S.No. |
Title and Authors of Paper |
Page.No. |
1 |
2ACK-Scheme: Routing Misbehavior Detection in MANETs Using OLSR
Prof. Shalini V. Wankhade |
001-007 |
2 |
Implementation of Matched Filter Based DSSS Digital GPS Receiver
V.SRIDHAR,T.NAGALAXMI,M.V BRAMHANANDA REDDY,M.SUNITHA RANI,M.RENUKA |
008-017 |
3 |
Design and Implementation of Optimal Pulse Shaping Filters for Digital Radio Systems
V.SRIDHAR,T.NAGALAXMI,M.V BRAMHANANDA REDDY,M.SUNITHA RANI,M.RENUKA |
018-023 |
4 |
SALT & PEPPER NOISE REMOVAL USING FUZZY BASED ADAPTIVE FILTER
Jaspreet Kaur |
024-026 |
5 |
Heterogeneous Interface Mobile Node in NS2
Sachin Dattatraya Patil, Varshapriya Jyotinagar |
027-032 |
6 |
OFDM: BER performance by Cyclic Prefix Length
Inderjeet Kaur, Dr.Y.K.Mathur |
038-041 |
7 |
Design and Verification Eight Port Router for Network on Chip
Sana.Ranjitha,B.Vijay Bhaskar ,R.SuryaPrakash |
042-046 |
8 |
Selective on-demand protocol for finding reliable nodes to form stable paths in ADHOC networks
T. Rajamohan Reddy, N. Sobharani |
047-050 |
9 |
ONLINE BUSINESS MANAGEMENT USING HYBRID CLOUD
Vanaja Gokul, Venkatesh.G, Vignesh.B, GowriShankar.M |
051-059 |
10 |
Interference Mitigation by CDMA RAKE Receiver With Walsh-Hadamard Sequence
Braj Bhooshan Pandey, Prof. Abhishek Choubey |
060-064 |
11 |
Speech based Emotion Recognition with Gaussian Mixture Model
Nitin Thapliyal,Gargi Amoli |
065-069 |
12 |
An Initial Approach to Provide Security in Cloud Network
Dr. S. Srinivasu, K.P.R KrishnaChaitanya, K.Naresh Kumar |
070-074 |
13 |
Determination of Noise Levels in Using AMS Features of Noisy Speech Signal and Their Comparison
Mrs. Anusha Krishna Prakash |
075-078 |
14 |
PIC CONTROLLER BASED PROCESS CONTROL SYSTEM USING GSM
Ritesh Gupta , Mukti Awad |
079-081 |
15 |
STUDY AND PERFORMANCE ANALYSIS OF CRYPTOGRAPHY ALGORITHMS
S. Pavithra,Mrs. E. Ramadevi |
082-086 |
16 |
Rapid Disclosure of Client’s Spot With the help of Location Based Services
Mr. Shaik Masood Ahemad,K.V.Nagendra |
087-090 |
17 |
New techniques to enhance FPGA based system security
Mr. Binu K Mathew, Dr. K.P Zachariah |
091-094 |
18 |
Dynamically Adjusting Network Topology for MANETS By using DBET
T.Damodar Yadav, K.M.Hemambaran |
095-101 |
19 |
Cloud Service Utilization
Pranay Chauhan |
102-105 |
20 |
Study of Maximum Power Point Tracking Using Perturb and Observe Method
Sonali Surawdhaniwar, Mr. Ritesh Diwan |
106-110 |
21 |
A Failure Recovery Scheme in Mobile Computing System Based on Checkpointing and Handoff Count
Anurag Sachan , Prachi Maheshwari |
111-118 |
22 |
A Customized Ontological-Based Web Information Collection Model
Krishna Madhav Majety, Uma Devi Deva, Sailaja Sanaka |
119-128 |
23 |
Wireless Sensor Networks for Disaster Management
Harminder Kaur,Ravinder Singh Sawhney,Navita Komal |
129-134 |
24 |
Approved Protocol For Reliability In Peer to Peer Networks
