S.No. |
Title and Authors of Paper |
Page.No. |
1 |
HOST SELECTION METHODOLOGY IN CLOUD COMPUTING ENVIRONMENT
Pawan Kumar, Pijush Kanti Dutta Pramanik |
001-005 |
2 |
XML Query Answering using Tree based Association Rules
Mrs.Mopuri Sujatha,Mrs. Dhyaram Lakshmi Padmaja |
006-010 |
3 |
Recognition and Classification of Broken Characters using Feed Forward Neural Network to Enhance an OCR Solution
Manas Yetirajam, Manas Ranjan Nayak, Subhagata Chattopadhyay |
011-015 |
4 |
A Relevant Document Information Clustering Algorithm for Web Search Engine
Y.SureshBabu, K.Venkat Mutyalu, Y.A.Siva Prasad |
016-020 |
5 |
Linearized Modeling of Single Machine Infinite Bus Power System and Controllers for Small Signal Stability Investigation and Enhancement
Balwinder Singh Surjan |
021-028 |
6 |
Perspective Study on Resource Information Aggregation in Computational Grid
R. Venkatesan, M. Manicka Raja |
029-033 |
7 |
Perspective Study on task scheduling in computational grid
R. Venkatesan, J. Raj Thilak |
034-040 |
8 |
Bandwidth and Energy Management in Wireless Sensor Networks
Ashish Talikoti, Jayashree A |
041-045 |
9 |
Preventing SQL Injection Attacks Using Combinatorial Approach
Dimple D. Raikar, Sharada Kulkarni,Padma Dandannavar |
046-052 |
10 |
Network Supporting Multilayered Quality of Service Routing in Wireless sensor network: Enhancing better QoS in WSNs
Shivanand B L, Prof Jayashree A |
053-059 |
11 |
Improved Shortest Remaining Burst Round Robin (ISRBRR) Using RMS as its time quantum
P.Surendra Varma |
060-064 |
12 |
Load Frequency Control of Interconnected Hydro-Thermal Power System Using Fuzzy and Conventional PI Controller
Sachin Khajuria, Jaspreet Kaur |
065-072 |
13 |
A SECURE MEDICAL IMAGE WATERMARKING TECHNIQUE USING NO-REFERENCE QUALITY METRICES
ShifaliGarg, Seema |
073-078 |
14 |
Performance Evaluation of AODV under Blackhole attack in MANET using NS2 simulator
Ajay Sharma,Rajesh Babu Ahirwar,Smita Patil |
079-082 |
15 |
Data mining approach to evaluate the data lossless Data Compression algorithms
Nishad P.M.,Dr. R.Manicka chezian |
083-092 |
16 |
Power System Stability Improvement By Using SVC With TID Tuned PID Controller
Habibur, Dr. Fayzur, Harun |
093-098 |
17 |
Information and Communication Technologies & Woman Empowerment in India
Dr. Mini Amit Arrawatia, Mr. Pankaj Meel |
099-104 |
18 |
QoS Parameters Analysis to Improve QoS in WSNs Routing Protocol
Ipsita Panda |
105-114 |
19 |
Survey on virtual machine security
Bright Prabahar P,Bijolin Edwin E |
115-121 |
20 |
Optimal sizing and Placement of Capacitors for Loss Minimization In 33-Bus Radial Distribution System Using Genetic Algorithm in MATLAB Environment
Mr. Manish Gupta, Dr. Balwinder Singh Surjan |
122-127 |
21 |
Quantify the intersection of behavior in the work environment
K.Hareesh Kumar, D.Uma Devi |
140-143 |
22 |
Workload Optimization by Horizontal Aggregation in SQL for Data Mining Analysis
Mr. Prasanna M. Rathod, Prof. Mrs. Karuna G. Bagde |
144-147 |
