Category Archives: Volume 2 Issue 3 March-2013

Volume 2 Issue 3 March-2013

S.No. Title and Authors of Paper Page.No.
1 Band Pass Filters with Low Pass and High Pass Filters Integrated With Operational Amplifiers in Advanced Integrated Communication Circuits
Ahmed Nabih Zaki Rashed
861-866
3 E- Commerce impact on Indian Market: a Survey on social impact
Tryambak Hiwarkar
870-874
4 Investigation on Performance of Trust Based Model and Trust Evaluation of Reactive Routing Protocols in MANET
Dharam Vir, Dr. S.K.Agarwal, Dr.S.A.Imam
875-880
5 Improving the Efficiency of Ranked keyword Search over Cloud Data
Kiruthigapriya Sengoden, Swaraj Paul
881-883
6 Cloud Computing: An Architecture, its Security Issues & Attacks
Kalpana N. Meher, Prof. P. S. Lokhande
884-890
7 Design and VLSI Implementation of DIP Based Rod Quality Inspection
G.Rajakumar, Dr.D.Manimegalai
891-896
8 Preamplification of Signal between Satellites
Babisha.S.Sumi, K. Shanthalakshmi
897-900
9 A Survey on Data Aggregation Techniques for Wireless Sensor Networks
Kriti Saini, Parveen Kumar, Jatin Sharma
901-903
10 A Novel Approach to Scheduling in Grid Environment: Enhanced Ant Colony Optimizer
D. Maruthanayagam,Dr.R. Uma Rani
904-915
11 Prediction Based Data Collection in Wireless Sensor Network
V.Mathibala , Mrs. Seiya Susan Thomas
916-919
12 An Efficient Iris Feature Encoding and Pattern Matching for Personal Identification
T.Karthikeyan, B.Sabarigiri
920-924
13 An Efficient Sharing of Personal Health Records Using DABE in Secure Cloud Environment
T .Parameswaran, S.Vanitha, K.S.Arvind
925-932
14 A survey on AODV routing protocol for AD-HOC Network
Parveen Kumar,Jatin Sharma, Kriti saini
933-937
15 Real Time Static Hand Gesture Recognition System in Simple Background for Devanagari Number System
Jayshree R.Pansare, Sandip Kadam, Onkar Dhawade, Pradeep Chauhan
938-941
16 A Novel Role Based Cross Domain Access Control Scheme for Cloud Storage
Punithasurya K , Esther Daniel , Dr. N.A. Vasanthi
942-946
17 A Novel Role Based Cross Domain Access Control Scheme for Cloud Storage
Punithasurya K , Esther Daniel , Dr. N.A. Vasanthi
942-946
18 FGEST: FINGER TRACKING AND GESTURE RECOGNITION IN SMARTPHONES
Pratham Parikh, Shubham Gupta, Swatil Patel, Varun Nimbalkar
947-950
19 A Scalable Privacy-Preserving Verification Correctness Protocol to Identify Corrupted Data in Cloud Storage
Neethu Mariam Joseph, Esther Daniel, Vasanthi N A
951-956
20 Enhancing Data Storage Integrity in Cloud Environment by mitigating Repudiation using CS-MPNR
Meena S, Esther Daniel, Dr. N.A. Vasanthi
957-963
21 A Countermeasure for Black Hole Attack in Mobile WiMAX Networks
M. Deva Priya, Dr. M.L.Valarmathi, S. Aishwarya, K. Jaya Bharathi
964-973
22 TOSCA ENABLING CLOUD PORTABILITY
SahithiTummalapalli,RaviKanth.P,Yuvaraj.K, SreenivasVelagapudi
974-978
23 Real Time Data Acquisition and Home Parameters Monitoring using LabVIEW
Mr.Rajesh R. Karhe,Mr.C.S.Patil,Mr. Mahesh S. Patil
979-983
24 A Framework for Building Applications Based on Hidden Topics with Short and Sparse Web Documents
Kanimozhiveena E, D. Ramya Dorai
984-988
25 PSO optimized reduced order PID Controller design
Yogendra Kumar Soni, Rajesh Bhatt
989-992
26 HIGH SPEED ROUTERS RELY ON WELL DESIGNED PACKET BUFFERS
