Volume 2 Issue 10 October-2013

S.No. Title and Authors of Paper Page.No.
1 An Accurate Model for Chromatic Dispersion in Optical Fibers under Radiation and Thermal Effects
Ahmed Nabih Zaki Rashed1, Abd El-Naser A. Mohamed, Imbaby I. Mahmoud, Mohamed S. El_Tokhy, Osama H. Elgzar
2646-2654
2 Modeling of Radiation Induced luminescence and How to Reduce Cherenkov Effect in Optical Fibers
Ahmed Nabih Zaki Rashed, Abd El-Naser A. Mohamed, Imbaby I. Mahmoud, Mohamed S. El_Tokhy, Osama H. Elgzar
2655-2660
3 An Efficient MRC based RNS-to-Binary Converter for the {22n-1,2n,22n+1-1} Moduli Set
Kazeem Alagbe Gbolagade
2661-2664
4 Artificial Metaplasticity MLP Results on MIT-BIH Cardiac Arrhythmias Data Base
Yasmine Benchaib, Mohamed Amine Chikh
2665-2673
5 Multi-layered Graph Clustering in Finding the Community Cores
Zin Mar Yin, Soe Soe Khaing
2674-2677
6 An Overview of Transparency in Homogeneous Distributed Database System
Nitesh Kumar, Saurabh Bilgaiyan , Santwana Sagnika
2678-2682
7 ESBA: Enhanced Search Based Approach for Software Module Clustering
Chandrakanth P,Anusha G,Kishore C
2683-2686
8 Implementation Of Turbo Coded OFDM For PAPR Reduction using Modified Selective Mapping Technique
RAVI MOHAN,SUMIT SHARMA,MOHAMMAD SUHEL
2687-2692
9 Anomaly Detection & Prevention by Using Users Fingerprints
Nitin Y. Suryavanshi , Dinesh D. Puri , Atul V. Dusane
2693-2695
10 Prediction of Round-off Noise Power Spectrum and Magnitude Response of Direct Form Second Order filter by Least Pth-norm IIR Filter Design Method
Er. Rupinder kaur,Er. Manjit Thapa,Er. Bhubneshwar Sharma
2696-2702
11 BER Performance of GMSK Based Radio over Fiber Technology
Sandeep Saini, Er. Shiv Goel
2703-2706
12 A Cross Border Access to Data Stored In the Cloud
K.Senathipathi, Dr.S.Chitra, J.Angeline Rubella, M.Suganya
2707-2714
13 A Survey on the Energy Conservation in Wireless Sensor Networks
Gayathri devi kotapati, Sumalika kotha, Chittineni Aruna
2715-2719
14 A New Approach for Selection Sorting
Mrs.P.Sumathi, Mr.V.V.Karthikeyan
2720-2724
15 Image Compression Techniques Using Artificial Neural Network
Birendra Kumar Patel, Prof. Suyash Agrawal
2725-2729
16 Optimization Location of TCSC to control Power Swing
Sonora Dixit, Rajkumar Jhapte
2730-2736
17 Analysis Techniques For Eliminating Noise In Medical Images Using Bivariate Shrinkage Method
Ravi Mohan Rai,Urooz Jabeen
2737-2741
18 A Study of a Gamma Camera in Nuclear Medicine
Dr. C. Gurudas Nayak, Dr. Rajesh Kumar, Mr. Michał Heichel
2742-2745
19 Spectrum Sensing Based on Poynting Vector Theorem for Cognitive Radio Networks
Amit Talreja,Prof Prabhat Patel
2746-2752
20 Area and Speed efficient Floating Point Unit design on Hybrid FPGA
Ankit Kumar Kusumakar, Utsav Malviya
2753-2755
21 A User Centric Cryptographic Framework for Data Security in Public Cloud Storage
Reetika Singh,Rajesh Tiwari
2756-2760
22 A Double Layer Protection Transmission Technique Using Cryptography and Steganography
Tanmaiy G Verma, Zohaib Hasan , Dr. Girish Verma
2761-2763

Volume 2 Issue 9 September-2013

S.No. Title and Authors of Paper Page.No.
1 RLC Low Pass Filters Transmission Transient Performance Characteristics Analysis
Ahmed Nabih Zaki Rashed
2533-2541
2 Mobile Payment Security issues: a Comprehensive Survey
Shikha Nema, Neeraj Shukla
2542-2548
3 Implementation on FPGA for Tuned Low Complexity Modified Curve Fitting Algorithm
Brajesh Gupta,Monika Kapoor
2549-2553
4 Reliability Analysis of Nanoscale CMOS Device with HCI Effect
Sandeep lalawat, Prof.Y.S.Thakur
2554-2557
5 Exploring the Usability and Accessibility of an E-Learning System
Sunil Kumar Sharma
2558-2560
6 PROTECTION OF SHARED DATA FOR ONLINE SOCIAL NETWORKS
A. SARATH, S. SRINIVASULU, B. SRINIVASULU
2561-2566
7 COMPARISONS OF DIFFERENT APPROACHES FOR VPC CAPACITY MANAGEMENT
Dr. M. Usha Rani,K. Sailaja
2567-2579
8 Position Based Forwarding Routing in Real Time City VANET
Seema.D, Sujata.Terdal
2580-2585
9 Static Signature Verification Using Local Feature Extraction Based DRT And HMM
Neeraj shukla,Nazia Khan
2586-2594
10 Modeling of IGBT Using Temperature Prediction Method
Amit Thakur,Y S Thakur
2595-2597
11 Channel Estimation for OFDM-IDMA Receivers System
G.ARIFA,K.MANJUNATH
2598-2603
12 Comparison of Bit Error Rate for Multipath Fading Channel in DS-CDMA
Mr. G.A. Bhalerao, Prof. R.G. Zope, Dr. D. N. Kyatanavar
2604-2610
13 INTRUSION DETECTION AND RESPONSE IN MANET ROUTING ATTACKS
M.MANJULA, K. RAVIKUMAR
2611-2614
14 Comparitive Analysis of Image Segmentation Techniques
Rohit Sardana
2615-2619
15 A SURVEY ON METRICS, MODELS & TOOLS OF SOFTWARE COST ESTIMATION
Soumyabrata Mukherjee, Bishnubrata Bhattacharya, Suvajit Mandal
2620-2625
16 Outlier Detection Using K-Mean and Hybrid Distance Technique on Multi-Dimensional Data Set
Shruti Aggarwal, Janpreet Singh
2626-2631
17 Bandwidth Enhancement of Dual Patch Microstrip Antenna Array using EBG Patterns on Feedline
Shweta Gautam, Ajit Yadav, Dr.Mithilesh Kumar
2632-2636
18 Frequency Reconfigurable Aperture coupled Microstrip Antenna with DGS for Bandwidth Improvement
Ajit Yadav,Shweta Gautam,Dr. Mithilesh Kumar
2637-2641
19 PRIVATIZATION OF SENSITIVE INFORMATION IN DATA PUBLISHING USING CLOSEENESS
S.SARANYA
2642-2645

Volume 2 Issue 8 August-2013

S.No. Title and Authors of Paper Page.No.
1 Compression Record Based Efficient k-Medoid Algorithm to Increase Scalability and Efficiency
Archana Kumari, Hritu Bhagat
2398-2401
2 Signal Delay Control Based on Different Switching Techniques in Optical Routed Interconnection Networks
Ahmed Nabih Zaki Rashed
2402-2408
3 Semantic Knowledge at User side through Web Browser Plug in: A Review
Hitesh Kumar,Dr. Dharmender Kumar
2409-2414
4 A performance evaluation of various security assessments in WiMAX
Pankaj chouhan, S.R. Mansore
2415-2420
5 QUERY PLANNING FOR CONTINUOUS AGGREGATION QUERIES USING DATA AGGREGATORS
A. SATEESH, D. ANIL, M. KIRANKUMAR
2421-2426
6 HEURISTICS IN GRID SCHEDULING
D. Thilagavathi, Dr. Antony Selvadoss Thanamani
2427-2432
7 Role of Information Technology in Total Quality Management: A Literature Review
Suby Khanam, Jamshed Siddiqui, Faisal Talib
2433-2445
8 Development and Applications of Line Following Robot Based Health Care Management System
Deepak Punetha, Neeraj Kumar, Vartika Mehta
2446-2450
9 Implementation of Soft Handover in IEEE 802.16e
Neeraj Kumar, Deepak Punetha, Sukhraj Singh
2451-2456
10 Analysis and Design of 3 LSB Techniques for Secure Audio Steganography
Laxmi Kumari, Dinesh Goyal
2457-2460
11 Inventory Management System Software for Public Universities in Ghana (IMSSPUG)
M. O Yinyeh, S. Alhassan
2461-2464
12 SECURITY CONCERNS IN MEDIUM SIZE ENTERPRISE CLOUD COMPUTING
SHAIK.SAIDHBIMCA,IBRAHIM GASHAW
2465-2471
13 Dynamic Load Balancing in Cloud Using Live Migration of Virtual Machine
Sandeep Bhargava, Swati Goyal
2472-2477
14 A COMPARATIVE BEAMFORMING ANALYSIS OF LMS & NLMS ALGORITHMS FOR SMART ANTENNA
Priyanka Yadav, Prof. Smita Patil
2478-2481
15 DYNAMIC AUDIT SERVICE OUTSOURCING FOR DATA INTEGRITY IN CLOUDS
CH. MUTYALANNA, P. SRINIVASULU, M. KIRAN
2482-2486
16 Design and Simulation of MEMS based Microhotplate as Gas Sensor
Monika, Dr. Arti Arora
2487-2492
17 Secure Re-encryption in Unreliable Cloud using Synchronous clock
Shyam Sarania, Amit Gupta
2493-2496
18 A Study on Handwritten Signature Verification Approaches
Surabhi Garhawal, Neeraj Shukla
2497-2503
19 Comparative Performance Analysis of Different CMOS Adders Using 90nm and 180nm Technology
Jatinder Kumar, Parveen Kaur
2504-2507
20 Energy Aware Congestion Control Multipath Routing: A Survey
Varun Mishra, Gajendra Singh Chandel
2508-2513
21 SECURING DISTRIBUTED ACCOUNTABILITY FOR DATA SHARING IN CLOUD COMPUTING
N. RAMESH, D. ANIL, M. KIRAN
2514-2519
22 Analysis of Power Utilization and different Routing Protocols in Mobile Ad Hoc Network (MANET)
Neha Shinde Holkar, Latika Mehrotra
2520-2525
23 A Dynamic Approach to Optimize Energy in RIP, OLSR and Fisheye Routing Protocols using Simulator
Dharam Vir, Dr. S.K.Agarwal, Dr. S.A.Imam
2526-2532

