Volume 3 Issue 4 April 2014

S.No. Title and Authors of Paper Page.No.
1 HIGH SPEED WITH LOW-POWER DATA BASE SORTING UNITS
Pradeep P,J Samson Immanuel
1036-1041
2 The Concept of Delay Tolerant Network Approaches and Issues
Sangamesh.C.Jalade, Amaresh Patil
1042-1045
3 Survey on Performance of IEEE 802.15.4 Low Rate – Wireless Personal Area Networks (LR-WPAN)
Babita, Sanjeev Indora
1046-1050
4 A proposed Framework for a Forecasting System of Wind Energy Power Generation
Ahmed A. Abdullah, Ahmed E. Saleh, Mohamed S. Moustafa, Khaled M. Abo-al-Ez
1051-1057
5 Touch screen controlled multipurpose spy robot using zigbee
Ankita Patel, Kinjal Chaudhari, Dattukumar Patel
1058-1062
6 Controlling contagious diseases by adopting DTH technique on Case Based Reasoning
K. Tulasi Krishna Kumar, M.Naga Saathvika
1063-1067
7 Usage of mobile sinks and CAEE algorithm to control congestion in WSN
Ms. J.Reni Jevitha, Mr. E.Manohar.
1068-1071
8 SIMULATION ANALYSIS FOR BER PERFORMANCE IN OFDM SYSTEMS USING STBC/SFBC BASED ON DETECTION TECHNIQUES
Prof. K.K. Arora,Er. Piyush Vyas,Er. Purneshwari Varshney
1072-1078
9 Sustainable Competitive Advantage through Knowledge Management
Rafi Ahmad Khan
1079-1082
10 An Optimization Based Edge-Aware Video Processing Using Temporal Filtering and Mixed-Domain Concept
Lidiya Augustine, Nagalakshmi Venugopal
1083-1086
11 Insider Threats Detection in Cognitive Radio Networks
H. Vignesh Ramamoorthy, B. Sabarigiri
1087-1093
13 An Advanced Power Management Using GSM Module
B.S.Sathish,Dr.P.Thirusakthimurugan,R.Narmadha
1101-1106
14 Small Area Edge Preservation for Multiscale Decomposition for High Dynamic Range Image Tone Mapping
Yedu Manmadhan, Anto Kumar R.P
1107-1112
15 Appraise of Load Balancing Techniques in Cloud Computing
Lanitha B, Raju M
1113-1115
16 DESIGN OF 3-BIT LOW POWER FLASH TYPE ADC
Sarojini Mandal, Dr.J.K Das
1116-1121
17 An Effectual Estimation of Software Defect (EESD)
Mr. Raghvendra Omprakash Singh,Mr.Yuvraj B. Hembade,Prof. Pradeep Kumar Sharma
1122-1126
18 Design and Development of JTAG for Trace and Debug of Controller and Implementation on FPGA
Mr. Manjunath T.N, Sunil T.D, Dr. M. Z Kurian, Imran Rasheed
1127-1130
19 MOBILITY BASED ALGORITHMS FOR DETECTION OF CLONE NODES IN MOBILE SENSOR NETWORKS
Benazir Banu, Anitha Angayarkanni
1131-1136
20 AREA EFFICIENT SYSTOLIC ARCHITECTURE FOR ALL-ONE POLYNOMIAL MULTIPLIER
Nhivashini.G, Sheebha.B
1137-1141
21 BER ANALYSIS OF COMMUNICATION SYSTEM THROUGH AWGN CHANNEL
Vijay Amrit Raj Varma
1142-1144
22 Evaluate The Performance Of WPAN Using Cooperative Mechanism
S.RAJASTEPHI, J.PRISKILLA ANGEL RANI , Dr.R.RAVI
1145-1148
23 Object Detection in Video Using Sequence Alignment and Joint Color & Texture Histogram
Ms. Pallavi M. Sune, Prof. A. P. Thakare
1149-1154
24 Fuel Cell Based Inverter Topologies
Mrs. S A Upasani , Miss Rucha V Deshmukh
1155-1158
25 Comparative analysis of 36, 48, 60 pulse AC-DC Controlled Multipulse Converter for Harmonic Mitigation
Sonika Raghuvanshi, Nagendra Singh
1159-1163
