Volume 2 Issue 3 – June 2013

Volume 2 Issue 3 – June 2013

1.

Secure Routing in Multicast Routing Protocol for Manet’s

Amandeep chhabra, Geeta Arora

Download PDF
2.

Survey on segmentation of medical images based on low level features

Amita Sharda, Gagan Jindal

Download PDF
3.

Multi Objective Based BBO for Optimal Placement of TCSC in Transmission Lines

Asha Deepthi Vijay, Rinku Scaria

Download PDF
4.

Selection and Sizing of Orifice Area of Pressure Relief Valve

B.J.Patil, Dr. V. B. Sondur

Download PDF
5.

Comparison Of Asymmetrical Cascaded Multilevel Inverter Control Techniques

Dr. Hina Chandwani, Himanshu N Chaudhari, Dhaval Patel

Download PDF
6.

Improved Security for Attacks in MANET using AODV

Dadaso Mane, Deepali Gothwal

Download PDF
7.

An Enhancement of Medical Images using Classical Unsharp Mask Filter and Log Gabor Filter

Gurpreet Kaur, Gagan Jindal

Download PDF
8.

Affective Music Video Content Retrieval Features Based on Songs

R.Hemalatha, A.Anbumani

Download PDF
9.

An Automated Performance Tuning Scheduling Framework for Computational Jobs in Desktop Grid

K Hemant Kumar Reddy, Diptendu Sinha Roy, Manas Ranjan Patra

Download PDF
10.

A Review on Routing Protocols in Wireless Sensor Networks

S.Kalaiarasi

Download PDF
11.

Review Paper on PSO in workflow scheduling and Cloud Model enhancing Search mechanism in Cloud Computing

Kavita Bhatt, Dr. Mahesh Bundele

Download PDF
12.

Brute-force Attack “Seeking but Distressing”

Konark Truptiben Dave

Download PDF
13.

WEDM Development and Optimization of process: A review

Lokesh Goyat, Rajesh Dudi, Neeraj Sharma

Download PDF
14.

Cryptographic Approach to Overcome Black Hole Attack in MANETs

Mohan Kumar S B, Nirmal Kumar S Benni

Download PDF
15.

Improved Bluetooth Connectivity with RFID

Nisha, Soniya Goyal, Neeraj Manglani

Download PDF
16.

Finite Element Analysis of Piezoelectric Cantilever

Nitin N More

Download PDF
17.

Ridge Regression for the Prediction of Compressive Strength of Concrete

Palika Chopra, Dr. R. K. Sharma, Dr. Maneek Kumar

Download PDF
18.

Review of Domain Driven Data Mining

K. Priya Karunakaran

Download PDF
19.

ICT driven Resource Mapping & Triggering using 3Cs for Disaster Management

Rajesh Sodhani, A. K. Goyal

Download PDF
20.

Smartphone Security by Cloud Computing

Ria Das, Indrajit Das

Download PDF
21.

Network Security Using Graph Theory

Angad Singh Cheema, Jitin Kohli, Kunal Arora, Saurabh Gupta, Syed Saif Ahmed

Download PDF
22.

Study on Content based Retrieval and Semantic Technique

Shelly, Gagan jindal

Download PDF
23.

Adaptive Vehicle Detector Approach for Complex Environments

M.P. Sirisha, A.Shanthi

Download PDF
24.

A Novel Implementation of Wavelet Transform and Lzma for Compression and Decompression of Document Images

M.Sudha, Dr.S.Palani

Download PDF
25.

Investigation on Engineering Properties of Soil-Mixtures Comprising of Expansive Soils and a Cohesive Non-Swelling Soil

Dr. Ch. Sudha Rani

Download PDF
26.

Preliminary Level Automated Classification of Brain Tumor using PCA and PNN

V. S. Kolge, Dr. K.V.Kulhalli

Download PDF
27.

Comprehensive Group Study Environment on Cloud

Yashasree.Tummala, Chintam VB Aditya Kumar

Download PDF
28.

Feasibility Testing of VCR Engine using various blend of Neem Oil

Yogesh Tamboli, Dr. G. R. Selokar, Amitesh Paul, Jehan Zala

Download PDF
29.

Rapid Scalable Scheduling for Updates in Streaming Data Warehouses

Dattatray G. Modani, Vinod S. Badgujar, A.Simhadri Babu

Download PDF
30.

A Novel Frequency Domain Based Watermarking

Nirupma Tiwari, Dr.Naveen Hemrajani

Download PDF
31.

Improvising Teaching Methodologyfor Large Class using Technology

Safa Hamdare

Download PDF
32.

Cyber Crime against Person

Desai Purva N., Patel Asma M.

Download PDF
33.

Rescue Robot

Sunantha Krishnan, Anthony Selva Jessobalan

Download PDF
34.

Applications of cyber Forensics: A study of cyber security and IT Act 2000 to prevent cyber crimes in Indian society

Seema M. Shinde, Bhusare Sangita A.,Karhale Deepali

Download PDF
35.

Load Balancing Algorithm for Azure Virtualization with Specialized VM’s

Anand Chaudhari, Anushka Kapadia

Download PDF
36.

An Efficient Active Diode Clamped Multilevel Inverter with Reduced Switching Stress

Avinash Verma, Sanjeev Gupta

Download PDF
37.

Imputation in Mixed Attribute Datasets using Higher Order Kernel Functions

Aasha.M

Download PDF
38.

Combined Effects of Thermal Barrier Coating and Blending With Diesel Fuel on Usability of Waste Plastic Oil in Diesel Engines

Dr.T.Senthilkumar, B.Kumaragurubaran, Dr.M.Chandrasekar, B.M.Gnanasekaran, J.Rajasekaran

Download PDF
39.

Improving Query Search Results by Using Click Patterns

Vishwanath D. Chavan, Anil S. Naik, Santosh C Pawar

Download PDF
40.

Study of biometric technology in Face recognition and its approaches

Upneet Kaur, Gagandeep Jindal

Download PDF
41.

Friction Welding on Lathe Machine with special Fixture

Gourav sardana, Ajay Lohan

Download PDF
42.

Data Security using Packet Dispersion in MANET

Ramkrushna C. Maheshwar, Rohitkumar R. Wagdarikar, Anandrao G. Deshmukh

Download PDF
43.

The importance of Information Integrity, Security, Networking and Data Protection

Rajashri S.Limaye

Download PDF
44.

Design and Analysis of Gasket Sealing of Cylinder Head under Engine Operation Conditions

D.Vinod Kumar, V.Sreenivasulu , P.Divakara Rao, Dr.C.Udaya Kiran, Y.Vijaya Kumar

Download PDF
45.

Implementation of Monostable Multivibrator Using Low Voltage Current Differencing Transconductance Amplifier

Shweta Gautam, Neeraj Jain, Anshul Kumar Sharma

Download PDF
46.

Power Aware & High Speed Booth Multiplier based on Adiabatic Logic

Namrata Gupta

Download PDF


Comments are closed.