Volume 2 Issue 7 July-2013

S.No. Title and Authors of Paper Page.No.
1 RC Band Pass Filters Analysis for Under damped Operating Conditions
Ahmed Nabih Zaki Rashed
2208-2216
2 Thermal nondestructive testing and spice simulation with approach of electro-thermal modelling
Chinmayee Jena, Alok Kumar Singh
2217-2222
3 Enhancement of the Security of a Digital Image using the Moduli Set {2n-1,2n,2n+1}
S. Alhassan, K.A. Gbolagade
2223-2229
4 Transformation of Graph Partitions into Problem Domain in Digital Circuit Layout
Maninder Kaur, Kawaljeet Singh
2230-2231
5 Cloud Data Security using Authentication and Encryption Technique
Sanjoli Singla, Jasmeet Singh
2232-2235
6 Monitoring Data Integrity while using TPA in Cloud Environment
Jaspreet Kaur, Jasmeet Singh
2236-2240
7 Design of low power SAR ADC in Biomedical Applications
Md.Kareemoddin, A. Ashok Kumar, Dr. Syed Musthak Ahmed
2241-2245
8 Image Edge Detection: A Review
Sunanda Gupta,Charu Gupta,S.K. Chakarvarti
2246-2251
9 A Web Search Engine based approach to Measure the Semantic Similarity between Words using Page Count and Snippets Method (PCSM)
Ms. Vaishali Nirgude, Dr. Rekha Sharma, Dr. R.R. Sedamkar
2252-2257
10 E-Voting System for on Duty Person Using RSA Algorithm with Kerberos Concept
Ms. Tanzila Afrin, Prof.K.J.Satao
2258-2261
11 Personal Identification Using Palmprint Biometrics Based on Principal Line Approach
Sumangala Biradar
2262-2267
12 Low Power And Area Efficiency of SHA-1 and SHA-2 Hash Algorithm
N.Swetha,K. Raveena
2268-2272
13 Edge Preserving MAP Estimation of Images Using Filtering Approach and Wavelet Based Mehods
Hitha Mohanan , Swagatha
2273-2276
14 Improving Performance of Wireless Mesh Network using Channel Allocation Schemes
Pranay Joshi, Prof. Rupesh Dubey, Prof. Harsh Goud
2277-2280
15 REVIEW ON ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS
G. Poornima, Mr. M. Rajasenathipathi
2281-2286
16 A Survey on Image Mining Techniques for Image Retrieval
J. Priya, Dr. R. Manicka Chezian
2287-2291
17 A Novel approach for Optimizing Cross Layer among Physical Layer and MAC Layer of Infrastructure Based Wireless Network using Genetic Algorithm
Vinay Verma, Savita Shiwani
2292-2296
18 Performance Analysis of Various Application Protocols for MANET
Dr. Ravi Sindal, Nidhi Jaiswal
2297-2301
19 Design & Analysis Of An Inverted-T Shaped Antenna With DGS For Wireless Communication
Arun Singh Kirar, Dr. P. K. Singhal
2302-2306
20 Public-Key Infrastructure (PKI)
Anju Sharma, Neeraj Goyat, Vinod Saroha
2307-2310
21 Improving End-to-End Delay Distribution in Wireless Sensor Networks
R.J Lawande, A.H. Ansari
2311-2318
22 A Novel Approach of Using Laplacian Image Enhancement
Rucha Ashok Deshmukh, Dr. S. A. Ladhake
2319-2322
23 RSA algorithm realization on FPGA
A.R.Landge, A.H. Ansari
2323-2327
24 Performance Investigation of Two-Stage Operational Amplifier
C.K.Kalawade, S.A.Shaikh
2328-2332
25 BF-PSO optimized PID Controller design using ISE, IAE, IATE and MSE error criteria
Yogendra Kumar Soni, Rajesh Bhatt
2333-2336
26 Simulated Annealing optimized PID Controller design using ISE, IAE, IATE and MSE error criteria
Yogendra Kumar Soni, Rajesh Bhatt
2337-2340
27 Accurate Analysis of Weblog Server File by Using Clustering Technique
Gurpreet Kaur
2341-2343
28 Performance Comparison of alCNRZ and nCRZ Modulation Format for WDM/DWDM System
Rupanjali Banerjee, Naveen Dhillon, Manjit Singh
2344-2350
29 Energy Efficient Protocol for Clustered Cooperative Sensor Network
Ms. Pallavi H. Chitte, Mr. D.K. Chitre
2351-2356
30 Design of Area Efficient High Speed Parallel Multiplier Using Low Power Technique on 0.18um technology
Vamsi Krishna Rongali, B Srinivas
2357-2362
31 Anomaly Detection using Support Vector Machine
Dharminder Kumar, Suman, Nutan
2363-2368
32 Automatic Boundary Detection and Generation of Region of Interest for Focal Liver Lesion Ultrasound Image Using Texture Analysis
Mihir N.Dalwadi , Prof. D.N.Khandhar, Prof. Kinita H.Wandra
2369-2373
33 MIMO – BASED STBC – OFDM SYSTEM ON TEXT MESSAGE TRANSMISSION
Sandeep Tiwari, Angeeta Hirwe, Rupesh Dubey
2374-2377
34 DESIGN AND PERFORMANCE ANALYSIS OF RING OSCILLATORS
ARYA TAH,DEBASISH KUMAR RAKSHIT,Dr. ASISH KUMAR MAL
2378-2383
35 Literature Survey on latest research issues in MANET
Mrs.Padma .P,Mr.R.Suresh
2384-2388
36 VOICE ACTIVATED PROGRAMMABLE MULTIPURPOSE ROBOT
V.NAGAMANI, SHANTI SWAROOP KAMPA, CH.SREEDHAR, SIDDARTH.G, A.RAKESH REDDY
2389-2397