26 Various Image Compression Techniques: A Review
Er. Shruti Puniani, Er. Nishi Madaan
1164-1170
27 Digital Video Watermarking Using Principal Component Analysis
Kunal Ahire, Prof. Gajendra Singh Chandel
1171-1174
28 A Study on Energy Efficient Server Consolidation Heuristics for Virtualized Cloud Environment
Susheel Thakur, Arvind Kalia, Jawahar Thakur
1175-1180
29 A Comprehensive Review of Various Image Enhancement Techniques
Er.Arun Begill, Er.Nishi Madaan
1181-1185
30 Ensuring Trustworthiness and Security during Data Transmission in Multihop Wireless Networks
S.Nandhini, Mr.S.Franson Varun Richo
1186-1189
31 Detecting Node Replica Attack Mitigation for Static Sensor Network
Vikram.A, Latha.A
1190-1193
32 Automatic multistyle licensed plate detection by using fuzzy logic classifier
J. Layolin sobiya,Mrs. P.Angelin priya
1194-1202
33 Introduction of Fourier Series to First Year Undergraduate Engineering Students
Pawar Tejkumar Dattatrya, Hiremath Suresh Shivarudrappa*, Birajdar Gajanan Malleshi, Bhopale Ashwinkumar Aru
1203-1207
34 GCO Based Web Page Retrieval Through Semantic Techniques
    A.Baskar, C.Gomathi
1208-1213
35 An Efficient and Secure ID-Based Mutual Authentication with Key Agreement Scheme Based on ECC for Mobile Devices
Shubhangi N. Burde,Prof. Hemlata Dakhore,Prof. S. P. Chhaware
1214-1219
36 A Survey on Shadow Detection Methods
Namrita Singh, A.A.Maxton
1220-1224
37 Detection of Clouds and Cloud Shadow in Satellite Images using Fuzzy Logic
Namrita Singh, A.A.Maxton
1225-1228
38 Development of Back Propagation Neural Network Model for Extracting the Feature from a Image Using Curvelet Transform
Mr. Tejas P. Patil, Prof. P. P. Narwade
1229-1238
39 STRENGTHENING USER’S CONTROL OF DATA IN THE CLOUD SERVICE – AUDITING and LOGGING MECHANISM
A. Anuba Merlyn , Asst.Prof. V. Veera Ragavan, Dr. K. Selva Kumar
1239-1247
40 An Efficient & Secured Way of Sharing the Data Using Distributed Accountability & Auditing in Cloud
Chandan.M, Aparna K.S
1248-1254
41 IRIS COLLARETTE BOUNDARY LOCALIZATION USING 2-D DFT FOR IRIS BASED BIOMETRIC SYSTEM
Kapil Rathor
1255-1259
42 Design and Implementation of Logical Scrambler Architecture for OTN Protocol
Chethan Kumar M, Praveen Kumar Y G, Dr. M. Z. Kurian
1260-1262
43 Design and Implementation of Q-algorithm for Data Collision Reduction in EPC GEN-2 based on FPGA
Rajeshwari T R, Sandra Benzamin, Dr. M. Z. Kurian
1263-1266
44 Comparison Between WSN and WSAN
S.Murugeswari,Dr.R.Ravi, S.Raji
1267-1272
45 Retrieval Of Digital Images Based On Shape Feature Using Support Vector Machines And Self Organizing Maps
Sarita Sharma, Avinash Dhole
1273-1279
46 Deep Learning Neural Network with Semi supervised Segmentation for Predicting Retinal and Cancer Cell Diseased Images
Veena Chandran, Dinesh Kumar A, Geetha P.K,Nidhya R
1280-1285
47 Protecting Privacy When Disclosing Information By using Wireless Sensor Networks
P SURYA CHANDRA, RAVI BOLLEDDULA
1286-1290
48 NOVEL IMPLEMENTATION OF SECURE SINGLE LOGIN IN DISTRIBUTED COMPUTING NETWORKS USING ECC
