S.No. |
Title and Authors of Paper |
Page.No. |
1 |
Standardized Parameterization of Intrusion Detection Systems
Björn-C. Bösch |
001-005 |
2 |
Parametric Optimization of Wire Electrical Discharge Machining of Composite Material
Sateesh Kumar Reddy K |
006-015 |
3 |
WEB SERVICES FOR MOBILE COMPUTING
Piyush M.Patil ,Kushal Gohil,Rohit Madhavi |
016-021 |
4 |
WIRELESS CAN BUS FOR INDUSTRIAL APPLICATION
N.Prakash, N.Magadevi |
022-026 |
5 |
CELLULAR NETWORK OPTIMIZATION USING MULTI HOP DYNAMIC CHANNEL ASSIGNMENT WITH DYNAMIC CHANNEL ASSIGNMENT SCHEME
Arasada Jagadeesh, D. Ajay kumar |
027-033 |
7 |
AN EFFICIENT SECURE ID-BASED FOR SECURING MULTIPLE PATIENTS‟ USING ECIES PRIVACY IN WIRELESS BODY SENSOR NETWORK
Bhagirath bhalawi, Ramratan Ahirwal, Yogendra Kumar Jain |
041-046 |
8 |
Review of CBVIR in WWW
Amit Pawar |
047-050 |
9 |
An Overview of Software Risk Management Principles
Vasundhara Rathod, Monali Chim, Pramila Chawan |
051-054 |
10 |
Statistical Inference and α-Stable Modeling for Anomaly Detection in Network Traffic
Ravindra Kumar Gupta, Gajendra Singh Chandel, Vijay D. Rughwani |
055-061 |
11 |
LSB,4D-DCT and Huffman Encoding Based Steganography in Safe Message Routing and Delivery for Structured Peer-to-Peer Systems
G.Satyavathy,M.Punithavalli |
062-067 |
12 |
Developing an approach for hyperlink analysis with noise reduction using Web Structure Mining
Mamta M. Hegde,Prof. M.V. Phatak |
068-072 |
13 |
To Detect and Prevent the anomaly in Network Traffic Based on Statistical approach and α-stable Model
Anup Bhange, Amber Syed |
073-079 |
14 |
A QoS-based Measurement of DSR and TORA Reactive Routing Protocols in MANET
Rajesh Kumar Chakrawarti, Madhulika |
080-084 |
15 |
EFFICIENT K-MEANS CLUSTERING ALGORITHM USING RANKING METHOD IN DATA MINING
Navjot Kaur, Jaspreet Kaur Sahiwal, Navneet Kaur |
085-091 |
16 |
EFFICIENT KEYWORD SEARCH IN RELATIONAL DATABASES
Navneet Kaur, Rajdeep Kaur , Navjot kaur |
092-098 |
17 |
Association Rule Mining by Block Scattered Transposition
Gurudatta Verma,Vinti Nanda |
099-104 |
18 |
A Trade Model for Cloud Computing Based on Isolating Cipher text and Decoding Services and Storage
P. Murali Krishna,Prof C.Rajendra |
105-111 |
19 |
Cubic Approach to Mobile Cloud Computing
Ms. Rinku Rajankar, Prof R. W. Jasutkar |
112-114 |
20 |
Caching and SOAP compression techniques in Service Oriented Architecture
B. Chandra Mouli,Prof. C. Rajendra |
115-119 |
21 |
Comparative Analysis of Load Balancing Algorithms in Cloud Computing
Ms.NITIKA,Ms.SHAVETA,Mr. GAURAV RAJ |
120-124 |
22 |
Orthogonal Frequency Division Multiplexing in Wireless Communication Systems: A Review
Sandeep Kaur, Gurpreet Bharti |
125-129 |
23 |
Design and Analysis of Notched Square slot loaded Microstrip Patch Antenna
Er.Saiyed Tazen Ali, Er.Devendra Soni, Er.Nisha Gaur |
130-133 |
24 |
Optimization of Information Retrieval by Advance Indexing Models and FIRS
Divya Jyoti Shrivastav, Waseem Ahmad |
134-138 |
25 |
SSCM: A Smart System For College Maintenance
B. Rasagna,Prof. C. Rajendra |
139-143 |
26 |
A SIMULATION AND ANALYSIS OF OFDM SYSTEM FOR 4G COMMUNICATIONS
N.SHIRISHA, K.BALAMUNAIAH, S.MUNIRATHNAM |
144-150 |
27 |
Performance and Analysis of DS-CDMA Rake Receiver
Y Mohan Reddy, M Nanda Kumar, K Manjunath |
151-155 |
28 |