IJARCET Volume 2 Issue 6 June-2013

S.No. Title and Authors of Paper Page.No.
1 An Approach for clustering uncertain data objects: A Survey
Samir N. Ajani, Prof. Mangesh Wanjari
1930-1932
2 Earthquake Disaster based Efficient Resource Utilization Technique in IaaS Cloud
Sukhpal Singh, Rishideep Singh
1933-1938
3 DATA SHARING IN THE CLOUD USING DISTRIBUTED ACCOUNTABILITY
Epuru Madhavarao, M Parimala, Chikkala JayaRaju
1939-1944
4 Wavelength Assignment In WDM Optical Networks
Mariya Daisy.S,Helina Rajini.J
1945-1949
5 Shunt Active Power Filter for Harmonic Mitigation by using Fuzzy Logic Controller
Shilpy Agrawal, Vijay Bhuria
1950-1954
6 Page Interest Estimation using Apriori Algorithm
Pranit Bari, P. M. Chavan
1955-1959
7 Discovering the Most Influential Human Action Using Web Based Classifier
Soumya R, R.Gnanakumari
1960-1964
8 Radio Interferences Performances in 750KV Transmission Line & 400KV Transmission Line of HVAC Transmission system by MATLAB program
Alka Szeerin Mansoori
1965-1968
9 A Modified Hierarchical Clustering Algorithm for Document Clustering
Merin Paul, P Thangam
1969-1973
10 A Review: Content Base Image Mining Technique for Image Retrieval Using Hybrid Clustering
Gurpreet Kaur
1974-1978
11 Analysis of Sleep Mode Energy Consumption in CMOS Circuits Using Power Gating Switches
R.Aishwarya, S.P.Valan Arasu
1979-1982
12 Reliability analysis based on losses from failure Modelling
Dr. Amit Gupta, Renu Garg
1983-1986
13 Secured Intersection based Geographical Routing Protocol for VANET
Suvya P, Prabhu C
1987-1992
14 Throughput Maximization for Optical Burst Switching Networks
Mrs. Kavitha.A, Mrs. Helina Rajini J
1993-2004
15 A review of vertical handoff algorithms based on Multi Attribute Decision Method
Manjaiah D.H, Payaswini P
2005-2008
16 Optical Character Recognition Techniques: A survey
Sukhpreet Singh
2009-2015
17 Discovering Semantic Similarity between Words Using Web Document and Context Aware Semantic Association Ranking
P.Ilakiya
2016-2020
18 Decision Strategies during vertical handover in heterogeneous networks
Sandeep Chouhan,Mr.R.B.Gaikwad
2021-2029
19 GEOEYE
Ambika Patil
2030-2033
20 CLUSTER ANALYSIS OF SSTS FRAMEWORK USING SOCIAL NETWORK ANALYSIS
M.Sindhuja, Dr.S.Rajalakshmi, S.T.Tharani
2034-2036
21 Analysis of Signature-Based and Behavior-Based Anti-Malware Approaches
Ashwini Mujumdar, Gayatri Masiwal, Dr. B. B. Meshram
2037-2039
22 High-Performance Computing using GPUs
Rakesh Kumar K. N, Hemalatha V, Shivakumar K. M, Basappa B. Kodada
2040-2045
23 Detection and Correction of Red Eye in Digital Photograph
Swati S. Deshmukh,Dr. A.D. Gawande,Prof. A.B.Deshmukh
2046-2051
24 GA optimized SVD based signal detector for Cognitive radio Networks
Nidhi Chandel and Mr. Rajesh B. Ahirwar
2052-2055
25 Survey on Improving the Performance of Web by Evaluation of Web Prefetching and Caching Algorithms
Arun Pasrija
2056-2060
26 A New Approach for Dynamic Load Balancing Algorithm
Harshal Khandre, Prof. Manasi Kulkarni
2061-2063
27 Hand Geometry Recognition System Using Feature Extraction
Poonam Rathi, Dr. Sipi Dubey
2064-2067
28 Development of High Availability Framework for the chassis of Advanced TCA (ATCA) in CDMA Networks
Sharath Kumar K.C. , H.K.Krishnappa
2068-2072
29 Secure Policy Based Data Sharing for Dynamic Groups in the Cloud
M. Kavitha Margret
2073-2076
30 Image Retrieval: A Literature Review
Meenakshi Shruti Pal, Dr. Sushil Kumar Garg
2077-2080
31 Association Rule Mining using Apriori Algorithm: A Survey
Charanjeet Kaur
2081-2084
32 Determination of Nontechnical Losses via Matlab Environment
Sonika Agrawal, Vijay Bhuria
2085-2090
33 Optimization of Hamilton Path Tournament Schedule
Trinetra Kumar Pathak, Vinod Kumar Bhalla
2091-2094
34 ASHA: AGENT BASED SECURE HOST ARP CACHE MANAGEMENT
Ranjith kanna kanna,Venkatramulu sunkari
2095-2097
35 Signal Strength Estimation and Comparison with Measured Signal Strength for Mobile Cellular Communication
Tilotma Yadav, Partha Pratim Bhattacharya
2098-2101
36 IMPLEMENTATION OF MOBILE TARGET DETECTION IN WIRELESS SENSOR NETWORKS
J.NAVEEN, S.MADHU PRIYA
2102-2107
37 Improved PCA Based Face Recognition System
Navneet Jindal, Vikas Kumar
2108-2113
38 BBO Comparison with other Nature Inspired Algorithms to Resolve Mixels
Mittu Mittal, Gagandeep Kaur
2114-2118
39 Automatic Text Extraction in Video Based on the Combined Corner Metric and Laplacian Filtering Technique
Kaushik K.S, Suresha D
2119-2124
40 Implementing Trust Negotiations In Multisession Transactions
S.Seetha, M.Ramamoorthy
2125-2129
41 Compare the results of Tuning of PID controller by using PSO and GA Technique for AVR system
Anil Kumar,Dr. Rajeev Gupta
2130-2138
42 Design and implementation of low power 16 bit ALU with clock gating
AnkitMitra
2139-2142
43 Grid Density Based Clustering Algorithm
Amandeep Kaur Mann, Navneet Kaur
2143-2147
44 Image Denoising using Dual-Tree Complex DWT and Double-Density Dual-Tree Complex DWT
Mr. R. K. Sarawale, Dr. Mrs. S.R. Chougule
2148-2154
45 Vehicle Theft Catcher
Ms. Ketki Ram Bhakare, Ms.Samiksha Bhakare, Mr. Nitin Bhomle
2155-2158
46 Multispectral Palm Image Fusion: A Critical Review
Rajashree Bhokare,Deepali Sale ,Dr. M.A. Joshi , Dr. M.S.Gaikwad
2159-2164
47 Effect of Feature Reduction in Sentiment analysis of online reviews
G.Vinodhini,RM.Chandrasekaran
2165-2172
48 Biological Effect of High Frequency Electromagnetic Radiation – A Review
Jyoti, Paramdeep Singh
2173-2176
49 Integrating Assembly Lines based on Lean Line Design Concept
Ms. Surekha. S, Dr. R. V Praveena Gowda, Mr. Manoj Kulkarni
2177-2185
50 A Survey on Speech Recognition
Harpreet Singh,Ashok Kumar Bathla
2186-2189
51 A Survey on Intrusion Detection System in Data Mining
Sahilpreet Singh,Meenakshi Bansal
2190-2194
52 Performance Analysis of AODV and DSDV in Simulation Based Map
Abhishek Singh, Anil. K. Verma
2195-2199
53 Solving Digital Circuit Layout Problem based on Graph Partitioning Technique: A Glance
Maninder Kaur, Kawaljeet Singh
