Volume 3 Issue 3 March-2014

S.No. Title and Authors of Paper Page.No.
1 USING SENTAURUS MOnte CArlo(MOCA) SIMULATION ESTIMATION OF SCATTERING EFFECTS IN NANOWIRE TRANSISTORS
Mr.S.Esakki Rajavel, A.GunaDhivya Vinisha, J.Jochebed,P.Angelene Sanjana, D.Gnancy
598-603
2 AN EFFICIENT HEMORRHAGE DETECTION USING SVM CLASSIFIER
Jishma Elizabeth Joy, R Jemila Rose
604-610
3 Analytical Study of Common Web Application Attacks
Junaid Latief Shah
611-617
4 Segmentation of Natural Color Images in HSI Color Space Based on FCM Clustering
Ganesan P, Priya Chakravarty, Shweta Verma
618-622
5 A Survey on Odia Computational Morphology
Dhabal Prasad Sethi
623-625
6 EFFECTIVE ALGORITHM FOR MINING ADVERSE DRUG REACTIONS
H.SANKARA VADIVU, E.MANOHAR, R.RAVI
626-630
7 Image Decomposition and Restoration for Blurred Images Using Filtering Techniques
A.Deepika, K.Raja Sundari, R.Ravi
631-635
8 Ecological Planning for Sustainable Development with a Green Technology: GIS
Anuj Tiwari, Merugu Suresh, Arun Kumar Rai
636-641
10 Dramatic Atmospheric Turbulence Effects on Submarine Laser Communication Systems (SLCS) and Free Space Optics (FSO)
Ahmed Nabih Zaki Rashed, Mohamed S. F. Tabbour
655-666
11 Evaluating F-Measure Metric Using ManTra Machine Translation Engine in Tourism domain for English to Hindi Language
Dr. Neeraj Tomer
667-671
12 FREQUENT PATTERNS FOR MINING ASSOCIATION RULE IN IMPROVED APRIORI ALGORITHM
Ms. Jyoti B. Deone, Asst. Prof. Vimla Jethani
672-678
13 An Efficient Method for Detection of Brain Tumor in MRI Images
Vishal B. Padole
679-682
14 Estimating the Exposure of Network Mechanisms to High-Tech DDoS Attacks
S.Vasanthi, R.Ravi, Dr. Beulah Shekhar
683-686
15 Securing Online Reputation System Through Trust Evaluation And User Correlation
D.Gnana Binu, R.Ravi, Dr. Beulah Shekhar
687-690
16 Morse Passwords Based Authentication System
Jyotsana Raut,Nikita Agashe,Suchita Somkuwar,Trupti Sapate,Pranali Doifode,Ms.Minal Domke
691-694
17 SECURE AND IMPLEMENTATION OF INTRUSION DETECTION IN VIRTUAL MACHINE SYSTEMS
U.Murugan, Guru Rama Senthilvel
695-700
18 An Alternative Approach for Time Synchronization in WSN
Rajni Kaushal
701-705
19 Web interface for configuration of Linux server
Ashish Anand, Kumar Kundan, Parag Dhawan, Rahul Kumar Pal, Sumit Kumar
706-709
21 A SURVEY ON VARIOUS TASK SCHEDULING ALGORITHM IN CLOUD COMPUTING
Gaurang Patel, Asst.Prof. Rutvik Mehta
715-717
22 LAN Monitoring and Controlling using Android
Dhanke D.T., Bodkhe S.S., Hambarde S.M., Vaidya R.P.
718-722
23 Review Article on Quantum Cryptography
Anuradha Singhal, Tarun Chander
723-728
24 Automation of Ant Build
Anuradha Singhal, Tarun Chander
729-730
25 LARGE SCALE SATELLITE IMAGE PROCESSING USING HADOOP DISTRIBUTED SYSTEM
Sarade Shrikant D., Ghule Nilkanth B., Disale Swapnil P., Sasane Sandip R.
731-735
26 Secure Data Storage of Mobile Phones on Cloud
Nilesh Khonde , Swapnil Bawankar, Lokesh Ashtankar, Anand Dharamthok , Khaire P. A.
