S.No. |
Title and Authors of Paper |
Page.No. |
1 |
A Review on Energy Efficient Modulation and Coding Techniques for Clustered Wireless Sensor Networks
M. Sheik Dawood,R. Aiswaryalakshmi, R Abdul Sikkandhar,G. Athisha |
319-322 |
2 |
A Combined Approach to Part-of-Speech Tagging Using Features Extraction and Hidden Markov Model
Bhairab Sarma,Prajadhip Sinha,Dr. Bipul Shyam Purkayastha |
323-329 |
3 |
Trends in High Performance Operation of Electro Absorption Integrated Laser Modulators in Advanced Optical Switching Transmission Networks
Ahmed Nabih Zaki Rashed |
330-336 |
4 |
A Review on Concurrency Fault Detection Techniques
C. Revathi, M. Mythily |
337-341 |
5 |
DOCUMENT FAXING THROUGH MOBICLOUD USING ANDROID
Swapnali Gharat , Prajakta Rajput, Jayashree Patil, Snehal Sonavane |
342-346 |
6 |
Energy Renewal Approach in Wireless Sensor Networks
G.Lilly Evangeline,G.Josemin Bala |
347-351 |
7 |
A New Optimization Method for Dynamic Travelling Salesman Problem with Hybrid Ant Colony Optimization Algorithm and Particle Swarm Optimization
Farhad Soleimanian Gharehchopogh, Isa Maleki, Seyyed Reza Khaze |
352-358 |
8 |
Survey on Ant Colony Algorithm
Sony V Johny, Sakhi S Anand |
359-361 |
9 |
Survey on Routing in Multihop Wireless Networks Using Micropayment Schemes
Presty Kasmir, Sakhi S Anand |
362-364 |
10 |
A Survey on Image Mosaicing Techniques
Hemlata Joshi,Mr.KhomLal Sinha |
365-369 |
11 |
UseofJMEforStudentInformationAcquisition
Rohini Misal, Varsha Rathi, Zimil Patel,Prof. Nikita J Kulkarni |
370-373 |
12 |
A New Proposed Technique to Prevent NAV attack in MACA Protocol
Vivek Pathak, Ambrish Gangal |
374-378 |
13 |
Identifying the Quality of Object Oriented Software System using Modularization Approach
Ms. Pragati D. Chowhan, Prof. S. S. Dhande |
379-382 |
14 |
NOVEL REMOTE RENDERING AND MONITORING ON PERSISTENT MOBILE CLOUD
R. Baskarane, R. Vijayalakshmi |
383-386 |
15 |
A Review on Otsu Image Segmentation Algorithm
Miss Hetal J. Vala, Prof. Astha Baxi |
387-389 |
16 |
A Comparative Study On Some New Steganographic Techniques
H. Faheem Ahmed, U. Rizwan |
390-398 |
17 |
Image segmentation based on kernel fuzzy C means clustering using edge detection method on noisy images
Saritha A K,Ameera P.M |
399-406 |
18 |
A New Algorithm For The Detection and Removal Of Impulse Noise Using Cellular Automata
Christylda Angelin Hannah .J, Natheldha Mary Navina .S |
407-411 |
19 |
Data-warehousing on Cloud Computing
Hemlata Verma |
411-416 |
20 |
Percentage Based Trust Model with Bandwidth Reservation Technique for Privacy Preserving Routing in MANETs
Raghu. R, Gopinathan. B |
417-423 |
21 |
Grid Based Multiple Features Based On Image Mosaicing
Richa Shukla, Rohit Raja |
424-427 |
22 |
Secure Secret Key (SSK) Generation Algorithm for Multimedia Multicast Networks
Sathya S,Ajay Kumar |
428-433 |
23 |
Routing Issues for Trust Based Framework in Mobile Ad Hoc Networks
Mukesh Kumar Garg, Dr. Ela Kumar |
434-435 |
24 |
Web Text Classification Using Genetic Algorithm and a Dynamic Neural Network Model
Revathi N, Anjana Peter, Prof.S.J.K.Jagadeesh Kumar |
436-442 |
25 |
Efficient Broadcast Algorithms To Reduce number of transmission Based on Probability Scheme
