Call for Papers Vol 7 Issue 5 May 2018




Dear Author/Researcher,
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) invites you to submit your research paper for publishing in Volume 7, Issue 5 (May 2018).

Scope & Topics

International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) is a monthly open access journal that publishes articles which contribute new results in all areas of the Computer Science & Computer Engineering. The journal is devoted to the publication of high quality papers on theoretical and practical aspects of computer science and computer Engineering. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on Computer science & Computer Engineering advancements, and establishing new collaborations in these areas. Original research papers, state-of-the-art reviews are invited for publication in all areas of Computer Science & Computer Engineering.

Online Publication Fee Detail:

For Foreign Author
• 50 USD for publishing.

For Indian author
• Rs. 1250/- per paper.

Paper Submission:

Authors are invited to submit papers through E-mail at ijarcet@gmail.com. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this journal. Paper must be in IJARCET Templete Topics considered include but are not limited to:

• Accessible Computing
• Algorithms and Computation Theory
• Artificial Intelligence and Soft Computing
• Bioinformatics and Biosciences
• Computer Architecture
• Computer Graphics and Animation
• Computer Science / Information Technology Education
• Cryptography and Information security
• Data Communication and Computer Networks
• Data Mining and Knowledge Management Process
• Database Management Systems
• Design Automation
• Digital Signal and Image Processing
• Electronic Commerce
• Embedded Systems
• Genetic and Evolutionary Computation
• Health Informatics
• High Performance Computing
• Information Retrieval
• Internet Engineering & Web services
• Management Information Systems
• Measurement and Evaluation
• Microarchitecture
• Multimedia and Applications
• Operating Systems
• Programming Languages
• Security, Privacy and Trust Management
• Simulation and Modeling
• Software Engineering
• Ubiquitous computing
• Wireless and Mobile networks

Important Dates

Submission deadline : 20th May, 2018
Notification : 25th May, 2018
Final manuscript due : 28th May, 2018
Publication date : 30th May, 2018

With Warm Regards,

Editor-in-chief

Email: ijarcet@gmail.com


Volume 3 Issue 7 July 2014

S.No. Title and Authors of Paper Page.No.
1 An Effective Subcarrier Allocation Algorithm for Future Wireless Communication Systems
K.Siva Rama Krishna, K.Veerraju Chowdary, M.Shiva, V.Rama Krishna Raju
2247-2252
2 STUDY AND ANALYSIS ON REDUCTION OF MATERIAL REQUEST AND LINE RETURN IN A VOLVO TRUCK ASSEMBLY LINE
Siddharameshwar M , Dr. Vijaykumar
2253-2259
3 Data Compression for Low Bandwidth Locations in Android Mobiles
Aswathy.G.Nair,Prof. Kala L
2260-2267
4 Microstructure analysis of spheroidal graphite iron (SGI) using hybrid image processing approach
Miss. Shilpa Godbole, Dr. (Mrs).V.Jayashree
2268-2273
5 CLUSTER BASED ROUTING PROTOCOLS FOR MOBILE WIRELESS SENSOR NETWORK: A REVIEW
Jaideep Lakhotia, Rajeev Kumar
2274-2278
6 A SURVEY ON TEXT MINING PROCESS AND TECHNIQUES
Sathees Kumar B , Karthika R
2279-2284
7 Cosine Alpha Tapered Beamforming Window for Uniform Concentric Circular Array using in High Altitude Platform System
Hamdy A. Sharshar
2285-2292
8 FRACTAL IMAGE COMPRESSION: the new saga of compression
Akhil Singal , Rajni , Krishan
2293-2302
9 Face Recognition Based on PCA Algorithm Using Simulink in Matlab
Dinesh Kumar, Rajni
2303-2312
10 Mobile tower radiation– Affects, Assessments and Monitoring of IIT Roorkee Campus
Akanksha Jain, Kamal Jain, Ajay Gairola
2313-2316
11 Light weight secure database encryption in Web Applications
Amandeep kaur, Mrs. Shailja
2317-2319
12 Security Improvisation in Image Stegenography using DES
Miss Laxmi Randa,Prof. Payal Saxena, Dr. Y.K.Jain
2320-2327
13 A Survey on Energetic Service Allocation Using Virtual Machines for Cloud Computing Domain
Adarsha M, Ms Deepika N
2328-2330
14 Spectrum management and Channel state estimation using Poynting Vector for Cognitive Radio
Prof. Ravi Mohan Rai, Shivam Tiwari
2331-2340
15 Reduction of PAPR Performance in Alamouti Coded MIMO-OFDM System using Selected Mapping Techniques with BPSK Modulation
Tincy Mary Mathew,Ekant Sharma
2341-2346
16 Improved QoS Optimization Approach in Sensor Network using Convolutional Encoding
Yashu, Smita
2347-2351
17 A Completion on Fruit Recognition System Using K-Nearest Neighbors Algorithm
Pragati Ninawe, Mrs. Shikha Pandey
2352-2356
18 Detecting Computer Viruses
Manju Khari, Chetna Bajaj
2357-2364
19 Development of Data Mining System to Analyze Cars using TkNN Clustering Algorithm
M.Jayakameswaraiah, Prof.S.Ramakrishna
2365-2373
20 Analysis and Comparison of major mechanisms implementing Virtual Private Networks
Anupriya Shrivastava, M A Rizvi
2374-2381
21 Securing the Multicast Groups in Wireless Networks
Miss. S.Vijayashanthi, Mr. S.Balamurugan
2382-2388
22 Taxonomy of Intrusion Detection System
Monika Sharma, Sumit Sharma
2389-2393
23 A Review of Some Information Extraction Methods, Techniques and their Limitations for Hyperspectral Dataset
Suresh Merugu, Dr. Kamal Jain
2394-2400
24 Survey on perceptual beat evaluation using GMM regression in Data Mining
K.MOHAMED AMANULLAH, B.SUGANTHI
2401-2403
25 Aggregation Protocols in Wireless Sensor Network- A Survey
Nanthini.D, R.A.Roseline
2404-2408
26 BER and Q-Value Performance Analysis of WDM Network Using DPSK Modulation Format
Vandana, Gitanjali Pandove
2409-2415
27 Secure and efficient data transmission in wireless sensor networks using elliptical curve cryptography
Varsha .S. Chare, Dr. Jayashree.Patil
2416-2423
28 File Replication and Consistency Maintenance in the Hadoop cluster using IRM Technique
Ashish R. Varma, Dr. A. K. Shrivastava
2424-2428
29 Resetting 2-Order Sigma –Delta Modulator in130 nm CMOS Technology
Garima Pandey, Anil Kumar Sahu,Dr.G.R.Sinha
2429-2434
30 REVIEW ON ROLE OF DATA WAREHOUSE IN BUSINESS INTELLIGENCE
Kanika Passi
2435-2438
31 Schemes Involved in Pollution Attacks in Network Coding- A Survey
Sangeetha.V,Radhapriya.S
2439-2442
32 DYNAMIC PROCESSING SLOTS SCHEDULING FOR I/O INTENSIVE JOBS OF HADOOP ON PATHOLOGY DATA
K.H Naz Mufeeda , Anisha Rodrigues
2443-2446
33 Design and Analysis of 5GHz Frequency, Low- Phase- Noise, Parasitic Compensated LC Voltage Controlled Oscillator
MR. ABHISHEK SINGH,MANISH KATARE
2447-2449
34 A SURVEY ON DELAY TOLERANT NETWORK
M.KOWSALYA,M.SORANAMAGESWARI
2450-2455
35 A SURVEY ON PERSONALIZED USER SEARCH GOALS USING MULTI SEARCH ALGORITHM
M.SENTHAMARAI SELVI,A.MARIMUTHU
2456-2459
36 VAMPIRE ATTACKS IN WIRELESS SENSOR NETWORK –A SURVEY
Kirthika.K , Mr.B.Loganathan
2460-2465
37 Reusability Calculation of Object Oriented Software Model by Analyzing CK Metric
Neha Goyal, Er. Deepali Gupta
2466-2470
38 Energy saving in WSN using congestion controls
Yogeshwari Chaudhari, Virendra Pawar
2471-2476
39 A Study on Various Proximity Malware Detection Techniques
Nithya.K, Dr.A.Malathi
2477-2480
40 Regression Testing Based on Comparing Fault Detection by multi criteria before prioritization and after prioritization
KanwalpreetKaur, Satwinder Singh
2481-2487
41 Anonymous Routing Protocol with Multiple hops for Communications in Highly Dynamic Hetrogenious Networks
Vikram Neerugatti, A Sreekanth Reddy, Varam Deepa
2488-2499
42 Time-Period Minimization of Circuit Execution in High Level Synthesis
Pavankumar G.V, Shilpa K.C
2500-2509
43 A Survey & Analysis of Routing Protocols for Mobile Ad-hoc network
Snehal Goverdhan,Aakanksha Choubey
2510-2515
44 Power Quality Improvement using UPFC with SOLAR CELLS by MPPT
R.BANU PRIYA, R.RUBAN RAJA
2516-2521
45 Software Reliabilty for Distributed systems: Industry Perspective
Dr. Amit Gupta, Renu Garg
2522-2526
46 FREQUENCY DISSEMINATED SCHEDULER FOR DIGITAL SPECTRUM NETWORKS
JebaMoses.T,Saravanan.D,Lakshmi Narasimman.S
2527-2536
47 A Study On Different Techniques For PAPR Reduction In OFDM System
Karuna Pandey, Assistant Prof. Amit Kumar Pathak
2537-2539
48 Rescue System for Coal Mine Workers using Different Sensors Based on GSM and RF-PRO
G. Divya,B.A.Sarath Manohar Babu
2540-2544
49 A generic framework for requirements elicitation from informal descriptions
S. Murugesh, Dr. A. Jaya
2545-2549
50 Framework for a Knowledge-Based Intelligent Clinical Decision Support System to Predict Prostate Cancer
JIMOH R.G , ADEKUNLE Y.A , EBIESUWA SEUN
2550-2559
51 Performance Comparison of ModRED AQM with Round Robin Scheduling
Dr. G.A. Ramachendra , Reshma Banu , Dr. G.F Ali ahammed
2560-2566
52 Analysis on Virtualization Technologies in Cloud
V RaviTeja Kanakala, V.Krishna Reddy, K.Thirupathi Rao
2567-2574