A. RAJYALAKSHMI, P. SRINIVASULU, G.PRAVALIKA, M. RAJYALAKSHMI
993-997
27 An Effective S-Box Comparison by Parity Based Fault Detection Scheme Using Composite Fields
M. Hemalatha, S. Sridevi Sathya Priya, P. Karthigaikumar
998-1001
28 Attacks & Preventions of Cognitive Radio Network-A Survey
Dr. Anubhuti Khare, Manish Saxena ,Roshan Singh Thakur , Khyati Chourasia
1002-1006
29 Fuzzy Inference System for Image Processing
Abhradita Deepak Borkar, Mithilesh Atulkar
1007-1010
30 Secured Cost Effective Group Handover Authentication Scheme For WiMAX Networks
Mohanaprasanth.P, B.Sridevi, Dr.S.Rajaram
1011-1016
31 CAN BASED REAL TIME IMPLEMENTATION IN AUTOMOBILE USING ARM
Mr. VIJAY BHAMARE, Mr. CHIRINJEEVI
1017-1020
32 Optimization of Throughput Using Multicast Routing in Wireless Mesh Networks
Akuluri Rakesh, S.R.Jino Ramson, John Major.J
1021-1025
33 Problems of character segmentation in Handwritten Text Documents written in Devnagari Script
Vneeta Rani, Pankaj Kumar
1026-1029
34 Respiratory Cancerous Cells Detection Using TRISS Model and Association Rule Mining
Ayyadurai.P, Kiruthiga.P, Valarmathi.S, Amritha.S
1030-1035
35 A New Multiplier – Accumulator Architecture based on High Accuracy Modified Booth Algorithm
J. Y. Yaswanth babu, P. Dinesh Kumar
1036-1040
36 Chunk Scheduling Strategies In Peer to Peer System-A Review
Sanu C , Deepa S S
1041-1045
37 OVERVIEW OF NIGHTTIME SOLAR CELL
H.N.Kamalaskar,Prof.P.H.Zope ,Prof.S.R.Suralkar
1046-1051
38 A Review of Web Page Ranking Algorithm
Parveen Rani
1052-1054
39 Security and QOS centric protocols for P2P networks: current state of the art
B.LALITHA
1055-1064
40 Biometrics using Electronic Voting System with Embedded Security
Alaguvel.R, Gnanavel.G,Jagadhambal.K
1065-1072
41 Multiple Event-Driven Node Localization in Wireless Sensor Networks
Martin Victor K, Mrs. K. Ramalakshmi
1073-1077
42 CONTENT BASED IMAGE RETRIVAL USING FRACTAL SIGNATURE ANALYSIS
K.KArunRaja, T.Sabhanayagam
1078-1080
43 Position based Routing Protocols for Wireless Ad hoc Networks: A Critical Survey
Saba Khalid,Shish Ahmad,Prof. Dr. Mohd Rizwan Beg
1081-1085
44 Real Time Static Hand Gesture Recognition System in Complex Background that uses Number system of Indian Sign Language
Jayshree R.Pansare, Hrushikesh Dhumal, Sanket Babar,Kiran Sonawale, Ajit Sarode
1086-1090
45 Segmentation of Handwritten Text Document- A Review
Er.Naunita
1091-1093
46 Hybrid Movement Control Algorithm For Restoring Connectivity In WSAN
Tesmy George,Priyadharshini.C
1094-1098
47 A Secured Data Transmission using Genetic based Encryption Techniques over Wireless Networks
Mrs. K. Rajasri, S. Sathiyadevi, Mrs. S. Tamilarasi
1099-1105
48 Hippocratic Database- Persisting privacy in e- banking
Minakshi Memoria, Neha Malik
1106-1108
49 AUTOMATED AUDITING AND LOGGING MECHANISM FOR SECURE DATA STORAGE IN CLOUD USING PROXY REENCRYPTION
J.Shyamala, D.Femila, B.Vinisha Cathrine Antonus
1109-1113
50 Use of Open Source Software in Engineering
Dr. Pardeep Mittal, Jatinderpal Singh
1114-1117
51 Improved Performance of Multiuser System Using Combined Diversity with Nagakami Fading Channel
Gowthami.S, Jayanthi.K, Dr.V.P.Arunachalam
1118-1121
52 PERFORMANCE ANALYSIS OF MULTICAST ROUTING PROTOCOLS IMAODV, MAODV, ODMRP AND ADMR FOR MANET
J.Gold Beulah Patturose, P.Immanuel Vinoth
