Vol. 2 No. 12 (2013)

Published: 2018-01-01

Articles

  • Pervasive Computing Issues, Challenges and Applications

    Lathies, Bhasker T,
    188
    1372
  • Extraction of Ontological Information based on Semantic Analysis

    Nataraj J, Mural Krishnan P, Praveen Godfrey, Arun S.N,
    302
    205
  • A STUDY ON TRADE-OFFS AMONG SERVICE EXCELLENCE ATTRIBUTES OF CLOUD COMPUTING

    P.Sundaramoorthy , S.P. Santhoshkumar, B. Santhoshkumar, Dr. M. Selvam,
    286
    224
  • A Comprehensive Paper for Performance Evaluation Between DSDV & AODV Routing Protocol

    Mr. Rakesh Kumar Khare, Mr. Raj Kumar Singh, Mr. Rakesh Kumar Khare, Mr. Raj Kumar Singh
    302
    222
  • Clarifying the clouds - Discussing cloud Computing and assistance grid architectures

    Er. Roma Soni, Er. Sahil Verma, Er. Kavita,
    287
    209
  • Moving Towards IT platforms to the cloud Computing & deep understanding with IT platform architecture transformation

    Er. Shalu soni, Er. Sahil Verma, Er. Vishal gupta,
    189
    216
  • Grip on the cloud and service grid technologies & some Pain points that clouds and service grids address

    Er. Anup Lal Yadav, Er. Sahil Verma, Er. kavita
    294
    215
  • Cloud: Computing Services And Deployment Models

    Ch Chakradhara Rao, Mogasala Leelarani Y Ramesh Kumar,
    281
    359
  • Bandwidth-Oriented Motion Estimation Algorithm For Real Time Mobile Video Application

    M.Vijay Shankar , D.Jahnavi, V.Yokesh,
    267
    237
  • SJRR CPU Scheduling Algorithm

    rakesh Patel , Mrs. Mili. Patel
    395
    277
  • Machine Learning: An artificial intelligence methodology

    Anish Talwar, Yogesh Kumar,
    749
    508
  • Data Protection Using Digital Watermarking

    Kapil Kumar Kaswan, Dr. Roshan Lal,
    151
    248
  • Slope Finder – A Distance Measure for DTW based Isolated Word Speech Recognition

    A.Akila, Dr.E.Chandra,
    225
    210
  • Secure Data Sharing In Cloud by Using CIA

    B. RamaKrishna, V.Tirupathi,
    317
    219
  • Efficient Monitoring Of Intrusion Detection In Mobile Ad Hoc Networks Using Monitoring Based Approach

    N.Kumar, M.Rameshkuar, R.Karthikeyan,
    274
    212
  • 9-Transistor Full Adder Design For Area Minimization

    Shubha goswami, shruti dixit,
    279
    663
  • Speech Enhancement through Elimination Of Impulsive Disturbance Using Log MMSE Filtering

    D.Koti Reddy, T.Jayanandan, C.L Vijay Kumar,
    236
    182
  • Effect of Aspirated Consonants on EMG Signals Generated in Zygomaticus Muscles

    Himanshu Raina Randhir Singh, Parveen Lehana,
    208
    199
  • Seamless Handover between Bluetooth and WIFI Using Packet Content Transfer Method

    Pallavi Dubey Prof. Namrata Sahayam,
    222
    276
  • HUE Preserving Color Image Enhancement without GAMUT Problem using newly proposed Algorithm

    Dipte Porwal, Md. S.Alam, Anjana Porwal,
    153
    227
  • A Strategic Capacity Planning Model: A Genetic Algorithm Approach

    N. Subramanian,
    247
    195
  • An Enhanced Content Based Image Retrieval System using Color Features

    R.Malini, C.Vasanthanayaki,
    287
    231
  • Color STIPs for the Live Feed

    V. Lakshmi Chetana, D. Prasad, G.Krishna Chaitanya,
    188
    200
  • Image Decomposition Using Wavelet Transform

    Gagandeep Kour, Sharad P. Singh
    269
    267
  • Modeling and Design of Microstrip Line Based SIW and Structural Effect on Wave Propagation Characteristics

    Yasser Arfat, Sharad P. Singh,
    296
    200
  • Image Compression Using SVD Technique and Measurement of Quality Parameters

    Rahul Samnotra, Randhir Singh, Javid Khan,
    278
    228
  • A New Approach to Automatic Generation of All Quadrilateral Mesh For Finite Element Analysis

    H.T. Rathoda, Bharath Rathod,T. Shivaramc, K. Sugantha Devi,
    234
    201
  • Fundamental Design Issues for the Future Internet

    Manoj , B C,
    258
    231
  • A Trust System for Broadcast Communications in SCADA

    Manoj , B C,
    220
    228
  • E-Mail Abstraction Scheme Using Collaborative Spam Detection Scheme

    Vinod.S , Insozhan.N, Vimal.V.R,
    250
    207
  • Secured PHR Transactions using Homomorphic Encryption in Cloud Computing

    Vidya.S, Vani.K,
    173
    206
  • Glass Fiber Reinforced Concrete & Its Properties Shrikant Harle, Prof. Ram Meghe

    Shrikant Harle, Prof. Ram Meghe,
    267
    275
  • Overcoming Cache Staleness Issue Using Dynamic Source Routing Protocol

    Chaitali G. Taral, Dr.P.R.Deshmukh,
    212
    232
  • Semantically Driven Personalized Recommendations on Sparse Data

    Kaushik, Tridev, Srivastava, Kavita,
    193
    208
  • A Clinical Expert System For Positional Vertigo

    Babikiranvelpula, Dr.S.Sai Satyanaraya,
    255
    201
  • Modelling & Simulation of Three-phase Induction Motor Fed by an asymmetrically Configured Hybrid Multilevel Inverter

    Hitesh Kumar Lade, Preeti Gupta Amit Shrivastava,
    270
    199
  • Obstacle Locating Capabilities of Mobile Robot Using Various Navigational Aids

    Avanish Shrivastava, Prof.Mohan Awasathy,
    282
    192
  • Comprehensive study of Handoff Strategy-A Survey

    Rajneet Kaur, Roopali Sood,
    157
    203
  • Nano Scale Simulation of GaAs based Resonant Tunneling Diode

    Vivek Sharma, Raminder Preetpal Singh,
    302
    192