Vol. 2 No. 04 (2013)

Published: 2017-12-30

Articles

  • Design of Low Power Variable Latency adder and Its Implementation in Decimation Filter

    Sasikumar.J N.Kirthika
    160
    224
  • Grid computing Issues, Challenges, Need And Practice

    Ayushi Pathak Nisha Kaushik
    165
    231
  • CYBER FORENSICS-A REVIEW

    Dr D S, Kushwaha,
    184
    207
  • Use Of Information Technology In Rural Development”

    Gosawi P.R., Madan B.S., Chopane V.V,
    168
  • TA DETAILED REVIEW ON INCREASING RELIABILITY OF SOFTWARE BY AN INNOVATIVE APPROACH

    K Manideep, A L Siridhara,
    171
  • A Survey on SQL Injection attacks, their Detection and Prevention Techniques

    Nithya1,R.Regan, , J.vijayaraghavan,
    247
    316
  • Gesture Recognition: A Communication and Future to Tablets

    Kunal Gandhi, Ayushi Pathak, Nisha Kaushik
    194
    218
  • AN ADAPTIVE TECHNIQUE FOR FINGER CODE GENERATION USING SEGMENTATION WITH SPFB BASED TECHNIQUE

    Dr. S. Pannirselvam , P. Raajan ,
    185
  • CAD SYSTEM FOR LUNG CANCER DETECTION

    Archana S, Dr.K.P.Kaliyamurthie, , Dr.V.Khanaa
    179
  • : RESOURCE IDENTIFICATION IN GRID USING GRS

    Sanjay Razdan
    153
  • : A NOVEL TECHNIQUE OF REAL TIME VIDEO MONITORING SYSTEM

    : Dharani.G, Jeevarathinam.K, Kavin.K, Pritiya.S,
    169
  • ACTIVE SHAPE MODEL AND TOUCH LESS HAND GEOMETRY FOR PALM PRINT RECOGNITION

    Gaganpreet kaur, Sandeep kaur, Dr. Dheerendra singh,
    191
  • DESIGN OF THE MATHEMATICAL MODEL FOR ANALYSIS OF HUMAN RESPIRATORY SYSTEM

    Ankit Kajaria,
    165
  • Purelet approach and ICA Based Poisson Noise Reduction in MRI Data Set

    Dr.S.Vasuki P.Karthikeyan, \G.Akshaya karthika
    211
    196
  • A Modified Version Of Extended Plafair Cipher (8x8)

    Gaurav Shrivastava Manoj Chouhan, Manoj Dhawan
    196
    586
  • Secure Authentication Methods for Preventing Jamming Attacks In Wireless Networks

    Y. Madhavi Latha, P. Rambabu,
    188
    211
  • Subscriber Theoretic Pricing for Video Streaming In Mobile Networks

    P. Supraja, , Sd. Afzal Ahmed , P. Babu P.Radhika,
    182
    196
  • An Adaptive Architecture for Autonomic Orchestration of Web Services

    Mrs.C.Sathya, Mrs.T.Hemalatha
    192
    201
  • TRANSFERRING VOICE OVER LOCAL AREA NETWORK THROUGH INTERNET PROTOCOL-PRIVATE BRANCH EXCHANGE

    R.Anandhi, T.Aravindan,C.Elavarasan, R.Ramya C.Gomathi,
    180
  • Survey Paper on Training of Cellular Automata for image

    Swati, Chauhan,
    165
    213
  • Implementation of Secret Delegation for Secured Attribute Based Access Control In Cloud Computing

    Mrs.G.Mariammal, Dr.N.Uma Maheswari Dr.R.Venkatesh Mr.P.Lakshmanan,
    187
    196
  • Multi Benfit’s Through Compression For Large Data Stored In Cloud

    1 M.Ravi Kumar, S.Manoj Kumar
    197
    197
  • Performance Analysis of Content Based Image Retrivel

    Arul Murugan A, Jothi Vignesh C, Nijanthan S, Rajasekar Vignesh E,
    194
    213
  • A Novel Cloud Computing Architecture Supporting E-Governance

    M.Shahul Hameed, A.Appunraj DR.T.Nalini
    141
    187
  • 4G, the fourth generation of mobile Communication

    Ansh Agarwal Adesh Sharma, Manish Rawat,
    204
    300
  • Study of Smartphone Attacks and Defenses

    Bhavya Chojar, Divya Lal, Kunal Gandhi, Kshitij Salari
    179
    211
  • Mobile Wireless Networks :Challenges

    Manish Rawat Adesh Sharma, Ansh Agarwal Mandeep kaur,
    194
    316
  • IMAGE STREAM TRANSFER USING REAL TIME PROTOCOL

    Sandeep Rao Priya Rani Pandey, Avinash
    415
  • Multiuser Short Message Service Based Wireless Electronic Notice Board

    Gowtham.R Kavipriya.K , Kesavaraj.G , Nathe Aen Mr. S.Maragatharaj,
    185
  • Designing of Mobile Robot with Mecanum Wheel