Volume 3 Issue 6 June 2014

S.No. Title and Authors of Paper Page.No.
1 A novel method for indexing and restructuring search results with Feedback Sessions
Veeresh Ramappa, Dr. G. F. Ali Ahammed
1997-2003
2 Challenges and issues in intelligent video surveillance system
Rohan Naik , Kalpesh Lad
2004-2011
3 A Study on Secure Data Transfer in Cluster-based Wireless Sensor Networks
Anil Kumar K, Latha.A
2012-2016
4 Challenges and Benefits of Fourth Generation Wireless Technology-An Overview
R.Anusha,Dr.N.Chandra Shekar Reddy,N.Chaitanya Reddy
2017-2021
5 Impressive pattern discovery to provide Effective Output through Text Mining
Dr.M.V.SIVA PRASAD, P.SANDEEP REDDY , S.TIRUMALARAO
2022-2026
6 Enterprise E-mails and File Archival System
Ketan Shevale
2027-2029
7 Comparative Study on CMOS Full Adder Circuits
Priyanka Rathore, Bhavna Jharia
2030-2036
8 Approximate Analysis of SIR for OFDM Transmissions in the Presence of Time-Varying Channel Impairments
Vien Nguyen-Duy-Nhat
2037-2040
9 Interconnected Smart Objects: Era of Internet of Things
Ms. Pooja,Mr. Manpreet Singh,Ms.Kiran Gandhi
2041-2046
10 A Review of Position Based Routing Protocol in Mobile Ad-Hoc Networks
Ms. Ankita M.Shendurkar, Prof. Nitin R.Chopde
2047-2053
11 A Survey on Digital Image watermarking
Er. Sonia, Er. Naresh Kumar Garg, Er. Gurvinder Singh
2054-2057
12 Cross Layer (Application and Medium Access Control) Design and Optimization of Wireless Network for Real Time Video Transmission
Smita M. Padle,Ms. Vrushali Mendre
2058-2064
13 Design IIR Notch Filter and Comb Filter to Eliminate Unwanted Frequencies for Environment
Dr. Kuldeep Kaur, Mandeep Singh Saini
2065-2070
14 DETECTION OF FLOODING BASED DOS ATTACK ON HADOOP DATANODE
Silky kalra, Anil Lamba
2071-2075
15 Evaluating the performance of wireless network with & without load balancing using OPNET modeler
Er.Richa Sharma, Dr.Rajiv Mahajan, Er.Satish Kumar
2076-2080
16 AN EXPLORE TO SMART SENSOR STANDARDS
Prof.M.B.Limkar, Ms.Vaishali .M.Bagade
2081-2085
17 PRIVACY PRESERVING BACK-PROPAGATION NEURAL NETWORK IN CLOUD COMPUTING
Dr.P.Kumar, R.Muthu Vijay Deepak
2086-2092
18 Performance Diagnosis Using Bigtable Monitoring for Cloud Computing System
Mr.A.Sheraj Dheen , Dr.P.Kumar
2093-2099
19 ENHANCEMENT BANDWIDTH & GAIN OF HEXAGONAL PATCH ANTENNA AT 1.8 GHz
Maneesh Rajput, Prof. Satyendra Swarnkar
2100-2105
20 Performance Analysis of Load Balancing in MANET using On-demand Multipath Routing Protocol
Monika Malik, Partibha Yadav, Ajay Dureja
2106-2110
21 Evolutionary Algorithms, Fuzzy Logic and Artificial Immune Systems applied to Cryptography and Cryptanalysis: State-of-the-art review
Anjali Dadhich, Dr. Surendra Kumar Yadav
2111-2120
22 Analysis on Rainwater Harvesting and its Utilization for Pico Hydro Power Generation
Shaleen Martin, Abhay Kumar Sharma
2121-2126
23 Channel Estimation in Mobile Wireless Systems & Comparisons Using Different Techniques
Vikas Kumar Batav, Brajlata Chourasiya
2127-2130
24 Survey on Mobility Prediction Schemes in MANET with clustering techniques
Seema Ruhil, Ajay Dureja
2131-2134
25 SCAMP-An enhanced Stable Clustering Algorithm in MANETs based on Mobility Prediction
Seema Ruhil, Ajay Dureja
2135-2140
26 Design and Implementation of Power Efficient Arbiter Module for AMBA AHB Protocol
Shankaranarayana Bhat M, Vikrant Vijay Malode
2141-2145
27 A MULTI-PARAMETRIC NETWORK CONFIGURATION AND RECONSTRUCTION APPROACH IN CLUSTERED MOBILE NETWORK
ANUJA RATHEE, (Prof.)DR. YUSUF MULGE
2146-2149
28 Particle Swarm Optimization for ILP Model Based Scheduling
Shilpa KC, C LakshmiNarayana
2150-2154
29 Agricultural field monitoring and automation using PIC16F877A microcontroller and GSM
Shaik Jhani Bhasha, Shaik Mazhar Hussain
2155-2157
30 An Exploration of Mobile Ad hoc Networks
Ridhi Chawla,Pankaj Kapoor
2158-2163
31 A Comparative Study of Image Classifiers in a Fruit Recognition System
Seema Paragi, H. Girish.
2164-2167
32 A Novel Approach to design High Speed MAC Unit
Mr. Yogesh Kumar,Mr. Kanak Kumar, Mr. Santosh Yadav, Mr. Abhishek Gupta
2168-2171
33 Real Time Wireless based Train Tracking, Track Identification and Collision avoidance System for Railway Sectors
R. Immanuel Rajkumar, Dr.P. E. Sankaranarayanan, Dr.G.Sundari
2172-2177
34 Test Case Minimization Strategies in CBSE Models: A Review
Zenith Pankaj, Dr. Sukhdip Singh
2178-2180
35 Improving the Performance of AODV with or without Load
Er.Richa Sharma, Dr.Rajiv Mahajan, Er.Satish Kumar
2181-2188
36 Computer Security Education Using Minix Instructional Operating System
Tulasi Devi Malleti,Thirapala Sridevi
2189-2195
37 Network Security Systems Using UTM Technology
Mr. Chetan H. Patil,Mr. Jaiprakash Shimpi, Mr. Kaustubh Markande,Mr.Vikram Patil
2196-2201
38 PERFORMANCE ANALYSIS FROM THE ENERGY AUDIT OF ATHERMAL POWER PLANT SGTPS
PoojaTalwar ,Prof. Shalini Vaishya,Arpit nagaria
2202-2207
39 Privacy Preserving Data Sharing Scheme for Group Users in Simulated Cloud
Saranya C, Vinoth P
2208-2213
40 Routing Protocol for Power Heterogeneous MANETs
P.Dhivya, M.Rajakani
2214-2218
41 Network Intrusion Detection using Data Mining Technique
Sivaranjani S, Mr. Ravi Pathak, Vaidehi.V
2219-2223
42 Automatic Annotation of Images using Label Transfer
Ebsil Sherly G.T, Mrs.S.Vanitha Sivagami
2224-2228
43 Structure Optimisation of Directional Polarisation Beam Splitter
Gebriel A. Gannat, S. S. A. Obayya
2229-2234
44 REDUCTION OF BIG DATA SETS USING FUZZY CLUSTERING
S.Prabha, P.Kola Sujatha
2235-2238
45 Information Technology Architectures for Grid Computing and its Applications
Abinaya. P, Pavithra. P, Nandhini. R, Manikandan. S
2239-2242
46 Resource Allocation to Minimize Cost in Cloud System
M.Markco ,D.Radha, K.Raju
2243-2246

