Volume 1 Issue 10 December-2012

S.No. Title and Authors of Paper Page.No.
1 A Survey on Coverage Problems in Wireless Sensor Networks
SANGEETHA S,RAMA LAKSHMI K
001-006
2 An efficient unobservable routing scheme resistant against DoS attacks
Chithra K,Dr.S.Karthik
007-013
3 Bio-Medical Image Retrieval Using SVM
S.Nithya, G.ShineLet
014-018
4 IDENTIFICATION OF HUMAN THROUGH PALMPRINT: A REVIEW
Shalini Agarwal , Dr. P.C Gupta
019-022
5 Simulation Of Echo Cancellation Of Speech Signal In Noisy Environment
R.Jegan, R.Manikandan,W.S.Nimi, W.S Kiran
023-025
6 Authentication for Online Voting Using Steganography and Biometrics
Linu Paul, Anilkumar M.N
026-032
7 EFFORT ESTIMATION OF SOFTWARE PROJECT
R Raja Ramesh Merugu, Venkat Ravi Kumar Dammu
033-041
8 TaaS: An Evolution of Testing Services using Cloud Computing
Abhinava Kumar Srivastava,Divya Kant Yadav,Sandeep Kumar Pandey
042-049
9 A New Approach to Improve Power Quality and Energy Saving Scheme by Dimming of Light Intensity
Suparna Pal,Chayan Chakraborty
050-056
10 Design of Robotics Technology for Application in the Electrical field with narrow and hazardous space
Suparna Pal, Chayan Chakraborty
057-062
11 A Review on Ensemble of Diverse Artificial Neural Networks
Mittal C. Patel, Prof. Mahesh Panchal
063-070
12 NEED OF FUTURE WEB TECHNOLOGY THE SEMANTIC WEB A BRIEF SURVEY
S.Raja Ranganathan,Dr.M.Marrikkannan,Dr.S.Karthik
071-075
13 MULTI AGENT-BASED DISTRIBUTED DATA MINING
REECHA B. PRAJAPATI, SUMITRA MENARIA
076-081
14 A BRIEF SURVEY ON THE CONCEPTS OF AGENT AND ARTIFICIAL IMMUNE SYSTEMS
PRIYADARSHINI.S, Dr. S KARTHIK
082-085
15 SOFTWARE MODULE CLUSTERING USING SINGLE AND MULTI-OBJECTIVE APPROACHES
CHANDRAKANTH P,ANUSHA G,KISHORE C
086-090
16 SURVEY ON DYNAMIC ANALYSIS TO DETECT VULNERABILITIES AND UNSAFE COMPONENT LOADINGS
Geethanjali.N, Maragatham.T, Dr. Karthik. S
091-093
17 Survey on Kannada Digits Recognition Using OCR Technique
Vishweshwarayya C. Hallur, Avinash A. Malawade, Seema G. Itagi
094-098
18 FUNDAMENTAL ISSUES FOR DEVELOPING INFORMATION SECURITY POLICIES
Mr. Hardeep Singh Sidhu
099-104
19 Enhanced Approach of Making Mobile Base Station in LEACH
Gunjan Jain, S.R Biradar
105-107
20 A cryptosystem based on Vigenère cipher with varying key
Quist-Aphetsi Kester
108-113
21 Cloud computing for economic optimization in e-Governance: A Case Study
Manmohan Brahma, Ram Krushna Das, K C Gouda
114-120
22 Survey of Image Denoising Methods using Dual-Tree Complex DWT and Double-Density Complex DWT
Mr. R. K. Sarawale, Dr. Mrs. S.R. Chougule
121-126
23 Tracking of Moving object in Video scene using Neural Network
Chitra Singh, Prof. Toran Verma
127-129
24 A Review on Multimedia Cloud Computing, its Advantages and Challenges
P.Bindhu Shamily, S.Durga
130-133
25 Introduction to image restoration and comparison of various methods of image restoration
Vaimin Raval,Prof.Lokesh Gagnani
134-136
26 Using Genetic Algorithm for Symmetric key Generation in Image Encryption
Aarti Soni, Suyash Agrawal
137-140
27 Optimizing Web Mining using Multi-agent System
Shah Yesha B,Prof G.B.Jethava
141-143
28 Object Oriented to Aspect Oriented: A Case Study
Harpreet Kaur
144-147
29 Energy Efficient operation in Switched Reluctance Motor by Controlling the Voltage
M.Ravindran, Dr. V.Kirubakaran
148-152
30 A Survey on Anonymous Publication of Data
Jyoti Gajendra,Mr. Khom Lal Sinha
