
68 A Novel Approach for Iris Recognition
Manisha M. Khaladkar, Sanjay R. Ganorkar
366-369
69 Offline Handwritten Signature Verification using Associative Memory Net
Tirtharaj Dash, Tanistha Nayak, Subhagata Chattopadhyay
370-374
70 Tool to Detect and Prevent W eb Attacks
Nilesh Khochare, Dr.B.B.Meshram
375-378
71 Particle Swarm Optimization in Cryptanalysis of DES
Shweta Pandey, Prof. Megha Mishra
379-381
72 AN ENHANCEMENT IN RELEVANCE KNOWLEDGE DISCOVERY MODEL FOR MEDICAL REASONING USING CBRM
Prof.S.Anithaa
382-387
73 Comparison of Modern Denoising Algorithms
Mahantesh R.Choudhari, Prof.K.Chandrasekar, Dr.S.A.Hariprasad
388-394
74 Computer Assisted Testing and Evaluation System: Distance Evaluation Using Mobile Agent Technology
Prakash V. Rajguru, Dr. Sushant B. Deshmukh
395-401
75 Accurate Spam Mail Detection using Bayesian Algorithm
V.Kanaka Durga, M.R. Raja Ramesh
402-406
76 Improved Focused Crawler Using Inverted WAH Bitmap Index
Sanjay Kumar Singh, Sonu Agrawal
407-409
77 Healthcare Information Technology Service Assessment: A Healthcare Leader Prospective
Syed Murtuza Hussain Bakshi
410-418
78 Design of Multi-Channel UART Controller Based On FIFO and FPGA
Deepchand Jaiswal,Dr. Rita Jain,Prof. M. Zahid Alam
419-426
79 VLSI Implementation of Pipelined Fast Fourier Transform
K. Indirapriyadarsini, S.Kamalakumari, G. Prasannakumar
427-432
80 Proposing Trust Count Based Validation Method to Lessen Internal Attacks in Mobile Adhoc Networks
D.SRINIVASA RAO,MOHD. SHAJID ANSARI
433-438
81 Techniques for Reducing Power in Multipliers
V.Alekhya, B.Srinivas
439-442
82 Design and Implementation of IEEE-754 Addition and Subtraction for Floating Point Arithmetic Logic Unit
V.VINAY CHAMKUR,Chetana.R
443-449
83 Enhancing the Slew rate and Gain Bandwidth of Single ended CMOS Operational Transconductance Amplifier using LCMFB Technique
Abhishek Singh,Sunil Kumar Shah, Pankaj Sahu
450-455
84 PAPR Reduction of an MC-CDMA system using SLM technique
Gagandeep Kaur, Rajbir Kaur
456-460
85 An Overview of PAPR Reduction Techniques for an MC-CDMA System
Gagandeep Kaur, Rajbir Kaur
461-470
86 Solving Three Dimensional Bin Packing Problem Using Elitism Based Genetic Algorithm
Pragya Gupta, Rajesh Tiwari
471-475
87 A HIGH SPEED AND EFFICIENT DESIGN FOR BINARY NUMBER SQUARING USING DWANDWA YOGA
B. Dilli kumar, M. Bharathi
476-479
88 Application Development Using WPF
Shirish Patil, Sameer Soni, Pranali Dhete, Dr B.B. Meshram
480-483
89 Virtualizing the Private Cloud for Maximum Resource Utilization
C.Shreeharsha, Prof.ManasiKulkarni
484-488
90 Secure Data Storage in the Cloud using Digital Signature Mechanism
Shobha Rajak, Ashok Verma
489-493
91 Applicability of Box Jenkins ARIMA Model in Crime Forecasting: A case study of counterfeiting in Gujarat State
Anand Kumar Shrivastav, Dr. Ekata
494-497
92 Geographical Routing in Intermittently Connected MANETs with Guaranteed Delivery at Void Locations
R.RAJA SEKHAR, S.SYED BASHA
498-503
93 Design & Implementation of Linux based Network Forensic System using Honeynet
Jatinder Kaur, Gurpal Singh, Manpreet Singh
504-508
94 Development of FPGA Based Embedded Web Server Using a Soft-core Processor
Raghuwar Sharan Soni, Deepak Asati
509-512
95 Development and Verification of VHDL code for 16 bit ADC for FPGA based Beam Position Measurement Board
Priti Trivedi, Sudeep Baudha
513-516
96 Classification of ECG Waveforms for Abnormalities Detection using DWT and Back Propagation Algorithm
Hari Mohan Rai, Anurag Trivedi
517-520
97 Design and Implementation of Virtual Client Honeypot
Himani Gupta, Gurpal Singh Chhabra
521-524
98 Detecting Sequence Number Collector Problem in Black Hole Attacks in AODV Based Mobile Adhoc Networks
