Volume 3 Issue 9 September 2014

Vol 3 Issue 9 September 2014

S.No. Title and Authors of Paper Page.No.
1 Image Multi-Thresholding By Combining The Lattice Boltzmann Method and Level Set Method Of Active Contour for Image Segmentation Using Fuzzy Clustering
Narahari Anudeep Reddy, Polala Narsimulu, M.Raju
2917-2923
2 ENERGY AND TRANSMISSION RATE AWARE TIMESERVING ROUTING IN WIRELESS SENSOR NETWORK
Mrs.N.Kanthimathi
2924-2929
3 Improve Optical Character Recognition Using Templates & Correlation
Sukhpreet Singh
2930-2935
4 Concurrent Fault Detection for Orthogonal Latin Quadrangle Encoders and Condition Computation
M.Sravani, P.Praveen kumar
2936-2940
5 Data Integrity Proof for Cloud Storage
Haritha Nuthi, Hemalatha Goli, Ramakrishna Mathe
2941-2944
6 Anti Smuggling System for Trees in Forest using Flex Sensor and Zigbee
Narhari R. Kotkar
2945-2948
7 Harmonic-Aware Scheduling For Fixed-Priority Real-Time Systems
Miss. Ashwini G. Ingale
2949-2953
8 ADOMIAN’S DECOMPOSITION METHOD FOR SOLVING ANHARMONIC OSCILLATOR SYSTEMS
MANJAK N.H., MISHRA A.K, RAKIYA M.K.A
2954-2956
9 An Energy Efficient Multi-sink Clustering Based Weighted Rendezvous Planning Method for Wireless Sensor Networks
S.Sujatha,G.Mohan
2957-2960
10 Analyzing the performance of Routing Protocols for Multicasting and Group Communication in Mobile Ad-hoc Network
Neha Gandotra, Dr.Rajesh Singh
2961-2966
11 A Survey on Co-existence Mechanisms in WLAN and WPAN Devices
Ms.R.Saranya, Dr.R.Pugazendi
2967-2972
12 A Survey on Efficient Handover Procedure in Proxy Mobile Ipv6 Networks
Ms.V.Anitha, Dr.R.Pugazendi
2973-2978
13 A Novel Technique to Improve the Performance of Wireless Sensor Network using Adaptive Antennas and High-Altitude Platform
Yasser Albagory, Mostafa Nofal, Omar Said
2979-2984
14 SVM Based Classification Technique for Color Image Retrieval
Mrs. Asmita Patil, Prof. Mrs. Apara Shide, Dr. Mrs. P. Malathi
2985-2989
15 Survey on WiMAX Technology and its protocol-A review
Amit Bhambri, Naveen Kansal
2990-2993
16 Energy Sucker Identifier and Energy Maximization in Wireless Networks
Kirthika.K, Mr.B.Loganathan
2994-2999
17 Sequential feedback from user session for finding effective personalized user search
SENTHAMARAI SELVI.M, Dr.A. MARIMUTHU
3000-3006
18 Analytical Comparison of DCT and LSB in Digital Watermarking
Anupam, Jyoti Rani
3007-3011
19 Power Management in TDM PON using Fuzzy
Akanksha Vyas,Vandana Dubey
3012-3015
20 Sketch Based Image Retrieval System
Ms. Asmita A. Desai , Prof. Mrs. Aparna S. Shinde , Dr. Mrs. P. Malathi
3016-3020
21 Performance Evaluation of WiMAX Network under Various Modulation techniques using various versions of TCP
Amit Bhambri, Naveen Kansal
3021-3024
22 k-TIER AND SELECTIVE BACKFILLING APPROACH FOR PARALLEL WORKLOAD SCHEDULING IN CLOUD
Shahabanath K K, Sreekesh Namboodiri T
3025-3030
23 Capacity & Performance Comparison of SISO and MIMO System for Next Generation Network (NGN)
Nimay Ch. Giri, Anwesha Sahoo, J. R. Swain, P. Kumar, A. Nayak, P. Debogoswami
3031-3035
24 Performance Metric Comparison of Routing Protocols in Ad Hoc Wireless Multi-Hop Networks Using NS2
Maahi Amit Khemchandani, Prof. B.W. Balkhande
3036-3040
25 Reducing Decryption Time of NTLM Hash Using Rainbow Tables
Priya Sharma,Asst. Prof. Gurdev Singh
3041-3046
26 Analysis of Sidelobe Level and Beamwidth of Uniform Concentric Circular Arrays Utilizing Kaiser Amplitude Weighting
Y. A. Albagory
3047-3052
27 A New Clustering Validity Index for Fuzzy C Means Algorithm Based on Measure Of Disparity
ADEKUNLE Y.A, ALAO O.D , EBIESUWA SEUN , SARUMI JERRY, AINAM JEAN-PAUL
3053-3061
28 Comparative study of Data Mining Approaches for Parkinson’s Diseases
Dr.Hari Ganesh S, Gracy Annamary S
3062-3068
29 Comparative study of Data Mining Approaches for blood platelet transfusion
Dr.Hari Ganesh S, Vanitha. K
3069-3074
30 PALMPRINT AUTHENTICATION BASED ON GABOR WAVELET USING SLIDING WINDOW APPROACH
Sadiya Thazeen, Feroz Morab, Mohammed Najmus Saqhib, Seema Morab