Volume 3 Issue 5 May 2014

S.No. Title and Authors of Paper Page.No.
1 Secure grouping data transmission scheme for Multiple Applications in Wireless Sensor Network
A.ASHOK , M.CHINNADURAI
1554-1599
2 To study Digital watermarking technique based on DCT and DWT
Mr. mitesh patel ,Ms swati patel
1560-1566
3 The study of various attacks on Digital watermarking technique
Mr.Mitesh Patel,Ms swati ,Mr.Alpesh Chauhan
1567-1570
4 Big Data and Hadoop
Sreedhar C, Dr. D. Kavitha, K. Asha Rani
1571-1575
5 A Secured Approach to Credit Card Fraud Detection Using Hidden Markov Model
Twinkle Patel, Ms. Ompriya Kale
1576-1583
6 An Efficient Approach To Detecting Phishing A Web Using K-Means And Naïve-Bayes Algorithms With Results
Ms. Nilam Badadhe , Ms. Sneha More , Mrs. N. V. Puri
1584-1589
7 A New Way to Convert Analog to Digital and Digital to Analog Data Using Successive Approximation
Saikat Sinha
1590-1594
8 DESIGN AND IMPLEMENTATION OF A SECURE MULTI-CLOUD DATA STORAGE USING ENCRYPTION
Prof. M. Ben Swarup,Chukkala Varaha Sampath, Pothabathula Srikanth
1595-1599
9 Making Mobile Devices Last Longer Through 3-tier Cyber Foraging Approach in Mobile Cloud Computing
Dhwani Sanghavi, Prof. Jignesh Vania
1600-1608
10 Performance Comparison of Multihop Wireless ADHOC Routing Protocols AODV, OLSR & TORA
Mahesh Chandra Gupta,Lakhan Dev Sharma
1609-1615
11 A Learning Based Search Engine Selection Technique
Kawaljeet Kaur , Richa Bansal
1616-1619
12 Parametric Analysis and Comparison of Various SRAM Topologies
Akanksha Singh,Joita Chakroborty,Apoorva Tripathi,Neha thakur
1620-1623
13 Swarm Intelligence and Evolutionary Computation based Cryptography and Cryptanalysis of 4-round DES algorithm
Anjali Dadhich, Dr. Surendra Kumar Yadav
1624-1633
14 EFFICIENT VISUAL CRYPTOGRAPHY FOR GENERAL ACCESS STRUCTURES WITH STAMPING AND SYNTHESIZING
P.Lakshmi, S.Baskari
1634-1638
15 IMAGE BASED VEHICLE DETECTION USING LOG GABOR FILTER
B.Sahaya priya, S.Sivakumar
1639-1645
16 Brain Tumor image Segmentation using Adaptive clustering and Level set Method
Kinjal Patel,Jasmine Jha
1646-1650
17 Non-Invasive Diagnosis of Eye Diseases using Image Segmentation and Neural Networks
L.Parvathavarthiny, S.Batmavady
1651-1655
18 Solution of Differential and Integral Equations Using Fixed Point Theory
Kakde R V, Biradar S S,Hiremath S S
1656-1659
19 A Novel Test Path Selection Based on Switching Activity and Its BIST Implementation
P.Pattunarajam, V.Srividhya, Dr.Reeba Korah
1660-1665
20 Privacy Preserving in Association Rule Mining On Horizontally Partitioned Database
RACHIT V. ADHVARYU, NIKUNJ H. DOMADIYA
1666-1671
21 Enhanced SLA-Tree Algorithm to Support Incremental Tree Building
Rohit Gupta, Tushar Champaneria
1672-1676
22 Study on Collaborative-Learning using Cloud Technologies
D.Jagadish, S.Mohamed Ibrahim, M.Thangavel
1677-1680
23 Precise Segmentation of Vessels from MRA Brain Images
D.Jenefa Magdalene,G.R.Jainish
1681-1685
24 IMPLEMENTATION OF MULTIPLE STATIC AND MOBILE SINK NODES FOR ENERGY BALANCING IN SENSOR NETWORKS
Anil Kumar P,Mrs. Richa Golash
1686-1692
25 Digital Watermarking for Video Sequences using Pseudo 3D-DCT Approach
Krishnamoorthi , Mrs. Anitha Devi M.D., Dr. M.Z. Kurian
1693-1698
26 DETECTION OF DESIGN PATTERNS USING DESIGN PATTERN NEARNESS MARKING (DPNM) ALGORITHM
Shanker Rao A,M.A. Jabbar,Mayank Sharma
1699-1706
27 Enhancement Key Of Cryptography And Steganography Using RSA And Neural Network
Kamal, Lovnish Bansal
1707-1710
28 Design and Development of a Biometric System Using Mouse Gesture Dynamics
Chethan D C,Mr.Sundaresh M P
1711-1715
29 DENIAL OF SERVICE RESILIENCE IN ADHOC SENSOR NETWORKS WITH CUSTOM DEFINED FIREWALL
E.Renuga,A.Jegatheesan
1716-1721
30 Mobile Cloud Computing Security Issues: Overview
Jaspreet Kaur Aulakh, Sugandha Sharma , Mayank Arora
1722-1726
31 Survey Paper on Spectrum Sensing Algorithm for Cognitive Radio Applications
Anushka Das, Yamini Mehta, Raaz Parwani,Preeti Bhardwaj,Prof. Vijay Rughwani
1727-1733
32 Mobile Cloud Computing Techniques: A Review
Karamjeet Kaur , Sugandha Sharma, Mayank Arora
1734-1738
33 Implementation on combined CIC filter and 64 taps using compensation Filter in matlab
Mr.Manjunathachari k.b, Mrs.Divya Prabha, Dr.M.Z.kurian
1739-1742
34 Watermarking Methods for User Selection System As Visible and Invisible Using DWT
Sapna Singla, Rajiv Bansal
1743-1746
35 Cross Domain Sentiment Classification: Current Solutions
Neethu Kurian
1747-1750
36 Classification of Texture with Features Extraction using Wavelet Approach
Revatee Bagade,Mr.P.P.Narwadw
1751-1754
37 LOW POWER IMPLANTABLE NEURAL RECORDING SYSTEM
VIJAYAKUMAR.P, KRIPAKARAN.P, JAYAPRAGESH.K
1755-1761
38 Developing Rich Internet Application from Thick Client Architecture
Varsha Kuldharme, Prateema Karande, Vinayak Kalaskar, Pranav Kamble,Prof.Bhavana Tiple
1762-1765
39 Simulation and Comparison of Energy Efficient Routing Protocols in MANET’s using NS2
Siddlingappagouda Biradar, Prahlad Kulkarni
1766-1771
40 Color Image Segmentation Using Brightness and Color Fusion
A.Anuja Merlyn, Dr.C.Seldev Christopher
1772-1777
41 An Efficient Digital Image Watermarking Using Diagonal Pixel Value Difference Method (DPVD)
Er. Sonia , Er. Naresh Kumar Garg
1778-1783
42 IMPROVE PERFORMANCE OF MULTIHOP ROUTING IN WIRELESS NETWORKS
M.Balaganesh, T.Madhurandhagam
1784-1789
43 Autocorrelation Function in EOF Analysis
Sujata Goswami, Prof. Nico Sneeuw, Prof. Kamal Jain
1790-1793
44 Design and Analysis of 2X2 MIMO System for 2.4 GHz ISM Band Applications
Harshal Nigam, Mithilesh Kumar
1794-1798
45 A New Approach of Sorting Using Recursive Partition
Mr. Maulik K. Patel, Ms. Shruti Yagnik
1799-1802
46 Dynamic Composition of Web Services by Ontology Mediation Techniques
N.Sharmila Banu
1803-1807
47 Design & Optimization of Microstrip Parallel Coupled Bandpass Filter at 20 GHz
Pooja Rani, Shilpi Gupta, R. K. Prasad
1808-1812
48 Design & Optimization of Stepped Impedance Low Pass Filter using ADS Simulation tool at 5 GHz
Shilpi Gupta, Pooja Rani, R. K. Prasad
1813-1817
49 Low-Power VLSI Implementation in Image Processing using Programmable CNN
Mrs. Sarita Chauhan, Janardan Sharma, , Pratibha Soni
1818-1824
50 SECURITY APPROACH FOR COMPUTER NETWORK BASED ON DETECTING COVERT CHANNEL IN TCP/IP PROTOCOL
Mr. Borhade Ajit M.,Prof. Borkar Bharat S.
1825-1831
51 A Study on Medium Access Control Protocols in Wireless Mesh Networks
G.Vijaya Kumar, A.Vishnuvardhan Reddy, Dr. R.Praveen Sam
1832-1838
52 Passport Authentication Using PNG Image with Data Repair Capability
Aswathi Muralidharan, Maria Johnson, Roshna Raj, Deepika M P
1839-1843
53 A Fine Grained Framework for Selective Sharing of Composite EHRs in Clouds
ShitalPalasagaonkar
1844-1852
54 Power Reduction in CMOS Technology by using Tri-State Buffer and Clock Gating
Renuka Jaiswal, Ranbir Paul, Vikas Ranjan Mahto
1853-1860
55 Escalating Security and performance in Wireless Ad-Hoc Network
Soniya .M, Sangeetha .T, Girija .K, Sabarinathan .P
1861-1865
56 OVERVIEW OF IMAGE COMPRESSION
GAGANDEEP KAUR, JAYA SEHGAL, ANKU BRAR
1866-1871
57 Energy Efficient Routing for MANETs using On-demand Multipath Routing Protocol
May Cho Aye, Aye Moe Aung
1872-1875
58 ERACK-A New Intrusion Detection System For MANET
Chinthanai Chelvan.K, Herman Jeeva.S, Prasanna.P, Saravanan.D
1876-1880
59 Mixed Integer Programming Model For A Variant Of Periodic Vehicle Routing Problem
Bambang Irawan, Herman Mawengkang
1881-1886
60 PROTECTION TECHNIQUES FOR TRANSFORMED EEG SIGNALS
Ankita Varshney,Abdul Khalid, Shaziya Parveen
1887-1891
61 Color Image Denoising Using Wavelet Thresholding
Tarun Kumar Sahu, Shweta Choubey, Ritesh Beohar
1892-1895
62 Real Time Pothole Tracking System Using Android Smart Phone
Pavan Gorade, Digambar Karde, Poonam Khilare, Abhishek Sontakke, Prof.Ranjana M.Kedar
1896-1899
63 Performance Analysis Of Double Edge triggered D flip flop
Namrata Rapartiwar, Vinod Kapse,Tarun kumar Sahu
1900-1903
64 Macroblock level QP adaptation using SSIM for H.264 Encoder
Kirti M. Sargar, Anita B. Wagh
1904-1907
65 An Improvised Intrusion Detection System for MANETs – Defensive EAACK
R.Gowtham, Celeste Fatima, R.G.Gopeeka, A.Chandrasekar
1908-1915
66 Implementing an algorithm to Enhanced Protection for Routing in IP Networks
Swapnil R. Sharma Dikshit,Lalit Dole
1916-1920
67 A survey paper on Frame work for classification of uncertain data
Shruti Sharma, Jigyasu dube
1921-1925
68 Review paper on Reliability of Wireless Sensor Networks
GAGANDEEP KAUR
1926-1928
69 Study of Undeniable Digital Signatures Schemes
Mohit Kaushik, Om Pal, Neha Mittal
1929-1933
70 Performance evaluation of AODV, DSDV and AntHocNet in video transmission
Neelam S. Labhade , S.S.Vasekar
1934-1939
71 Performance Analysis Of Geocast Routing Protocol In Vehicular Ad-hoc Network
Pooja Mane, Reshma Zambare, Priyanka Kanake,Priyanka Harale, Prof. Uma Nagaraj
1940-1945
72 Wireless Sensor Network Application for Agricultural Environmental Sensing
Manish Giri, Anuja Doshi, Pranoti Kulkarni, Kanchan Yendhe, Sushma Raskar
1946-1949
73 Invariant and Zernike Based Offline Handwritten Character Recognition
S.Sangeetha Devi,Dr.T.Amitha
1950-1954
74 An Efficient Exact Single Pattern Matching Algorithm
Urmila Patel, Mr. Mitesh Thakkar
1955-1958
75 A SURVEY REPORT ON SECURING DATA THROUGH WATERMARKING
Chaitra H.N, Smitha U.V
1959-1964
76 A SURVEY REPORT ON VIDEO SHORT BOUNDARY DETECTION SCHEMES
Mahalakshmi R C,Dr.Suresh kumar D S,Rajendra C J
1965-1968
77 Discrimination Prevention Mechanism with Differential Privacy Scheme in Data Mining
S.Subbulakshmi,B.Arulkumar
1969-1973
78 Design and Implementation of an On-chip Multistage Network Topology for System On-Chip
Chatrinaik.R, Sowmya sunkara
1974-1979
79 Apex as an “Approximate” Communication System in Wireless Network for video transmission
Prapti Jaiswal, Anjali Yadav
1980-1986
80 NON INVASIVE TECHNIQUE BASED EVALUATION OF ELECTROMYOGRAM SIGNALS USING STATISTICAL ALGORITHM
Tanu Sharma, Karan Veer, Ravinder Agarwal
1987-1991
81 Design and implementation of IP Core Based Architecture of Telecommand System on chip (SoC) on FPGA
Mr. Anjan d, Mrs.Ashwini.s.shivannavar, Dr. M. Z Kurian
1992-1996