Farzane kabudvand, adel hassas |
135-139 |
25 |
A New Approach of Region Descriptor in content based image compression in medical applications
Adel hassas , Farzane kabudvand |
140-144 |
26 |
ANALYSIS OF WAVELET TRANSFORM AND FAST WAVELET TRANSFORM FOR IMAGE COMPRESSION: REVIEW
Er.Naveen Dhillon, Er. Kuldeep Sharma,Er. Kanika Kaushal |
145-153 |
27 |
Analysis of Image Segmentation and Edge Detection in Medical Images
B.Sabarigiri, H.Vignesh Ramamoorthy |
154-158 |
28 |
Evaluating the Performance and Delay in Unstructured Peer to Peer Networks
K L Haritha, B Lalitha |
159-163 |
29 |
INCREASING RESONANT FREQUENCY OF MICROSTRIP PATCH ANTENNA BY DECREASING THE VALUE OF DIELECTRIC CONSTANT OF SUBSTRATE
MANVENDRA SINGH BHANDARI, Dr. S C GUPTA |
164-166 |
30 |
A New Fragile Approach for Optimization in Invisible Image Watermarking by Using Symmetric Key Algorithms
Vandana Tehlani |
167-171 |
31 |
Energy Efficient Geographical Routing Protocol with Location Aware Routing in MANET
Shwaita Kodesia,Asst. Prof. PremNarayan Arya |
172-179 |
32 |
COMPREHENSIVE STUDY OF DIGITAL FORENSICS
Jatinder kaur, Gurpal Singh |
180-184 |
33 |
SEMANTIC BASED LEARNING APPROACH IN EDUCATION SYSTEM
Dr Shikha Singh , Gaurav Jindal |
185-189 |
34 |
Comparative analysis between PCA and Fast ICA based Denoising of CFA Images for Single Sensor Digital Cameras
Shawetangi kala, Raj Kumar Sahu |
190-195 |
35 |
An Improved Approach in Clustering Algorithm for Load Balancing in Wireless Sensor Networks
J S Rauthan, S Mishra |
196-202 |
36 |
SMART CARD BASED TOLL GATE AUTOMATED SYSTEM
V.SRIDHAR,M.NAGENDRA |
203-212 |
37 |
Optimized MAC Protocol with Power Efficiency in Mobile Ad-hoc Network
Rahul Mukherjee |
213-221 |
38 |
An ACO Approach to Solve a Variant of TSP
Bharat V. Chawda, Nitesh M. Sureja |
222-226 |
39 |
Design of WLAN RF front end LNA for Noise & Gain Improvement
Pankaj Sahu, Avinash Gaur, Abhishek Singh |
227-230 |
40 |
SECURE MULTICAST COMMUNICATION USING GROUP BASED MULTICAST HIERARCHY
R. Varalakshmi, Dr. V. Rhymend Uthariaraj |
231-236 |
41 |
Study and Development of Iris Segmentation and Normalisation Techniques
Anshu Parashar,Yogita Gulati |
237-240 |
42 |
FPGA IMPLEMENTATION OF FOUR PHASE CODE DESIGN USING MODIFIED GENETIC ALGORITHM (MGA)
Kandarpa Srinivas, Bandi Sarada, Malijeddi Murali |
241-250 |
43 |
Design of Local Oscillator Circuit for FINFET and SET
Haramardeep Singh |
251-255 |
44 |
Comparison of Memetic Algorithm and PSO in Optimizing Multi Job Shop Scheduling
M. Nandhini, S.Kanmani |
256-261 |
45 |
A SURVEY ON CLOUD DATA SECURITY USING ENCRYPTIOIN TECHNIQUE
C.BAGYALAKSHMI,DR.R.MANICKA CHEZIAN |
262-265 |
46 |
A SURVEY ON CONTENT BASED IMAGE RETRIEVAL SYSTEM
M.Janani,Dr.R.Manicka Chezian |
266-269 |
47 |
A SURVEY ON AD-HOC IN WIRELESS SENSOR NETWORKS
KARTHIKA.M,DR.R.MANICKA CHEZIAN |
270-273 |
48 |
