S.No. |
Title and Authors of Paper |
Page.No. |
1 |
HIGH SPEED WITH LOW-POWER DATA BASE SORTING UNITS
Pradeep P,J Samson Immanuel |
1036-1041 |
2 |
The Concept of Delay Tolerant Network Approaches and Issues
Sangamesh.C.Jalade, Amaresh Patil |
1042-1045 |
3 |
Survey on Performance of IEEE 802.15.4 Low Rate – Wireless Personal Area Networks (LR-WPAN)
Babita, Sanjeev Indora |
1046-1050 |
4 |
A proposed Framework for a Forecasting System of Wind Energy Power Generation
Ahmed A. Abdullah, Ahmed E. Saleh, Mohamed S. Moustafa, Khaled M. Abo-al-Ez |
1051-1057 |
5 |
Touch screen controlled multipurpose spy robot using zigbee
Ankita Patel, Kinjal Chaudhari, Dattukumar Patel |
1058-1062 |
6 |
Controlling contagious diseases by adopting DTH technique on Case Based Reasoning
K. Tulasi Krishna Kumar, M.Naga Saathvika |
1063-1067 |
7 |
Usage of mobile sinks and CAEE algorithm to control congestion in WSN
Ms. J.Reni Jevitha, Mr. E.Manohar. |
1068-1071 |
8 |
SIMULATION ANALYSIS FOR BER PERFORMANCE IN OFDM SYSTEMS USING STBC/SFBC BASED ON DETECTION TECHNIQUES
Prof. K.K. Arora,Er. Piyush Vyas,Er. Purneshwari Varshney |
1072-1078 |
9 |
Sustainable Competitive Advantage through Knowledge Management
Rafi Ahmad Khan |
1079-1082 |
10 |
An Optimization Based Edge-Aware Video Processing Using Temporal Filtering and Mixed-Domain Concept
Lidiya Augustine, Nagalakshmi Venugopal |
1083-1086 |
11 |
Insider Threats Detection in Cognitive Radio Networks
H. Vignesh Ramamoorthy, B. Sabarigiri |
1087-1093 |
13 |
An Advanced Power Management Using GSM Module
B.S.Sathish,Dr.P.Thirusakthimurugan,R.Narmadha |
1101-1106 |
14 |
Small Area Edge Preservation for Multiscale Decomposition for High Dynamic Range Image Tone Mapping
Yedu Manmadhan, Anto Kumar R.P |
1107-1112 |
15 |
Appraise of Load Balancing Techniques in Cloud Computing
Lanitha B, Raju M |
1113-1115 |
16 |
DESIGN OF 3-BIT LOW POWER FLASH TYPE ADC
Sarojini Mandal, Dr.J.K Das |
1116-1121 |
17 |
An Effectual Estimation of Software Defect (EESD)
Mr. Raghvendra Omprakash Singh,Mr.Yuvraj B. Hembade,Prof. Pradeep Kumar Sharma |
1122-1126 |
18 |
Design and Development of JTAG for Trace and Debug of Controller and Implementation on FPGA
Mr. Manjunath T.N, Sunil T.D, Dr. M. Z Kurian, Imran Rasheed |
1127-1130 |
19 |
MOBILITY BASED ALGORITHMS FOR DETECTION OF CLONE NODES IN MOBILE SENSOR NETWORKS
Benazir Banu, Anitha Angayarkanni |
1131-1136 |
20 |
AREA EFFICIENT SYSTOLIC ARCHITECTURE FOR ALL-ONE POLYNOMIAL MULTIPLIER
Nhivashini.G, Sheebha.B |
1137-1141 |
21 |
BER ANALYSIS OF COMMUNICATION SYSTEM THROUGH AWGN CHANNEL
Vijay Amrit Raj Varma |
1142-1144 |
22 |
Evaluate The Performance Of WPAN Using Cooperative Mechanism
S.RAJASTEPHI, J.PRISKILLA ANGEL RANI , Dr.R.RAVI |
1145-1148 |
23 |
Object Detection in Video Using Sequence Alignment and Joint Color & Texture Histogram
Ms. Pallavi M. Sune, Prof. A. P. Thakare |
1149-1154 |
24 |
Fuel Cell Based Inverter Topologies
Mrs. S A Upasani , Miss Rucha V Deshmukh |
1155-1158 |
25 |
Comparative analysis of 36, 48, 60 pulse AC-DC Controlled Multipulse Converter for Harmonic Mitigation
Sonika Raghuvanshi, Nagendra Singh |
1159-1163 |
26 |