Volume 3 Issue 4 April 2014

S.No. Title and Authors of Paper Page.No.
1 HIGH SPEED WITH LOW-POWER DATA BASE SORTING UNITS
Pradeep P,J Samson Immanuel
1036-1041
2 The Concept of Delay Tolerant Network Approaches and Issues
Sangamesh.C.Jalade, Amaresh Patil
1042-1045
3 Survey on Performance of IEEE 802.15.4 Low Rate – Wireless Personal Area Networks (LR-WPAN)
Babita, Sanjeev Indora
1046-1050
4 A proposed Framework for a Forecasting System of Wind Energy Power Generation
Ahmed A. Abdullah, Ahmed E. Saleh, Mohamed S. Moustafa, Khaled M. Abo-al-Ez
1051-1057
5 Touch screen controlled multipurpose spy robot using zigbee
Ankita Patel, Kinjal Chaudhari, Dattukumar Patel
1058-1062
6 Controlling contagious diseases by adopting DTH technique on Case Based Reasoning
K. Tulasi Krishna Kumar, M.Naga Saathvika
1063-1067
7 Usage of mobile sinks and CAEE algorithm to control congestion in WSN
Ms. J.Reni Jevitha, Mr. E.Manohar.
1068-1071
8 SIMULATION ANALYSIS FOR BER PERFORMANCE IN OFDM SYSTEMS USING STBC/SFBC BASED ON DETECTION TECHNIQUES
Prof. K.K. Arora,Er. Piyush Vyas,Er. Purneshwari Varshney
1072-1078
9 Sustainable Competitive Advantage through Knowledge Management
Rafi Ahmad Khan
1079-1082
10 An Optimization Based Edge-Aware Video Processing Using Temporal Filtering and Mixed-Domain Concept
Lidiya Augustine, Nagalakshmi Venugopal
1083-1086
11 Insider Threats Detection in Cognitive Radio Networks
H. Vignesh Ramamoorthy, B. Sabarigiri
1087-1093
13 An Advanced Power Management Using GSM Module
B.S.Sathish,Dr.P.Thirusakthimurugan,R.Narmadha
1101-1106
14 Small Area Edge Preservation for Multiscale Decomposition for High Dynamic Range Image Tone Mapping
Yedu Manmadhan, Anto Kumar R.P
1107-1112
15 Appraise of Load Balancing Techniques in Cloud Computing
Lanitha B, Raju M
1113-1115
16 DESIGN OF 3-BIT LOW POWER FLASH TYPE ADC
Sarojini Mandal, Dr.J.K Das
1116-1121
17 An Effectual Estimation of Software Defect (EESD)
Mr. Raghvendra Omprakash Singh,Mr.Yuvraj B. Hembade,Prof. Pradeep Kumar Sharma
1122-1126
18 Design and Development of JTAG for Trace and Debug of Controller and Implementation on FPGA
Mr. Manjunath T.N, Sunil T.D, Dr. M. Z Kurian, Imran Rasheed
1127-1130
19 MOBILITY BASED ALGORITHMS FOR DETECTION OF CLONE NODES IN MOBILE SENSOR NETWORKS
Benazir Banu, Anitha Angayarkanni
1131-1136
20 AREA EFFICIENT SYSTOLIC ARCHITECTURE FOR ALL-ONE POLYNOMIAL MULTIPLIER
Nhivashini.G, Sheebha.B
1137-1141
21 BER ANALYSIS OF COMMUNICATION SYSTEM THROUGH AWGN CHANNEL
Vijay Amrit Raj Varma
1142-1144
22 Evaluate The Performance Of WPAN Using Cooperative Mechanism
S.RAJASTEPHI, J.PRISKILLA ANGEL RANI , Dr.R.RAVI
1145-1148
23 Object Detection in Video Using Sequence Alignment and Joint Color & Texture Histogram
Ms. Pallavi M. Sune, Prof. A. P. Thakare
1149-1154
24 Fuel Cell Based Inverter Topologies
Mrs. S A Upasani , Miss Rucha V Deshmukh
1155-1158
25 Comparative analysis of 36, 48, 60 pulse AC-DC Controlled Multipulse Converter for Harmonic Mitigation
Sonika Raghuvanshi, Nagendra Singh
1159-1163
26 Various Image Compression Techniques: A Review
Er. Shruti Puniani, Er. Nishi Madaan
1164-1170
27 Digital Video Watermarking Using Principal Component Analysis
Kunal Ahire, Prof. Gajendra Singh Chandel
1171-1174
28 A Study on Energy Efficient Server Consolidation Heuristics for Virtualized Cloud Environment
Susheel Thakur, Arvind Kalia, Jawahar Thakur
1175-1180
29 A Comprehensive Review of Various Image Enhancement Techniques
Er.Arun Begill, Er.Nishi Madaan
1181-1185
30 Ensuring Trustworthiness and Security during Data Transmission in Multihop Wireless Networks
S.Nandhini, Mr.S.Franson Varun Richo
1186-1189
31 Detecting Node Replica Attack Mitigation for Static Sensor Network
Vikram.A, Latha.A
1190-1193
32 Automatic multistyle licensed plate detection by using fuzzy logic classifier
J. Layolin sobiya,Mrs. P.Angelin priya
1194-1202
33 Introduction of Fourier Series to First Year Undergraduate Engineering Students
Pawar Tejkumar Dattatrya, Hiremath Suresh Shivarudrappa*, Birajdar Gajanan Malleshi, Bhopale Ashwinkumar Aru
1203-1207
34 GCO Based Web Page Retrieval Through Semantic Techniques
    A.Baskar, C.Gomathi
1208-1213
35 An Efficient and Secure ID-Based Mutual Authentication with Key Agreement Scheme Based on ECC for Mobile Devices
Shubhangi N. Burde,Prof. Hemlata Dakhore,Prof. S. P. Chhaware
1214-1219
36 A Survey on Shadow Detection Methods
Namrita Singh, A.A.Maxton
1220-1224
37 Detection of Clouds and Cloud Shadow in Satellite Images using Fuzzy Logic
Namrita Singh, A.A.Maxton
1225-1228
38 Development of Back Propagation Neural Network Model for Extracting the Feature from a Image Using Curvelet Transform
Mr. Tejas P. Patil, Prof. P. P. Narwade
1229-1238
39 STRENGTHENING USER’S CONTROL OF DATA IN THE CLOUD SERVICE – AUDITING and LOGGING MECHANISM
A. Anuba Merlyn , Asst.Prof. V. Veera Ragavan, Dr. K. Selva Kumar
1239-1247
40 An Efficient & Secured Way of Sharing the Data Using Distributed Accountability & Auditing in Cloud
Chandan.M, Aparna K.S
1248-1254
41 IRIS COLLARETTE BOUNDARY LOCALIZATION USING 2-D DFT FOR IRIS BASED BIOMETRIC SYSTEM
Kapil Rathor
1255-1259
42 Design and Implementation of Logical Scrambler Architecture for OTN Protocol
Chethan Kumar M, Praveen Kumar Y G, Dr. M. Z. Kurian
1260-1262
43 Design and Implementation of Q-algorithm for Data Collision Reduction in EPC GEN-2 based on FPGA
Rajeshwari T R, Sandra Benzamin, Dr. M. Z. Kurian
1263-1266
44 Comparison Between WSN and WSAN
S.Murugeswari,Dr.R.Ravi, S.Raji
1267-1272
45 Retrieval Of Digital Images Based On Shape Feature Using Support Vector Machines And Self Organizing Maps
Sarita Sharma, Avinash Dhole
1273-1279
46 Deep Learning Neural Network with Semi supervised Segmentation for Predicting Retinal and Cancer Cell Diseased Images
Veena Chandran, Dinesh Kumar A, Geetha P.K,Nidhya R
1280-1285
47 Protecting Privacy When Disclosing Information By using Wireless Sensor Networks
P SURYA CHANDRA, RAVI BOLLEDDULA
1286-1290
48 NOVEL IMPLEMENTATION OF SECURE SINGLE LOGIN IN DISTRIBUTED COMPUTING NETWORKS USING ECC
D.Mariammal, P.Brundha
1291-1294
49 Video Recommendation based on Content and Social Behaviour of User
Kanchana Devi A , Sathiya Devi S
1295-1298
50 Doppler Effect method of Underground oil leakage prediction by Optical Fiber Communication (OFC)
Kumaraswamy.T.C, Selvakumar.S
1299-1301
51 A SOFTWARE DESIGN PATTERN FOR BANK SERVICE-ORIENTED ARCHITECTURE
C.K.Gomathy,Dr.S.Rajalakshmi
1302-1306
52 PERFORMANCE ENHANCEMENT AND EFFICIENCY EVALUATION FOR VANET APPLICATION BASED ON RLSMP TOOL
SIVAKUMAR P , SARAVANAN S
1307-1310
53 Performance Analysis of MPLS network with Traditional IP Network in Service Provider Environment
Nishant N.Kale, Sunil A. Waichol
1311-1316
54 Centroids Initialization for K-Means Clustering using Improved Pillar Algorithm
Bapusaheb B. Bhusare, S. M. Bansode
1317-1322
55 Analysis of Load Balancing Algorithms in Cloud Computing and Study of Game Theory
Shilpa S, Prof. Shubhada Kulkarni, Prof.Sharada Kulkarni
1323-1329
56 Image Segmentation and Edge Detection Using a Neural Networks RBF Approach
Shweta Lawanya Rao,Dolley Shukla
1330-1335
58 Face Detection in Real Time Based on HOG
Rekha N, Dr.M.Z.Kurian
1345-1352
59 FAST RE-AUTHENTICATION FOR EFFICIENT AND SEAMLESS HANDOVER IN 4G NETWORKS
S.Arunkumar, P.Rajkumar
1353-1358
60 IMPROVING DATA SECURITY USING ATTRIBUTE BASED BROADCAST ENCRYPTION IN CLOUD COMPUTING
K.Kamalakannan, Mrs.Hemlathadhevi
1359-1363
61 Wireless Advertising Using Pull-Based Approach
Pratiksha parjane ,Rekha jadhav ,Afsha Pathan, Rubina pathan, M. A. R.Shabad
1364-1368
62 Jamming Detection System in Wireless Sensor Networks
K.P.Vijayakumar, P.Ganeshkumar, M.Anandaraj
1369-1372
63 Profit-Aware Policy Scheduler (PAPS) for Resource Allocation in IaaS Clouds
Rajalakshmi Shenbaga Moorthy, Thamarai Selvi Somasundaram, Kannan Govindarajan
1373-1377
64 Improved Search Goals with Feedback Sessions by using Precision Values
Nancy S, Sathiya Devi S
1378-1381
65 An Efficient Approach for Image Retrieval Using Semantic Relevance
Sukhada Aloni
1382-1385
66 A Novel Security Scheme for Improving Reliable Transmission using Energy Based Routing
M. Siva Sangari, Mrs.P. Brundha
1386-1389
67 Clustering In Content-Based Image Retrieval
David Raja Nadar , Savita R Bhosale
1390-1392
68 Automatic Data Cleansing Of Incorrect City Names In Spatial Databases Using LCS Algorithm
Dr. M. Ben Swarup , B. Leela Priyanka
1393-1396
69 Performances of Connected Lookup and Unconnected Lookup Transformations in ETL
G.Thangaraju,Dr.X.Agnes Kala Rani
1397-1404
70 “T-Board: The Total Keyboard” For M-Learning Platform
Mr. Vishwas Kulkarni,Mr. Kishor Deshmukh, Ms. Puja Pathak, Ms. Gauri Pathak, Mr. Amol Khandhare
1405-1413
71 Wavelets Transform Based Data Hiding Technique for Stegnography
Jayapragash.K,Vijayakumar.P
1414-1419
72 Case study then Direct-Form FIR Poly-phase Linear Interpolator Filter Design with Symmetric Structure
Mandeep Singh Saini, Dr. Kuldeep Kaur
1420-1428
73 Malware Detection in Android
Geethu M Purushothaman, G Gopinadh, Nihar SNG Sreepada
1429-1436
74 Design And Implementation Of Child Activity Recognition Using Accelerometer And RFID Cards
Kushbu, M.C. Chandrashekhar, Dr.M.Z. Kurian
1437-1440
75 Abridged Energy Utilization in Wireless Networks through Efficient Scheduling Mechanism
S Priyamohana, S Veluchamy, C Suresh Kumar
1441-1445
76 Link Adaptation Technique for MIMO-OFDM systems with Low Complexity QRM-MLD Algorithm
C. Suganya, S.Santhiya, K.Jayapragash
1446-1450
77 CONTENT BASED IMAGE RETRIEVAL USING INTEGRATION OF COLOR AND TEXTURE FEATURES
Aditi Giri, Yogesh Kumar Meena
1451-1454
78 Secure Group Key Agreement with Node Authentication
Anurag Singh Tomar, Gaurav Kumar Tak, Manmohan Sharma
1455-1458
79 Dynamic Resource Allocation Using Latent Semantic Ranking in Cloud Computing Environment
N.Krishnaveni,Prof.G.Sivakumar
1459-1462
80 Energy Consumption in MANET’s using Energy Efficient AODV Protocol
Mr.Vaibhav Naresh Palav, Prof. Mrs. Savita R. Bhosale
1463-1468
81 Optimized Test Case Prioritization with multi criteria for Regression Testing
KanwalpreetKaur,Satwinder Singh
1469-1473
82 Efficient Design of Arithmetic Logic Unit using Reversible Logic Gates
Ravi Raj Singh, Sapna Upadhyay, Saranya S, Soumya, Jagannath KB, Hariprasad SA
1474-1477
83 An Evolutionary-Fuzzy Expert System for the Diagnosis of Coronary Artery Disease
Y.Niranjana Devi, S.Anto
1478-1484
84 Context-Based Similarity Analysis for Document Summarization
S.Prabha, Dr.K.Duraiswamy, B.Priyanga
1485-1491
85 A COMPREHENSIVE STUDY ON BOTNET AND ITS DETECTION TECHNIQUES
P.Panimalar, Dr.K.Rameshkumar
1492-1496
86 Optical Pulse Compression and its Effects Using Fiber Bragg Grating
Manoj Divagar. T, S. James Raja, S. Ilayaraja
1497-1501
87 Analysis and Estimation of Rust Disease in Bengal gram Based on Thresholding and RGB Extraction using Image Processing
Shivanand N , Jagadeesh S , Pavan J , Shilpa M , S.G.Kanakaraddi
1502-1505
88 AMapReduce Approach for Traffic Telemetric Analysis in Hadoop
Harshit Sharan,Abhinay Agrawal
1506-1509
89 Fuzzy Information System to Classify Hypertension According to Blood Pressure
Priyanka Dudi, Manmohan Sharma
1510-1512
90 Personal Digital Assistant Based Ubiquitous Programming
Nidhi Manjula, Uttam Kumar Kesri, Deepika Sharma
1513-1517
91 Compression of Secant and Gaussian Pulse Using Nonlinear Fiber Bragg Grating
S. Ilayaraja, S. James Raja, Manoj Divagar. T
1518-1522
93 DESIGN OF LDPC ARCHITECTURE USING VERILOG CODING
Manjunatha P N , Prof .T.S Bharath kumar, Dr. M Z Kurian
1527-1531
94 Accident Monitoring System using Wireless Application
Megha Nirbhavane, Shashi Prabha
1532-1535
95 A Lightweight Paradigm for Security in Bluetooth
Mrs.Sandhya S,Dr.Sumithra Devi K A
1536-1540
96 A METHOD FOR PREVENTING DISCRIMINATION IN DATA MINING
P.Yuvasri,S.Boopathy
1541-1546
97 Effective Video Streaming with Low Latency over MANET
Mr.S.Mohideen Badhusha, Dr.K.Duraiswamy, G.Subha
1547-1553