23 |
A General Method to Solve All Two-Port Ladder Networks
Dr. C. Gurudas Nayak, Prasanna K. Mahavarkar, Akshata G. Nayak, Chintala Abhinav Reddy |
148-149 |
24 |
Avoid Impact of Jamming Using Multipath Routing Based on Wireless Mesh Networks
M. KIRAN KUMAR, M. KANCHANA, I. SAPTHAMI, B. KRISHNA MURTHY |
150-154 |
25 |
Effective Load Distribution Over Multipath Networks to Control the Delay
Rajesh Kumar Injamala, P.Samatha,T.Bharath Manohar, E.V.N.Jyothi, Sindhu Vegesna |
155-159 |
26 |
A Detailed Survey on Various Record Deduplication Methods
Lalitha. L, Maheswari.B,Dr.Karthik.S |
160-163 |
27 |
A Survey of Different Software Fault Prediction Using Data Mining Techniques Methods
Karpagavadivu.K, Maragatham.T, Dr.Karthik.S |
164-166 |
28 |
Global sensitivity and analysis of O.D.E by solving the P.D.E
DrAyaz Ahmad |
167-170 |
29 |
A Performance Analysis of Energy Aware and Link Stability based Routing Protocols for MANET
Deepthy Mathews, S.Kannan, Dr.S.Karthik |
171-175 |
30 |
A Survey on Fault Tolerance in Work flow Management and Scheduling
K.Ganga,Dr S.Karthik, A.Christopher Paul |
176-179 |
31 |
Survey on Effective Software Effort Estimation Techniques
Rathi. J, Kamalraj. R, Karthik. S |
180-183 |
32 |
Cloud Service Negotiation Techniques
Ariya T K, Christophor Paul, Dr S Karthik |
184-188 |
33 |
SEARCHING TECHNIQUES IN ENCRYPTED CLOUD DATA
Deepa P L, S Vinoth Kumar, Dr S Karthik |
189-193 |
34 |
TPA BASED CLOUD STORAGE SECURITY TECHNIQUES
ANUPRIYA.A.S, ANANTHI, Dr. S KARTHIK |
194-197 |
35 |
Study on Techniques to Improve Diversity in Recommender Systems
Vaishnavi.S, Jayanthi.A, Karthik.S |
198-201 |
36 |
Designing Authentication for Wireless Communication Security Protocol
Ms. Roshni Chandrawanshi, Prof. Ravi Mohan, Mr. Shiv Prakash Chandrawanshi |
202-206 |
37 |
Taxonomy of Cyber Crimes and Legislation in Saudi Arabia
Naasir Kamaal Khan |
207-209 |
38 |
A Study on Autonomic Placement and Resource Management with Cloud Workloads
T.Ambika, S.Ananthi, Dr.S.Karthik |
210-213 |
39 |
A Survey on Access Control of Cloud Data
Ms Reshma Sadasivan, Mrs K.Sangeetha, Dr S.Karthik |
214-218 |
40 |
Enhancing Key Management In Intrusion Detection System For Manets
Ms Shyama Sudarsan, Mrs Vinodhini, Dr S.Karthik |
219-222 |
41 |
Smart Human Resource Information System
S.B.Awati, C.S.Kale, J.S.Awati |
223-229 |
42 |
Small Signal Stability Investigation of SMIB System Using V ariable Structure Control
Balwinder Singh, Rashmi Vikal, Ashish Dutta |
230-233 |
43 |
GRID ARCHITECTURES FOR eLEARNING SYSTEM
Sanjeev Narayan Bal |
234-241 |
44 |
Systematic Survey on Object Tracking Methods in Video
J.Joshan Athanesious,P.Suresh |
242-247 |
45 |
A Novel Approach to Improve Avalanche Effect of AES Algorithm
Chandra Prakash Dewangan,Shashikant Agrawal |
248-252 |
46 |
MANET PROTOCOLS ANALYSIS WITH VARYING PAUSE TIME SIMULATION TIME AND SPEED
Deepak Shrivastva, Saurabh Singh Rajput, Hemant Kumar |
253-258 |
47 |
Healthcare monitoring system for web-enabled smart buildings