736-739
27 Efficient Mining of web log for improving the website using Density Based Spatial Clustering Application with Noise (DBSCAN)
Akiladevi R, Mathew Kurian
740-743
28 Delegating Log Management to the Cloud by Secure Logging as a Service
Priyadharshini.T.R,Senbagavalli.M,Saravana kumar.R
744-748
29 A Novel Approach Based Anomaly Detection for Secure Data Aggregation Using HEED Algorithm
S.Kannadhasan, J.Sangeetha, K.Niranjana
749-751
30 MIMO with Constant Envelope Modulation (CEM) – For Better Circuit Design
Brahmadesam T Madav
752-755
31 IDENTIFYING GUILTY AGENT USING MP3-STEGO-FILE
Ashwini Palimkar,Dr. S.H.Patil
756-762
32 Office Security Monitoring System
Achennaki Shylla, Hashmita Raut, Heena Nehare, Pooja Anne, Prarthana Deshkar
763-765
33 Bank Locker System Using Iris
Chetna R. Koli, Nikita S. Kheratkar, Pooja S. Ganganalli, T. G. Shirsat
766-770
34 Various Techniques Use In Wireless Sensor Network For Congestion Control
Prof. Sachin Patel, Prof. Rakesh Pandit, Mr. Abhijeet Rathod
771-774
35 Dynamic Bus Timetable Using GPS
Gunjal Sunil N. , Joshi Ajinkya V. , Gosavi Swapnil C. , Kshirsagar Vyanktesh B.
775-778
36 WSN Routing Challenges: A Methodical Analysis
Sukhchandan Randhawa
779-785
37 Key Dependent Secure Messenger
Nandanwar Aniket D., Deshmukh Sonali S., Hadawale Rashmi R., Nanaware Gauri B.
786-789
38 ENCRYPTION AND DECRYPTION IN COMPLEX PARALLELISM
H.Anusuya Baby, Christo Ananth
790-795
39 IMAGE RETRIEVAL SYSTEM: BASED ON USER REQUIREMENT AND INFERRING ANALYSIS TROUGH FEEDBACK
Mount Steffi Varish.C, Guru Rama SenthilVel
796-801
40 Performance Analysis of Medical Image Fusion Using Multimodal Graph Cut Algorithm
S.Anbumozhi, P. S.Manoharan
802-807
41 IMPROVING EFFICIENCY OF NODES USING DEPLOYMENT FRAMEWORK IN ZIGBEE WIRELESS NETWORKS
Prinslin.L, V.Janani
808-810
42 A Distributed Firewall Optimization Protocol For Customized Policy Verification
Arun.P, Divya.V, Jyothi.S,Vaishnavi.S
811-813
43 Cloud information accountability using cloud log security protocols
A.PUNITHA ANGEL MARY, P.MALARKODI
814-817
44 OPTIMIZING THE WEB RESOURCES USING AN EFFECTIVE MECHANISM
S.SUJITHA, R.RAVI, DR.BEULAH SEKHAR
818-821
45 COMPARISION OF PARALLEL BCD MULTIPLICATION IN LUT-6 FPGA AND 64-BIT FLOTING POINT ARITHMATIC USING VHDL
Mrs. Vibha Mishra, Prof. Vinod Kapse
822-826
46 Survey Paper on Credit Card Fraud Detection
Suman,Mitali Bansal
827-832
47 Optimized Design of IIR Poly-phase Multirate Filter for Wireless Communication System
Er. Kamaldeep Vyas, Mrs. Neetu
833-839
48 Resilient Identity Based Encryption for Cloud Storage by using Aggregate Keys
L.MohamedIrfan, S.Muthurangasamy, T.Yogananth
840-844
49 A Review on: Efficient fuzzy type Ahead search in Xml data
Ms. Sonali Kadam, Prof. Sanchika Bhajpai
845-848
50 A High Quality Cryptography Based Image Steganography Using ASCII Differencing and Three LSB Bits Insertion Method
Tajinder Singh, Sukhjit Singh, Gurvinder Singh
849-852
51 Comparative Study and Implementation of Image Enhancement Techniques based on Histogram Equalization
Satnam Kaur, Baljeet singh
853-859
52 ON-BOARD DIAGNOSTIC SYSTEM FOR VEHICLES
D.NANDHINI, G.NANDHINI, M.NANDHINI, R.VIDHYA
860-865
53 Searching and Optimization Techniques in Artificial Intelligence: A Comparative Study & Complexity Analysis
Ashwani Chandel, Manu Sood
866-871
54 Markovian Semantic Indexing:Application to Online Image Retrieval System
K. Naresh Kumar, K. Krishna Reddy
872-878
55 LLVM Clang Utilities
Borase Gayatri S., Gawale Mohini R., Mate Satyabhama S., Mujawar Nilofar S.
879-882
56 SECURE DATA ACCESS USING BIOMETRIC RECOGNITION IN CLOUD COMPUTING
P.NIVETHA , V.SARALA
883-887
57 Industrial Network for People and Resources (IPRnet)
Chaitali Datkhore , Tejaswini Tule , Vaishali Titare, Mayuri Wagh
888-891
58 ITFOOD: Indexing Technique for Fuzzy Object Oriented Database
Priyanka J. Pursani, Prof. A. B. Raut
892-898
59 Content Relevance Prediction Algorithm in Web Crawlers to Enhance Web Search
Saurabh Pakhidde, Jaya Rajurkar, Prashant Dahiwale
899-902
60 ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS: A LITERATURE REVIEW
Najiya A, Fameela K.A, Asst. Professor Reshma V.K
903-908
61 REVIEW PAPER ON
IMAGE CONTRAST ENHANCEMENT TECHNIQUES

Ms. K.T.Chalekar, Prof T. Yengantiwar
909-911
62 Autosilent Mobile System
Kore Geetanjali T.,Naik Suman R., Sanap Kavita V., Mawale Ashwini J.