Volume 3 Issue 3 March-2014

S.No. Title and Authors of Paper Page.No.
1 USING SENTAURUS MOnte CArlo(MOCA) SIMULATION ESTIMATION OF SCATTERING EFFECTS IN NANOWIRE TRANSISTORS
Mr.S.Esakki Rajavel, A.GunaDhivya Vinisha, J.Jochebed,P.Angelene Sanjana, D.Gnancy
598-603
2 AN EFFICIENT HEMORRHAGE DETECTION USING SVM CLASSIFIER
Jishma Elizabeth Joy, R Jemila Rose
604-610
3 Analytical Study of Common Web Application Attacks
Junaid Latief Shah
611-617
4 Segmentation of Natural Color Images in HSI Color Space Based on FCM Clustering
Ganesan P, Priya Chakravarty, Shweta Verma
618-622
5 A Survey on Odia Computational Morphology
Dhabal Prasad Sethi
623-625
6 EFFECTIVE ALGORITHM FOR MINING ADVERSE DRUG REACTIONS
H.SANKARA VADIVU, E.MANOHAR, R.RAVI
626-630
7 Image Decomposition and Restoration for Blurred Images Using Filtering Techniques
A.Deepika, K.Raja Sundari, R.Ravi
631-635
8 Ecological Planning for Sustainable Development with a Green Technology: GIS
Anuj Tiwari, Merugu Suresh, Arun Kumar Rai
636-641
10 Dramatic Atmospheric Turbulence Effects on Submarine Laser Communication Systems (SLCS) and Free Space Optics (FSO)
Ahmed Nabih Zaki Rashed, Mohamed S. F. Tabbour
655-666
11 Evaluating F-Measure Metric Using ManTra Machine Translation Engine in Tourism domain for English to Hindi Language
Dr. Neeraj Tomer
667-671
12 FREQUENT PATTERNS FOR MINING ASSOCIATION RULE IN IMPROVED APRIORI ALGORITHM
Ms. Jyoti B. Deone, Asst. Prof. Vimla Jethani
672-678
13 An Efficient Method for Detection of Brain Tumor in MRI Images
Vishal B. Padole
679-682
14 Estimating the Exposure of Network Mechanisms to High-Tech DDoS Attacks
S.Vasanthi, R.Ravi, Dr. Beulah Shekhar
683-686
15 Securing Online Reputation System Through Trust Evaluation And User Correlation
D.Gnana Binu, R.Ravi, Dr. Beulah Shekhar
687-690
16 Morse Passwords Based Authentication System
Jyotsana Raut,Nikita Agashe,Suchita Somkuwar,Trupti Sapate,Pranali Doifode,Ms.Minal Domke
691-694
17 SECURE AND IMPLEMENTATION OF INTRUSION DETECTION IN VIRTUAL MACHINE SYSTEMS
U.Murugan, Guru Rama Senthilvel
695-700
18 An Alternative Approach for Time Synchronization in WSN
Rajni Kaushal
701-705
19 Web interface for configuration of Linux server
Ashish Anand, Kumar Kundan, Parag Dhawan, Rahul Kumar Pal, Sumit Kumar
706-709
21 A SURVEY ON VARIOUS TASK SCHEDULING ALGORITHM IN CLOUD COMPUTING
Gaurang Patel, Asst.Prof. Rutvik Mehta
715-717
22 LAN Monitoring and Controlling using Android
Dhanke D.T., Bodkhe S.S., Hambarde S.M., Vaidya R.P.
718-722
23 Review Article on Quantum Cryptography
Anuradha Singhal, Tarun Chander
723-728
24 Automation of Ant Build
Anuradha Singhal, Tarun Chander
729-730
25 LARGE SCALE SATELLITE IMAGE PROCESSING USING HADOOP DISTRIBUTED SYSTEM
Sarade Shrikant D., Ghule Nilkanth B., Disale Swapnil P., Sasane Sandip R.
731-735
26 Secure Data Storage of Mobile Phones on Cloud
Nilesh Khonde , Swapnil Bawankar, Lokesh Ashtankar, Anand Dharamthok , Khaire P. A.
736-739
27 Efficient Mining of web log for improving the website using Density Based Spatial Clustering Application with Noise (DBSCAN)
Akiladevi R, Mathew Kurian
740-743
28 Delegating Log Management to the Cloud by Secure Logging as a Service
Priyadharshini.T.R,Senbagavalli.M,Saravana kumar.R
744-748
29 A Novel Approach Based Anomaly Detection for Secure Data Aggregation Using HEED Algorithm
S.Kannadhasan, J.Sangeetha, K.Niranjana
749-751
30 MIMO with Constant Envelope Modulation (CEM) – For Better Circuit Design
Brahmadesam T Madav
752-755
31 IDENTIFYING GUILTY AGENT USING MP3-STEGO-FILE
Ashwini Palimkar,Dr. S.H.Patil
756-762
32 Office Security Monitoring System
Achennaki Shylla, Hashmita Raut, Heena Nehare, Pooja Anne, Prarthana Deshkar
763-765
33 Bank Locker System Using Iris
Chetna R. Koli, Nikita S. Kheratkar, Pooja S. Ganganalli, T. G. Shirsat
766-770
34 Various Techniques Use In Wireless Sensor Network For Congestion Control
Prof. Sachin Patel, Prof. Rakesh Pandit, Mr. Abhijeet Rathod
771-774
35 Dynamic Bus Timetable Using GPS
Gunjal Sunil N. , Joshi Ajinkya V. , Gosavi Swapnil C. , Kshirsagar Vyanktesh B.
775-778
36 WSN Routing Challenges: A Methodical Analysis
Sukhchandan Randhawa
779-785
37 Key Dependent Secure Messenger
Nandanwar Aniket D., Deshmukh Sonali S., Hadawale Rashmi R., Nanaware Gauri B.
786-789
38 ENCRYPTION AND DECRYPTION IN COMPLEX PARALLELISM
H.Anusuya Baby, Christo Ananth
790-795
39 IMAGE RETRIEVAL SYSTEM: BASED ON USER REQUIREMENT AND INFERRING ANALYSIS TROUGH FEEDBACK
Mount Steffi Varish.C, Guru Rama SenthilVel
796-801
40 Performance Analysis of Medical Image Fusion Using Multimodal Graph Cut Algorithm
S.Anbumozhi, P. S.Manoharan
802-807
41 IMPROVING EFFICIENCY OF NODES USING DEPLOYMENT FRAMEWORK IN ZIGBEE WIRELESS NETWORKS
Prinslin.L, V.Janani
808-810
42 A Distributed Firewall Optimization Protocol For Customized Policy Verification
Arun.P, Divya.V, Jyothi.S,Vaishnavi.S
811-813
43 Cloud information accountability using cloud log security protocols
A.PUNITHA ANGEL MARY, P.MALARKODI
814-817
44 OPTIMIZING THE WEB RESOURCES USING AN EFFECTIVE MECHANISM
S.SUJITHA, R.RAVI, DR.BEULAH SEKHAR
818-821
45 COMPARISION OF PARALLEL BCD MULTIPLICATION IN LUT-6 FPGA AND 64-BIT FLOTING POINT ARITHMATIC USING VHDL
Mrs. Vibha Mishra, Prof. Vinod Kapse
822-826
46 Survey Paper on Credit Card Fraud Detection
Suman,Mitali Bansal
827-832
47 Optimized Design of IIR Poly-phase Multirate Filter for Wireless Communication System
Er. Kamaldeep Vyas, Mrs. Neetu
833-839
48 Resilient Identity Based Encryption for Cloud Storage by using Aggregate Keys
L.MohamedIrfan, S.Muthurangasamy, T.Yogananth
840-844
49 A Review on: Efficient fuzzy type Ahead search in Xml data
Ms. Sonali Kadam, Prof. Sanchika Bhajpai
845-848
50 A High Quality Cryptography Based Image Steganography Using ASCII Differencing and Three LSB Bits Insertion Method
Tajinder Singh, Sukhjit Singh, Gurvinder Singh
849-852
51 Comparative Study and Implementation of Image Enhancement Techniques based on Histogram Equalization
Satnam Kaur, Baljeet singh
853-859
52 ON-BOARD DIAGNOSTIC SYSTEM FOR VEHICLES
D.NANDHINI, G.NANDHINI, M.NANDHINI, R.VIDHYA
860-865
53 Searching and Optimization Techniques in Artificial Intelligence: A Comparative Study & Complexity Analysis
Ashwani Chandel, Manu Sood
866-871
54 Markovian Semantic Indexing:Application to Online Image Retrieval System
K. Naresh Kumar, K. Krishna Reddy
872-878
55 LLVM Clang Utilities
Borase Gayatri S., Gawale Mohini R., Mate Satyabhama S., Mujawar Nilofar S.
879-882
56 SECURE DATA ACCESS USING BIOMETRIC RECOGNITION IN CLOUD COMPUTING
P.NIVETHA , V.SARALA
883-887
57 Industrial Network for People and Resources (IPRnet)
Chaitali Datkhore , Tejaswini Tule , Vaishali Titare, Mayuri Wagh
888-891
58 ITFOOD: Indexing Technique for Fuzzy Object Oriented Database
Priyanka J. Pursani, Prof. A. B. Raut
892-898
59 Content Relevance Prediction Algorithm in Web Crawlers to Enhance Web Search
Saurabh Pakhidde, Jaya Rajurkar, Prashant Dahiwale
899-902
60 ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS: A LITERATURE REVIEW
Najiya A, Fameela K.A, Asst. Professor Reshma V.K
903-908
61 REVIEW PAPER ON
IMAGE CONTRAST ENHANCEMENT TECHNIQUES

Ms. K.T.Chalekar, Prof T. Yengantiwar
909-911
62 Autosilent Mobile System
Kore Geetanjali T.,Naik Suman R., Sanap Kavita V., Mawale Ashwini J.
912-914
63 TGI Modules for Social Tagging System
Mr. Tambe Pravin M.,Prof. Shamkuwar Devendra O.
915-919
64 AN EFFICIENT APPROACH TO SEGMENT SCALING IN PSORIASIS SKIN IMAGE
Anuradha Balasubramaniam, Anbu Selvi
920-925
65 Literature Survey on Contour Point based Recognition
E.Komathi, A.Mani
926-929
66 PRIVACY PROTECTION OF FREQUENTLY USED DATA SENSITIVE IN CLOUD SEVER
T.Pavithra,Mrs.G.Umarani
930-934
67 Adaptive Additive-Increase Multiplicative-Decrease (AAIMD) Congestion control Algorithm for WSN
SubhashPanchal,Prof. O.S Khanna
935-940
68 An Architecture For Centralizing And Modernizing The Classical Medical System
Hari.P.V, Vijaya Kumar.S,Vijaya kumar.H
941-945
69 DYNAMIC QUERY GROUPING BASED ON THE USER SEARCH QUERY LOGS
K.Sugashini, O.Priyanga, M.Abarna
946-949
70 Hybrid Cryptography Technique For Mobile Ad-hoc Network
M.sangeetha, V.Vidya Lakshmi
950-954
71 Morphological Technique in Medical Imaging for Human Brain Image Segmentation
Asheesh Kumar, Naresh Pimplikar, Apurva Mohan Gupta, Natarajan P
955-959
72 FIXED POINT THEOREM IN MENGER SPACE
M.S. Chauhan,Dheeraj Aheere,Bharat Singh
960-965
73 Women Security System
Shaik Mazhar Hussain
966-968
74 Indian stock market prediction using neural network technique
Gholap Rahul Mansing,Kale Devidas Bhausaheb,Shirasth Yogesh Sominath,Borkute Pooja Ashok
969-971
75 Detection of Insider and Outsider Attack using Holistic Protocol in Vehicular Ad Hoc Networks
M.sharmila mari, M.Ponnrajakumari
972-975
76 Domainwise Extraction of Information and Knowledge using Automated Query Generation
Akash R. Dumbre, Yogesh S. Sandbhor, Hrishikesh V. Pardeshi, Nikhil K. Niwdunge
976-979
77 Evaluation of Crop Fields from Hyperspectral Images Using Optimized Methods
Dr.P.Tamije Selvy, S.Sam Peter
980-983
78 ENHANCING THE PERFORMANCE OF INFORMATION RETRIEVAL IN QA USING SEMANTIC WEB TECHNOLOGY
S.Lakshmi Prabha,C.Meenaa , S.Pugazhl Vendhan, S.Raja Ranganathan
984-989
79 Particle Swarm Optimization with Aging Leader and Challenges for Multiswarm Optimization
S.Vijayalakshmi, D.Sudha, S.Mercy Sigamani, K.Kalpana Devi
990-995
80 A Survey of Tag Completion for Efficient Image Retrieval Based on TBIR
Mr. Wakchaure Sujit R., Prof. Shamkuwar Devendra O.
996-1000
81 Power and Area Efficient Error Tolerant Adder Using Pass Transistor XOR Logic in VLSI Circuits
S.Sathish Kumar, V.Muralidharan, S.Raja
1001-1005
82 Audit based Misbehaviour and Gray-hole detection in spontaneous wireless Adhoc network
Nafees Muneera.M, Thirupurasundari.D.R
1006-1011
83 Location Based Service on Android Platform
Shweta C . Agrawal , Rutuja G.Gadbail ,Prof. P.D.Chowhan
1012-1015
84 Detection of Lost Mobile on Android Platform
Shreya K. Patil , Bhawana D. Sarode ,Prof. P.D.Chowhan
1016-1018
85 Agricultural Environmental Sensing Application Using Wireless Sensor Network
Manish Giri, Pranoti Kulkarni, Anuja Doshi,Kanchan Yendhe,Sushma Raskar
1019-1022
86 Efficient Nearest and Score Based Ranking for Keyword Search
Rajkumar.R, Manimekalai.P, Mohanapriya.M, Vimalarani.C
1023-1027
87 Maximizing the Network Lifetime of MANET Using Efficient Power and Life Aware Routing Protocol
Anuja.M, Jaya shree.S, Gobinath.S, Mrs. R.M.Bhavadharini
1028-1031
88 Certificate Revocation Using Public Key Infrastructure For MANET’s
Gowsalyaa.M,Karthick.N,Keerthana.S,Durga.R
1032-1035

