Volume 1 Issue 8 October-2012

S.No. Title and Authors of Paper Page.No.
1 HOST SELECTION METHODOLOGY IN CLOUD COMPUTING ENVIRONMENT
Pawan Kumar, Pijush Kanti Dutta Pramanik
001-005
2 XML Query Answering using Tree based Association Rules
Mrs.Mopuri Sujatha,Mrs. Dhyaram Lakshmi Padmaja
006-010
3 Recognition and Classification of Broken Characters using Feed Forward Neural Network to Enhance an OCR Solution
Manas Yetirajam, Manas Ranjan Nayak, Subhagata Chattopadhyay
011-015
4 A Relevant Document Information Clustering Algorithm for Web Search Engine
Y.SureshBabu, K.Venkat Mutyalu, Y.A.Siva Prasad
016-020
5 Linearized Modeling of Single Machine Infinite Bus Power System and Controllers for Small Signal Stability Investigation and Enhancement
Balwinder Singh Surjan
021-028
6 Perspective Study on Resource Information Aggregation in Computational Grid
R. Venkatesan, M. Manicka Raja
029-033
7 Perspective Study on task scheduling in computational grid
R. Venkatesan, J. Raj Thilak
034-040
8 Bandwidth and Energy Management in Wireless Sensor Networks
Ashish Talikoti, Jayashree A
041-045
9 Preventing SQL Injection Attacks Using Combinatorial Approach
Dimple D. Raikar, Sharada Kulkarni,Padma Dandannavar
046-052
10 Network Supporting Multilayered Quality of Service Routing in Wireless sensor network: Enhancing better QoS in WSNs
Shivanand B L, Prof Jayashree A
053-059
11 Improved Shortest Remaining Burst Round Robin (ISRBRR) Using RMS as its time quantum
P.Surendra Varma
060-064
12 Load Frequency Control of Interconnected Hydro-Thermal Power System Using Fuzzy and Conventional PI Controller
Sachin Khajuria, Jaspreet Kaur
065-072
13 A SECURE MEDICAL IMAGE WATERMARKING TECHNIQUE USING NO-REFERENCE QUALITY METRICES
ShifaliGarg, Seema
073-078
14 Performance Evaluation of AODV under Blackhole attack in MANET using NS2 simulator
Ajay Sharma,Rajesh Babu Ahirwar,Smita Patil
079-082
15 Data mining approach to evaluate the data lossless Data Compression algorithms
Nishad P.M.,Dr. R.Manicka chezian
083-092
16 Power System Stability Improvement By Using SVC With TID Tuned PID Controller
Habibur, Dr. Fayzur, Harun
093-098
17 Information and Communication Technologies & Woman Empowerment in India
Dr. Mini Amit Arrawatia, Mr. Pankaj Meel
099-104
18 QoS Parameters Analysis to Improve QoS in WSNs Routing Protocol
Ipsita Panda
105-114
19 Survey on virtual machine security
Bright Prabahar P,Bijolin Edwin E
115-121
20 Optimal sizing and Placement of Capacitors for Loss Minimization In 33-Bus Radial Distribution System Using Genetic Algorithm in MATLAB Environment
Mr. Manish Gupta, Dr. Balwinder Singh Surjan
122-127
21 Quantify the intersection of behavior in the work environment
K.Hareesh Kumar, D.Uma Devi
140-143
22 Workload Optimization by Horizontal Aggregation in SQL for Data Mining Analysis
Mr. Prasanna M. Rathod, Prof. Mrs. Karuna G. Bagde
144-147
23 A General Method to Solve All Two-Port Ladder Networks
Dr. C. Gurudas Nayak, Prasanna K. Mahavarkar, Akshata G. Nayak, Chintala Abhinav Reddy
148-149
24 Avoid Impact of Jamming Using Multipath Routing Based on Wireless Mesh Networks
M. KIRAN KUMAR, M. KANCHANA, I. SAPTHAMI, B. KRISHNA MURTHY
150-154
25 Effective Load Distribution Over Multipath Networks to Control the Delay
Rajesh Kumar Injamala, P.Samatha,T.Bharath Manohar, E.V.N.Jyothi, Sindhu Vegesna
155-159
26 A Detailed Survey on Various Record Deduplication Methods
Lalitha. L, Maheswari.B,Dr.Karthik.S
160-163
27 A Survey of Different Software Fault Prediction Using Data Mining Techniques Methods
Karpagavadivu.K, Maragatham.T, Dr.Karthik.S
164-166
28 Global sensitivity and analysis of O.D.E by solving the P.D.E
DrAyaz Ahmad
167-170
29 A Performance Analysis of Energy Aware and Link Stability based Routing Protocols for MANET
Deepthy Mathews, S.Kannan, Dr.S.Karthik
171-175
30 A Survey on Fault Tolerance in Work flow Management and Scheduling
K.Ganga,Dr S.Karthik, A.Christopher Paul
176-179
31 Survey on Effective Software Effort Estimation Techniques
Rathi. J, Kamalraj. R, Karthik. S
180-183
32 Cloud Service Negotiation Techniques
Ariya T K, Christophor Paul, Dr S Karthik
184-188
33 SEARCHING TECHNIQUES IN ENCRYPTED CLOUD DATA
Deepa P L, S Vinoth Kumar, Dr S Karthik
189-193
34 TPA BASED CLOUD STORAGE SECURITY TECHNIQUES