2200-2204
54 Comparative Study of Two-way Finite Automata and Turing machine
Sumaiya Faizyab
2205-2207

Volume 2 Issue 5 May-2013

S.No. Title and Authors of Paper Page.No.
1 A Verification Method Based On Petri Net for Online Student Registration Web Service Composition
A.Kumaravel, M.Merlin Mexa
1663-1669
2 An Overview of Partial Shuffle for Database Access Pattern Protection Using Reverse Encryption Algorithm
Priti V. Bhagat, Rohit Singhal
1670-1673
3 ENHANCED TECHNIQUE FOR SECURED AND RELIABLE WATERMARKING USING MFHWT
Sandeep Kaur, Rajiv Bansal
1674-1677
4 DESIGN OF WI-FI INTEGRATED SOPHISTICATED METER USING EMBEDDED SYSTEM
Iswarya.V
1678-1683
5 CLASSIFICATION BY K-MEANS CLUSTERING
MUKESH KUMAR CHOUDHAR, MANDEEP SINGH SAINI, PALVEE
1684-1688
6
Harris-Hessian Algorithm for Coin Apprehension

Saranya das.Y.M,R.Pugazhenthi
1689-1693
7 Modified Dactylogram Sifting
Geethu V S, V.Selvakumar
1694-1698
8 Preserving Privacy Using Data Perturbation in Data Stream
Neha Gupta, IndrJeet Rajput
1699-1704
9 A Study of Secure Routing in Mobile Ad-hoc Networks
Desai Piyusha P.
1705-1708
10 Secure Data Transmission using Watermarking and Image Compression
Dr. Ajit Singh, Meenakshi Gahlawat
1705-1715
11 Mitigating Denial of Service Attacks in Wireless Networks
S. Raja Ratna,R. Ravi,Dr. Beulah Shekhar
1716-1719
12 Packet Load Generator for Telecom Networks
Niranjan U, Ramacharyulu P Govardhanam, K Vijaya
1720-1724
13 Fusion of Statistic, Data Mining and Genetic Algorithm for feature selection in Intrusion Detection
MeghaAggarwal, Amrita
1725-1731
14 Efficient and Reliable Resource Management Framework for Public Cloud Computing
M.Sasitharagai, T.Rajendran, M.Malarmathi
1732-1737
15 Web Gate Keeper: Detecting Encroachment in Multi-tier Web Application
Sanaz Jafari, Prof.Dr.Suhas H. Patil
1738-1742
16 750kv Transmission Line parameter and line Efficiency calculation and the performance of High Voltage alternating current Transmission system using MATLAB program
Alka Szeerin Mansoori
1743-1748
17 Performance Analysis of IIR Digital Band Stop Filter
Subhadeep Chakraborty, Abhirup Patra
1749-1756
18 Cooperative Defense against Pollution Attack in P2P System with Network Coding
Dr Siddaraju, Chitresha Mehta
1757-1761
19 Analyzing Knowledge Based Feature Selection to Detect Remote to Local Attacks
Mya Thidar Myo Win, Kyaw Thet Khaing
1762-1765
20 A Statistical Approach to Classify and Identify DDoS Attacks using UCLA Dataset
Thwe Thwe Oo, Thandar Phyu
1766-1770
21 Design and Implementation of Structured and Unstructured Data Querying System in Heterogeneous Environment
Thu Zar Mon
1771-1775
22 Intrusion Alert Elimination on Network Attack Alerting System
Mon Mon Zaw
1776-1779
23 A Survey on Windows Component Loading Vulnerabilities
U.Haritha, V.Lokanadham Naidu
1780-1783
24 Enforcing Multi-user Security Policies in Cloud Computing
Mrs. Shubhada P. Mone, Mrs. Sunita S. Dhotre
1784-1788
25 Construction and Selection of Single Sampling Quick Switching Variables System for given Control Limits Involving Minimum Sum of Risks
Dr. D. SENTHILKUMAR, R. GANESAN, B. ESHA RAFFIE
1789-1800
26 Audio-based Classification of Video Genre Using Multivariate Adaptive Regression Splines
Hnin Ei Latt, Nu War
1801-1805
27 Cost Estimation Modal to find faulty Objects in Software Reusable Components
Ramadeep Kaur, Sami Anand
1806-1810
28 Overview of Impact of Requirement Metrics in Software Development Environment
Mohd.Haleem, Prof (Dr) Mohd.Rizwan Beg, Sheikh Fahad Ahmad
1811-1815
29 A KNOWLEDGE BASED APPROACH FOR AUTOMATIC DATABASE NORMALIZATION
G.Sunitha, Dr.A.Jaya
1816-1819
30 The Comparative Study of DCT and DWT in Blind Detection Based Digital Watermarking
Mya Thidar Kyaw, Dr. Kyi Soe
1820-1824
31 WEIGHT ROTATION TECHNIQUE FOR PAPR REDUCTION IN OFDM
S.P.Vijayaragavan,R.Sakthivel,B.Karthik
1825-1828
32 Key Frame Extraction for Video Summarization Using DWT Wavelet Statistics
Khin Thandar Tint, Dr. Kyi Soe
1829-1833
33 AN EFFECTIVE METHODOLOGY FOR MINUTIAE BASED FINGERPRINT MATCHING USING SINGULARITIES INDEXING
M.Sivapriya, S.Pushpa
1834-1840
34 A Maintainability Estimation Model and Metrics for Object-Oriented Design (MOOD)
Kiranjit Kaur,Sami Anand
1841-1843
35 The optimize load balancing in cluster computing
Mr. Sunil Kumar Pandey, Prof. Rajesh Tiwari
1844-1849
36 Important Roles Of Data Mining Techniques For Anomaly Intrusion Detection System
Phyu Thi Htun, Kyaw Thet Khaing
1850-1854
37 Detection Model for Daniel-of-Service Attacks using Random Forest and k-Nearest Neighbors
Phyu Thi Htun, Kyaw Thet Khaing
1855-1860
38 Fuzzy RDBMS Design: SQL Add-On
Subita Kumari, Sonia
1861-1865
39 Performance Study of Interweave Spectrum Sharing Method in Cognitive Radio
Pinki Yadav, Partha Pratim Bhattacharya
1866-1872
40 Simulative analysis for Image Denoising using wavelet thresholding techniques
Virendra Kumar, Dr. Ajay Kumar
1873-1878
41 Human Identification Based Biometric Gait Features using MSRC
Nyo Nyo Htwe, Nu War
1879-1885
42 MEMS ACCELEROMETER BASED HAND GESTURE RECOGNITION
Meenaakumari.M, M.Muthulakshmi
1886-1892
43 Security Analysis of Fair E-cash Payment System
Thae Nu Nge
1893-1896
44 Fairness of Optimistic ID-Based Concurrent Signature Schemes
Pearl Ei Phyu
1897-1900
45 Analysis and Improvement on a Single Unit Cyclic Fair Exchange Protocol for Multi-party
Nay Chi Htun, Khin Khat Khat Kyaw
1901-1903
46 Reconfiguration of Memory for High Speed Matrix Multiplication
Ms. Shamshad Shirgeri,Ms. Pallavi Umesh Naik, Mrs. Rohini, Prof. Krishnananda Shet
1904-1908
47 A Survey on Algorithms for Cluster Head Selection in WSN
Srie Vidhya Janani. E, Ganeshkumar.P, Vasantha Suganthi.G, Sultan.M, Kaleeswaran. D
1909-1913
48 STUDY OF QUANTUM CRYPTOGRAPHY
Swapnika,Rajani bala,Kavita
1914-1917
49 Advanced Technique of Digital Watermarking based on SVD-DWT-DCT and Arnold Transform
Sangeeta Madhesiya, Shakil Ahmed
1918-1923
50 Energy Enhancement in AOMDV
Alpesh chauhan, Prof.B.V.Buddhdev
1924-1929