Szalontai Levente |
259-264 |
48 |
General Study on Moving Object Segmentation Methods for Video
S.Arun Inigo, P.Suresh |
265-270 |
49 |
Comparative Study and Analysis of Soft Computing Techniques Implemented in Secure Data Transmission
Hemant Kumar Garg, P.C.Gupta |
271-274 |
50 |
Performance Analysis of Different Parallel CMOS Adders and Effect of Channel Width at 0.18um
Akanksha Mandowara, Mukesh Maheshwari |
275-281 |
51 |
RULE-BASE DATA MINING SYSTEMS FOR CUSTOMER QUERIES
A.Kaleeswaran, V.Ramasamy |
282-286 |
52 |
Study & Analysis of Web Content Mining Tools to Improve Techniques of Web Data Mining
Arvind Kumar Sharma, P.C. Gupta |
287-293 |
53 |
Overview Of Video Condensation In Streaming Video
S.charles Samuel raj, P. Suresh |
294-297 |
54 |
Implementation of Enhanced CloSpan Algorithm for CP-Miner
Amita Kiran. B,Soujanya.K.L.S, Raju. G |
298-301 |
55 |
A SIP Based Authentication Scheme for RFID Systems
Shruti S.Utpat, Parikshit N.Mahalle |
302-305 |
56 |
Data Hiding in Color Images Using Modified Quantization Table
Neha Batra,Pooja Kaushik |
306-312 |
57 |
DISTRIBUTED GENERATION- A NEW APPROACH
Kamal Kant Sharma, Dr Balwinder Singh |
313-318 |
58 |
A Survey on Multi-Focus ImageFusion Methods
A. Anish,T. Jemima Jebaseeli |
319-324 |
59 |
Comparison of Band-stop FIR Filter using Modified Hamming Window and Other Window functions and Its Application in Filtering a Mutitone Signal
Saurabh Singh Rajput, Dr. S.S. Bhadauria |
325-328 |
60 |
Capacity Analysis of MIMO OFDM System using Water filling Algorithm
Hemangi Deshmukh, Harsh Goud |
329-333 |
61 |
A Low-Quiescent Current Two- Input/Output Buffer with Class A-B Output Stage for LCD Driver
Deepchand Jaiswal, Rita Jain, M. Zahid Alam |
334-338 |
62 |
A Review Paper on Face Recognition Techniques
Sujata G. Bhele, V. H. Mankar |
339-346 |
63 |
A Survey on Security in Palmprint Recognition: A Biometric Trait
Dhaneshwar Prasad Dewangan, Abhishek Pandey |
347-351 |
64 |
A Comprehensive Study of Major Techniques of Facial Expression Recognition
Tanvi Sheikh, Shikha Agrawal |
352-356 |
65 |
A Survey on Scheduling of Parallel Programs in Heterogeneous System
Manoj Kumar Singh, Rajesh Tiwari |
357-360 |
66 |
A Survey of Identification of Soybean Crop Diseases
Pratibha Dongre, Mr. Toran Verma |
361-364 |
67 |
Evaluating NIST Metric for English to Hindi Language Using ManTra Machine Translation Engine
Neeraj Tomer,Deepa Sinha |
365-369 |
68 |
A Proficient Apprehension-Based Mining Replica For Ornamental Text Clustering
B. Pavan Kumar,J. Nagamuneiah |
370-376 |
69 |
A Study of Green ICT and Cloud Computing Implementation at Higher Technical Education Institution
Kavita Suryawanshi, Sameer Narkehde |
377-382 |
70 |
Implementing Software as a Service in Cloud using Android Applications
S.Priyadarsini, N.Deepa, Himanshu Kumar |
383-386 |
71 |
Visual Composition and Automatic Code Generation for Heterogeneous Components Coordination with Reo
Herve Kabamba Mbikayi |
387-394 |