ANUPRIYA.A.S, ANANTHI, Dr. S KARTHIK
194-197
35 Study on Techniques to Improve Diversity in Recommender Systems
Vaishnavi.S, Jayanthi.A, Karthik.S
198-201
36 Designing Authentication for Wireless Communication Security Protocol
Ms. Roshni Chandrawanshi, Prof. Ravi Mohan, Mr. Shiv Prakash Chandrawanshi
202-206
37 Taxonomy of Cyber Crimes and Legislation in Saudi Arabia
Naasir Kamaal Khan
207-209
38 A Study on Autonomic Placement and Resource Management with Cloud Workloads
T.Ambika, S.Ananthi, Dr.S.Karthik
210-213
39 A Survey on Access Control of Cloud Data
Ms Reshma Sadasivan, Mrs K.Sangeetha, Dr S.Karthik
214-218
40 Enhancing Key Management In Intrusion Detection System For Manets
Ms Shyama Sudarsan, Mrs Vinodhini, Dr S.Karthik
219-222
41 Smart Human Resource Information System
S.B.Awati, C.S.Kale, J.S.Awati
223-229
42 Small Signal Stability Investigation of SMIB System Using V ariable Structure Control
Balwinder Singh, Rashmi Vikal, Ashish Dutta
230-233
43 GRID ARCHITECTURES FOR eLEARNING SYSTEM
Sanjeev Narayan Bal
234-241
44 Systematic Survey on Object Tracking Methods in Video
J.Joshan Athanesious,P.Suresh
242-247
45 A Novel Approach to Improve Avalanche Effect of AES Algorithm
Chandra Prakash Dewangan,Shashikant Agrawal
248-252
46 MANET PROTOCOLS ANALYSIS WITH VARYING PAUSE TIME SIMULATION TIME AND SPEED
Deepak Shrivastva, Saurabh Singh Rajput, Hemant Kumar
253-258
47 Healthcare monitoring system for web-enabled smart buildings
Szalontai Levente
259-264
48 General Study on Moving Object Segmentation Methods for Video
S.Arun Inigo, P.Suresh
265-270
49 Comparative Study and Analysis of Soft Computing Techniques Implemented in Secure Data Transmission
Hemant Kumar Garg, P.C.Gupta
271-274
50 Performance Analysis of Different Parallel CMOS Adders and Effect of Channel Width at 0.18um
Akanksha Mandowara, Mukesh Maheshwari
275-281
51 RULE-BASE DATA MINING SYSTEMS FOR CUSTOMER QUERIES
A.Kaleeswaran, V.Ramasamy
282-286
52 Study & Analysis of Web Content Mining Tools to Improve Techniques of Web Data Mining
Arvind Kumar Sharma, P.C. Gupta
287-293
53 Overview Of Video Condensation In Streaming Video
S.charles Samuel raj, P. Suresh
294-297
54 Implementation of Enhanced CloSpan Algorithm for CP-Miner
Amita Kiran. B,Soujanya.K.L.S, Raju. G
298-301
55 A SIP Based Authentication Scheme for RFID Systems
Shruti S.Utpat, Parikshit N.Mahalle
302-305
56 Data Hiding in Color Images Using Modified Quantization Table
Neha Batra,Pooja Kaushik
306-312
57 DISTRIBUTED GENERATION- A NEW APPROACH
Kamal Kant Sharma, Dr Balwinder Singh
313-318
58 A Survey on Multi-Focus ImageFusion Methods
A. Anish,T. Jemima Jebaseeli
319-324
59 Comparison of Band-stop FIR Filter using Modified Hamming Window and Other Window functions and Its Application in Filtering a Mutitone Signal
Saurabh Singh Rajput, Dr. S.S. Bhadauria
325-328
60 Capacity Analysis of MIMO OFDM System using Water filling Algorithm
Hemangi Deshmukh, Harsh Goud
329-333
61 A Low-Quiescent Current Two- Input/Output Buffer with Class A-B Output Stage for LCD Driver
Deepchand Jaiswal, Rita Jain, M. Zahid Alam
334-338
62 A Review Paper on Face Recognition Techniques
Sujata G. Bhele, V. H. Mankar
339-346
63 A Survey on Security in Palmprint Recognition: A Biometric Trait
Dhaneshwar Prasad Dewangan, Abhishek Pandey
347-351
64 A Comprehensive Study of Major Techniques of Facial Expression Recognition
Tanvi Sheikh, Shikha Agrawal
352-356
65 A Survey on Scheduling of Parallel Programs in Heterogeneous System
Manoj Kumar Singh, Rajesh Tiwari
357-360
66 A Survey of Identification of Soybean Crop Diseases
Pratibha Dongre, Mr. Toran Verma
361-364
67 Evaluating NIST Metric for English to Hindi Language Using ManTra Machine Translation Engine
Neeraj Tomer,Deepa Sinha
365-369
68 A Proficient Apprehension-Based Mining Replica For Ornamental Text Clustering
B. Pavan Kumar,J. Nagamuneiah
370-376
69 A Study of Green ICT and Cloud Computing Implementation at Higher Technical Education Institution
Kavita Suryawanshi, Sameer Narkehde
377-382
70 Implementing Software as a Service in Cloud using Android Applications
S.Priyadarsini, N.Deepa, Himanshu Kumar
383-386
71 Visual Composition and Automatic Code Generation for Heterogeneous Components Coordination with Reo
Herve Kabamba Mbikayi
387-394