Estimate BER and Computational Complexity for OFDM Modulation Schemes by using different Modulation Techniques
M Nanda Kumar, K Manjunath, K Yogaprasad |
156-162 |
29 |
Optimized Way to Uncover Promising Customer Deeds Using CMAR
G. Srujana Kumari, Prof.C.Rajendra, V.Sreenatha Sarma |
163-167 |
30 |
End-User Controlled Vertical Handover Procedure for 4G Wireless Access Networks
M. Gopu, Dr. Ritesh Khanna |
168-172 |
32 |
CLOUD AND GRID ANALOGY: HOW TO CORRELATE THEM BY PERFORMANCE
Tripti Sharma, Bhupesh Kumar Dewangan, Sanjay Kumar Baghel |
180-183 |
33 |
DESIGN OF AXI BUS FOR 32-BIT PROCESSOR USING BLUESPEC
T.Ananth kumar, DR.S.Saraswathi Janaki |
184-188 |
34 |
Comparative Study of Software Module Clustering Algorithms: Hill-Climbing, MCA and ECA
Kishore C, Srinivasulu Asadi, Anusha G |
189-195 |
35 |
Analyzing Web Modeling Existing Languages and Approaches to Model Web Application Design
D.R. Ingle, Dr. B. B. Meshram |
196-204 |
36 |
E-Investment Banking: NextGen Investment
D.R. Ingle, Dr. B. B. Meshram |
205-211 |
37 |
SAFETY COMMUNICATION IN INTEGRATED VANETs FOR EMERGENCY SITUATIONs -3G WIRELESS NETWORKS
K.KEERTHI,K.SEKHAR |
212-217 |
38 |
Task Scheduling Using Compact Genetic Algorithm for Heterogeneous System
Neelu Sahu, Sampada Satav |
218-221 |
39 |
Performance characterization of AODV protocol in MANET
Ruchi Rani,Manisha Dawra |
222-229 |
40 |
Text MiningUsing Coherent Keyphrase Extraction
Prof. Manjusha Yeola, Prof. Mamta Hegde |
230-232 |
41 |
The Assembly of Neural Network in Soft Computing
Dr. G.S. Katkar |
233-237 |
42 |
A NOVEL TECHNIQUE FOR INCREASING USER CAPACITY FOR MOBILE COMMUNICATION BASED ON SMART ANTENNA
Harish T.S ,T.D. Shashikala |
238-247 |
43 |
Implementation of March Algorithm Based MBIST Architecture for SRAM
M. Radha Rani, G. Rajesh Kumar, G. Prasanna Kumar |
248-253 |
44 |
Trust Improvement among the nodes in a Wireless Adhoc Network
A.Neogi, A. Banerjee |
254-258 |
45 |
Scatter Search with ACO for Load Balancing In Structured P2P Systems
Harnit Saini, Inderjeet Kaur |
259-262 |
46 |
Development of Testing Environment for Embedded Systems
Miss. Ashwini M. Motghare, Prof. Swapnili P. Karmore |
263-266 |
47 |
SIGNIFICANCE OF STATISTICS IN HEALTH SCIENCES IN RURAL AREA
Reetu Malhotra, Vandana Singh , Dr. Rajesh Kumar |
267-271 |
48 |
REMOVAL OF BYZANTINE ATTACKS IN ADHOC NETWORKS
G.JYOSHNA, K.YOGA PRASAD |
272-276 |
49 |
ON-CHIP CRYSTAL OSCILLATOR WITH BETTER ESD & LATCH-UP PROTECTION
K.Gowthami,P.U.K.Prabha |
277-280 |
50 |
Image Cataloging and Partitioning using Hierarchical Conditional Random Field Model
Mr. Manoj Vairalkar, Prof. S.U.Nimbhorkar |
281-284 |
51 |
Robust Non-intrusive Real Time Access Control Squint Eye States Detection Based on Hough Transform on Human Face Images
R. M. Potdar, Anil Mishra, Somesh Yadav |
285-291 |
52 |
Sensors Lifetime Enhancement Techniques in Wireless Visual Sensor Networks – A Survey
Mr.K.Thangaraj, Prof.M.Chitra |
292-297 |
53 |
Impact of Malware in Cyber world
Pranay chauhan, Nihal gupta, Brajesh chaturvedi |
298-302 |
54 |
SEIZETOKEN: A DYNAMIC LOAD BALANCING ALGORITHM FOR DISTRIBUTED SYSTEMS
Ankita Singhal, Padam Kumar |
303-312 |
55 |
Modeling and Simulation of Trajectories of a Wire Like Particle in a Three Phase Common Enclosure Gas Insulated Busduct (GIB) with and Without Image Charges
M.Siva Sathyanarayana, J.Amarnath |
313-320 |