Volume 2 Issue 4 April-2013

S.No. Title and Authors of Paper Page.No.
1 Quantitative Code Review based on Weighted Checklist
Amol Sharma, Ajay Rana
1291-1297
2 Implementation and Comparison of Kernel and Silhouette Based Object Tracking
Mr. Joshan Athanesious J, Mr. Suresh P
1298-1303
3 Analysing Radio Wave Propagation Model for Indoor Wireless Communication
Phyo Thu Zar Tun, Aye Su Hlaing
1304-1308
4 An Efficient Geometric feature based License Plate Localization and Stop Line Violation Detection System
Waing, Dr.Nyein Aye
1309-1313
5 Segmentation of the White Matter from the Brain fMRI Images
Kaushik K.S, Rakesh Kumar K.N, Suresha D
1314-1317
6 A Survey on Prevention of Black Hole Attack in an Ad-Hoc Network
Bessy M Kuriakose, M S Annie Ramya
1318-1321
7 Improving authentication mechanism for using extended public key cryptography in mobile adhoc network
Mr.Sandip A.Kahate, Mr.Onkar V.Chandure
1322-1329
8 A Review of Soft Computing Advance in Genetics & Laser Biomedical Instrumentation
Dr.Tryambak A. Hiwarkar, Sridhar Iyer
1330-1338
9 Disambiguation of User Queries in Search Engines
Rekha Jain, Rupal Bhargava, G.N Purohit
1339-1341
10 Application of Genetic Algorithm for Image Enhancement and Segmentation
Miss. Komal R. Hole, Prof. Vijay S. Gulhane, Prof. Nitin D. Shellokar
1342-1346
11 Audio-Based Action Scene Classification Using HMM-SVM Algorithm
Khin Myo Chit, K Zin Lin
1347-1351
12 Eye Detection System using Orientation Histogram
Nwe Ni San, Nyein Aye
1352-1356
13 Ontology Evolution by Significant Analysis of Terms using WordNet for Web Services
Priya C V, Janaki Kumar
1357-1362
14 A Generalized Definition Language for Implementing the Object Based Fuzzy Class Model
Debasis Dwibedy, Dr. Laxman Sahoo, Sujoy Dutta
1363-1367
15 Monitoring And Controlling The Gas Plant By Wireless Sensor Network Using Co-operative Communication
Jyoti M. Giri,Prof. S.M. Kulkarni
1368-1373
16 Harvesting collective Images for Bi-Concept exploration
B.Nithya priya,   K .P.kaliyamurthie
1374-1382
17 Techniques for Object Recognition in Images and Multi-Object Detection
Khushboo Khurana, Reetu Awasthi
1383-1388
18 BER PERFORMANCE OF GMSK USING MATLAB
Dharma Devi, Mrs. Abhilasha Sharma
1389-1392
19 Guideline of Data Mining Technique in Healthcare Application
Mr.Swapnil D. Raut,  Prof. Avinash Wadhe
1393-1397
20 PERVASIVE AUTHENTICATION AND AUTHORIZATION INFRASTRUCTURES FOR MOBILE USERS USING PERVASIVE-PKI
Ms. Sneha R. Kaware,Prof. Karuna G. Bagde
1398-1404
21 A survey on cost effective multi-cloud storage in cloud computing
Nitesh Shrivastava, Ganesh Kumar
1405-1409
22 DATA SHARING IN THE CLOUD USING DISTRIBUTED ACCOUNTABILITY
Epuru Madhavarao, M Parimala,Chikkala JayaRaju
1410-1414
23 Blind Image De-convolution In Surveillance Systems By Genetic Programming
Miss. Shweta R. Kadu, Prof. A.D. Gawande, Prof L. K Gautam
1415-1419
24 Design of Reconfigure Virtual Channel Regulator for BiNoC Router
Mr. Ashish Khodwe , Prof. C.N. Bhoyar
1420-1427
25 Design of Differential LC and Voltage Controlled Oscillator for ISM Band Applications
Mr. Pravin Bodade, Ms. Divya Meshram
1428-1431
26 Implementation of Citation Parser on the Basis of Knowledge Base Hierarchy
Anand V. Saurkar, Prof. A.R. Itkikar
1432-1438
27 Spectrum of Cyber threats & Available Control Mechanisms
Vikram Mangla, Dr.S.N.Panda
1439-1447
28 Surface and Embedded Micro Strip Lines Characteristic Impedance and its Signal Propagation Delay Time in Optical Spectrum Transmission Regions
Ahmed Nabih Zaki Rashed
1448-1454
29 Real-Time Static Devnagri Sign Language Translation using Histogram
Jayshree R. Pansare, Kirti S. Rampurkar, Pritam L. Mahamane, Reshma J. Baravkar,Sneha V. Lanjewar
1455-1459
30 Automatic Template Extraction using Hyper Graph Technique from Heterogeneous Web Pages
D.Kanagalatchumy, Dr.S.Pushpa
1460-1466
31 A Hybrid Local Broadcast Algorithm in Wireless Ad Hoc Networks using Dynamic Approach
R.Madhanmohan, K.Parkavi
1467-1471
32 Economic Load Dispatch with Valve Point Loading Effect and Generator Ramp Rate Limits Constraint using MRPSO
Nagendra Singh, Yogendra Kumar
1472-1477
33 Remote Monitoring, Controlling and Lost Hardware Detecting through GSM
Amir Sheikh, Rahul Hendawe, Rajnish Singh, Jayashree Shiral, Anmol Rohan
1478-1482
34 IMAGE SEGMENTATION TECHNIQUES AND GENETIC ALGORITHM
Dinesh Maru, Brijesh Shah
1483-1487
35 Comparative Analysis of Various Scheduling Algorithms
Lalit Kishor, Dinesh Goyal
1488-1491
36 Design of Multilayer High Impedance Surface for Antenna Applications
Praveen Kumar Kancherla,Dr. Habibulla Khan
1492-1495
37 Co-axial Feed Rectangular Patch Antenna over High Impedance Surface
K. Praveen kumar,Dr. Hbibulla Khan
1496-1501
38 A Wide Range All Digital Feedback Duty Cycle Corrector
K. Sindhuja,C. Pandiarajan
1502-1506
39 The Efficient load balancing in the parallel computer
Mr. Sunil Kumar Pandey, Prof. Rajesh Tiwari
1507-1511
40 Mobile Cloud Computing
Miss Priyanka J.Pursani,Prof. P.L.Ramteke
1512-1517
41 Conceptual Dependency Based Requirements Clustering for Component Selection
Siba A., R. Subha, S. Palaniswami
1518-1522
42 A Low Power Asynchronous FPGA with Autonomous Fine Grain Power Gating and LEDR Encoding
N.Rajagopala krishnan, k.Sivasuparamanyan, G.Ramadoss
1523-1529
43 Traffic Management on Road using Density Aware Routing
Mr. Gadkari M. Y., Mr. Sambre N.B.
1530-1533
44 Exploring Concept Map and Its Role As Knowledge Assessment Tool (2009-2012)
Kumar R, Sarukesi K, Uma G V.
1534-1540
45 Trust in Cloud Computing
Prasad I. Bhosle, Swapnil A. Kasurkar
1541-1548
46 Improved wavelet based compression with adaptive lifting scheme using Artificial Bee Colony algorithm
R.Ramanathan,K.Kalaiarasi,D.Prabha
1549-1554
47 BlackHole Attack and Detection Method for AODV Routing Protocol in MANETs
Vipin Khandelwal,Dinesh Goyal
1555-1559
48 Extracting and Aligning the Data Using Tag Path Clustering and CTVS Method
J.KOWSALYA, K.DEEPA
1560-1564
49 Model Based Test Case Generation From Natural Language Requirements And Inconsistency, Incompleteness Detection in Natural Language Using Model-Checking Approach
NEETHU GEORGE, J.SELVAKUMAR
1565-1573
50 Modeling of Fuel Cell Electrical Supply Management System for Onboard Marine Application
K. Mercy Rosalina, K. Nirmala Kumari, N. Prema Kumar
1574-1578
51 Data Mining: Estimation of Missing Values Using Lagrange Interpolation Technique
L.Sunitha, Dr M.BalRaju, J.Sasikiran
1579-1582
52 AN OVERVIEW & ANALYSIS SAFETY PROPOSAL AND POLICIES OF INTERNET NETWORK SAFETY
Nitin Tiwari, Rajdeep singh solanki, Gajaraj singh pandya
1583-1589
53 Improvement on Multi Group-LEACH Protocol of Wireless Sensor Network
Mr. Santosh.Irappa.Shirol, Mr. Kalmesh.M.Waderhatti
1590-1595
54 Web usage mining: Review on preprocessing of web log file
Sunita sharma, Ashu bansal
1596-1600
55 A STUDY OF DIFFERENT ATTACKS IN MANET AND DISCUSSION ABOUT SOLUTIONS OF BLACK HOLE ATTACK ON AODV PROTOCOL
Er.Kiran Narang, Sonal
1601-1606
56 To improve the modularity of the software in the code smell using Aspect-Oriented Programming (AOP)
AMANPREET SINGH, NAIYA, ESH NARAYAN
1607-1613
57 Leakage Power Reduction Through Hybrid Multi-Threshold CMOS Stack Technique In Power Gating Switch
R.Divya ,J.Muralidharan
1614-1618
58 A Review of Query Image in Content Based Image Retrieval
Ms. Anchal A. Solio,Dr. Siddharth A. Ladhake
1619-1622
59 Balanced window size Allocation Mechanism for Congestion control of Transmission Control Protocol based on improved bandwidth Estimation
Dusmant Kumar Sahu, S.LaKshmiNarasimman, G.Michale
1623-1628
60 Open-Source Network Simulation Tools: An Overview
Suraj G. Gupta, Mangesh M. Ghonge, Parag D. Thakare, Dr. P. M. Jawandhiya
1629-1635
61 A Design of an Efficient, Robust, Autonomous and a well Coordinated Distributed Network Monitory System for Large Computer Networks
Quist-Aphetsi Kester
1636-1641
62 Automatic Wireless Attendance Recording and Management Using Near Field Communication (NFC)
Kumari Lavanya, Midhila NM, Eveline Blessy,B.Karthik
1642-1645
63 Review of Unmanned Aircraft System (UAS)
Suraj G. Gupta, Mangesh M. Ghonge, Dr. P. M. Jawandhiya
1646-1658
64 Sensor-Network based Intelligent Water Quality Monitoring and Control
Li Zhenan, Wang Kai, Liu Bo
1659-1662

