Vol. 2 No. 08 (2013)

Published: 2017-12-31

Articles

  • Development New Press Machine using Programmable Logic Controller

    N. M. Z. Hashim , N. M. T. N. Ibrahim,Z. Zakaria Fadhli Syahrial , H. Bakri,
    158
    215
  • Survey on Intelligent Transport System (ITS) application for vehicle speed limit monitoring and accident reporting

    Sadiki Lameck Kusyama, Dr. Michael Kisangiri, Dina Machuve,
    179
    202
  • Development of Tomato Inspection and Grading System using Image Processing

    N. M. Z. Hashim , N. H. Mohamad Z. Zakaria , H. Bakri, F. Sakaguchi,
    216
    308
  • Automatic vehicle over speed, accident alert and locator system for public transport (Buses)

    Sadiki Lameck Kusyama, Dr. Michael Kisangiri, Dina Machuve,
    183
    199
  • Flood Detector Emergency Warning System

    N. M. Z. Hashim , N. B. Hamdan Z. Zakaria, R. A. Hamzah A. Salleh,
    213
  • Smart Casing for Desktop Personal Computer

    N. M. Z. Hashim, A. F. Jaafar Z. Zakaria3, A. Salleh R. A. Hamzah,
    193
    222
  • A System for Monitoring and Reporting Excessive Passengers in Public Buses Case Study: Tanzania

    Kilavo Hassan, Anael Sam, Dina Machuve,
    238
    225
  • Biometric Based Web Security Using Ridges of Finger

    Md. Majharul Haque, R.H.M.Alaol Kabir, Md. Shakil Ahamed- -Shohag , Dr. Zerina Begum,
    208
    222
  • Kinetic And Correlation Studies Between Varying Corrosion Parameters And Corrosion Rate Of N-80 Oil Well Tubular Steel In 15% Hydrochloric Acid Pickling Solution Using Ficus Abutilifolia Plant Extract

    Abubakar, G, Ibrahim, H., Mustafa M., Apugo-Nwosu, T. U., Nwobi B E I., Akuso, S. A. and Agboun D T
    233
    213
  • Corrosion Inhibition Studies Of Ficus Abutilifolia On N-80 Oil Well Tubular Steel In 15% Hydrochloric Acid Solution

    Abubakar, G* ., Ibrahim,H., Apugo-Nwosu T.U.,Mustafa,M.,Akuso,S. A.,Agboun D T Nwobi, B.E. and Ayilara, S. I.,
    167
    211
  • A Review on “Adaptive Contriving Routing for Multihop Wireless Ad Hoc Networks

    Mubina Begum,C RamaKrishna, Sasmita Behera,
    180
    197
  • A Review on” Packet-Hiding Methods to Hamper Selective Jamming Attacks in wireless networks

    Pranita Chaudhar, C. RamaKrishna, Sasmita Behera,
    164
  • A Software Test Data Generation Tool for Unit Testing Of C++ Programs Using Control Flow Graph

    Goodubaigari Amrulla,
    187
    229
  • An Optimal Energy Efficient Video Distribution Over Cooperative Wireless Networks

    K. Mohan Satya Narayana Reddy, K. Sathi Reddy,
    231
    215
  • Analysis Of Full Bridge Boost Converter For Wide Input Voltage Range

    Ch. Abhilash, R. Shirisha, Khaja Rafi,
    165
    208
  • Empirical Study on Migrating Data From Relational Databases To Object-Oriented Technology.

    Dr Leelavathi, Rajamanicakam,
    177
    180
  • A Collaborative Writing Tool on Cloud Environment

    B. Manikyala Rao, Ch. Latha,
    242
    216
  • Computational Algorithm for Automatic Recognition of Vehicle Registration Plates

    Ms. Preetika Sharma, Mr Gaurav Sapra, Mr Rachit Agarwal,, Ms. Preetika Sharma, Mr Gaurav Sapra, Mr Rachit Agarwal,
    176
    204
  • New Algorithm for Minimum Spanning Network Connectivity Problem

    *Madhu Mohan Reddy P, Suresh Babu C Purusotham S Sundara Murthy M,
    168
    203
  • An Adaptive Energy Efficient Packet Forwarding Method for Wireless Sensor Networks

    Sangeetha tamilmozhi, Dr. R. Pugazendi,
    181
    196
  • An Adaptive Energy Efficient Packet Forwarding Method for Wireless Sensor Networks

    T. Sangeetha tamilmozhi, Dr. R. Pugazendi
    148
  • Diagnosis and Risk Assessment of Cancer On Genes Dataset Using Data Mining Techniques

    Arunkumar Sivaraman, Dr.M.Lakshmi, S.Arun Rajesh,
    192
  • Traffic Flow Prediction Based on Optimized Type-2 Neuro-Fuzzy Systems

    Mojtaba Paricheh , Assef Zare,
    175
    206
  • Review of "Achieving Secure, Scalable, and Finegrained Data Access Control in Cloud Computing"

