Published: 2014-04-28

Single Image Super Resolution Using Sparse Representation with Image Fusion Principle

Eman A. Sultan , Said E. El-Khamy , EL-Sayed El-Rabie, Nawal A. El-Fishawy, Fathi E. Abd El-Samie

Abstract 37  | PDF

Data Encryption and Decryption Algorithms using Key Rotations for Data Security in Cloud System

Prakash G L, Dr. Manish Prateek, Dr. Inder Singh

Abstract 53  | PDF

A New Approach to an All Quadrilateral Mesh Generation over Arbitrary Linear Polygonal Domains for Finite Element Analysis

H.T. Rathoda, Bharath Rathod, K. T. Shivaramc ,A. S. Hariprasad , , K.V.Vijayakumar d, K. Sugantha Devi

Abstract 33  | PDF

Use of NFC Technology In Electronic Ticket System For Public Transport

M.R.Waghe, P.A.Pawar, Prof S.N. Bhadane

Abstract 33  | PDF

The Proposal of an Efficient Cyber forensics tool using Neural Networks and Image Mining concepts

P Ramesh Babu, Hunde Merga Dugassa, Abebe Gemeda3

Abstract 40  | PDF

A Smart Home Security System Based On Arm7 Processor

Kharik Abhishek R, Chaudhari Archana, Prof.R.R.Bhambare

Abstract 78  | PDF

A Review of Research Work in Software Engineering

Madhu Kumari, Meera Sharma, Ajay Kumar

Abstract 50  | PDF

The Case study of Energy Conservation & Audit in Industry Sector

Mehulkumar J Panchal, Dr. Ved Vyas Dwivedi, Rajendra Aparnathi

Abstract 81  | PDF

Clustering Approach To Test Case Prioritization Using Code Coverage Metric

Medhun Hashini D.R

Abstract 41  | PDF

PAPR Reduction in OFDM Systems

Gondge Sagar S, Jawalkoti Chaitanya B,Raut Pranoti N, Ms.N.K. Bhandari

Abstract 33  | PDF

An Effective Classification and Novel Class Detection of Data Streams

G.Divya, MR.D.BrightAnand

Abstract 33  | PDF

Location Detection and Time Monitoring System for Moving Object

Nirupama.Sheelwant, Sandeep.Sheelwant

Abstract 43  | PDF

Review on Software Ecosystem: An Emerging Area

Rohit Deshmukh

Abstract 35  | PDF

ATM Transaction Security System Using Biometric Palm Print Recognition and Transaction Confirmation System

Asst. Prof. Sanjay S. Ghodke, Harshad Kolhe, Saurabh Chaudhari, Kedar Deshpande, Somesh Athavle

Abstract 44  | PDF

Mining Hashtags: The Tweet Suggestion System

Anuraag Vikram Kate , Nikilav P V, Kasthuri Rengan

Abstract 40  | PDF

DEFENDING FLOOD ATTACKS BY LIMITING PACKET REPLICATION ON TIME INTERVAL

V.Senthilvel, A.Arjun

Abstract 32  | PDF

Optimal Sizing And Placement Of Capacitor In A Radial Distribution System Using Loss Sensitivity Factor And Firefly Algorithm.

Priyanka Das, S Banerjee

Abstract 53  | PDF

Evaluation of the Reduction in Switching Time and Stress in Constant Electric Power Dependent Public Utilities by Automatic Mains and Phase Changer

Lasisi Hammed, Oladokun Ajibola Samson

Abstract 40  | PDF

iMobile: Remote Access for Android Phones

Prof. Jayvant H. Devare, Sonali D.Kotkar, DipaliN.Nilakh, Priyanka S.Solat, Ms. Shradha S. Wabale

Abstract 34  | PDF

Providing Information Security Using ArcSight SIEM in an Organization

Aamir Sohail

Abstract 32  | PDF

Identification of diseases of Soybean Using Cluster Analysis

Mamta Tiwari, Dr. Bharat Mishra

Abstract 39  | PDF

Agile Development Methodology with cloud computing

Neha Jain, Shipra Dubey

Abstract 34  | PDF

Twitance Twitter Recommendation and Analytic Tool

Ashish Singh, Rohit Khatana, Jitendra Kumar, Aravind S, Gautam Rege, Geeta Patil

Abstract 30  | PDF

Local Route Repair Mechanism for AODV

Arpit Dhingra, Anil Kumar

Abstract 50  | PDF

Fabrication Of Thin Film Transistor Using High K Dielectric Materials

S.Arunprathap, A.Napolean, Cyril Robinson Azariah

Abstract 65  | PDF

DDOS Attack And Detection For Secured Cloud Computing Resources

Danveer Singh, Basant Kumar Gupta , Harshit Gupta

Abstract 32  | PDF

Disease Identification in Iris Using Gabor Filter

G.DurgaDevi, D.M.D Preethi

Abstract 28  | PDF

An explicit finite element integration scheme using automatic mesh generation technique for linear convex quadrilaterals over plane regions