A Novel Low power and Area efficient Carry Look Ahead Adder Using GDI Technique
Pakkiraiah chakali, M.Bharathi, Adilakshmi Siliveru |
274-279 |
49 |
A Survey on Clustering Based Image Segmentation
Santanu Bhowmik, Viki Datta |
280-284 |
50 |
Micro-cantilever Sensors for Detection of Pesticide Contents in the Water-table of Malwa Region in Punjab
Gurleen Kaur, Ravinder Singh Sawhney, Rajan Vohra |
285-290 |
51 |
LOW POWER MULTIPLEXER BASED FULL ADDER USING PASS TRANSISTOR LOGIC
B. Dilli kumar, K. Charan kumar, M. Bharathi |
291-296 |
52 |
A smart Home Security system based on ARM9
B. Srinivasa sarma, Dr. P. Sudhakar Reddy |
297-302 |
53 |
Gabor Filter, PCA and SVM Based Breast Tissue Analysis and Classification
Pravin S. Hajare, Vaibhav V. Dixit |
303-306 |
54 |
A 5 level, 3 phase H-bridge PWM method for I.M. Controlling with field oriented techniques
Siddharth Shukla,N.K. SINGH,Amit Gupta |
307-312 |
55 |
CLASSIFICATION OF TEXT USING FUZZY BASED INCREMENTAL FEATURE CLUSTERING ALGORITHM
ANILKUMARREDDY TETALI, B P N MADHUKUMAR, K.CHANDRAKUMAR |
313-318 |
56 |
DATA SECURITY USING CRYPTOGRAPHY AND STEGNOGRAPHY
Epuru Madhavarao,ChikkalaJayaRaju,Pedasanaganti Divya,A.S.K.Ratnam |
319-325 |
57 |
LICENSE PLATE CHARACTER RECOGNITION USING BACK PROPAGATION ALGORITHM
T. Selvakani, Dr. N. Krishnan |
326-327 |
58 |
Communal Acceptor- Inaugurate Multicast for Gridiron Applications
M. Nirmala Kumari, M. KiranKumar, B. KrishnaMurthy, P. Nirupama |
328-334 |
59 |
Exploiting Dynamic reserve provision for Proficient analogous Data dispensation in the Cloud
S. Shabana, R. Priyadarshini, R. Swathi, A. Dhasaradhi |
335-340 |
60 |
Restricting mischievous users in anonymizing networks
A. Amaranath, N. Maneiah, G. Prasadbabu, P. Nirupama |
341-345 |
61 |
Implementation of Radix-4 Multiplier with a Parallel MAC unit using MBE Algorithm
Bodasingi Vijay Bhaskar ,Valiveti Ravi Tejesvi, Reddi Surya Prakash Rao |
346-351 |
62 |
Intrusion Detection and Classification Using Improved ID3 Algorithm of Data Mining
Sandeep Kumar,Prof. Satbir Jain |
352-356 |
63 |
Device Parameter Optimization of Scaled Si-Ge Hetrojunction Bipolar Transistor
ARUN KUMAR , R.K. CHAUHAN |
357-366 |
64 |
Improvising the Infrastructure as a Service Cloud
A. Vamsi Krishna,Prof C. Rajendra |
367-370 |
65 |
IMPROVING THE EFFICIENCY OF THERMAL EQUIPMENTS OF 210 MW TPS THROUGH THERMAL AUDIT
MUDITA DUBEY,Prof. ABHAY SHARMA |
371-379 |
66 |
Recursive Pseudo-Exhaustive Two-Pattern Generator
PRIYANSHU PANDEY, VINOD KAPSE |
380-385 |
67 |
ESW -FI: An Improved Analysis of Frequent Itemsets Mining
K Jothimani, Dr Antony SelvadossThanamani |
386-390 |
68 |
NETWORK MONITORING, MANAGEMENT AND ENHANCEMENT USING VPN
Archana Verma, Dr. BalKishan, Rishabh Jain |
391-394 |
69 |
Frequent Itemset Mining Technique in Data Mining
Sanjaydeep Singh Lodhi,Premnarayan Arya,Dilip Vishwakarma |
395-404 |