    U.JyothiK., Nagi Reddy, B. Ravi Prasad,
    181
    194
  • HOP-COUNT ANALYSIS IN UNSTRUCTURED P2P NETWORKS

    Mrs.R.Sivapriya, Mr.S.Dhanabal,
    167
    201
  • IMPROVING HIGH PERFORMANCE UTILIZATION OF INFRASTRUCTURE-AS-A-SERVICE CLOUDS

    M.Anitha Mr.Veera Prasd, Mrs.T.HimaBindu ,
    179
  • A Survey on LSB Based Steganography Methods

    M. Pavani, S. Naganjaneyulu, C. Nagaraju,
    234
    235
  • IMPLEMENTATION OF WAVELET TRANSFORM, DPCM AND NEURAL NETWORK FOR IMAGE COMPRESSION

    V.Krishnanai Dr.G.Manoj Someswar, K.Purushotham A.Rajaiah,
    166
    168
  • Comparison Of SINR In FemtoCell & MacroCell Network In MacroCell Environment

    Kanak Raj Chaudhary, Rachna Arya,
    169
    208
  • Association Rule Mining on Type 2 Diabetes using FP-growth association rule

    dita Rane Madhuri Rao
    249
    203
  • Ipv6 Security: Issue Of Anonymity

    Varsha Alangar, Anusha Swaminathan
    236
    269
  • Iris Recognition using Discrete Sub-band Transform for Biometric Identification

    Nidhi, Er. Pushpinder Singh,
    187
  • Literature Survey of WATM

    Dr. M. Usha Rani, K. Sailaja
    190
    170
  • Modeling and Predicting Total Ozone Column and Rainfall in Kodaikanal, Tamilnadu By Arima ProcessAmongst all weather happenings, ozone plays the very important role in human life as well as climate change. The understanding of Total Ozone Column (TOC) and

    R.SamuelSelvaraj, Sachithananthem C.P., K.Thamizharasan,
    212
    229
  • Mosacing Using Laplacian of Gaussion Method

    Payun S, Tembhurne,
    178
    193
  • A Novel Image Steganography (NIS) Technique

    Amanpreet Kaur, Neetu Sardana,
    184
    206
  • OVERVIEW ON PASSENGERS OVERLOAD CONTROL IN PUBLIC BUSES CASE STUDY: TANZANIA

    Kilavo Hassan, Anael Sam, Dina Machuve,
    266
    453
  • BRUTE FORCE ATTACK – BLOCKING TECHNIQUE

    G. Sowmya, A. Naveen Kumar,
    244
    219
  • Comparative Analysis of CMOS Transmission Gate Based Adders

    Swaranjeet Singh,
    200
    209
  • Prevention of Credit Card Fraudulence in Point-of-Sale Terminus

    Manoj , Prabhakar,
    195
    201
  • STATISTICS OF CYBER CRIME IN INDIA: AN OVERVIEW

    Rupinder , Pal Kaur,
    225
    232
  • Novel Approach for Secured Data Delivery in Congested Wireless Sensor Network

    Divya Hiran, Dr. Jitendra Kumawat,
    191
    196
  • Internet Routing With Lightweight Route Attestation

    M.V.R Jyothisree, V.Ramakrishna, Dr.A.V.Krishna Prasad,
    166
    191
  • Introduction on Data Warehouse with OLTP and OLAP

    Arpit, Parekh,
    272
    620
  • Numerical Integration Over Polygonal Domains using Convex Quadrangulation and Gauss Legendre Quadrature Rules

    H. T. Rathoda, B. Venkateshb Shivaram. K. Tc , Mamatha. T. Mb
    146
    236
  • An Allocation of Exploited Resources for Potent Parallel Data Processing In Cloud

    Prof.Santosh Kumar. B, AnandKumar A.K,
    142
  • Advance Reservations And Scheduling For Bulk Transfers In Research Networks

    N.Naveen Kumar Sk.Meeravali, i2 B.Bobby Arun Kumar Nakka Thirupathi Kuda Nageswara Rao,
    138
    180
  • Multiple Routing Configurations For Fast Ip Network Recovery

    Sk.Meeravali B.Bobby Arun Kumar, N.Naveen Kumar Nakka Thirupathi Rao, Kuda Nageswara Rao,
    152
    197
  • Review On Secure and Distributed Reprogramming Protocol

    Ruchika Markan, ,Gurvinder Kaur,
    133
    161
  • Mining Association Rules for Web Crawling using Genetic Algorithm

    J. Usharani Dr. K. Iyakutti,
    169
    180
  • Trust Aware AODV

    V.Vallinayagi, Dr G.M, Nasira,
    105
    164
  • Literature Survey on Energy Consumption Control for Wireless Mobile Ad-hoc Network

    Krishan Kumar YK Jain
    112
    5
  • Performance Evaluation of Dynamic Fuzzy Voter Used In Safety Critical Systems

    P.Babul Saheb, K.Subbarao,
    120
    185