Volume 3 Issue 2 February 2014

S.No. Title and Authors of Paper Page.No.
1 A Novel Interference Aware Optimized Link State Routing Protocol for Power Heterogeneous MANETs
Vijaya Lekshmi. S.V, E.P.Prakash
246-250
2 RFID Technology in Bank Services
Sana Azari, Somayyeh Jafarali Jassbi, Midia Reshadi
251-255
3 Click Based Authentication For Accessing Web Accounts
Rohit Urade, Roshan Kumar, Dinesh Gawande, Sejal Jawade, Ashwini Awchat
256-259
4 Identification of Phishing Web Pages and Target Detection
Purnima Singh, Manoj D. Patil
260-263
5 Combine Study of Transmission Line Fault Detection Techniques
Rucha V. Deshmukh, A.Prof. M. R. Salodkar
264-267
6 Investigating Interesting Rules Using Association Mining for Educational Data
Dr.Vijayalakshmi M N,S.Anupama Kumar,Kavyashree BN
268-271
7 Load Balancing Algorithms in Cloud Computing Environment – A Methodical Comparison
J. Uma, V. Ramasamy, A. Kaleeswaran
272-275
8 An Efficient Mining Model For Enhancing Text Classification Using k-NN
T.SIVAKUMAR,A.KALEESWARAN
276-284
9 The New Era of Transmission and Communication Technology : Li-Fi (Light Fidelity)LED & TED Based Approach
Ravi Prakash, Prachi Agarwal
285-290
10 Improved Particle Swarm Optimization for Wireless Intelligent Surveillance Path Planning using Wireless Sensor Network
Mr. R.Baskarane, Mr. T. Sendhil kumar, Mr. A.Parthiban
291-296
11 A Survey on Greedy Routing Using Clustering Approach in VANET
Karupparaya yuvaraja.S, K.Aravindhan
297-300
12 A NOVEL APPROACH FOR DESIGNING A D-FLIP FLOP USING MTCMOS TECHNIQUE FOR REDUCING POWER CONSUMPTION
Megala. C. D,Venkatesan .K
301-306
13 A Modified Encryption Technique using Playfair Cipher 10 by 9 Matrix with Six Iteration Steps
Subhajit Bhattacharyya, Nisarga Chand, Subham Chakraborty
307-312
14 Cloud Computing an Era in the World
V. Vijayalakshmi, S. Thamizharasan, P. Mahalakshmi
313-319
15 Double-phase Microaggregation for Protecting Bio-medical Data in Mobile Health
S. Saranya, M. Madan mohan, X. Rexeena
320-323
16 Risk Assessment for Diabetes Mellitus using Association Rule Mining
X.Rexeena, B.Suganya Devi, S.Saranya
324-328
17 Enhancement of a Novel Secure Dependable Data Storage & Privacy in Cloud Network
Prof. B. Anuradha, V. Nithya
329-333
18 Detect and Isolate Black hole attack in MANET using AODV Protocol
Jaspinder Kaur,Birinder Singh
334-338
19 HYBRID RECOMMENDATION USING ASSOCIATION RULE MINING BY PARTIAL EVALUATION OF WEB PERSONALIZATION FOR RETRIEVAL EFFECTIVENESS
Richa Soni,Gurpreet Kaur
339-348
20 Vegetation of Low Cost Remote Sensing Images by Mean Shift Algorithm
S.Chitra, R.Subash, C.Premalatha
349-353
21 A Survey: Hadoop, Managing Large Data very efficiently
Yadav Krishna R ,Ms. Purnima Singh
354-356
22 A PCQP Technique Of Location Based Service To Improve k-NN Search Using Secret Circular Shift
B.LEKSHMI JAIN,R.S SYAM DEV,M. MADAN MOHAN
357-363
23 ROUGH SETS APPLICATION FOR STUDENTS CLASSIFICATION BASED ON PERCEPTUAL DATA
Asheesh Kumar, Naresh Rameshrao Pimplikar, Apurva Mohan Gupta
364-371
24 Subspace Clustering using CLIQUE: An Exploratory Study
Jyoti Yadav, Dharmender Kumar
372-378
25 A Comparative Analysis on Symmetric Key Encryption Algorithms
G. Muthukumar,Dr. E. George Dharma Prakash Raj
379-383
26 Application of Monte Carlo method in Grid Computing and Allied Fields
Manas kumar Yogi, Vijaya kranthi chinthala
384-388
27 REVIEW OF IMPERCEPTIBLE TECHNIQUES FOR STILL DIGITAL IMAGE WATERMARKING
Ms. Chandrakala J. Chetri,Dr. Subhaschandra G. Desai
389-395
28 Active Contours based SAR Image Segmentation with G0- Statistical- Model
D.SriDevi, J.Marimuthu
396-398
29 A Novel Fuzzy Control Approach for the Allocation of Virtualized Resource
R. Nandhiniprabha, G. Sudhakar, M. Madan Mohan
399-402
30 SELF COLLIMATION IN PILLAR TYPE PHOTONIC CRYSTAL USING COMSOL
S.Hemalatha , K.Shanthalakshmi
403-407
31 HAVS: Hadoop Based Adaptive Video Streaming by the Integration of Cloudlets and Stratus
Keerthika Janani.M ,Sudhakar.G
408-413
32 A Review of Phase Correction Methods for Partial Fourier Reconstruction of MRI
Sivadas Neelima, Lakshmi Prabha P
414-418
33 GSM Based Alphanumeric Scrolling Display System
Raj Hakani
419-422
34 Comparison and performance analysis of routing protocol for mobile adhoc network
Lokeshwer Sinha, Samta Gajbhiye
423-426
35 Survey on Packet Hiding Scheme for Network Security by Selective Jamming Attacks
Katkar Kiran B., Dukare Ajay B., Pawar Monali R., Darandale Dnyaneshwar R.
427-431
36 K-Means Based Clustering In High Dimensional Data
Sindhupriya. R, Ignatius Selvarani. X
432-433
37 Survey on Playlist Generation Techniques
Sneha Antony, Jayarajan J N
437-439
38 Real Time News Reporting Using MOBICLOUD
Dahale Jyoti A. , Ahirrao Swapnil S. , Bhagwat Sagar S. , Autade Yogesh S.
440-443
39 Novel Approach to Discover Effective Patterns For Text Mining
Rujuta Taware, Prof. Sanchika A. Bajpai
444-448
41 AN EFFECTIVE ALGORITHM FOR COMPARISON OF REAL-TIME AND NON-REAL TIME DATA IN TEMPORAL BASED ACTIVITY MODEL
G.Karthika, V.Bhuvaneshwari ,G.Elavarasi
454-457
42 Emotion classification of textual document using Emotion – Topic Model
S.Sujitha, S.Selvi, J.Martina Jasmine
458-462
43 A RESEARCH: RESOLUTION FOR TYPICAL QUESTIONS IN TEMPORAL EXPRESSION(TERSEO) WITH THE HELP OF FILE.C ,WHAT.OUTPUT
Vijayaraghavan.U, Dr.Kumar.A,Sivakumar.V, Maharajan.K,Vijayalakshmi.S
463-469
44 Adaptive DS/CDMA Non-Coherent Receiver using MULTIUSER DETECTION Technique
V.Rakesh, S.Prashanth, V.Revathi, M.Satish, Ch.Gayatri
470-474
45 Q-FACTOR IMPROVEMENT IN 32 APSK FOR LONG HAUL OPTICAL COMMUNICATION
Sathiya vathi B , Siva kumar M
475-478
46 An Evolution of Testing In Software Engineering
K. Rajasri, T. Godwin Selva Raja
479-482
47 Smart Address Book
Saurabhee A. Wandhekar,Amey P. Pagar,Sagar V. Yewatkar, Shivkanya S. Shinde
483-486
48 Secure Frequent Itemset Hiding Techniques in Data Mining
Arpit Agrawal,Jitendra Soni
487-495
49 Liver And Hepatic Tumors Segmentation in 3-D CT Images
Christo Ananth, D.L.Roshni Bai, K.Renuka, A.Vidhya, C.Savithra
496-503
50 Comparative Study of Routing Protocols in MANET
Prerna Yadav,Shubhra Saxena
504-509
51 Dynamic Cluster Scoring Job Scheduling algorithm for grid computing
S. Dineshbabu, S. Supriya
510-514
52 Attendance Monitoring Using Image Processing
Divya Singh, Monica Kamnani, Ruhi Hadke,Shruti Khonde,Valhavi Patil, Mitali.R. Ingle
515-518
53 A Review of Empirical Evaluation of Software Testing Techniques with Subjects
Manika Tyagi, Sona Malhotra
519-523
54 Secret Sharing in Multisession Using Peer Head Authority
S.Pavithra, R.Jeyanthi
524-527
55 A machine doctor that diagnosing ophthalmology problems using Neural Networks
A.Jenefa, R.Ravi,H.Manimala
528-533
56 DESIGN AND PERFORMANCE ANALYSIS OF FAULT SECURE NETWORK-ON-CHIP USING FPGA
C.Ashok Kumar, P.Muneeswari, K.Rajkumar
534-539
57 Job Scheduling in Cloud Computing using Ant Colony Optimization
Dr.D.Maruthanayagam,T. Arun Prakasam
540-547
58 AUTOMATIC TRACK CREATION AND DELETION FRAMEWORK FOR FACE TRACKING
Renimol T G, Anto Kumar R.P
548-552
59 Overview of Sequential Pattern-Mining Algorithms
Prof. Kirti S. Patil.
553-555
60 An Improved Fuzzy C-means Algorithm learned wavelet network for segmentation of Dermoscopic image
LishaRajan T L,Jemila Rose R
556-563
61 A Comparative Study of Various Filters in Image Denosing with Curvelet Transformation
Sunil Kumar Naik,Abha Choubey
564-567
62 PREVENTING DNS BASED BOTNET COMMUNICATION FOR DDOS ATTACK
K.Suganya, Asst.Prof C.Gomathi
568-574
63 DOMAIN KNOWLEDGE IDENTIFICATION AND CLASSIFICATION FOR DISEASE DIAGNOSIS
Jothilakshmi.M, Asst.Prof Anuvelavan.S
575-581
64 SCHEDULING TRANSFERABLE OBJECTS FOR QUERY PROCESSING IN WSN
S.Kanimozhi,Asst.Prof P.Karthikeyan
582-589
65 Multi Level Malicious Behaviour Detection and Analysis Using Genetic Algorithm for Social Network
Sudhansu Gaur, Ashwani Kumar
590-597