Volume 2 Issue 3 March-2013

S.No. Title and Authors of Paper Page.No.
1 Band Pass Filters with Low Pass and High Pass Filters Integrated With Operational Amplifiers in Advanced Integrated Communication Circuits
Ahmed Nabih Zaki Rashed
861-866
3 E- Commerce impact on Indian Market: a Survey on social impact
Tryambak Hiwarkar
870-874
4 Investigation on Performance of Trust Based Model and Trust Evaluation of Reactive Routing Protocols in MANET
Dharam Vir, Dr. S.K.Agarwal, Dr.S.A.Imam
875-880
5 Improving the Efficiency of Ranked keyword Search over Cloud Data
Kiruthigapriya Sengoden, Swaraj Paul
881-883
6 Cloud Computing: An Architecture, its Security Issues & Attacks
Kalpana N. Meher, Prof. P. S. Lokhande
884-890
7 Design and VLSI Implementation of DIP Based Rod Quality Inspection
G.Rajakumar, Dr.D.Manimegalai
891-896
8 Preamplification of Signal between Satellites
Babisha.S.Sumi, K. Shanthalakshmi
897-900
9 A Survey on Data Aggregation Techniques for Wireless Sensor Networks
Kriti Saini, Parveen Kumar, Jatin Sharma
901-903
10 A Novel Approach to Scheduling in Grid Environment: Enhanced Ant Colony Optimizer
D. Maruthanayagam,Dr.R. Uma Rani
904-915
11 Prediction Based Data Collection in Wireless Sensor Network
V.Mathibala , Mrs. Seiya Susan Thomas
916-919
12 An Efficient Iris Feature Encoding and Pattern Matching for Personal Identification
T.Karthikeyan, B.Sabarigiri
920-924
13 An Efficient Sharing of Personal Health Records Using DABE in Secure Cloud Environment
T .Parameswaran, S.Vanitha, K.S.Arvind
925-932
14 A survey on AODV routing protocol for AD-HOC Network
Parveen Kumar,Jatin Sharma, Kriti saini
933-937
15 Real Time Static Hand Gesture Recognition System in Simple Background for Devanagari Number System
Jayshree R.Pansare, Sandip Kadam, Onkar Dhawade, Pradeep Chauhan
938-941
16 A Novel Role Based Cross Domain Access Control Scheme for Cloud Storage
Punithasurya K , Esther Daniel , Dr. N.A. Vasanthi
942-946
17 A Novel Role Based Cross Domain Access Control Scheme for Cloud Storage
Punithasurya K , Esther Daniel , Dr. N.A. Vasanthi
942-946
18 FGEST: FINGER TRACKING AND GESTURE RECOGNITION IN SMARTPHONES
Pratham Parikh, Shubham Gupta, Swatil Patel, Varun Nimbalkar
947-950
19 A Scalable Privacy-Preserving Verification Correctness Protocol to Identify Corrupted Data in Cloud Storage
Neethu Mariam Joseph, Esther Daniel, Vasanthi N A
951-956
20 Enhancing Data Storage Integrity in Cloud Environment by mitigating Repudiation using CS-MPNR
Meena S, Esther Daniel, Dr. N.A. Vasanthi
957-963
21 A Countermeasure for Black Hole Attack in Mobile WiMAX Networks
M. Deva Priya, Dr. M.L.Valarmathi, S. Aishwarya, K. Jaya Bharathi
964-973
22 TOSCA ENABLING CLOUD PORTABILITY
SahithiTummalapalli,RaviKanth.P,Yuvaraj.K, SreenivasVelagapudi
974-978
23 Real Time Data Acquisition and Home Parameters Monitoring using LabVIEW
Mr.Rajesh R. Karhe,Mr.C.S.Patil,Mr. Mahesh S. Patil
979-983
24 A Framework for Building Applications Based on Hidden Topics with Short and Sparse Web Documents
Kanimozhiveena E, D. Ramya Dorai
984-988
25 PSO optimized reduced order PID Controller design
Yogendra Kumar Soni, Rajesh Bhatt
989-992
26 HIGH SPEED ROUTERS RELY ON WELL DESIGNED PACKET BUFFERS
A. RAJYALAKSHMI, P. SRINIVASULU, G.PRAVALIKA, M. RAJYALAKSHMI
993-997
27 An Effective S-Box Comparison by Parity Based Fault Detection Scheme Using Composite Fields
M. Hemalatha, S. Sridevi Sathya Priya, P. Karthigaikumar
998-1001
28 Attacks & Preventions of Cognitive Radio Network-A Survey
Dr. Anubhuti Khare, Manish Saxena ,Roshan Singh Thakur , Khyati Chourasia
1002-1006
29 Fuzzy Inference System for Image Processing
Abhradita Deepak Borkar, Mithilesh Atulkar
1007-1010
30 Secured Cost Effective Group Handover Authentication Scheme For WiMAX Networks
Mohanaprasanth.P, B.Sridevi, Dr.S.Rajaram
1011-1016
31 CAN BASED REAL TIME IMPLEMENTATION IN AUTOMOBILE USING ARM
Mr. VIJAY BHAMARE, Mr. CHIRINJEEVI
1017-1020
32 Optimization of Throughput Using Multicast Routing in Wireless Mesh Networks
Akuluri Rakesh, S.R.Jino Ramson, John Major.J
1021-1025
33 Problems of character segmentation in Handwritten Text Documents written in Devnagari Script
Vneeta Rani, Pankaj Kumar
1026-1029
34 Respiratory Cancerous Cells Detection Using TRISS Model and Association Rule Mining
Ayyadurai.P, Kiruthiga.P, Valarmathi.S, Amritha.S
1030-1035
35 A New Multiplier – Accumulator Architecture based on High Accuracy Modified Booth Algorithm
J. Y. Yaswanth babu, P. Dinesh Kumar
1036-1040
36 Chunk Scheduling Strategies In Peer to Peer System-A Review
Sanu C , Deepa S S
1041-1045
37 OVERVIEW OF NIGHTTIME SOLAR CELL
H.N.Kamalaskar,Prof.P.H.Zope ,Prof.S.R.Suralkar
1046-1051
38 A Review of Web Page Ranking Algorithm
Parveen Rani
1052-1054
39 Security and QOS centric protocols for P2P networks: current state of the art
B.LALITHA
1055-1064
40 Biometrics using Electronic Voting System with Embedded Security
Alaguvel.R, Gnanavel.G,Jagadhambal.K
1065-1072
41 Multiple Event-Driven Node Localization in Wireless Sensor Networks
Martin Victor K, Mrs. K. Ramalakshmi
1073-1077
42 CONTENT BASED IMAGE RETRIVAL USING FRACTAL SIGNATURE ANALYSIS
K.KArunRaja, T.Sabhanayagam
1078-1080
43 Position based Routing Protocols for Wireless Ad hoc Networks: A Critical Survey
Saba Khalid,Shish Ahmad,Prof. Dr. Mohd Rizwan Beg
1081-1085
44 Real Time Static Hand Gesture Recognition System in Complex Background that uses Number system of Indian Sign Language
Jayshree R.Pansare, Hrushikesh Dhumal, Sanket Babar,Kiran Sonawale, Ajit Sarode
1086-1090
45 Segmentation of Handwritten Text Document- A Review
Er.Naunita
1091-1093
46 Hybrid Movement Control Algorithm For Restoring Connectivity In WSAN
Tesmy George,Priyadharshini.C
1094-1098
47 A Secured Data Transmission using Genetic based Encryption Techniques over Wireless Networks
Mrs. K. Rajasri, S. Sathiyadevi, Mrs. S. Tamilarasi
1099-1105
48 Hippocratic Database- Persisting privacy in e- banking
Minakshi Memoria, Neha Malik
1106-1108
49 AUTOMATED AUDITING AND LOGGING MECHANISM FOR SECURE DATA STORAGE IN CLOUD USING PROXY REENCRYPTION
J.Shyamala, D.Femila, B.Vinisha Cathrine Antonus
1109-1113
50 Use of Open Source Software in Engineering
Dr. Pardeep Mittal, Jatinderpal Singh
1114-1117
51 Improved Performance of Multiuser System Using Combined Diversity with Nagakami Fading Channel
Gowthami.S, Jayanthi.K, Dr.V.P.Arunachalam
1118-1121
52 PERFORMANCE ANALYSIS OF MULTICAST ROUTING PROTOCOLS IMAODV, MAODV, ODMRP AND ADMR FOR MANET
J.Gold Beulah Patturose, P.Immanuel Vinoth
1122-1127
53 Cloud Computing: Migration from Traditional Systems to the Cloud
Ganesh Olekar,Vikram Sreekumar
1128-1131
54 An Unobservable Secure Routing Protocol against Wormhole and Black hole Attacks in MANET
Annie Jesus Suganthi Rani.A, R.Mathan
1132-1138
55 A Framework renders Data integrity issue and Bandwidth allocation over in Cloud
Mrs. V. Kavitha Chandrakanth, Mrs. P. Jamuna
1139-1142
56 Technologies of Cloud Computing – Architecture Concepts based on Security and its Challenges
Nandini Mishra ,Kanchan khushwha, Ritu chasta,Er. Abhishek Choudhary
1143-1149
57 A modified Clustering algorithm based on Optimization method
J.Mercy Geraldine, P.Kiruthiga
1150-1153
58 Efficient Timeslot Assignment and Route Discovery Mechanism for Mobile Clients
Gayathri. R,T. Prabakaran
1154-1158
59 ARCHITECTURE OF 4-BIT PIPELINE ADC IN CMOS TECHNOLOGY
Ms. R. M. Shende,Prof. P. R. Gumble
1159-1165
60 Price Adjustment for Double Auction Based Scheduling in Grid Environment
Santhiya H, Karthikeyan P
1166-1169
61 Investigation of SAR inside Different Enclosures and Reduction Techniques
J.JANISH BLESSY, T.ANITA JONES MARY, Dr.C.S.RAVICHANDRAN
1170-1174
62 An Efficient Authentication and Access Control Scheme to Protect Integrity of Anonymous Networks
Santhosh S, Asst. Prof. Alok Ranjan
1175-1180
63 Efficient Road Traffic Policing With Coordinators and Routers Using Radio Frequency
Sathish Nagarajan, P Kavitha
1181-1186
64 ADAPTIVE SHARING METHOD FOR MULTIPLE CONTINUOUS QUERY
Mariat Thomas,Mr. G. Naveen Sundar
1187-1191
65 Radix-4 Encoder & PPG Block for Multiplier Architecture using GDI Technique
Ankita Dhankar, Satyajit Anand
1192-1195
66 E-Governance – A challenge for India
Dr. Pardeep Mittal, Amandeep Kaur
1196-1199
67 Green Computing – Need and Implementation
Dr. Pardeep Mittal, Navdeep Kaur
1200-1203
68 A Novel BIST based Diagnosis Technique to Detect Faults in FPGA
Ms.N.Ramya, Ms. N. Kirthika
1204-1208
69 THROUGHPUT OPTIMIZATION IN MOBILE NETWORKS USING MILP ON EB BILLING APPLICATIONS
D.KOWSALYA DEVI, G.PRABU , P.TAMILSELVAM
1209-1213
70 Study of User Experience (UX) and UX Evaluation methods
Vignesh Balasubramoniam, Niranjan Tungatkar
1214-1219
71 Review of authentication and digital signature methods in Mobile ad hoc network
Amol Bhosle, Yogadhar Pandey
1220-1224
72 Performance Analysis on Learning Algorithms with various Facial Expressions in Spiking Neural Networks
J.Lincy Kiruba, A.Diana Andrushia
1225-1228
73 Improving ontology and precision recall using ontology model, genetic, greedy algorithm semantic similarity calculation and ontology graph
K.Srihari,Dr. V.P.Arunachalam,Dr. S Karthik
1229-1252
74 Ontology construction and query indexing technique to improve query indexing time, precision and number of good pages visited
K.Srihari,Dr. V.P.Arunachalam,Dr. S Karthik
1253-1269
75 A Survey – Performance based Routing Protocols in Wireless Ad-hoc Networks Environment
Pratibha Sahu, Navdeep Kaur Saluja, Ragini Sen
1270-1279
76 Comparison of Optimization Techniques for Mutual Information based Real Time Image Registration
Renu Maria Mathews, D. Raveena Judie Dolly, Ann Therese Francy
1280-1284
77 Design of Least Complex S-Box and its Fault Detection for Robust AES Algorithm
G. Alisha Evangeline, S. Krithiga, J. Jesu Mejula
1285-1290