3075-3081
31 Visual Cryptography for Color Images Using Jarvis Halftone Method
Bharati Pannyagol
3082-3085
32 Detection From Fingerprint Images A Critical Section To Analyze the State Of the Art and the Related Open Issues
Asst. Prof. M. Sreenivas, Mr. Shimpi Jaiprakash Bhika
3086-3089
33 EFFICIENT ROUTE SELECTION ALGORITHM DESIGN FOR INDUSTRIAL SENSOR NETWORKS
Dr. N.SUDHA BHUVANESWARI,S.BANU PRIYA
3090-3097
34 AN INEXPENSIVE SECURITY AUTHENTICATION SYSTEM BASED ON A NOVEL FACE-RECOGNITION STRUCTURE
B.Harini,S.Kalyan
3098-3101
35 Cyber-Physical Systems Security: To Improve Independent Computing Capabilities of reliable Platforms and Tools
P.SalmanRaju,Dr. M. Rama Bai,T. Ashok
3102-3110
36 CLASSIFICATION OF NORMAL AND ABNORMAL RETINAL IMAGES USING NEURAL NETWORKS
K.A.Nithya,Mrs.Aruchamy Rajini
3111-3115
37 Histogram Based Block Classification Scheme of Compound Images: A Hybrid Extension
Professor S Kumar
3116-3120
38 Full Custom Design of Low Power 8-bit Magnitude Comparator With Small Transistor Count by Static Cmos
D.Pavana kumari,K.V.Ramana rao,Bhaskara Rao Doddi
3121-3125
39 DESIGN OF IMPROVED MAJORITY LOGIC FAULT DETECTOR/ CORRECTOR BASED ON EUCLIDEAN GEOMETRY LOW DENSITY PARITY CHECK (EG-LDPC)CODES
A.JAYASREE, P. DHANEEF KUMAR
3126-3131
40 Edge Detection in Image corrupted by Gaussian Noise Using Ant Colony Optimization
Vaibhav Ranjan, Avneesh Pandey, Prakash Chandra Joshi
3132-3137
41 Rotation, Scale and Font Invariant Character Recognition System using Neural Networks
Nitin Khosla, Dr.Sheifali Gupta
3138-3142
42 Designing and simulation a motion control system of mobile robot based on fuzzy logic
Tsmots Ivan, Vavruk Iryna, Tkachenko Roman, Teslyuk Vasyl
3143-3147
44 STREAMING ALGORITHM FOR SEAMLESS VIDEO SHARING OVER CLOUD
C. Saravanan,E.Nisha
3158-3162
45 Quality-improved gray Scale image using pseudo-randomized visual cryptography algorithum with sigmoid function
Santosh kumar, Prof. Sini Shibu
3163-3177
46 Image Compression and Filtering Operation Analysis using Integer Wavelet Transform
Pallavi Pooja, Tilak mukherjee, Kanak Kumar
3178-3181
47 Confidentiality and Anonymity Strengthening To Prevent Intruders in Network
Ms.NulynPunitha J, Ms.Usharani S
3182-3185
48 Parking Navigation For Multiple Parking System
Prof.Gayatri Bhandari,Mrinal Bari, Shweta Borse, Ashwini Gaikwad, Reshma Kadam
3186-3189
49 TECHNOLOGY DEVELOPMENT OF MODULE TEXT
B.Sivaranjani,S.Meena Selvaraj
3190-3198
50 A Novel Approach to Enhanced Security in Public Cloud: Using LDAP Protocol
ShikhaNema , Prof.Shailendra Singh Raghuwanshi
3199-3204
51 PALLIATING ENERGY DIMINUTION ATTACKS IN WSN
N.Srija, K.Deepika
3205-3207
52 ANDROID MOBILE BASED HOME AUTOMATION USING BLUETOOTH
D.Jaya Sree, M.Jhansi Lakshmi
3208-3215
53 SECURITY IN MOBILE AD HOC NETWORKS
A.Ajay Chary, M.Jhansi Lakshmi
3216-3221
54 Risk-Aware Mitigation for MANET Routing Attacks
M.HIMAGIRESHWAR RAO, G.KIRAN KUMAR
3222-3231
55 DESIGN AND IMPLEMENTION OF WORK PLANNER
A.Sravani, M.Jhansi Lakshmi
3232-3246
56 OPTIMAL SOLUTION FOR SHORTEST PATH PROBLEM USING HEURISTIC SEARCH TECHNIQUE
Mr. Girish P Potdar, Dr. R C Thool
3247-3256
57 DETECTION TECHNIQUE FOR IMAGE FORGERY FROM GLOBAL AND LOCAL FEATURES USING HASHES
K.Hemalatha, M.Anitha, N.Pushpalatha
3257-3261
58 Enhancement of old images by hybrid binarization method
Mrs.Preeti.Kale, Dr.S.T.Gandhe
3262-3264
59 Packet Flow Analysis and Jitter Base Comparison of AODV,DSDV and AntHocNet Routing Algorithm
N.S.Labhade, Asst.Prof.S.S.Vasekar
3265-3278
61 Performance of BER in MIMO-OFDM System
Roshni Gulwani,Himani Agrawal
3283-3286
62 Refactoring Framework for Instance Code Smell Detection
D. Raj Kumar, G.M. Chanakya
3287-3292
63 Compatibility Issues and Challenges in 802.11g Implementation: A Review
ArunUniyal,Vishwanath Bijalwan,Jitendra Singh Rauthan
3293-3296
65 Efficient Natural Language Query interface to databases
B.SUJATHA, Dr.S.Vishwanatha Raju, S.Nagaprasad
3300-3308