Volume 3 Issue 1 January 2014

S.No. Title and Authors of Paper Page.No.
1 Calculation on Coverage & connectivity of random deployed wireless sensor network factors using heterogeneous node
Shikha Nema,Neeraj Shukla
001-008
2 A Literature Survey: Stemming Algorithm for Odia Language
Dhabal Prasad Sethi, Sanjit Kumar Barik
009-011
3 Leakage Power Reduction Using Power Gating And Multi-Vt Technique
AruljothiK ,PrajithaP B, RajaprabhaR
012-019
4 Adaptive Fingerprint Image Enhancement Techniques and Performance Evaluations
Kanpariya Nilam, Rahul Joshi
020-024
5 Image Mining Using Image Feature
Varsha Kundlikar, Meghana Nagori
025-030
6 PageRank and Link Analysis using Web Mining
Sanjay Kumar Singh, Rohit Raja
031-034
7 Study of cloud provisioning and it’s Research challenges
Mitesh Barad, Prashant Jani, Richa Sinha
035-039
8 Fuel Gauge Sensing Technologies for Automotive Applications
Vinay Divakar
040-042
9 ENHANCING TRAVELING SALESMAN PROBLEM THROUGH BIO INSPIRED ALGORITHMS (ABC)
SARANYA. S, PRIYA VAIJAYANTHI. R
043-046
10 Noise Removal from Electrocardiogram (ECG) a Comparison Approaches
Rajesh D. Wagh, Kiran R. Khandarkar, Dipanjali D. Shipne, Shaila P. Kharde
047-051
12 ANALYSIS ON THE WEATHER FORECASTING AND TECHNIQUE
Janani.B,PriyankaSebastian
059-061
13 DESIGN AND` DEVELOPMENT OF RFID BASED INTELLIGENT SECURITY SYSTEM
Sukhraj Singh, Neeraj Kumar, Navjot Kaur
062-065
14 AN IMAGE RANKING USING GOOGLE IMAGE SEARCH
Shilpa A. Shingare, Manoj D. Patil
066-070
15 A novel approach to Edge Detection in Coloured Images by Genetic Algorithms & Neural Networks
Er. Navneet Kaur ,Er. Rishma,Er. Naveen Dhillon
071-076
16 MapReduce Programming Paradigm Solving Big-Data Problems by Using Data-Clustering Algorithm
Yadav Krishna R,Ms. Purnima Singh
077-080
17 SURVEY ON SLEEP SCHEDULING METHODS IN WIRELESS SENSOR NETWORKS
S. Kousalya Devi,Mrs.C.Kavitha
081-085
18 ENHANCEMENT AND ISOLATION PROCESS APPLIED ON MRI IMAGES FOR CLASSIFICATION OF BRAIN TUMOUR
NEERAJ SINGLA, SUGANDHA SHARMA
086-091
19 ADVANCED SURVEY ON FACE RECOGNITION TECHNIQUES IN IMAGE PROCESSING
NEERAJ SINGLA,SUGANDHA SHARMA
092-098
20 Performance Enhancement of Radio Over Fiber Communication Systems With Wavelength Division Multiplexing and Modulation Techniques
Hamdy A. Sharshar
099-107
21 Review of Web Pre-Fetching and Caching Algorithms
Arun Pasrija,Shikha Sharma
108-112
22 E-Learning in India
Sunil Kumar Sharma, Javed Wasim, Dr. Jamshed Siddiqui
113-117
23 Accessibility Testing of Website through Statistical Technique
Monika Purohit, RemyaM.A
118-123
24 A Survey on Image Classification Methods and Techniques for Improving Accuracy
R.R Darlin Nisha, V.Gowri
124-126
25 Enhancing Digital Forensic Analysis through Document Clustering
Vidhya B, Priya Vaijayanthi R
127-130
26 Survey on Stock Market Prediction and Performance Analysis
Mrityunjay Sharma
131-135
27 My Help
Santhosh Reddy M, Monisha LakshmiPathi, Monica Kathi Reddy
136-138
28 Novel Approach to Discover High Utility Itemsets from Transactional Database
Supriya P. Bhosale
139-142
29 A Review on Changing Image from Grayscale to Color
Miss. Apurva B. Parandekar, Prof. S.S.Dhande, Prof. H.R.Vhyawhare
143-146
30 TRANSIENT AUTHENTICATION SERVICE
Sapana V Shinde, Daniyal M Solkar, Paul Antony, Swapnil Chatte , Lakshmi Madhuri
147-152
31 Feature Extraction of Leaf Diseases
Mr. Hrishikesh P. Kanjalkar, Prof. S.S.Lokhande
153-155
32 Priority based Packet Classification
Vijayalalitha A, Dharmaraj R
156-158
33 A Review On RGB Color Preserving Cryptography For Secure Data Transmission
Anchal A. Solio, Dr. S. A. Ladhake
159-162
34 Enhancing Data Privacy and Efficiency for Secure Cloud Storage Model
S.Simla Mercy, D.S.Delphin Hepsiba, G.Umarani Srikanth
163-166
35 A Review on Self Adaptive Technique For Image Registration Working On Variable Image Parameter
Prof. Ankita V. Pande, Prof. A. B. Deshmukh
167-171
36 Packet Classification Based On Standard Access Control List
S.Mythrei, R.Dharmaraj
172-175
37 A Novel Approach to Content Based Image Retrieval Technique Using Local Tetra Patterns
Vinayak G Ukinkar , Prof. Praveen Bhanodiya , Prof. Mrudula Mukadam
176-181
38 WEB PAGE INFORMATION HIDING USING PAGE CONTENTS
Dhammjyoti V. Dhawase , Prof. Sachin Chavan
182-186
39 Literature Review on a secure hashing scheme for Image Authentication
Samruddhi S.kuralkar, Dr. P. R. Deshmukh
187-190
40 Survey on Routing Mechanisms and Schemes in MANETs
Ramya.R, Karunakaran.P
191-196
41 AN EFFICIENT XML DATA STREAMING METHOD IN MOBILE WIRELESS NETWORK
U. Ravindran, J. Sribhavani
197-205
42 IMPROVING SERVICE CREDIBILITY IN PASSWORD AUTHENTICATED PEER SERVICES
U. Ravindran, D.Gayathri
206-209
43 Steady State Behavior Of a Network Queue Model Comprised of Two Bi-serial Channels Linked with a Common Server
Deepak Gupta,Navjeet Kaur,Raminder Kaur Cheema
210-222
44 An Analysis of Web Mining and its types besides Comparison of Link Mining Algorithms in addition to its specifications
B. Rajdeepa, Dr. P. Sumathi
223-227
45 Ensemble System for Optic Disc and Macula Detection
Tamilarasi, Duraiswamy
228-232
46 A Novel Approach In Fractal Antenna Design Using Sierpinski Arrowhead Geometry
Ankan Bhattacharya
233-237
47 Implementation and Analysis of cloud based Secure Trust based Middleware for Smartphones for accessing Enterprise Applications
Harsukhpal Singh,Nitin Gohal,Sachin Majithia,Mandeep Singh
238-245