Various Image Compression Techniques: A Review
Er. Shruti Puniani, Er. Nishi Madaan |
1164-1170 |
27 |
Digital Video Watermarking Using Principal Component Analysis
Kunal Ahire, Prof. Gajendra Singh Chandel |
1171-1174 |
28 |
A Study on Energy Efficient Server Consolidation Heuristics for Virtualized Cloud Environment
Susheel Thakur, Arvind Kalia, Jawahar Thakur |
1175-1180 |
29 |
A Comprehensive Review of Various Image Enhancement Techniques
Er.Arun Begill, Er.Nishi Madaan |
1181-1185 |
30 |
Ensuring Trustworthiness and Security during Data Transmission in Multihop Wireless Networks
S.Nandhini, Mr.S.Franson Varun Richo |
1186-1189 |
31 |
Detecting Node Replica Attack Mitigation for Static Sensor Network
Vikram.A, Latha.A |
1190-1193 |
32 |
Automatic multistyle licensed plate detection by using fuzzy logic classifier
J. Layolin sobiya,Mrs. P.Angelin priya |
1194-1202 |
33 |
Introduction of Fourier Series to First Year Undergraduate Engineering Students
Pawar Tejkumar Dattatrya, Hiremath Suresh Shivarudrappa*, Birajdar Gajanan Malleshi, Bhopale Ashwinkumar Aru |
1203-1207 |
34 |
GCO Based Web Page Retrieval Through Semantic Techniques
A.Baskar, C.Gomathi |
1208-1213 |
35 |
An Efficient and Secure ID-Based Mutual Authentication with Key Agreement Scheme Based on ECC for Mobile Devices
Shubhangi N. Burde,Prof. Hemlata Dakhore,Prof. S. P. Chhaware |
1214-1219 |
36 |
A Survey on Shadow Detection Methods
Namrita Singh, A.A.Maxton |
1220-1224 |
37 |
Detection of Clouds and Cloud Shadow in Satellite Images using Fuzzy Logic
Namrita Singh, A.A.Maxton |
1225-1228 |
38 |
Development of Back Propagation Neural Network Model for Extracting the Feature from a Image Using Curvelet Transform
Mr. Tejas P. Patil, Prof. P. P. Narwade |
1229-1238 |
39 |
STRENGTHENING USER’S CONTROL OF DATA IN THE CLOUD SERVICE – AUDITING and LOGGING MECHANISM
A. Anuba Merlyn , Asst.Prof. V. Veera Ragavan, Dr. K. Selva Kumar |
1239-1247 |
40 |
An Efficient & Secured Way of Sharing the Data Using Distributed Accountability & Auditing in Cloud
Chandan.M, Aparna K.S |
1248-1254 |
41 |
IRIS COLLARETTE BOUNDARY LOCALIZATION USING 2-D DFT FOR IRIS BASED BIOMETRIC SYSTEM
Kapil Rathor |
1255-1259 |
42 |
Design and Implementation of Logical Scrambler Architecture for OTN Protocol
Chethan Kumar M, Praveen Kumar Y G, Dr. M. Z. Kurian |
1260-1262 |
43 |
Design and Implementation of Q-algorithm for Data Collision Reduction in EPC GEN-2 based on FPGA
Rajeshwari T R, Sandra Benzamin, Dr. M. Z. Kurian |
1263-1266 |
44 |
Comparison Between WSN and WSAN
S.Murugeswari,Dr.R.Ravi, S.Raji |
1267-1272 |
45 |
Retrieval Of Digital Images Based On Shape Feature Using Support Vector Machines And Self Organizing Maps
Sarita Sharma, Avinash Dhole |
1273-1279 |
46 |
Deep Learning Neural Network with Semi supervised Segmentation for Predicting Retinal and Cancer Cell Diseased Images
Veena Chandran, Dinesh Kumar A, Geetha P.K,Nidhya R |
1280-1285 |
47 |
Protecting Privacy When Disclosing Information By using Wireless Sensor Networks
P SURYA CHANDRA, RAVI BOLLEDDULA |
1286-1290 |
48 |
NOVEL IMPLEMENTATION OF SECURE SINGLE LOGIN IN DISTRIBUTED COMPUTING NETWORKS USING ECC