D.Mariammal, P.Brundha
1291-1294
49 Video Recommendation based on Content and Social Behaviour of User
Kanchana Devi A , Sathiya Devi S
1295-1298
50 Doppler Effect method of Underground oil leakage prediction by Optical Fiber Communication (OFC)
Kumaraswamy.T.C, Selvakumar.S
1299-1301
51 A SOFTWARE DESIGN PATTERN FOR BANK SERVICE-ORIENTED ARCHITECTURE
C.K.Gomathy,Dr.S.Rajalakshmi
1302-1306
52 PERFORMANCE ENHANCEMENT AND EFFICIENCY EVALUATION FOR VANET APPLICATION BASED ON RLSMP TOOL
SIVAKUMAR P , SARAVANAN S
1307-1310
53 Performance Analysis of MPLS network with Traditional IP Network in Service Provider Environment
Nishant N.Kale, Sunil A. Waichol
1311-1316
54 Centroids Initialization for K-Means Clustering using Improved Pillar Algorithm
Bapusaheb B. Bhusare, S. M. Bansode
1317-1322
55 Analysis of Load Balancing Algorithms in Cloud Computing and Study of Game Theory
Shilpa S, Prof. Shubhada Kulkarni, Prof.Sharada Kulkarni
1323-1329
56 Image Segmentation and Edge Detection Using a Neural Networks RBF Approach
Shweta Lawanya Rao,Dolley Shukla
1330-1335
57 Design and Implementation of Reversible Sequential Circuits
Harish Naik KP, G.Jyothi, Dr.K.N.Murulidhara, Dr.M.Z.Kurian
1336-1344
58 Face Detection in Real Time Based on HOG
Rekha N, Dr.M.Z.Kurian
1345-1352
59 FAST RE-AUTHENTICATION FOR EFFICIENT AND SEAMLESS HANDOVER IN 4G NETWORKS
S.Arunkumar, P.Rajkumar
1353-1358
60 IMPROVING DATA SECURITY USING ATTRIBUTE BASED BROADCAST ENCRYPTION IN CLOUD COMPUTING
K.Kamalakannan, Mrs.Hemlathadhevi
1359-1363
61 Wireless Advertising Using Pull-Based Approach
Pratiksha parjane ,Rekha jadhav ,Afsha Pathan, Rubina pathan, M. A. R.Shabad
1364-1368
62 Jamming Detection System in Wireless Sensor Networks
K.P.Vijayakumar, P.Ganeshkumar, M.Anandaraj
1369-1372
63 Profit-Aware Policy Scheduler (PAPS) for Resource Allocation in IaaS Clouds
Rajalakshmi Shenbaga Moorthy, Thamarai Selvi Somasundaram, Kannan Govindarajan
1373-1377
64 Improved Search Goals with Feedback Sessions by using Precision Values
Nancy S, Sathiya Devi S
1378-1381
65 An Efficient Approach for Image Retrieval Using Semantic Relevance
Sukhada Aloni
1382-1385
66 A Novel Security Scheme for Improving Reliable Transmission using Energy Based Routing
M. Siva Sangari, Mrs.P. Brundha
1386-1389
67 Clustering In Content-Based Image Retrieval
David Raja Nadar , Savita R Bhosale
1390-1392
68 Automatic Data Cleansing Of Incorrect City Names In Spatial Databases Using LCS Algorithm
Dr. M. Ben Swarup , B. Leela Priyanka
1393-1396
69 Performances of Connected Lookup and Unconnected Lookup Transformations in ETL
G.Thangaraju,Dr.X.Agnes Kala Rani
1397-1404
70 “T-Board: The Total Keyboard” For M-Learning Platform
Mr. Vishwas Kulkarni,Mr. Kishor Deshmukh, Ms. Puja Pathak, Ms. Gauri Pathak, Mr. Amol Khandhare
1405-1413
71 Wavelets Transform Based Data Hiding Technique for Stegnography
Jayapragash.K,Vijayakumar.P
1414-1419
72 Case study then Direct-Form FIR Poly-phase Linear Interpolator Filter Design with Symmetric Structure