Anand Nayyar
525-529
99 A New Approach for Sharpness and Contrast Enhancement of an Image
M.Obulesu, V.Vijaya Kishore
530-535
100 Bit Error Probability for Wireless Communication by using A Two Level FH-CDMA scheme over Fading Channel
Y Venkatadri, A Mahendran
536-541
101 Promulgate: an approach to Optimize the data transfer in Service Oriented Architecture
B. Chandra Mouli,Prof. C. Rajendra
542-546
102 EVALUATE FAKE OBJECTS TO PREDICTS UNAUTHENTICATED DEVELOPERS
A. Santhi Lakshmi, Prof. C. Rajendra
547-551
103 EKST: Efficient Keyword Searching Technique for Encrypted Data in CipherCloud
V. Sravan Kumar Reddy,Professor C. Rajendra
552-556
104 Scheme of security in Mobile Ad Hoc Networks using Route Blacklist Limit Mechanism
Hemant Kamle, Geetika Dubey
557-562
105 Color Image Segmentationusing Clustering Technique
Patel Janak kumar Baldevbhai, R.S. Anand
563-574
106 Design & Implementation of Fast Modulo Multiplier Based Network Intrusion Detection System (NIDS) using HDL
Sachin Singh, Sunil Kumar Shah
575-579
107 Device Driver Fault Simulation Using KEDR
Shakti D Shekar, Prof. Dr. B B Meshram, Prof. Varshapriya
580-584
108 Implementation and optimisation of FPGA based network security system using VHDL
Pravinkumartiwari,Momd.abdullah, Rajesh nema
585-589
109 Intelligent System for detecting, Modeling,Classification of human behavior using image processing, machine vision and OpenCV
Niraj .B. Gadhe, Prof: Dr. B .K . Lande, Prof: Dr. B.B.Meshram
590-599
110 Auto-assemblage for Suffix Tree Clustering
Pushplata, Mr Ram Chatterjee
600-608
111 WPA Exploitation In The World Of Wireless Network
Pranav S. Ambavkar, Pranit U. Patil, Dr.B.B.Meshram, Prof. Pamu Kumar Swamy
609-618
112 A Roadmap for Configuring Moodle with MLE-Moodle and MyMLE
Lakshmi Kurup, Ajay Arunachalam
619-624
113 An Approach to Improve the Web Performance By Prefetching the Frequently Access Pages
Ms. Seema,Ms. Priyanka Makkar
625-634
114 Reduction of Data at Namenode in HDFS using harballing Technique
Vaibhav Gopal Korat, Kumar Swamy Pamu
635-642
115 A Morphological approach for discrimination between Glaucomatous and Non glaucomatous Eyes by Optic Disc Localization
C.Radhika
643-648
116 Multiple Target Tracking with the help of Mean Shift Algorithm
Mahesh Kumar Chouhan, Rahul Mishra, Dr. Dhiiraj Nitnawwre
649-652
117 A Resolved Retrieval Technique For Software Components
Swathy vodithala, P.Niranjan Reddy, M.Preethi
653-656
118 Case Based Reasoning System for Ship Turning Problem
Deepak kumar Dixena,Amit Ranjan,Baishakhi Chakraborty
657-660
119 Robustness of RC4 against Differential attack
Bhargvi H. Kamble, Dr. B. B. Meshram
661-665
120 Desktop virtualization using SaaS Architecture
Pranit U. Patil, Pranav S. Ambavkar , Dr.B.B.Meshram , Prof. Varshapriya
666-670
121 Image Denoising Using Curvelet Transform Using Log Gabor Filter
Vishal Garg, Nisha Raheja
671-679
122 COEXISTENCE MODEL OF ZIGBEE & IEEE 802.11b (WLAN) IN UBIQUITOUS NETWORK ENVIRONMENT
Neha Gandotra, Vishwanath Bijalwan, Manohar Panwar
680-684
123 A Hybrid Colour Image Enhancement Technique Based on Contrast Stretching and Peak Based Histogram Equalization
A Balachandra Reddy, K Manjunath
685-689
124 Anomaly Detection and Prevention in Network Traffic based on Statistical approach and α-Stable Model
Anup Bhange,Sumit Utareja
690-698
125 A Multimodal Biometric System Using Fingerprint and Face
Sona Aggarwal, Yogita Gulati
699-703
126 A Literature Review of Online Discussion Forum in e-Learning Scenario
Ankita Singhal,Brij Mohan Kalra
704-708
127 A Model for identifying Guilty Agents in Data Transmission
Shreyta Raj , Dr. Ravinder Purwar , Ashutosh Dangwal
709-713