    Dr.V.Khanaa, Dr.Krishna Mohanta,
    291
    299
  • An R-Tree Node Splitting Algorithm Using MBR Partition for Spatial Query

    Dr.V.Khanaa, Dr.Krishna Mohanta
    221
    227
  • Graph Clustering In Social Networks Based On Attribute Similarities

    S. Kalaichezhian
    187
    210
  • "Identifying high throughput path in Wireless Mesh Networks with bandwidth Guarantees

    Regan. R, Divya.K, Madheswari.R,
    184
    187
  • Improved Security Architecture For Up Keeping Routing Services on Ad Hoc Networks

    VRegan. R, Ilakkiya veera, Kousalya.J,
    178
    199
  • Secure Migration of Various Database over A Cross Platform Environment

    R.Vinodha, Mr.R.Suresh
    200
    192
  • n Artificial Neural Network Based Vessel Detection On The Optic Disc Using Retinal Photograph

    Sharmila .S,
    151
    199
  • Tracking System for Wireless Devices in Wifi Environment

    Deepali Khatwar, Vaishali Katkar
    173
    0 196
  • Design of Ultra High Band Pass Filter By Using Di-Electric Resonator

    Rajni Yadav, Kavita Dagar, Bhanu Yadav,
    195
    255
  • An Efficient Framework for Name Disambiguition In Digital Library

    J. Pricilla
    186
    180
  • Extraction of Html Documents From Heterogeneous WebPages Using Cluster Techniques

    Sruthi Kamban K.S, M.Sindhuja,
    150
    203
  • A Secure Environment for Unsafe Component Loading

    Veeralakshmi S, Sindhuja M,
    163
    185
  • Health Monitoring System for Induction Motors

    Dr.R. Udayakumar Dr.V. Khanaa,
    181
    212
  • Optimization of Group Elevator Scheduling

    Dr.R. Udayakumar, Dr.V. Khanaa,
    168
    206
  • Secure Educational Network

    Dr.R. Udayakumar, Dr.V. Khanaa
    182
    202
  • Sixth Sense Technology

    Dr.R. Udayakumar, Dr.V. Khanaa
    189
    226
  • Mobile Application Development Strategies

    Ms. Warhekar Snehal P* Prof. Gaikwad V.
    119
    203
  • Heterogeneous Mobility Management and Vision for Wireless Networks

    Madhurima V, T.Venkat Narayana Rao Lallu Nayak,
    163
    172
  • Software Quality Prediction: A Review and Current Trends

    P. Ranjeet Kumar *, R. Ramesh, T.Venkat Narayana Rao Shireesha Dara
    137
    218
  • Carry Bypass & Carry Select Adder Using Reversible Logic Gates

    Yedukondala Rao Veeranki Alok Katiyar, Venkata Reddy Kopparthi,
    871
    191
  • Protection of Data Base Security via Collaborative Inference Detection

    Alok Kumar Shukla, Ajay Sharma, Dharmendra Kumar,
    137
    187
  • Minutiae Based Fingerprint Recogntion

    Ritu Ritu
    129
    176
  • Role Based Query Modification for Relational Database systems

    Ahmed H. Araf Nawal El-Fishawy, Mervat M. Mousa
    137
    191
  • A Review on Tcp Westwood Protocol For Simulated And Internet Environment

    Vijay P Reshamwala Kaushika D Patel
    141
    168
  • Quantification Analysis of Chaotic Fractal Dimensions

    Hemant Kumar Singh Prof. Deepa Gupta
    174
    193
  • Microscopic Image Analysis for Plant Tissue Using Image Processing Technique

    rof. Satange D. N Ms. Pasarkar Anagha A Ms. Chauhan Priyanka D
    170
    178
  • OVERVIEW OF TEXT SUMMARIZATION EXTRACTIVE TECHNIQUES

    Mrs Pimpalshende A. N.
    169
    0
  • DATA MINING TECHNIQUES FOR SOFTWARE EFFORT ESTIMATION TO IMPROVE COST EFFICIENCY

    Ms. K. Gayathiri Dr. T. Nalini ,Dr. V. Khanaa,
    132
  • RELIABILITY APPROACH OF DATA GATHERING PROTOCOL FOR MOBILE USERS IN WIRELESS SENSOR NETWORK

    Miss. Chaitali G. Taral, Dr.P.R.Deshmukh Prof. G.S.Thakare
    116
  • Integration of 2 D Secure Barcode in Identity Cards:A New Approach

    Manisha Bajpai Arun Prakash Agrawal
    143
    252
  • An overview of Mobile Ad Hoc Networks for the Proactive, Reactive and Hybrid Routing Protocol

    Sumedha S. Deshpande Krutika V. Asare, Swapnil Deshpande
    109
  • Hybrid Dwt-Dct Coding Techniques for Medical Images