Volume 2 Issue 12 December 2013

S.No. Title and Authors of Paper Page.No.
1 Image Enhancement for Face Images Using Wavelet
Zhe Heng Lee, Haidi Ibrahim
3007-3010
2 Scalable Filtering and Matching of XML Documents in Publish/Subscribe Systems for Mobile Environment
Yi Yi Myint, Hninn Aye Thant
3011-3016
3 DISTINGUISH SYBIL HARASS IN METROPOLITAN VEHICULAR NETWORKS
C.Rohitha,Dr.N. Sudhakar Reddy
3017-3021
4 DYNAMIC DEPLOYMENT OF WIRELESS SENSOR NETWORKS USING MACHINE LEARNING ALGORITHMS
Parimala M, Zareena N, Sumalatha G
3022-3025
5 MIND READING COMPUTERS
Mamta Devi,Minakshi Phore, Pooja Kumari
3026-3029
6 Implementation of Automatic Meter Reading System Using Wireless Sensor Network
Amruta kotasthane, Hate S.G
3030-3032
7 Implementation of Mobile Agent Architecture for E- Commerce Application for Mobile Devices
Kalpana N. Meher, Prof. Sanjay Jadhav, Prof. P. S. Lokhande
3033-3041
8 A review on Coverage factors in Wireless Sensor Networks
Shikha Nema,Neeraj Shukla
3042-3046
9 Improvement in Routing Behavior of AODV Protocol in MANET
Miss Anjali Sharma,Prof. Alpna Singh
3047-3051
10 An Enhance Uniform & Robust ASL Recognition Approach Irrespective of Color & Shape
Mr. Swapnil A. Bobade, Prof. Vijaya K. Shandilya
3052-3059
11 Implementation of Median Filter for CI Based on FPGA
Manju Chouhan, C.D Khare
3060-3065
12 Predefined Object Reduction
Mohammed Adam TaheirMohammed,Wan Maseri Binti Wan Mohd, Ruzaini Bin Abdullah Arshah, LiuYao
3066-3070
13 WIRELESS BASED CLOSED LOOP AUTOMATION OF STREET LIGHT CONTROL USING PIR
V.VELLINGIRI, Dr.M.THIRUMARIMURUGAN, Dr. T.KANNADASAN
3071-3074
14 Ethernet Based Home Monitoring System for Elderly Using Wireless Sensors
Rajesh Kone, Ch.Sridevi, T.D.Bhavani, D.Kishor Kumar
3075-3082
15 ARDUINO BASED SMART CART
Dr. Sheifali Gupta,Ashmeet Kaur, Avni Garg, Abhishek Verma, Akshay Bansal, Arvinder Singh
3083-3090
16 Performance and Cost Optimised MPPT for Solar Powered Vehicle
Dr. Sheifali Gupta,Ankit Aneja, Hitesh Mittal, Jai Aditya Chaudhary
3091-3096
17 Investigation of Interoperability to improve End-End connectivity in Cellular Networks
S.Malathy, C.Elavarasu
3097-3104
18 Handwritten Character Recognition for Telugu Scripts Using Multi Layer Perceptrons (MLP)
C. Vikram,C. Shoba Bindu,C. Sasikala
3105-3110
19 Modified Adaptive Power Control Algorithm for 3G Mobile Networks using CIR Technique
ADITYASINGH MANDLOI,AKHILESH PANCHAL, MEENAKSHI AKHAND, NEHA SINGH
3111-3114
20 A Watermarking Algorithm Based on HT-DWT-TGF for Security Applications
C. SUBBA RAO,B.V.LAKSHMI
3115-3121
21 JOINT SOURCE CHANNEL CODING WITH SPACE TIME TRELLIS CODE MODULATION
G.Saranya devi, A.K Gowthami, K.Kavitha
3122-3126
22 Declaring Time Parameter to Data in Active Storage Framework
Backya S, Palraj K
3127-3131
23 Text Detection and Extraction in Video Sequences
P.JAYAPRIYA,V.GOPI,C.NARASIMHAN
3132-3138
24 STUDY ON MANAGEMENT INFORMATION SYSTEM, ITS COMPONENTS AND IMPLEMENTATION PROCESS
Ms. Supriya Mahajan, Mr. Vansh Raheja
3139-3143
25 A Comparative Study on Various Mechanisms to Detect Phishing Websites
Radhe Shyam Panda, Rajesh Tiwari
3144-3147
26 Minimizing the Congestion and Delay Effects in Peer to Peer Networks
V Raviteja Kanakala,V Ravikishore
3148-3157
27 Hybrid predefined Searching
Mohammed Adam Taheir Mohammed,Wan Maseri Binti Wan Mohd, Ruzaini Bin Abdullah Arshah, LiuYao
3158-3162
28 SURVEY ON PERSONAL MOBILE COMMERCE PATTERN MINING AND PREDICTION
S. Jacinth Evangeline, K.M. Subramanian, Dr. K. Venkatachalam
3163-3167
29 Survey Paper: Cryptography The art of hiding Information
Manoj Kumar Pandey,Mrs. Deepty Dubey
3168-3171
30 ADVANCE METHOD OF DETECTION AND REMOVAL OF NOISE FROM DIGITAL IMAGE
Ms. Swapna M. Patil, Prof. R.R. Karhe
3172-3176
31 Growth and Future of Social Media
Suja P Mathews,Sunu George
3177-3183
32 Survey: Effective Feature Subset Selection Methods and Algorithms for High Dimensional Data
K.Revathi, T.Kalai Selvi
3184-3190
33 SURVEY PAPER BASED ON MEDICAL IMAGE SEGMENTATION AND CLUSTERING TECHNIQUES
Mrs. Princy Mishra,Mrs. Shikha Agarwal,Ms. Usha Kiran
3191-3194
34 A EFFECTIVE CONTENT BASED IMAGE RETRIEVAL SYSTEM BASED ON FEATURES AND TECHNIQUES
MONIKA RATHORE, MR. RAVINDRA GUPTA, MR.GAURAV SHRIVASTAVA
3195-3201
36 A Review of Literature On Image Inpainting And Super Resolution
Sanket S. Khedikar, Dr. P.N.Chatur
3211-3214
37 Survey of Different Techniques for Image Tamper Detection on Digital Images
Geetanjali Sahu, Usha Kiran
3215-3218
38 Enlarging the Agricultural Structure by using Wireless Sensors Networks
P.Boopathi,M.Kavitha,Dr.T.Kalai Kumaran,Dr.S.Karthik
3219-3223
39 A Review of Literature on Delta Closed Patterns and Noninduced Patterns from Sequences
Vishal B. Rathod, Prof. A.V.Deorankar, Dr. P.N.Chatur
3224-3226
40 Simulation Model of MB-OFDM for short range indoor wireless environment
Ms. Surabhi Tankkar , Mrs. Bhosale J.D
3227-3230
41 SURVEY ON INFERRING USER SEARCH GOAL USING FEEDBACK SESSION
D.Kavitha, K.M.Subramanian, Dr.K.Venkatachalam
3231-3237
42 Modified Run Length Encoding Scheme for High Data Compression Rate
M.VidyaSagar, J.S. Rose Victor
3238-3242
43 WIRELESS SENSOR NETWORK FOR MOBILE HEALTHCARE SYSTEM:ISSUES SURVEY
N.C.Meena priyanka, Ms.E.Annal Sheeba Rani
3243-3246
44 DETECTION OF UNSAFE COMPONENT LOADINGS USING DYNAMIC ANALYSIS TECHNIQUE
N. Geethanjali, S.Priyadarshini, Dr.S.Karthik
3247-3251
45 A Two Layer Encryption Approach to Secure Data Sharing in Cloud Computing
Mr. Bhavesh Rahulkar , Mr. Praveen Shende
3252-3254
46 Automatic monitoring & Reporting of water quality by using WSN Technology and different routing methods
A.C.Khetre, Prof.S.G.Hate
3255-3260
47 Cloud Computing Security from Single to Multi-clouds using Secret Sharing Algorithm
Priyanka Pareek
3261-3264
48 A Study of Security Issues and Cloud Models in Cloud Computing
Deepthi.S, Tulasi.V
3265-3270
49 A Cynical View on Agile Software Development from the Perspective of a new Small-Scale Software Industry
Apoorva Mishra,Deepty Dubey
3271-3275
50 E, H and J field Variation in H-Plane Horn Antenna when EBG unit Cell is placed inside the Wave Guide
Doondi kumar Janapala, K. Ramakanth Reddy, R. Swathi, J. Anusha
3276-3279

Volume 2 Issue 11 November-2013

S.No. Title and Authors of Paper Page.No.
2 Modeling of Radiation Induced Attenuation and its Recovery in Optical Fibers
Ahmed Nabih Zaki Rashed, Abd El-Naser A. Mohamed, Imbaby I. Mahmoud, Mohamed S. El_Tokhy, Osama H. Elgzar
2768-2775
3 Modeling of Radiation Induced Damage and Thermal Effects on Avalanche Photodiodes Properties
Ahmed Nabih Zaki Rashed, Abd El-Naser A. Mohamed, Imbaby I. Mahmoud, Mohamed S. El_Tokhy, Osama H. Elgzar
2776-2787
4 Modeling of Avalanche Photodiodes Performance under Thermal and Radiation Effects
Ahmed Nabih Zaki Rashed, Abd El-Naser A. Mohamed, Imbaby I. Mahmoud, Mohamed S. El_Tokhy, Osama H. Elgzar
2788-2799
5 Comparative Study of RF/microwave IIR Filters by using the MATLAB
Ravi kant doneriya,Prof. Laxmi shrivastava
2800-2805
6 A REVIEW ON CLUSTERING TECHNIQUES AND THEIR COMPARISON
W.Sarada,Dr.P.V.Kumar
2806-2812
7 Hardware Implementation of Iris recognition on FPGA: A Selected Review
Tajinderpal Singh, Dr.Sheifali Gupta
2813-2816
8 ULTRA LOW VOLTAGE, LOW POWER, LOW AREA, PROCESS VARIATION TOLERANT SCHMITT TRIGGER BASED SRAM DESIGN
Maheswary Sreenath, Prof.Binu K Mathew
2817-2827
9 A SURVEY ON CRAWLING WEB FORUMS
K.Vidhya,Ms.E.Annal Sheeba Rani
2828-2831
10 EXTENDING THE LIFE TIME OF WIRELESS SENSOR NETWORK USING ADAPTIVE PROTOCOLS
S.P.Vijayaragavan, Dr.T.V.U.Kiran Kumar, B.Karthik, Ajay prakash pandit
2832-2835
11 A Low Power 8-bit Magnitude Comparator With Small Transistor Count Using STATIC CMOS Logic
Bhaskara Rao Doddi, B.N. Srinivasa Rao, R. Prasad Rao
2836-2840
12 A survey of the algorithms for image noise removal and edge detection
Er. Navneet Kaur , Er. Rishma
2841-2844
13 Fault Detection Using Graph Based Segmentation
Jagrti Patel, Meghna Jain, PapiyaDutta
2845-2851
14 Fault Tolerance in Mobile Ad-Hoc Network with Enhanced_AOMDV Protocol
A. Dhanalakshmi, D.Maheshwari
2852-2862
15 Analysis on Image Segmentation using Spectral Clustering
Priyanka Daga, Ram Kishan Dewangan
2863-2865
16 Use of Least Significant Bit for Text Hiding Behind Image
Salony Pandey,Vinay Harsora
2866-2868
17 SADF FOR IMPLEMENTATION OF DYNAMIC APPLICATIONS
V.SUBHASHINI ,M.SAI KISHORE
2869-2872
18 Evaluation of Network Intrusion Detection System using PCA and NBA
Aradhana Srivastav, Pankaj Kumar, Rajkumar Goel
2873-2881
19 Selection of Motion Sensor for Smart Applications: A Characteristic Analysis
S.Raja, G.Ilangovan
2882-2884
20 Study Of Various Periodicity Detection Techniques In Time Series Data And Primary Level Plan For New Technique
Prof. Sandeep Khanna, Mr. Swapnil A. Kasurkar
2885-2890
21 Design a Low Power Half-Subtractor Using AVL Technique Based on 65nm CMOS Technology
Devendra Kumar Gautam, Dr. S R P Sinha, Er. Yogesh Kumar Verma
2891-2897
22 A Survey on Image Denoising based on Wavelet Transform
Deepti Sahu, R K Dewangan
2898-2900
23 FVAS: An Embedded Finger-Vein Authentication System for Mobile Devices
M.Sravani,P.Praveen Kumar
2901-2904
24 Survey Of Key Management Schemes For Secure Group Communication With Heterogeneous Environment In Wireless Sensors Networks
Priyanka Manhas,Parminder Kaur
2905-2909
25 Modeling of Skid –Steered Wheeled Vehicle
Stephy Merin Mathew
2910-2917
26 An Effective Focused Web Crawler for Web Resource Discovery
Nandar Win Min, Aye Nandar Hlaing
2918-2922
27 Hybrid Intrusion Detection for Anomaly & Misuse Attack using Clustering in Wireless Sensor Network
Mr. Ansar I. Sheikh, Prof. Pankaj Kawadkar, Prof. Hitesh Gupta
2923-2931
28 Facial Emotion Recognition Using Optimization Technique
S.Ramya, G.Sophia Reena
2932-2940
29 A Review on Acoustic Echo Cancellation Techniques
Pankush Singla, Sandeep Kaur, Sukhpreet Singh
2941-2943
30 Mobile Data Security on Cloud Computing Using SAAS
Mr. Yogesh Graham, Mr Praveen Shende
2944-2946
31 Performance Analysis of Different Approach of Adaptive Sorting
Maulik Patel, Shruti Yagnik
2947-2950
32 A review and Exploration of various Elements Inducing noise in Scheming Instrumentation amplifier
P.ARUMBU, V.ANAND, B.KARTHIK, V.GOPI
2951-2955
33 Classifying biological Data based on Association rule using Multi-Objective Genetic Algorithm
Deep Hakani,Harshita Kanani
2956-2962
34 Ensemble of Classifiers Based on Association Rule Mining
Divya Ramani,Harshita Kanani,Chirag Pandya
2963-2967
35 Incremental Mining for Frequent Item set on Large Uncertain Databases
Mr. Avinash A. Powar,Prof. A.S. Tamboli
2968-2971
36 Statistically Refining the Initial Points for K-Means Clustering Algorithm
Kamaljit Kaur, Dr. Dalvinder Singh Dhaliwal, Dr. Ravinder Kumar Vohra
2972-2977
37 Design and Development of Industrial Pollution Control System using LabVIEW
Isha Gupta, Rashpinder Kaur
2978-2980
38 Road Accidents Prevention system using Driver’s Drowsiness Detection
Garima Turan, Sheifali Gupta
2981-2983
39 Design and Development of Virtual Instrumentation System for Disabled using LabVIEW
Gunjeet Kaur, Rashpinder Kaur
2984-2987
40 End to End Delay based Comparison of Routing Protocols in Wireless Networks
Dharam Vir, Dr. S.K. Agarwal, Dr. S.A. Imam
2988-2993
41 Comparative Study of Malaria Parasite Detection using Euclidean Distance Classifier & SVM
Ms. Snehal Suryawanshi, Prof. V. V. Dixit
2994-2997
42 An Analysis for Power Minimization at Different Level of Abstraction to Optimize Digital Circuit
Vivechana Dubey, Ravimohan Sairam
2998-3002
43 Image Steganography Based On DCT Algorithm for Data Hiding
Suchitra. B, Priya. M, Raju.J
3003-3006