912-914
63 TGI Modules for Social Tagging System
Mr. Tambe Pravin M.,Prof. Shamkuwar Devendra O.
915-919
64 AN EFFICIENT APPROACH TO SEGMENT SCALING IN PSORIASIS SKIN IMAGE
Anuradha Balasubramaniam, Anbu Selvi
920-925
65 Literature Survey on Contour Point based Recognition
E.Komathi, A.Mani
926-929
66 PRIVACY PROTECTION OF FREQUENTLY USED DATA SENSITIVE IN CLOUD SEVER
T.Pavithra,Mrs.G.Umarani
930-934
67 Adaptive Additive-Increase Multiplicative-Decrease (AAIMD) Congestion control Algorithm for WSN
SubhashPanchal,Prof. O.S Khanna
935-940
68 An Architecture For Centralizing And Modernizing The Classical Medical System
Hari.P.V, Vijaya Kumar.S,Vijaya kumar.H
941-945
69 DYNAMIC QUERY GROUPING BASED ON THE USER SEARCH QUERY LOGS
K.Sugashini, O.Priyanga, M.Abarna
946-949
70 Hybrid Cryptography Technique For Mobile Ad-hoc Network
M.sangeetha, V.Vidya Lakshmi
950-954
71 Morphological Technique in Medical Imaging for Human Brain Image Segmentation
Asheesh Kumar, Naresh Pimplikar, Apurva Mohan Gupta, Natarajan P
955-959
72 FIXED POINT THEOREM IN MENGER SPACE
M.S. Chauhan,Dheeraj Aheere,Bharat Singh
960-965
73 Women Security System
Shaik Mazhar Hussain
966-968
74 Indian stock market prediction using neural network technique
Gholap Rahul Mansing,Kale Devidas Bhausaheb,Shirasth Yogesh Sominath,Borkute Pooja Ashok
969-971
75 Detection of Insider and Outsider Attack using Holistic Protocol in Vehicular Ad Hoc Networks
M.sharmila mari, M.Ponnrajakumari
972-975
76 Domainwise Extraction of Information and Knowledge using Automated Query Generation
Akash R. Dumbre, Yogesh S. Sandbhor, Hrishikesh V. Pardeshi, Nikhil K. Niwdunge
976-979
77 Evaluation of Crop Fields from Hyperspectral Images Using Optimized Methods
Dr.P.Tamije Selvy, S.Sam Peter
980-983
78 ENHANCING THE PERFORMANCE OF INFORMATION RETRIEVAL IN QA USING SEMANTIC WEB TECHNOLOGY
S.Lakshmi Prabha,C.Meenaa , S.Pugazhl Vendhan, S.Raja Ranganathan
984-989
79 Particle Swarm Optimization with Aging Leader and Challenges for Multiswarm Optimization
S.Vijayalakshmi, D.Sudha, S.Mercy Sigamani, K.Kalpana Devi
990-995
80 A Survey of Tag Completion for Efficient Image Retrieval Based on TBIR
Mr. Wakchaure Sujit R., Prof. Shamkuwar Devendra O.
996-1000
81 Power and Area Efficient Error Tolerant Adder Using Pass Transistor XOR Logic in VLSI Circuits
S.Sathish Kumar, V.Muralidharan, S.Raja
1001-1005
82 Audit based Misbehaviour and Gray-hole detection in spontaneous wireless Adhoc network
Nafees Muneera.M, Thirupurasundari.D.R
1006-1011
83 Location Based Service on Android Platform
Shweta C . Agrawal , Rutuja G.Gadbail ,Prof. P.D.Chowhan
1012-1015
84 Detection of Lost Mobile on Android Platform
Shreya K. Patil , Bhawana D. Sarode ,Prof. P.D.Chowhan
1016-1018
85 Agricultural Environmental Sensing Application Using Wireless Sensor Network
Manish Giri, Pranoti Kulkarni, Anuja Doshi,Kanchan Yendhe,Sushma Raskar
1019-1022
86 Efficient Nearest and Score Based Ranking for Keyword Search
Rajkumar.R, Manimekalai.P, Mohanapriya.M, Vimalarani.C
1023-1027
87 Maximizing the Network Lifetime of MANET Using Efficient Power and Life Aware Routing Protocol
Anuja.M, Jaya shree.S, Gobinath.S, Mrs. R.M.Bhavadharini
1028-1031
88 Certificate Revocation Using Public Key Infrastructure For MANET’s
Gowsalyaa.M,Karthick.N,Keerthana.S,Durga.R
1032-1035