153-156
31 Detection of Mobile Replica Node Attacks in Mobile Sensor Networks Using Speed Measurement Testing
T.Nidharshini, V.Janani
157-161
32 Load Frequency Control of a Small Isolated Power Station by Using Supercapacitor Based Energy Storage System
Rahul Nema,Dr. Anurag Trivedi
162-168
33 A Congestion Control And Policy Enforcing Mechanism For Reliable Routing Using SATEM In Mobile Ad Hoc Networks
M. Rajalakshmi, M. Manikandan
169-173
34 Review of Comparative Analysis of Empirical Propagation model for WiMAX
Sachin S. Kale, A.N. Jadhav
174-178
35 Survey Paper of Image Matching and Retrieval using Discrete Sine Transformation
Vivek Kumar Soni,Mrs. Shikha Agrawal
179-184
36 A Review on Support Vector Machine for Data Classification
Himani Bhavsar, Mahesh H. Panchal
185-189
37 Practical and Secure Outsourcing of Linear Programming in Cloud Computing
K. Jaya Santhosh, S. Reshma
190-198
38 Link Aggregation Strategies
Chithra Balakrishnan, M.Manikandan
199-203
39 Biclustering for Microarray Data: A Short and Comprehensive Tutorial
Arabinda Panda,Satchidananda Dehuri
204-208
40 Xml Based Solution to MDA
Mr. Ketan B. Rathod,Ms. Astha Baxi
209-215
41 Positioning of mobile station using Received signal strength and Time of arrival
Mr. S. S. Bhandare, Mrs.M.R.Dixit
216-218
42 Enhancing Performance of Rectangular Patch Antenna Using “SYMMETERICAL CIRCUITOUS SQAURES” Loaded with Metamaterial Structure
Anamika Verma, Dr.Sarita Singh Bhadauria
219-224
43 Criminals and crime hotspot detection using data mining algorithms: clustering and classification
Sukanya.M, T.Kalaikumaran, Dr.S.Karthik
225-227
44 Data mining techniques for detecting the crime hotspot by using GIS
Sangamithra.V, T.Kalaikumaran, Dr.S.Karthik
228-231
45 Biometrics Security Technology with Speaker Recognition
Ravi Anand, Jaikaran Singh, MukeshTiwari, Vikas Jains,Sanjay Rathore
232-236
46 Optimal Design RRC Pulse Shape Polyphase FIR Decimation Filter for Multi-Standard Wireless Transceivers
MANDEEP SINGH SAINI, RAJIV KUMAR
237-244
47 Empirical Study on Predictors of Student Learning Satisfaction from Web Based Learning Systems
Riyanka Dwivedi, Vipin Khurana , Advitiya Saxena
245-258
48 Analysis and Experiment of MEMS based Micropump for Microfluidic Application
K.Ganesan,Dr.V.Palanisamy
259-264
49 Hybrid Computational Intelligence for Optimization Based On PSO and DE
Preeti Soni, Prof. Minu Choudhary
265-267
50 Distributional canonical sine transform by Using Gelfand-shilov technique
S.B.Chavhan
268-273
51 Coordinated control ULTC power transformer with STATCOM for Voltage Control and Reactive Power Compensation
Ratnesh Singh
274-281
52 Anomaly Exposure in Network Traffic and its collision: a Survey
Saurabh Ratnaparkhi,Anup Bhange
282-286
53 A Comparative Survey on Availability and Integrity Verification in Multi-Cloud
Ms.V.Mangaiyarkkarasi, Mr.K.A.Dhamodaran
287-295
54 Various Security Threats and Issues in Wireless Networks: A Survey
D.Prabakar, Dr.M.Marikkannan , Dr.S.Karthik
296-300
55 Review of issues in automatic labelling of formatted document
Pallavi Galgale , Priyanka Ahire, Snehal Ingavale, Dr. R.S. Prasad
301-304
56 Enhancer- A Time Commit Protocol
Himanshu Dubey, Aman Kr. Srivastava, Ram Swaroop Misra
305-309
57 A Survey on content Anatomy Approach to Temporal Topic Summarization
P.Sathyashree,A.Mansoor ali,D.Mansoor hussian
310-314