S.Tharani, R.Santhosh |
443-447 |
26 |
Security and Privacy in Emerging Wireless Networks with Mobile Sinks
S.Rajeshwari, R.Santhosh |
448-451 |
27 |
Combating Sybil Attacks using SybilGuard
Abhijeet B. Potey,Prof.Anjali B.Raut |
452-455 |
28 |
DISCRIMINATION OF HEART RATE VARIABILITY USING DECISION TREES AND MLP NETWORKS
Gomathi.S, Mohan Raj.T, Saranya Sri.R |
456-461 |
29 |
Correlation Preserved Indexing Based Approach For Document Clustering
Meena.S.U, P.Parthasarathi |
462-470 |
30 |
MEDICAL IMAGING FOR THE SEGMENTATION OF ABDOMINAL ORGANS USING PARALLELIZATION AND ORIENTED ACTIVE APPEARANCE MODELS
Brahmya Joseph, P.Madhavan |
471-476 |
31 |
Survey on Data Sharing and Re-Encryption in Cloud
Renjith P , Sabitha S |
477-480 |
32 |
An Efficient Face Recognition under Varying Image Conditions
C.Kanimozhi,V.Nirmala |
481-485 |
33 |
Link Stability and Energy Optimization by Excluding Self node for Mobile and Wireless Networks
T .Parameswaran, K. Thamarai Selvi, Mani Deepak Choudhry |
486-492 |
34 |
A Study of Decision Support System (With reference to Indian Retail Industry)
Dr. Mini Amit Arrawatia, Mr. Pankaj Meel |
493-498 |
35 |
E-Commerce Applications: Vulnerabilities, Attacks and Countermeasures
P. S. Lokhande ,B. B. Meshram |
499-509 |
36 |
A cost effective Online Examinations model using server virtualization with virtual machine clusters
Balaji Kandregula |
510-513 |
37 |
Review on an Underwater Acoustic Networks
Amanpreet Singh Mann, Reena Aggarwal |
514-518 |
38 |
A Survey on Different Fingerprint Recognition Systems
Mr Parth BPathak,Prof Mrs A G Andurkar |
519-523 |
39 |
DVS Scheduling in Multi Core Real Time System
X.JUDE ROY JEYASEELAN |
524-529 |
40 |
Query Optimization: Finding the Optimal Execution Strategy
Vinod S.Gangwani,Prof.P.L.Ramteke |
530-533 |
41 |
Fast distribution of Data in Wireless Sensor Network using Concurrency Operation
Geetha N, Janani V |
534-538 |
42 |
REVIEW OF PASSWORD PROTECTING MECHANISM
Ms.K.Banu priya, Dr.P.Venkateswari |
539-545 |
43 |
Concert augmentation in Cognitive Radio System with OFDM and Beamforming technique for Data communication
A. Suban, K.Mangayarkarasi |
546-550 |
44 |
Improving P2P Performance by Applying Proper Replica Placement Strategies
Thara R J, Kala Karun A, Shine S |
551-554 |
45 |
Interference Mitigation in LTE- Advanced MU-MIMO through Beamforming Technique
A.Suban , V. S. Priyanka , S. Atchaya |
555-558 |
46 |
Performance Enhancement of Data Communication through Visible Light Communication Using On Off Keying
Prabu.P,Manikandan.R, Pradeep.M |
559-563 |
47 |
Enhanced audit services for the correctness of outsourced data in cloud storage
V.Venkatesh, P.Parthasarathi |
564-567 |
48 |
5G Mobile Technology
Ms. Reshma S. Sapakal,Ms. Sonali S. Kadam |
568-571 |
49 |
Android Application to get Word Meaning through Voice
Miss. Priyanka V. Mhamunkar, Mr. Krishna S. Bansode, Prof. Laxman S. Naik |
572-575 |
50 |
Review on Data Dissemination over Wireless Sensor Networks
Madhu Rani, Arvind kumar |
576-581 |
51 |
Selfishness of Discriminate Node in Caching Based Wireless Sensor Network
Poonam Bisht, Arvind kumar |
582-586 |
52 |
AOMDV with improved Energy Function