Mandeep Singh Saini, Dr. Kuldeep Kaur
1420-1428
73 Malware Detection in Android
Geethu M Purushothaman, G Gopinadh, Nihar SNG Sreepada
1429-1436
74 Design And Implementation Of Child Activity Recognition Using Accelerometer And RFID Cards
Kushbu, M.C. Chandrashekhar, Dr.M.Z. Kurian
1437-1440
75 Abridged Energy Utilization in Wireless Networks through Efficient Scheduling Mechanism
S Priyamohana, S Veluchamy, C Suresh Kumar
1441-1445
76 Link Adaptation Technique for MIMO-OFDM systems with Low Complexity QRM-MLD Algorithm
C. Suganya, S.Santhiya, K.Jayapragash
1446-1450
77 CONTENT BASED IMAGE RETRIEVAL USING INTEGRATION OF COLOR AND TEXTURE FEATURES
Aditi Giri, Yogesh Kumar Meena
1451-1454
78 Secure Group Key Agreement with Node Authentication
Anurag Singh Tomar, Gaurav Kumar Tak, Manmohan Sharma
1455-1458
79 Dynamic Resource Allocation Using Latent Semantic Ranking in Cloud Computing Environment
N.Krishnaveni,Prof.G.Sivakumar
1459-1462
80 Energy Consumption in MANET’s using Energy Efficient AODV Protocol
Mr.Vaibhav Naresh Palav, Prof. Mrs. Savita R. Bhosale
1463-1468
81 Optimized Test Case Prioritization with multi criteria for Regression Testing
KanwalpreetKaur,Satwinder Singh
1469-1473
82 Efficient Design of Arithmetic Logic Unit using Reversible Logic Gates
Ravi Raj Singh, Sapna Upadhyay, Saranya S, Soumya, Jagannath KB, Hariprasad SA
1474-1477
83 An Evolutionary-Fuzzy Expert System for the Diagnosis of Coronary Artery Disease
Y.Niranjana Devi, S.Anto
1478-1484
84 Context-Based Similarity Analysis for Document Summarization
S.Prabha, Dr.K.Duraiswamy, B.Priyanga
1485-1491
85 A COMPREHENSIVE STUDY ON BOTNET AND ITS DETECTION TECHNIQUES
P.Panimalar, Dr.K.Rameshkumar
1492-1496
86 Optical Pulse Compression and its Effects Using Fiber Bragg Grating
Manoj Divagar. T, S. James Raja, S. Ilayaraja
1497-1501
87 Analysis and Estimation of Rust Disease in Bengal gram Based on Thresholding and RGB Extraction using Image Processing
Shivanand N , Jagadeesh S , Pavan J , Shilpa M , S.G.Kanakaraddi
1502-1505
88 AMapReduce Approach for Traffic Telemetric Analysis in Hadoop
Harshit Sharan,Abhinay Agrawal
1506-1509
89 Fuzzy Information System to Classify Hypertension According to Blood Pressure
Priyanka Dudi, Manmohan Sharma
1510-1512
90 Personal Digital Assistant Based Ubiquitous Programming
Nidhi Manjula, Uttam Kumar Kesri, Deepika Sharma
1513-1517
91 Compression of Secant and Gaussian Pulse Using Nonlinear Fiber Bragg Grating
S. Ilayaraja, S. James Raja, Manoj Divagar. T
1518-1522
93 DESIGN OF LDPC ARCHITECTURE USING VERILOG CODING
Manjunatha P N , Prof .T.S Bharath kumar, Dr. M Z Kurian
1527-1531
94 Accident Monitoring System using Wireless Application
Megha Nirbhavane, Shashi Prabha
1532-1535
95 A Lightweight Paradigm for Security in Bluetooth
Mrs.Sandhya S,Dr.Sumithra Devi K A
1536-1540
96 A METHOD FOR PREVENTING DISCRIMINATION IN DATA MINING
P.Yuvasri,S.Boopathy
1541-1546
97 Effective Video Streaming with Low Latency over MANET
Mr.S.Mohideen Badhusha, Dr.K.Duraiswamy, G.Subha
1547-1553