Volume 3 Issue 5 May 2014

S.No. Title and Authors of Paper Page.No.
1 Secure grouping data transmission scheme for Multiple Applications in Wireless Sensor Network
A.ASHOK , M.CHINNADURAI
1554-1599
2 To study Digital watermarking technique based on DCT and DWT
Mr. mitesh patel ,Ms swati patel
1560-1566
3 The study of various attacks on Digital watermarking technique
Mr.Mitesh Patel,Ms swati ,Mr.Alpesh Chauhan
1567-1570
4 Big Data and Hadoop
Sreedhar C, Dr. D. Kavitha, K. Asha Rani
1571-1575
5 A Secured Approach to Credit Card Fraud Detection Using Hidden Markov Model
Twinkle Patel, Ms. Ompriya Kale
1576-1583
6 An Efficient Approach To Detecting Phishing A Web Using K-Means And Naïve-Bayes Algorithms With Results
Ms. Nilam Badadhe , Ms. Sneha More , Mrs. N. V. Puri
1584-1589
7 A New Way to Convert Analog to Digital and Digital to Analog Data Using Successive Approximation
Saikat Sinha
1590-1594
8 DESIGN AND IMPLEMENTATION OF A SECURE MULTI-CLOUD DATA STORAGE USING ENCRYPTION
Prof. M. Ben Swarup,Chukkala Varaha Sampath, Pothabathula Srikanth
1595-1599
9 Making Mobile Devices Last Longer Through 3-tier Cyber Foraging Approach in Mobile Cloud Computing
Dhwani Sanghavi, Prof. Jignesh Vania
1600-1608
10 Performance Comparison of Multihop Wireless ADHOC Routing Protocols AODV, OLSR & TORA
Mahesh Chandra Gupta,Lakhan Dev Sharma
1609-1615
11 A Learning Based Search Engine Selection Technique
Kawaljeet Kaur , Richa Bansal
1616-1619
12 Parametric Analysis and Comparison of Various SRAM Topologies
Akanksha Singh,Joita Chakroborty,Apoorva Tripathi,Neha thakur
1620-1623
13 Swarm Intelligence and Evolutionary Computation based Cryptography and Cryptanalysis of 4-round DES algorithm
Anjali Dadhich, Dr. Surendra Kumar Yadav
1624-1633
14 EFFICIENT VISUAL CRYPTOGRAPHY FOR GENERAL ACCESS STRUCTURES WITH STAMPING AND SYNTHESIZING
P.Lakshmi, S.Baskari
1634-1638
15 IMAGE BASED VEHICLE DETECTION USING LOG GABOR FILTER
B.Sahaya priya, S.Sivakumar
1639-1645
16 Brain Tumor image Segmentation using Adaptive clustering and Level set Method
Kinjal Patel,Jasmine Jha
1646-1650
17 Non-Invasive Diagnosis of Eye Diseases using Image Segmentation and Neural Networks
L.Parvathavarthiny, S.Batmavady
1651-1655
18 Solution of Differential and Integral Equations Using Fixed Point Theory
Kakde R V, Biradar S S,Hiremath S S
1656-1659
19 A Novel Test Path Selection Based on Switching Activity and Its BIST Implementation
P.Pattunarajam, V.Srividhya, Dr.Reeba Korah
1660-1665
20 Privacy Preserving in Association Rule Mining On Horizontally Partitioned Database
RACHIT V. ADHVARYU, NIKUNJ H. DOMADIYA
1666-1671
21 Enhanced SLA-Tree Algorithm to Support Incremental Tree Building
Rohit Gupta, Tushar Champaneria
1672-1676
22 Study on Collaborative-Learning using Cloud Technologies
D.Jagadish, S.Mohamed Ibrahim, M.Thangavel
1677-1680
23 Precise Segmentation of Vessels from MRA Brain Images
D.Jenefa Magdalene,G.R.Jainish
1681-1685
24 IMPLEMENTATION OF MULTIPLE STATIC AND MOBILE SINK NODES FOR ENERGY BALANCING IN SENSOR NETWORKS
Anil Kumar P,Mrs. Richa Golash
1686-1692
25 Digital Watermarking for Video Sequences using Pseudo 3D-DCT Approach