Alpesh chauhan,Prof.B.V.Buddhdev |
587-591 |
53 |
Dynamic Pattern Matching: Efficient Pattern Matching using Data Preprocessing with help of One time look indexing method
S.Hrushikesava Raju,Dr. T. Swarna Latha |
592-599 |
54 |
Privacy Requirement Engineering Based on Modified Evidence Combination Approach
Nithya V. P., R. Subha |
600-605 |
55 |
A Survey on Various Median Filtering Techniques for Removal of Impulse Noise from Digital Images
Ms. Rohini R. Varade, Prof. M. R. Dhotre, Ms. Archana B. Pahurkar |
606-609 |
56 |
A Survey on Migration of Task between Cloud and Mobile Device
Mrs. Minal Zaa,Prof.J.P.Gabhane,Prof.A.V.Dehankar |
610-613 |
57 |
TOP K ANSWERS FOR KEYWORD QUERIES USING INDEXES
Sharmili C, Rexie J. A. M |
614-618 |
58 |
NEURAL NETWORK BASED MATCHING APPROACH FOR IRIS RECOGNITION
Anjana Peter, Revathi N, Ms. Merlin Mercy |
618-623 |
59 |
Position-based Opportunistic Routing for Highly Dynamic MANETS
S.Sharon Ranjini,G.ShineLet |
624-627 |
60 |
The Content Summarization system
A.Pearline Divya, S.Leela |
628-635 |
61 |
Design of Dynamic Error Handling Tool
Komal R. Patel, Harshita C. Kanani |
636-638 |
62 |
An Intercluster-Chaining Protocol with Neighbour Node for Energy Efficient Data Collection in Wireless Sensor Networks
M.Govindarajan, P.Balamurugan |
639-646 |
63 |
Design of RC5 Algorithm using Pipelined Architecture
R.Sanju Abraham, A.Arun |
647-651 |
64 |
Security Issues with Possible Solutions in Cloud Computing-A Survey
Abhinay B.Angadi, Akshata B.Angadi, Karuna C.Gull |
652-661 |
65 |
Cloud based Intra-College Communication Information System using Mobile Clients
Swapnil S. Bangare, Atul S. Mhaske, Sagar A. Sune, Harshal D. Pranjale |
662-665 |
66 |
Design of a Cost Effective and environment friendly Off-Grid Wind-Diesel Hybrid Power System in Kutubdia Island of Bangladesh
Sham Datto,Md. Harun OrRoshid, MafinMuntasir Rahman |
666-669 |
67 |
Stochastic Based Optimal Resource Provisioning in Cloud Computing
P. Arun pandian, S. Anto |
670-675 |
68 |
Interpreting Inference Engine for Semantic Web
MS. PRIYANKA PATEL, MS. PRIYANKA TRIKHA |
676-678 |
69 |
Detection of Colluding Collision and Identity Delegation Attacks in Wireless Ad Hoc Networks via SADEC
Angel Mary Alex, M. Ashwin |
679-683 |
70 |
Cluster Based Energy Efficient Sensory Data Collection With Mobile Sink
G. Sunil, Mrs. D. Jasmine David |
684-687 |
71 |
Pre Layout And Post Layout Analysis Of Parallel Counter Architecture Based On State Look-Ahead Logic
Ulala N Ch Mouli Yadav, J.Samson Immanuel |
688-693 |
72 |
A Design of Ultra Low Power and High Speed 64 Bit Error Tolerant Adder for MAC
R.Arun Kumar, D.AbrahamChandy |
694-697 |
73 |
EFFICIENT LOCALIZED DEPLOYMENT ALGORITHM WITH BALANCED ENERGY CONSUMPTION IN WIRELESS SENSOR NETWORKS
Shamily C., P. Anitha Christy Angelin |
698-702 |
74 |
DISTANCE BASED RANGE QUERIES
Josepin Dayana T, J. A. M Rexie |
703-706 |
75 |
Analysis of local and global techniques for disparity map generation in stereo vision
Vrushali Baxi, Ms. Priyanka Tirkha, Bilav I. Prajapati |
707-710 |
76 |
A Survey on the different text data compression techniques
Rajinder Kaur, Mrs. Monica Goyal |
711-714 |
77 |