    Mrs. Mishra Keerti Mrs.Verma Deepti, Mr. Verma R.L.
    145
    173
  • A Hybrid Watermarking Scheme For Medical Images

    Mrs. Verma Deepti, , Mrs.Mishra Keerti Mr.Verma R.L
    116
    175
  • A Hybrid Watermarking Scheme For Medical Images

    Mrs. Verma Deepti Mrs.Mishra Keerti ,Mr.Verma R.L.
    126
  • USE OF ARTIFICIAL NEURAL NETWORK TO IDENTIFY CARCINOMA CELL

    Miss. Kuralkar Samruddhi S. *, Dr. Deshmukh P.R
    164
    183
  • Wireless Cellular Communications Security Issues and Types of Attacks with WAP

    K.V.N.R. Sai Krishna
    128
    169
  • Image Segmentation Using Cellular Automata: A Technical Survey

    Priyanka Shotrya Sanjeev Bhardwaj
    152
    305
  • “The Pertinence of Intelligent System in the field of Digital Image Forensics”

    Miss. Pande Ankita V Prof. Shandilya V.K.
    136
  • “Digital Image Processing Approach for Fruit and Flower Leaf Identification and Recognition”

    Miss. Pande Ankita V Prof. Shandilya V.K
    168
    190
  • Achieving Energy Efficiency by the Enhancement Of Mac Protocol To Prevent Nav Attack

    Pathak Vivek Gangal Ambrish
    121
    202
  • Improving Decision Support Systems with Data mining, Data warehousing, OLAP and OLTP Technologies

    Ms. Ramteke M. A*, Prof. Dhande S. S,
    187
    189
  • An Aperture Coupled Feed Approach to Gain and Bandwidth Enhancement of Microstrip Patch Array Antennas

    Fathima Anees S Mrs. Rajini A R
    179
    194
  • IMAGE RECONSTRUCTION OF WATER WAVES USING BISPECTRUM TECHNIQUES

    Miss. Solio Anchal A. Dr. Ladhake S.A
    125
  • Image Segmentation Using Graph Partition Methods

    Gayathri.S Thamizh Illakiya.M K. John Singh,
    119
    211
  • Anomaly Detection: An Application of Visual Surveillance

    M. Aishwarya, S. Shanu
    134
    214
  • Dynamic Routing With Security Considerations

    Abhinav Srivastava Amritanshu Srivastava Gaurav Kumar Mall
    181
    189
  • A SURVEY OF BROADCASTING PROTOCOLS IN WIRELESS NETWORK

    Nayak Divya, Prof. Shukla Suwesh, Shrivastava Manish
    116
    197
  • ARTIFICIAL VISION SYSTEM FOR AUTOMATIC NUMBER PLATE IDENTIFICATION

    Miss. Kuralkar Samruddhi S. Dr. Deshmukh
    129
    167
  • WEB MINING AND ITS CATEGORIES – A SURVEY

    *M.Srividya D.Anandhi M.S.Irfan Ahmed
    159
    0
  • PROTECTED CASH WITHDRAWAL IN ATM USING MOBILE PHONE

    M.R.Dineshkumar .S.Geethanjali R.Karthika M.Nagaraj N.Vijayanandam,
    145
    228
  • PHOTO SHARING WEBSITES USING PERSONALIZED AND NON-PERSONALIZED IMAGE SEARCH

    V.Dhavamani V.Shalini , Dr.K.P.Kaliyamurthie Dr.K.P.Kaliyamurthie
    124
    174
  • SECURITY AND KEY DISTRIBUTION IN BINDING OF IP TO DNS

    Arvind Kumar Gupta Pravin Tripathi,Sat
    103
    185
  • : A STUDY OF FUNDAMENTALS AND PRINCIPLES OF SOFTWARE ENGINEERING PROCESS

    Niraj jNake
    150
    194
  • ASPECTS OF SECURITY IN CLOUD COMPUTING

    : Anu Rathi, Yogesh Kumar Anish Talwar
    165
    188
  • SIMULATION AND EXPERIMENTAL STUDIES ON HYDRODYNAMICS CHARACTERISTICS OF COCURRENT THREE PHASE FLUIDISATION USING FUZZY LOGIC

    : Anish .T. Achankunju Sivalingam A, , Kannadasan T.
    141
    165
  • PERFORMANCE EVALUATION OF LOCALIZATION TECHNIQUE IN WIRELESS SENSOR NETWORK

    Urvashi Singh Manish kumar Jha
    124
    169
  • A SURVEY ON SECURITY IN MOBILE ADHOC NETWOR

    Dr. Anna Saro Vijendran A. Kamatchi,
    116
    177
  • ACTIVE SOURCE ROUTING PROTOCOL FOR MOBILE NETWORK:

    Anil Kumar Prasad Anamika Bhusan, Divya Gupta
    155
    241
  • EMPIRICAL ANALYSIS OF CORRELATION BETWEEN C&K METRICS AND TESTABILITY

    Jaspreet kaur, Raj Kumari
    150
    165