D.Mariammal, P.Brundha |
1291-1294 |
49 |
Video Recommendation based on Content and Social Behaviour of User
Kanchana Devi A , Sathiya Devi S |
1295-1298 |
50 |
Doppler Effect method of Underground oil leakage prediction by Optical Fiber Communication (OFC)
Kumaraswamy.T.C, Selvakumar.S |
1299-1301 |
51 |
A SOFTWARE DESIGN PATTERN FOR BANK SERVICE-ORIENTED ARCHITECTURE
C.K.Gomathy,Dr.S.Rajalakshmi |
1302-1306 |
52 |
PERFORMANCE ENHANCEMENT AND EFFICIENCY EVALUATION FOR VANET APPLICATION BASED ON RLSMP TOOL
SIVAKUMAR P , SARAVANAN S |
1307-1310 |
53 |
Performance Analysis of MPLS network with Traditional IP Network in Service Provider Environment
Nishant N.Kale, Sunil A. Waichol |
1311-1316 |
54 |
Centroids Initialization for K-Means Clustering using Improved Pillar Algorithm
Bapusaheb B. Bhusare, S. M. Bansode |
1317-1322 |
55 |
Analysis of Load Balancing Algorithms in Cloud Computing and Study of Game Theory
Shilpa S, Prof. Shubhada Kulkarni, Prof.Sharada Kulkarni |
1323-1329 |
56 |
Image Segmentation and Edge Detection Using a Neural Networks RBF Approach
Shweta Lawanya Rao,Dolley Shukla |
1330-1335 |
57 |
Design and Implementation of Reversible Sequential Circuits
Harish Naik KP, G.Jyothi, Dr.K.N.Murulidhara, Dr.M.Z.Kurian |
1336-1344 |
58 |
Face Detection in Real Time Based on HOG
Rekha N, Dr.M.Z.Kurian |
1345-1352 |
59 |
FAST RE-AUTHENTICATION FOR EFFICIENT AND SEAMLESS HANDOVER IN 4G NETWORKS
S.Arunkumar, P.Rajkumar |
1353-1358 |
60 |
IMPROVING DATA SECURITY USING ATTRIBUTE BASED BROADCAST ENCRYPTION IN CLOUD COMPUTING
K.Kamalakannan, Mrs.Hemlathadhevi |
1359-1363 |
61 |
Wireless Advertising Using Pull-Based Approach
Pratiksha parjane ,Rekha jadhav ,Afsha Pathan, Rubina pathan, M. A. R.Shabad |
1364-1368 |
62 |
Jamming Detection System in Wireless Sensor Networks
K.P.Vijayakumar, P.Ganeshkumar, M.Anandaraj |
1369-1372 |
63 |
Profit-Aware Policy Scheduler (PAPS) for Resource Allocation in IaaS Clouds
Rajalakshmi Shenbaga Moorthy, Thamarai Selvi Somasundaram, Kannan Govindarajan |
1373-1377 |
64 |
Improved Search Goals with Feedback Sessions by using Precision Values
Nancy S, Sathiya Devi S |
1378-1381 |
65 |
An Efficient Approach for Image Retrieval Using Semantic Relevance
Sukhada Aloni |
1382-1385 |
66 |
A Novel Security Scheme for Improving Reliable Transmission using Energy Based Routing
M. Siva Sangari, Mrs.P. Brundha |
1386-1389 |
67 |
Clustering In Content-Based Image Retrieval
David Raja Nadar , Savita R Bhosale |
1390-1392 |
68 |
Automatic Data Cleansing Of Incorrect City Names In Spatial Databases Using LCS Algorithm
Dr. M. Ben Swarup , B. Leela Priyanka |
1393-1396 |
69 |
Performances of Connected Lookup and Unconnected Lookup Transformations in ETL
G.Thangaraju,Dr.X.Agnes Kala Rani |
1397-1404 |
70 |
“T-Board: The Total Keyboard” For M-Learning Platform
Mr. Vishwas Kulkarni,Mr. Kishor Deshmukh, Ms. Puja Pathak, Ms. Gauri Pathak, Mr. Amol Khandhare |
1405-1413 |
71 |
Wavelets Transform Based Data Hiding Technique for Stegnography
Jayapragash.K,Vijayakumar.P |
1414-1419 |
72 |
Case study then Direct-Form FIR Poly-phase Linear Interpolator Filter Design with Symmetric Structure