H.T. Rathod, Bharath Rathod Shivaram K.T , H. Y. Shrivalli Tara Rathod ,K. Sugantha Devi

Abstract 38  | PDF

Twilight in the Wireless Web: Light Fidelity

Pankaj Mehendiratta, Surbhi Gupta, Rohit Sharma

Abstract 32  | PDF

Netflow Traffic Analyzer For worm detection- A Survey

Manish Khule, Megha Singh, Deepak Kulhare

Abstract 39  | PDF

Customization Issues In Cloud Based Multi Tenant SaaS Applications

Mala Dutta, Pritesh Gupta

Abstract 40  | PDF

Tracking A Dynamic Target in Wireless Sensor Network Using Enhanced Polygon Based Framework

Ramya A R, P Mangayarkarasi

Abstract 36  | PDF

IMAGE SEGMENTATION- A REVIEW

Ripandeep kaur, Manpreet kaur

Abstract 30  | PDF

Age Synthesis and Estimation From Face Image

Ms. Deepali R. gadbail, Prof. S.S. Dhande, Prof.Kanchan M. Pimple

Abstract 42  | PDF

Digital Image Watermarking For Bank Security Using Arm Processor

Purushottam Wadekar, Prakash S. Jadhav, Vishal Raj, Prof.N.K.Bhandari

Abstract 42  | PDF

PREDICTION OF ELASTIC MODULUS FROM COMPESSIVE MODULUS OF LIME STABILIZED LATERITIC SOIL FOR MECHANISTIC DESIGN USING THE SPLIT CYLINDER

D.B.Eme, J.C.Agunwamba

Abstract 35  | PDF

POWER QUALITY IMPROVEMENT TECHNIQUES IN HYBRID SYSTEMS – A REVIEW

V.Srikanth, A. Naveen kumar

Abstract 29  | PDF

Cloud Storage, Issues and Solution

Jitendra Singh, Ashish Jha

Abstract 36  | PDF

Privacy Preservation of Sensitive Attributes Using Hybrid Approach

M. Geetha , V. Uma Rani

Abstract 29  | PDF

Short Term Load Prediction of a Distribution Network based on an Artificial Intelligent Method

K.Aruna, Dr.N.Yadaiah

Abstract 31  | PDF

Performance Studies of Three-Phase Cascaded H-Bridge and Diode-Clamped Multilevel inverters

T.Rakesh, Dr.V. Madhusudhan, Dr.M.Sushama

Abstract 38  | PDF

Design of a Power System Stabilizer for aSynchronous Generator Using HybridIntelligent Controller

V.Sanjeeva Rao, Dr.B.V.Shankarram

Abstract 27  | PDF

Satellite Image enhancement using Combination of Transform Techniques and Interpolation Methods

R.Swaminathan, Dr.Manoj Wadhwa

Abstract 44  | PDF

River: A Reliable Inter-Vehicular Routing Protocol For Vehicular Adhoc Networks

R.Mallika Devi., Dr.B.Srinivasan.

Abstract 32  | PDF

Network Security: Spoofing-The Online Attacks

Mr. Vinod Saroha, Ritu Mehta, Sonia,Asha

Abstract 34  | PDF

IRCAR: Improved Reputation based Context-aware Routing Algorithm for Delay Tolerant Network

Aditya Pancholi, Sapna Grover

Abstract 30  | PDF

Research on Android app Vs Apple app Market: Who is leading?

Shivam Jaiswal , Ajay Kumar

Abstract 41  | PDF

CLOUD COMPUTING: BEGINNING OF A NEW TECHNICAL ERA

Neha Jain,Shipra Dubey, ander.Rajesh Kumar

Abstract 43  | PDF

Comparative study of CPW-fed Bowtie antenna with ACS-fed Bowtie antenna for wireless applications

Bathala V. Sindooja, T. Anita Jones Mary

Abstract 36  | PDF

Profit Maximization Using Prediction Model

Devare Jayvant ,Phalke Vrushali, Ajabe Varsha,Phalke Ashwini Chaudhari Sheetal

Abstract 27  | PDF

Routing in Delay Tolerant Mobile Network: A Comparative Analysis

Sapna Grover, Aditya Pancholi

Abstract 31  | PDF

Survey of MARS: Spatial Link Quality and Node Positioning in Wireless Relay Network

Suganya.G, Mrs. A. Mary joycy

Abstract 34  | PDF