A Review of a Goal Directed Visual Perception System using Object based Top down Attention
Aniket D. Pathak, Priti Subramanium |
715-718 |
78 |
Determination of optimum coefficients of IIR Digital Butterworth Band-Stop Filter
Subhadeep Chakraborty, Abhirup Patra |
719-725 |
79 |
DIVERSITY IMPROVEMENT IN RECOMMENDER SYSTEM
Antony Taurshia.A,S.Deepa Kanmani |
726-728 |
80 |
Design of Wireless Monitor System Based On S3C2440 and GPRS
CH.SREEDHAR, SRIDHAR.V,G.NAGENDRA,M.ZUBAIR |
729-738 |
81 |
QARS for Self Reconfiguration Mechanism in Wireless Mesh Networks
A.Melveena, D.Ramya Dorai |
739-743 |
82 |
RANKING ADAPTATION SVM FOR TARGET DOMAIN SEARCH
M.S.Gayathri, S.Leela |
744-749 |
83 |
A Survey on Routing Protocol for Wireless Sensor Network
Sitender Kumar, Arvind Kumar, Rohit kumar vishwkarma |
750-755 |
84 |
A Survey on Energy-Efficient protocol for Wireless Sensor Networks
Rohit kumar vishwkarma, Arvind kumar, Sitender arora |
756-760 |
85 |
A Three-Layer Architecture based Approach for Data Access Layer in the Information Systems Production
Farhad Soleimanian Gharehchopogh, Esmail Amini, Behnam Zebardast |
761-766 |
86 |
Simulation and evaluation of convolution encoder for different noisy channel over wireless communication network in CDMA environment
Jai Kumar,Anita Suman |
767-772 |
87 |
A Survey on Preserving Privacy towards Location Proof
Senthilguru S, Blessed prince P |
773-776 |
88 |
Energy-Aware Duty Cycle Scheduling for Efficient Data Collection in Wireless Sensor Networks
Jerrin T John, S. R. Jino Ramson |
777-783 |
89 |
Plant Recognition through Leaf Features Mapping
Ms. Pushpinder Kaur, Ms. Janhavi Mane, Ms Sonali Sawant |
784-786 |
90 |
Data mining with Improved and efficient mechanism to detect the Vulnerabilities using intrusion detection system
Awan Dhawan |
787-791 |
91 |
An Enhanced and efficient mechanism to detect Sybil attack in Wireless Sensor Networks
Heena Sharma, Awan Dhawan |
792-796 |
92 |
Highly Secure Distributed Authentication and Intrusion Detection with DataFusion in MANET
S.Jeyashree |
797-801 |
93 |
Wavelet Based Classification of Multispectral Satellite Image Using Fuzzy Incorporated Hierarchical Clustering With SVM Classifier
S.Sindhu, Dr.S.Vasuki |
802-807 |
94 |
Identification of diabetic retinopathy stages in human retinal image
A.Alaimahal, Dr.S.Vasuki |
808-811 |
95 |
Non-Stationary Power Quality Signals Classification using Fuzzy C-means Algorithm
M.Venkata Subbarao, N.Sayedu.Khasim,Jagadeesh Thati, M.H.H.Sastry |
812-816 |
96 |
Low and mid-level features for target detection in satellite images
Rajani.D.C |
817-825 |
97 |
Performance analysis of Meandered loop and Top loaded monopole antenna for Wireless Applications
M. Ilakkia, T. Anita Jones Mary, Dr. C. S. Ravichandran |
826-830 |
98 |
Study of Wireless Optical CDMA LAN in Indoor Environment
R.KANMANI, K. SANKARANARAYANAN |
831-838 |
99 |
Power Optimized MAC Protocol in Ad-Hoc Network’s
Rahul Mukherjee |
839-847 |
100 |
A cryptographic Image Encryption technique based on the RGB PIXEL shuffling
Quist-Aphetsi Kester |
848-854 |
101 |
AUTOMATIC IMAGE ANNOTATION USING WEAKLY SUPERVISED GRAPH PROPAGATION
Kalaivani.R,Thamaraiselvi.K |
855-860 |