Volume 2 Issue 2 February-2013

S.No. Title and Authors of Paper Page.No.
1 A Review on Energy Efficient Modulation and Coding Techniques for Clustered Wireless Sensor Networks
M. Sheik Dawood,R. Aiswaryalakshmi, R Abdul Sikkandhar,G. Athisha
319-322
2 A Combined Approach to Part-of-Speech Tagging Using Features Extraction and Hidden Markov Model
Bhairab Sarma,Prajadhip Sinha,Dr. Bipul Shyam Purkayastha
323-329
3 Trends in High Performance Operation of Electro Absorption Integrated Laser Modulators in Advanced Optical Switching Transmission Networks
Ahmed Nabih Zaki Rashed
330-336
4 A Review on Concurrency Fault Detection Techniques
C. Revathi, M. Mythily
337-341
5 DOCUMENT FAXING THROUGH MOBICLOUD USING ANDROID
Swapnali Gharat , Prajakta Rajput, Jayashree Patil, Snehal Sonavane
342-346
6 Energy Renewal Approach in Wireless Sensor Networks
G.Lilly Evangeline,G.Josemin Bala
347-351
7 A New Optimization Method for Dynamic Travelling Salesman Problem with Hybrid Ant Colony Optimization Algorithm and Particle Swarm Optimization
Farhad Soleimanian Gharehchopogh, Isa Maleki, Seyyed Reza Khaze
352-358
8 Survey on Ant Colony Algorithm
Sony V Johny, Sakhi S Anand
359-361
9 Survey on Routing in Multihop Wireless Networks Using Micropayment Schemes
Presty Kasmir, Sakhi S Anand
362-364
10 A Survey on Image Mosaicing Techniques
Hemlata Joshi,Mr.KhomLal Sinha
365-369
11 UseofJMEforStudentInformationAcquisition
Rohini Misal, Varsha Rathi, Zimil Patel,Prof. Nikita J Kulkarni
370-373
12 A New Proposed Technique to Prevent NAV attack in MACA Protocol
Vivek Pathak, Ambrish Gangal
374-378
13 Identifying the Quality of Object Oriented Software System using Modularization Approach
Ms. Pragati D. Chowhan, Prof. S. S. Dhande
379-382
14 NOVEL REMOTE RENDERING AND MONITORING ON PERSISTENT MOBILE CLOUD
R. Baskarane, R. Vijayalakshmi
383-386
15 A Review on Otsu Image Segmentation Algorithm
Miss Hetal J. Vala, Prof. Astha Baxi
387-389
16 A Comparative Study On Some New Steganographic Techniques
H. Faheem Ahmed, U. Rizwan
390-398
17 Image segmentation based on kernel fuzzy C means clustering using edge detection method on noisy images
Saritha A K,Ameera P.M
399-406
18 A New Algorithm For The Detection and Removal Of Impulse Noise Using Cellular Automata
Christylda Angelin Hannah .J, Natheldha Mary Navina .S
407-411
19 Data-warehousing on Cloud Computing
Hemlata Verma
411-416
20 Percentage Based Trust Model with Bandwidth Reservation Technique for Privacy Preserving Routing in MANETs
Raghu. R, Gopinathan. B
417-423
21 Grid Based Multiple Features Based On Image Mosaicing
Richa Shukla, Rohit Raja
424-427
22 Secure Secret Key (SSK) Generation Algorithm for Multimedia Multicast Networks
Sathya S,Ajay Kumar
428-433
23 Routing Issues for Trust Based Framework in Mobile Ad Hoc Networks
Mukesh Kumar Garg, Dr. Ela Kumar
434-435
24 Web Text Classification Using Genetic Algorithm and a Dynamic Neural Network Model
Revathi N, Anjana Peter, Prof.S.J.K.Jagadeesh Kumar
436-442
25 Efficient Broadcast Algorithms To Reduce number of transmission Based on Probability Scheme
S.Tharani, R.Santhosh
443-447
26 Security and Privacy in Emerging Wireless Networks with Mobile Sinks
S.Rajeshwari, R.Santhosh
448-451
27 Combating Sybil Attacks using SybilGuard
Abhijeet B. Potey,Prof.Anjali B.Raut
452-455
28 DISCRIMINATION OF HEART RATE VARIABILITY USING DECISION TREES AND MLP NETWORKS
Gomathi.S, Mohan Raj.T, Saranya Sri.R
456-461
29 Correlation Preserved Indexing Based Approach For Document Clustering
Meena.S.U, P.Parthasarathi
462-470
30 MEDICAL IMAGING FOR THE SEGMENTATION OF ABDOMINAL ORGANS USING PARALLELIZATION AND ORIENTED ACTIVE APPEARANCE MODELS
Brahmya Joseph, P.Madhavan
471-476
31 Survey on Data Sharing and Re-Encryption in Cloud
Renjith P , Sabitha S
477-480
32 An Efficient Face Recognition under Varying Image Conditions
C.Kanimozhi,V.Nirmala
481-485
33 Link Stability and Energy Optimization by Excluding Self node for Mobile and Wireless Networks
T .Parameswaran, K. Thamarai Selvi, Mani Deepak Choudhry
486-492
34 A Study of Decision Support System (With reference to Indian Retail Industry)
Dr. Mini Amit Arrawatia, Mr. Pankaj Meel
493-498
35 E-Commerce Applications: Vulnerabilities, Attacks and Countermeasures
P. S. Lokhande ,B. B. Meshram
499-509
36 A cost effective Online Examinations model using server virtualization with virtual machine clusters
Balaji Kandregula
510-513
37 Review on an Underwater Acoustic Networks
Amanpreet Singh Mann, Reena Aggarwal
514-518
38 A Survey on Different Fingerprint Recognition Systems
Mr Parth BPathak,Prof Mrs A G Andurkar
519-523
39 DVS Scheduling in Multi Core Real Time System
X.JUDE ROY JEYASEELAN
524-529
40 Query Optimization: Finding the Optimal Execution Strategy
Vinod S.Gangwani,Prof.P.L.Ramteke
530-533
41 Fast distribution of Data in Wireless Sensor Network using Concurrency Operation
Geetha N, Janani V
534-538
42 REVIEW OF PASSWORD PROTECTING MECHANISM
Ms.K.Banu priya, Dr.P.Venkateswari
539-545
43 Concert augmentation in Cognitive Radio System with OFDM and Beamforming technique for Data communication
A. Suban, K.Mangayarkarasi
546-550
44 Improving P2P Performance by Applying Proper Replica Placement Strategies
Thara R J, Kala Karun A, Shine S
551-554
45 Interference Mitigation in LTE- Advanced MU-MIMO through Beamforming Technique
A.Suban , V. S. Priyanka , S. Atchaya
555-558
46 Performance Enhancement of Data Communication through Visible Light Communication Using On Off Keying
Prabu.P,Manikandan.R, Pradeep.M
559-563
47 Enhanced audit services for the correctness of outsourced data in cloud storage
V.Venkatesh, P.Parthasarathi
564-567
48 5G Mobile Technology
Ms. Reshma S. Sapakal,Ms. Sonali S. Kadam
568-571
49 Android Application to get Word Meaning through Voice
Miss. Priyanka V. Mhamunkar, Mr. Krishna S. Bansode, Prof. Laxman S. Naik
572-575
50 Review on Data Dissemination over Wireless Sensor Networks
Madhu Rani, Arvind kumar
576-581
51 Selfishness of Discriminate Node in Caching Based Wireless Sensor Network
Poonam Bisht, Arvind kumar
582-586
52 AOMDV with improved Energy Function
Alpesh chauhan,Prof.B.V.Buddhdev
587-591
53 Dynamic Pattern Matching: Efficient Pattern Matching using Data Preprocessing with help of One time look indexing method
S.Hrushikesava Raju,Dr. T. Swarna Latha
592-599
54 Privacy Requirement Engineering Based on Modified Evidence Combination Approach
Nithya V. P., R. Subha
600-605
55 A Survey on Various Median Filtering Techniques for Removal of Impulse Noise from Digital Images
Ms. Rohini R. Varade, Prof. M. R. Dhotre, Ms. Archana B. Pahurkar
606-609
56 A Survey on Migration of Task between Cloud and Mobile Device
Mrs. Minal Zaa,Prof.J.P.Gabhane,Prof.A.V.Dehankar
610-613
57 TOP K ANSWERS FOR KEYWORD QUERIES USING INDEXES
Sharmili C, Rexie J. A. M
614-618
58 NEURAL NETWORK BASED MATCHING APPROACH FOR IRIS RECOGNITION
Anjana Peter, Revathi N, Ms. Merlin Mercy
618-623
59 Position-based Opportunistic Routing for Highly Dynamic MANETS
S.Sharon Ranjini,G.ShineLet
624-627
60 The Content Summarization system
A.Pearline Divya, S.Leela
628-635
61 Design of Dynamic Error Handling Tool
Komal R. Patel, Harshita C. Kanani
636-638
62 An Intercluster-Chaining Protocol with Neighbour Node for Energy Efficient Data Collection in Wireless Sensor Networks
M.Govindarajan, P.Balamurugan
639-646
63 Design of RC5 Algorithm using Pipelined Architecture
R.Sanju Abraham, A.Arun
647-651
64 Security Issues with Possible Solutions in Cloud Computing-A Survey
Abhinay B.Angadi, Akshata B.Angadi, Karuna C.Gull
652-661
65 Cloud based Intra-College Communication Information System using Mobile Clients
Swapnil S. Bangare, Atul S. Mhaske, Sagar A. Sune, Harshal D. Pranjale
662-665
66 Design of a Cost Effective and environment friendly Off-Grid Wind-Diesel Hybrid Power System in Kutubdia Island of Bangladesh
Sham Datto,Md. Harun OrRoshid, MafinMuntasir Rahman
666-669
67 Stochastic Based Optimal Resource Provisioning in Cloud Computing
P. Arun pandian, S. Anto
670-675
68 Interpreting Inference Engine for Semantic Web
MS. PRIYANKA PATEL, MS. PRIYANKA TRIKHA
676-678
69 Detection of Colluding Collision and Identity Delegation Attacks in Wireless Ad Hoc Networks via SADEC
Angel Mary Alex, M. Ashwin
679-683
70 Cluster Based Energy Efficient Sensory Data Collection With Mobile Sink
G. Sunil, Mrs. D. Jasmine David
684-687
71 Pre Layout And Post Layout Analysis Of Parallel Counter Architecture Based On State Look-Ahead Logic
Ulala N Ch Mouli Yadav, J.Samson Immanuel
688-693
72 A Design of Ultra Low Power and High Speed 64 Bit Error Tolerant Adder for MAC
R.Arun Kumar, D.AbrahamChandy
694-697
73 EFFICIENT LOCALIZED DEPLOYMENT ALGORITHM WITH BALANCED ENERGY CONSUMPTION IN WIRELESS SENSOR NETWORKS
Shamily C., P. Anitha Christy Angelin
698-702
74 DISTANCE BASED RANGE QUERIES
Josepin Dayana T, J. A. M Rexie
703-706
75 Analysis of local and global techniques for disparity map generation in stereo vision
Vrushali Baxi, Ms. Priyanka Tirkha, Bilav I. Prajapati
707-710
76 A Survey on the different text data compression techniques
Rajinder Kaur, Mrs. Monica Goyal
711-714
77 A Review of a Goal Directed Visual Perception System using Object based Top down Attention
Aniket D. Pathak, Priti Subramanium
715-718
78 Determination of optimum coefficients of IIR Digital Butterworth Band-Stop Filter
Subhadeep Chakraborty, Abhirup Patra
719-725
79 DIVERSITY IMPROVEMENT IN RECOMMENDER SYSTEM
Antony Taurshia.A,S.Deepa Kanmani
726-728
80 Design of Wireless Monitor System Based On S3C2440 and GPRS
CH.SREEDHAR, SRIDHAR.V,G.NAGENDRA,M.ZUBAIR
729-738
81 QARS for Self Reconfiguration Mechanism in Wireless Mesh Networks
A.Melveena, D.Ramya Dorai
739-743
82 RANKING ADAPTATION SVM FOR TARGET DOMAIN SEARCH
M.S.Gayathri, S.Leela
744-749
83 A Survey on Routing Protocol for Wireless Sensor Network
Sitender Kumar, Arvind Kumar, Rohit kumar vishwkarma
750-755
84 A Survey on Energy-Efficient protocol for Wireless Sensor Networks
Rohit kumar vishwkarma, Arvind kumar, Sitender arora
756-760
85 A Three-Layer Architecture based Approach for Data Access Layer in the Information Systems Production
Farhad Soleimanian Gharehchopogh, Esmail Amini, Behnam Zebardast
761-766
86 Simulation and evaluation of convolution encoder for different noisy channel over wireless communication network in CDMA environment
Jai Kumar,Anita Suman
767-772
87 A Survey on Preserving Privacy towards Location Proof
Senthilguru S, Blessed prince P
773-776
88 Energy-Aware Duty Cycle Scheduling for Efficient Data Collection in Wireless Sensor Networks
Jerrin T John, S. R. Jino Ramson
777-783
89 Plant Recognition through Leaf Features Mapping
Ms. Pushpinder Kaur, Ms. Janhavi Mane, Ms Sonali Sawant
784-786
90 Data mining with Improved and efficient mechanism to detect the Vulnerabilities using intrusion detection system
Awan Dhawan
787-791
91 An Enhanced and efficient mechanism to detect Sybil attack in Wireless Sensor Networks
Heena Sharma, Awan Dhawan
792-796
92 Highly Secure Distributed Authentication and Intrusion Detection with DataFusion in MANET
S.Jeyashree
797-801
93 Wavelet Based Classification of Multispectral Satellite Image Using Fuzzy Incorporated Hierarchical Clustering With SVM Classifier
S.Sindhu, Dr.S.Vasuki
802-807
94 Identification of diabetic retinopathy stages in human retinal image
A.Alaimahal, Dr.S.Vasuki
808-811
95 Non-Stationary Power Quality Signals Classification using Fuzzy C-means Algorithm
M.Venkata Subbarao, N.Sayedu.Khasim,Jagadeesh Thati, M.H.H.Sastry
812-816
96 Low and mid-level features for target detection in satellite images
Rajani.D.C
817-825
97 Performance analysis of Meandered loop and Top loaded monopole antenna for Wireless Applications
M. Ilakkia, T. Anita Jones Mary, Dr. C. S. Ravichandran
826-830
98 Study of Wireless Optical CDMA LAN in Indoor Environment
R.KANMANI, K. SANKARANARAYANAN
831-838
99 Power Optimized MAC Protocol in Ad-Hoc Network’s
Rahul Mukherjee
839-847
100 A cryptographic Image Encryption technique based on the RGB PIXEL shuffling
Quist-Aphetsi Kester
848-854
101 AUTOMATIC IMAGE ANNOTATION USING WEAKLY SUPERVISED GRAPH PROPAGATION
Kalaivani.R,Thamaraiselvi.K
855-860