Krishnamoorthi , Mrs. Anitha Devi M.D., Dr. M.Z. Kurian
1693-1698
26 DETECTION OF DESIGN PATTERNS USING DESIGN PATTERN NEARNESS MARKING (DPNM) ALGORITHM
Shanker Rao A,M.A. Jabbar,Mayank Sharma
1699-1706
27 Enhancement Key Of Cryptography And Steganography Using RSA And Neural Network
Kamal, Lovnish Bansal
1707-1710
28 Design and Development of a Biometric System Using Mouse Gesture Dynamics
Chethan D C,Mr.Sundaresh M P
1711-1715
29 DENIAL OF SERVICE RESILIENCE IN ADHOC SENSOR NETWORKS WITH CUSTOM DEFINED FIREWALL
E.Renuga,A.Jegatheesan
1716-1721
30 Mobile Cloud Computing Security Issues: Overview
Jaspreet Kaur Aulakh, Sugandha Sharma , Mayank Arora
1722-1726
31 Survey Paper on Spectrum Sensing Algorithm for Cognitive Radio Applications
Anushka Das, Yamini Mehta, Raaz Parwani,Preeti Bhardwaj,Prof. Vijay Rughwani
1727-1733
32 Mobile Cloud Computing Techniques: A Review
Karamjeet Kaur , Sugandha Sharma, Mayank Arora
1734-1738
33 Implementation on combined CIC filter and 64 taps using compensation Filter in matlab
Mr.Manjunathachari k.b, Mrs.Divya Prabha, Dr.M.Z.kurian
1739-1742
34 Watermarking Methods for User Selection System As Visible and Invisible Using DWT
Sapna Singla, Rajiv Bansal
1743-1746
35 Cross Domain Sentiment Classification: Current Solutions
Neethu Kurian
1747-1750
36 Classification of Texture with Features Extraction using Wavelet Approach
Revatee Bagade,Mr.P.P.Narwadw
1751-1754
37 LOW POWER IMPLANTABLE NEURAL RECORDING SYSTEM
VIJAYAKUMAR.P, KRIPAKARAN.P, JAYAPRAGESH.K
1755-1761
38 Developing Rich Internet Application from Thick Client Architecture
Varsha Kuldharme, Prateema Karande, Vinayak Kalaskar, Pranav Kamble,Prof.Bhavana Tiple
1762-1765
39 Simulation and Comparison of Energy Efficient Routing Protocols in MANET’s using NS2
Siddlingappagouda Biradar, Prahlad Kulkarni
1766-1771
40 Color Image Segmentation Using Brightness and Color Fusion
A.Anuja Merlyn, Dr.C.Seldev Christopher
1772-1777
41 An Efficient Digital Image Watermarking Using Diagonal Pixel Value Difference Method (DPVD)
Er. Sonia , Er. Naresh Kumar Garg
1778-1783
42 IMPROVE PERFORMANCE OF MULTIHOP ROUTING IN WIRELESS NETWORKS
M.Balaganesh, T.Madhurandhagam
1784-1789
43 Autocorrelation Function in EOF Analysis
Sujata Goswami, Prof. Nico Sneeuw, Prof. Kamal Jain
1790-1793
44 Design and Analysis of 2X2 MIMO System for 2.4 GHz ISM Band Applications
Harshal Nigam, Mithilesh Kumar
1794-1798
45 A New Approach of Sorting Using Recursive Partition
Mr. Maulik K. Patel, Ms. Shruti Yagnik
1799-1802
46 Dynamic Composition of Web Services by Ontology Mediation Techniques
N.Sharmila Banu
1803-1807
47 Design & Optimization of Microstrip Parallel Coupled Bandpass Filter at 20 GHz
Pooja Rani, Shilpi Gupta, R. K. Prasad
1808-1812
48 Design & Optimization of Stepped Impedance Low Pass Filter using ADS Simulation tool at 5 GHz
Shilpi Gupta, Pooja Rani, R. K. Prasad
1813-1817
49 Low-Power VLSI Implementation in Image Processing using Programmable CNN
Mrs. Sarita Chauhan, Janardan Sharma, , Pratibha Soni
1818-1824
50 SECURITY APPROACH FOR COMPUTER NETWORK BASED ON DETECTING COVERT CHANNEL IN TCP/IP PROTOCOL
Mr. Borhade Ajit M.,Prof. Borkar Bharat S.