Mandeep Singh Saini, Dr. Kuldeep Kaur |
1420-1428 |
73 |
Malware Detection in Android
Geethu M Purushothaman, G Gopinadh, Nihar SNG Sreepada |
1429-1436 |
74 |
Design And Implementation Of Child Activity Recognition Using Accelerometer And RFID Cards
Kushbu, M.C. Chandrashekhar, Dr.M.Z. Kurian |
1437-1440 |
75 |
Abridged Energy Utilization in Wireless Networks through Efficient Scheduling Mechanism
S Priyamohana, S Veluchamy, C Suresh Kumar |
1441-1445 |
76 |
Link Adaptation Technique for MIMO-OFDM systems with Low Complexity QRM-MLD Algorithm
C. Suganya, S.Santhiya, K.Jayapragash |
1446-1450 |
77 |
CONTENT BASED IMAGE RETRIEVAL USING INTEGRATION OF COLOR AND TEXTURE FEATURES
Aditi Giri, Yogesh Kumar Meena |
1451-1454 |
78 |
Secure Group Key Agreement with Node Authentication
Anurag Singh Tomar, Gaurav Kumar Tak, Manmohan Sharma |
1455-1458 |
79 |
Dynamic Resource Allocation Using Latent Semantic Ranking in Cloud Computing Environment
N.Krishnaveni,Prof.G.Sivakumar |
1459-1462 |
80 |
Energy Consumption in MANET’s using Energy Efficient AODV Protocol
Mr.Vaibhav Naresh Palav, Prof. Mrs. Savita R. Bhosale |
1463-1468 |
81 |
Optimized Test Case Prioritization with multi criteria for Regression Testing
KanwalpreetKaur,Satwinder Singh |
1469-1473 |
82 |
Efficient Design of Arithmetic Logic Unit using Reversible Logic Gates
Ravi Raj Singh, Sapna Upadhyay, Saranya S, Soumya, Jagannath KB, Hariprasad SA |
1474-1477 |
83 |
An Evolutionary-Fuzzy Expert System for the Diagnosis of Coronary Artery Disease
Y.Niranjana Devi, S.Anto |
1478-1484 |
84 |
Context-Based Similarity Analysis for Document Summarization
S.Prabha, Dr.K.Duraiswamy, B.Priyanga |
1485-1491 |
85 |
A COMPREHENSIVE STUDY ON BOTNET AND ITS DETECTION TECHNIQUES
P.Panimalar, Dr.K.Rameshkumar |
1492-1496 |
86 |
Optical Pulse Compression and its Effects Using Fiber Bragg Grating
Manoj Divagar. T, S. James Raja, S. Ilayaraja |
1497-1501 |
87 |
Analysis and Estimation of Rust Disease in Bengal gram Based on Thresholding and RGB Extraction using Image Processing
Shivanand N , Jagadeesh S , Pavan J , Shilpa M , S.G.Kanakaraddi |
1502-1505 |
88 |
AMapReduce Approach for Traffic Telemetric Analysis in Hadoop
Harshit Sharan,Abhinay Agrawal |
1506-1509 |
89 |
Fuzzy Information System to Classify Hypertension According to Blood Pressure
Priyanka Dudi, Manmohan Sharma |
1510-1512 |
90 |
Personal Digital Assistant Based Ubiquitous Programming
Nidhi Manjula, Uttam Kumar Kesri, Deepika Sharma |
1513-1517 |
91 |
Compression of Secant and Gaussian Pulse Using Nonlinear Fiber Bragg Grating
S. Ilayaraja, S. James Raja, Manoj Divagar. T |
1518-1522 |
93 |
DESIGN OF LDPC ARCHITECTURE USING VERILOG CODING
Manjunatha P N , Prof .T.S Bharath kumar, Dr. M Z Kurian |
1527-1531 |
94 |
Accident Monitoring System using Wireless Application
Megha Nirbhavane, Shashi Prabha |
1532-1535 |
95 |
A Lightweight Paradigm for Security in Bluetooth
Mrs.Sandhya S,Dr.Sumithra Devi K A |
1536-1540 |
96 |
A METHOD FOR PREVENTING DISCRIMINATION IN DATA MINING
P.Yuvasri,S.Boopathy |
1541-1546 |
97 |
Effective Video Streaming with Low Latency over MANET
Mr.S.Mohideen Badhusha, Dr.K.Duraiswamy, G.Subha |
1547-1553 |