1122-1127
53 Cloud Computing: Migration from Traditional Systems to the Cloud
Ganesh Olekar,Vikram Sreekumar
1128-1131
54 An Unobservable Secure Routing Protocol against Wormhole and Black hole Attacks in MANET
Annie Jesus Suganthi Rani.A, R.Mathan
1132-1138
55 A Framework renders Data integrity issue and Bandwidth allocation over in Cloud
Mrs. V. Kavitha Chandrakanth, Mrs. P. Jamuna
1139-1142
56 Technologies of Cloud Computing – Architecture Concepts based on Security and its Challenges
Nandini Mishra ,Kanchan khushwha, Ritu chasta,Er. Abhishek Choudhary
1143-1149
57 A modified Clustering algorithm based on Optimization method
J.Mercy Geraldine, P.Kiruthiga
1150-1153
58 Efficient Timeslot Assignment and Route Discovery Mechanism for Mobile Clients
Gayathri. R,T. Prabakaran
1154-1158
59 ARCHITECTURE OF 4-BIT PIPELINE ADC IN CMOS TECHNOLOGY
Ms. R. M. Shende,Prof. P. R. Gumble
1159-1165
60 Price Adjustment for Double Auction Based Scheduling in Grid Environment
Santhiya H, Karthikeyan P
1166-1169
61 Investigation of SAR inside Different Enclosures and Reduction Techniques
J.JANISH BLESSY, T.ANITA JONES MARY, Dr.C.S.RAVICHANDRAN
1170-1174
62 An Efficient Authentication and Access Control Scheme to Protect Integrity of Anonymous Networks
Santhosh S, Asst. Prof. Alok Ranjan
1175-1180
63 Efficient Road Traffic Policing With Coordinators and Routers Using Radio Frequency
Sathish Nagarajan, P Kavitha
1181-1186
64 ADAPTIVE SHARING METHOD FOR MULTIPLE CONTINUOUS QUERY
Mariat Thomas,Mr. G. Naveen Sundar
1187-1191
65 Radix-4 Encoder & PPG Block for Multiplier Architecture using GDI Technique
Ankita Dhankar, Satyajit Anand
1192-1195
66 E-Governance – A challenge for India
Dr. Pardeep Mittal, Amandeep Kaur
1196-1199
67 Green Computing – Need and Implementation
Dr. Pardeep Mittal, Navdeep Kaur
1200-1203
68 A Novel BIST based Diagnosis Technique to Detect Faults in FPGA
Ms.N.Ramya, Ms. N. Kirthika
1204-1208
69 THROUGHPUT OPTIMIZATION IN MOBILE NETWORKS USING MILP ON EB BILLING APPLICATIONS
D.KOWSALYA DEVI, G.PRABU , P.TAMILSELVAM
1209-1213
70 Study of User Experience (UX) and UX Evaluation methods
Vignesh Balasubramoniam, Niranjan Tungatkar
1214-1219
71 Review of authentication and digital signature methods in Mobile ad hoc network
Amol Bhosle, Yogadhar Pandey
1220-1224
72 Performance Analysis on Learning Algorithms with various Facial Expressions in Spiking Neural Networks
J.Lincy Kiruba, A.Diana Andrushia
1225-1228
73 Improving ontology and precision recall using ontology model, genetic, greedy algorithm semantic similarity calculation and ontology graph
K.Srihari,Dr. V.P.Arunachalam,Dr. S Karthik
1229-1252
74 Ontology construction and query indexing technique to improve query indexing time, precision and number of good pages visited
K.Srihari,Dr. V.P.Arunachalam,Dr. S Karthik
1253-1269
75 A Survey – Performance based Routing Protocols in Wireless Ad-hoc Networks Environment
Pratibha Sahu, Navdeep Kaur Saluja, Ragini Sen
1270-1279
76 Comparison of Optimization Techniques for Mutual Information based Real Time Image Registration
Renu Maria Mathews, D. Raveena Judie Dolly, Ann Therese Francy
1280-1284
77 Design of Least Complex S-Box and its Fault Detection for Robust AES Algorithm
G. Alisha Evangeline, S. Krithiga, J. Jesu Mejula
1285-1290