1825-1831
51 A Study on Medium Access Control Protocols in Wireless Mesh Networks
G.Vijaya Kumar, A.Vishnuvardhan Reddy, Dr. R.Praveen Sam
1832-1838
52 Passport Authentication Using PNG Image with Data Repair Capability
Aswathi Muralidharan, Maria Johnson, Roshna Raj, Deepika M P
1839-1843
53 A Fine Grained Framework for Selective Sharing of Composite EHRs in Clouds
ShitalPalasagaonkar
1844-1852
54 Power Reduction in CMOS Technology by using Tri-State Buffer and Clock Gating
Renuka Jaiswal, Ranbir Paul, Vikas Ranjan Mahto
1853-1860
55 Escalating Security and performance in Wireless Ad-Hoc Network
Soniya .M, Sangeetha .T, Girija .K, Sabarinathan .P
1861-1865
56 OVERVIEW OF IMAGE COMPRESSION
GAGANDEEP KAUR, JAYA SEHGAL, ANKU BRAR
1866-1871
57 Energy Efficient Routing for MANETs using On-demand Multipath Routing Protocol
May Cho Aye, Aye Moe Aung
1872-1875
58 ERACK-A New Intrusion Detection System For MANET
Chinthanai Chelvan.K, Herman Jeeva.S, Prasanna.P, Saravanan.D
1876-1880
59 Mixed Integer Programming Model For A Variant Of Periodic Vehicle Routing Problem
Bambang Irawan, Herman Mawengkang
1881-1886
60 PROTECTION TECHNIQUES FOR TRANSFORMED EEG SIGNALS
Ankita Varshney,Abdul Khalid, Shaziya Parveen
1887-1891
61 Color Image Denoising Using Wavelet Thresholding
Tarun Kumar Sahu, Shweta Choubey, Ritesh Beohar
1892-1895
62 Real Time Pothole Tracking System Using Android Smart Phone
Pavan Gorade, Digambar Karde, Poonam Khilare, Abhishek Sontakke, Prof.Ranjana M.Kedar
1896-1899
63 Performance Analysis Of Double Edge triggered D flip flop
Namrata Rapartiwar, Vinod Kapse,Tarun kumar Sahu
1900-1903
64 Macroblock level QP adaptation using SSIM for H.264 Encoder
Kirti M. Sargar, Anita B. Wagh
1904-1907
65 An Improvised Intrusion Detection System for MANETs – Defensive EAACK
R.Gowtham, Celeste Fatima, R.G.Gopeeka, A.Chandrasekar
1908-1915
66 Implementing an algorithm to Enhanced Protection for Routing in IP Networks
Swapnil R. Sharma Dikshit,Lalit Dole
1916-1920
67 A survey paper on Frame work for classification of uncertain data
Shruti Sharma, Jigyasu dube
1921-1925
68 Review paper on Reliability of Wireless Sensor Networks
GAGANDEEP KAUR
1926-1928
69 Study of Undeniable Digital Signatures Schemes
Mohit Kaushik, Om Pal, Neha Mittal
1929-1933
70 Performance evaluation of AODV, DSDV and AntHocNet in video transmission
Neelam S. Labhade , S.S.Vasekar
1934-1939
71 Performance Analysis Of Geocast Routing Protocol In Vehicular Ad-hoc Network
Pooja Mane, Reshma Zambare, Priyanka Kanake,Priyanka Harale, Prof. Uma Nagaraj
1940-1945
72 Wireless Sensor Network Application for Agricultural Environmental Sensing
Manish Giri, Anuja Doshi, Pranoti Kulkarni, Kanchan Yendhe, Sushma Raskar
1946-1949
73 Invariant and Zernike Based Offline Handwritten Character Recognition
S.Sangeetha Devi,Dr.T.Amitha
1950-1954
74 An Efficient Exact Single Pattern Matching Algorithm
Urmila Patel, Mr. Mitesh Thakkar
1955-1958
75 A SURVEY REPORT ON SECURING DATA THROUGH WATERMARKING
Chaitra H.N, Smitha U.V
1959-1964
76 A SURVEY REPORT ON VIDEO SHORT BOUNDARY DETECTION SCHEMES
Mahalakshmi R C,Dr.Suresh kumar D S,Rajendra C J
1965-1968
77 Discrimination Prevention Mechanism with Differential Privacy Scheme in Data Mining
S.Subbulakshmi,B.Arulkumar
1969-1973
78 Design and Implementation of an On-chip Multistage Network Topology for System On-Chip
Chatrinaik.R, Sowmya sunkara
1974-1979
79 Apex as an “Approximate” Communication System in Wireless Network for video transmission
Prapti Jaiswal, Anjali Yadav
1980-1986
80 NON INVASIVE TECHNIQUE BASED EVALUATION OF ELECTROMYOGRAM SIGNALS USING STATISTICAL ALGORITHM
Tanu Sharma, Karan Veer, Ravinder Agarwal
1987-1991
81 Design and implementation of IP Core Based Architecture of Telecommand System on chip (SoC) on FPGA
Mr. Anjan d, Mrs.Ashwini.s.shivannavar, Dr. M. Z Kurian
1992-1996