Volume 2 Issue 1 January-2013

S.No. Title and Authors of Paper Page.No.
1 Automated Intelligent Wireless Drip Irrigation Using Linear Programming
Manish Giri,Dnyaneshwar Natha Wavhal
001-005
2 An effective Golden Section Search Approach based Distribution Load Flow
Naveen Jain, Jai Kumar Maherchandani
006-010
3 Review of methods for secret sharing in cloud computing
Dnyaneshwar Supe, Amit Srivastav, Dr. Rajesh S. Prasad
011-017
4 DIFFERENTIATION OF TERM AND PRETERM DELIVERY GROUPS BY EHG SIGNAL ANALYSIS
Dhananjay Kumar, Kumar Gaurav Shankar, Praveen Kumar
018-020
5 Some New Steganographic Techniques using Spatial Resolution Reduction
H. Faheem Ahmed, U. Rizwan
021-026
6 Performance Comparison of ACO Algorithms for MANETs
Jubin Sebastian E
027-032
7 A Survey of Metastability Errors in CMOS Digital Circuits
Manisha Thakur, Puran Gaur, Braj Bihari soni
033-036
8 Fault identification and diagnosis using greedy Back Tracking approach in large-scale network
U.Sridhar, Dr.G.Gunasekaran
037-041
9 Optimized Surveillance Solution for Unattended Baggage Recognition
R.Karthikeyan, P.Mahalakshmi, N.GowriShankar
042-046
10 UNMANNED MULTI-FUNCTIONAL ROBOT USING ZIGBEE ADOPTER NETWORK FOR DEFENSE APPLICATION
Premkumar .M
047-055
11 On Fault Tolerance of Resources in Grid Environment
Minakshi Memoria, Mukesh Yadav
056-063
12 Reducing Routing Overhead For Multimedia Traffic in Manet Using Rebroadcast Probability
Sivakumar.P, Sivaranjani.R, Srilakshmi.G, Subashini.R
064-070
13 Electronic Mail Security
Dr. Ajit Singh, Meenakshi Gahlawat
071-076
15 A REVIEW ON OPTIMIZATION OF ENERGY BY USING PWM INVERTER
Mr. Ravindra Patil,Prof. M.H. Nerkar, Mr. Prashant Chaudhari
082-085
16 A REVIEW ON HAND GETSURE RECOGNITION SYSTEMS
Mr. Prashant Chaudhari,Prof. G. R. Phulay,Mr. Ravindra Patil
086-090
17 DATA STORAGE SECURITY IN CLOUD BY USING JAR FILES AND HIERARCHICAL ID-BASED CRYPTOGRAPHY
Ms R.PUNITHA,Mr.D.VIJAYBABU
091-096
18 A SURVEY ON SECURED WATERMARKING TECHNIQUES FOR JPEG IMAGES ON COMPRESSED-ENCRYPTED DOMAIN
Aparna Soni, Deepty Dubey
097-101
19 Feature Based Image Sequence Retargeting in the Uncompressed Video Domain
Kavitha. S
102-106
20 DDS architecture for digital frequency generation
Ms. Shruti S.Desai, Prof. A.S.Joshi
107-111
21 A Comparative Study of Fuzzy & Genetic Power System Stabilizers and Role of Static Voltage Compensation on Power System stability
Naveen Jain, Jai Kumar Maherchandani
112-115
22 ANALYZING AND EXTRACTING SOCIALMINING TRENDS THROUGH WEB OPINION DEVELOPMENTS VIA DENSITY BASED CLUSTERING
Jeswin Roy Dcouth, MohanRaj.T
116-122
23 Survey on Data Integrity in Cloud Computing
Reenu Sara George, Sabitha S
123-125
24 Integrating Heterogeneous Data Sources Using XML
Yogesh R.Rochlani , Prof. A.R. Itkikar
126-130
25 Cryptography Using Quantum Key Distribution in Wireless Networks
Srinivasa Rao Katakam,M.S.R.Lakshmi Reddy
131-135
26 My College Finder – An Android based application
Ankit Karandikar, Sameer Kalantre, Ajinkya Kohok, Deepak Ingale, Mrs. Rutuja Kulkarni
136-138
27 Health-On-The-Move based on ANDROID Operating System
Rutuja Kulkarni,Ankita Deshmukh, Manjiri Shivankar,Prajakta Gore,Tanmay Patil
139-141
28 A SURVEY ON ENHANCED APPROACH FOR CATEGORICAL LINK BASED CLUSTERING
C.M.Geetha, K.Sangeetha ,Dr S.Karthik
142-144
29 A Survey of Performance based Secure Routing Protocols in MANET
Hariom Soni,Preeti Verma
145-154
30 Survey on Live VM Migration Techniques
Anju Mohan, Shine S
155-157
31 Performance Study of Different Medical Images Based on Morphology in Noisy Environment
V. Kalpana,V. Vijaya kishore
158-168
32 Energy Ef ficient and Reliable Communication in Underwater Acoustic Sensor Networks
S.Beeno Ancy, S.Shahul Hammed
169-173
33 An Approach for Storage Security in Cloud Computing- A Survey
W. Sharon Inbarani, G. Shenbaga Moorthy, C. Kumar Charlie Paul
174-179
35 A Modified Linear Approximation Transform for Medical Image Compression
K.Shiby Angel, D.Sujitha Juliet, S.Saravanan
183-187
36 STUDY OF VARIOUS ISSUES IN VOICE TRANSLATION
Aakash Nayak, Santosh Khule, Anand More, Avinash Yalgonde,Dr. Rajesh S. Prasad
188-191
37 DETECTION OF NODE CAPTURE ATTACKS IN WIRELESS SENSOR NETWORKS
S.Pavaimalar, G.ShenbagaMoorthy
192-196
38 Integration of Sound Signature and Graphical Password Authentication System
Suyog S. Nischal, Sachin Gaikwad, Kunal Singh, Prof. A. Devare
197-199
39 Modelling and Controller Design of Inverted Pendulum
Mr.Pankaj Kumar,Mr. KunalChakraborty,Mr. RabiRanjan Mukherjee,Mr.SuvobratraMukherjee
200-206
40 An efficient technique for maximization of network lifetime & minimization of delay for the performance enhancement of WSN
Priyanka M. Lokhande, Prof. A.P.Thakare
207-213
41 A Modified Stochastic Location Update Scheme In Mobile Ad-hoc Networks
Rosemary. P.J., Aneesh M Haneef
214-217
42 Data Mining in Clinical Decision Support Systems for Diagnosis, Prediction and Treatment of Heart Disease
Syed Umar Amin, Kavita Agarwal, Dr. Rizwan Beg
218-223
43 Image Steganography
Rahul Joshi,Lokesh Gagnani, Salony Pandey
224-227
44 Image Steganography With LSB
Rahul Joshi,Lokesh Gagnani, Salony Pandey
228-229
45 VirtuaGuard: Intrusion Detection System on Static and Dynamic Web Applications
AJINKYA NIKAM, BHIM BIRADAR, SAGAR DHERE, PRAHSANT SONAWANE,Prof .Ruta Kulkarni
230-232
46 MSNN based techniques for Face and Eye Recognition
Ramit Lala, Alok Kumar Singh
233-237
47 Survey on Certain Algorithms Computing Best Possible Routes for Transportation Enquiry Services
Neha Choubey,Mr. Bhupesh Kr. Gupta
238-242
48 ARM Based Fruit Grading and Management System Using Image Processing
Manoj B. Avhad, Satish M. Turkane
243-248
49 A Comprehensive Study of Data Mining and Application
Dheeraj Agrawal
249-252
50 Review of Real Time Two Phase Navigation System for Interactive Path Finding and Tracking Approach for Assisting Visually Impaired People
Sanjay M.Malode, Dr. S.K.Shriwastava
253-255
51 A Latest Method for Improving Resolution in Three Dimension Imaging Light Detection and Ranging
R. Sugunadevi, K. Shanthalakshmi
256-262
52 Frame Differencing with Simulink model for Moving Object Detection
Himanshu Goyal
263-266
53 Design of Colour and Texture Based Relevant Image Search Engine
S.Meenachi Sundaresan , Dr. K.G.Srinivasagan
267-272
54 Maximizing The Lifetime Of Wireless Sensor Node
SANGEETHA KAILAIMANI
273-281
55 A Comparative based study of Different Video-Shot Boundary Detection algorithms
Mr. Ravi Mishra, Dr. S. K. Singhai, Dr. Monisha Sharma
282-289
56 Review of Cloud Computing and Its Application
Sagar B.Jadhav, Dr. Rajesh Prasad,Shantanu S.Panhale, Chetan S. Mohture
290-292
57 Optimization of Searches on Social Networks using Graph theory and Formal Concepts Analysis
Quist-Aphetsi Kester
293-303
58 A Survey on Recent Trends in Cloud Computing and its Application for

Multimedia
M. Ramya Catherine, E.Bijolin Edwin

304-309
59 Challenges in the Cloud Application Development
B.J.D Kalyani
310-313
60 Implementation of MKD-WebServer Rating Application for Analysis of Web performance through SSL
Veereshkumar M Kolli, Vinaykumar M Kolli, Vaishakh B
314-318