Vol. 3 No. 04 (2014)

Published: 2014-04-28

Articles

  • Single Image Super Resolution Using Sparse Representation with Image Fusion Principle

    Eman A. Sultan , Said E. El-Khamy , EL-Sayed El-Rabie, Nawal A. El-Fishawy, Fathi E. Abd El-Samie
    198
    246
  • Data Encryption and Decryption Algorithms using Key Rotations for Data Security in Cloud System

    Prakash G L, Dr. Manish Prateek, Dr. Inder Singh
    251
    265
  • A New Approach to an All Quadrilateral Mesh Generation over Arbitrary Linear Polygonal Domains for Finite Element Analysis

    H.T. Rathoda, Bharath Rathod, K. T. Shivaramc ,A. S. Hariprasad , , K.V.Vijayakumar d, K. Sugantha Devi
    176
    210
  • Use of NFC Technology In Electronic Ticket System For Public Transport

    M.R.Waghe, P.A.Pawar, Prof S.N. Bhadane
    326
    246
  • The Proposal of an Efficient Cyber forensics tool using Neural Networks and Image Mining concepts

    P Ramesh Babu, Hunde Merga Dugassa, Abebe Gemeda3
    266
    231
  • A Smart Home Security System Based On Arm7 Processor

    Kharik Abhishek R, Chaudhari Archana, Prof.R.R.Bhambare
    330
    230
  • A Review of Research Work in Software Engineering

    Madhu Kumari, Meera Sharma, Ajay Kumar
    254
    258
  • The Case study of Energy Conservation & Audit in Industry Sector

    Mehulkumar J Panchal, Dr. Ved Vyas Dwivedi, Rajendra Aparnathi
    268
    313
  • Clustering Approach To Test Case Prioritization Using Code Coverage Metric

    Medhun Hashini D.R
    260
    254
  • PAPR Reduction in OFDM Systems

    Gondge Sagar S, Jawalkoti Chaitanya B,Raut Pranoti N, Ms.N.K. Bhandari
    176
    223
  • An Effective Classification and Novel Class Detection of Data Streams

    G.Divya, MR.D.BrightAnand
    236
    0 224
  • Location Detection and Time Monitoring System for Moving Object

    Nirupama.Sheelwant, Sandeep.Sheelwant
    248
    223
  • Review on Software Ecosystem: An Emerging Area

    Rohit Deshmukh
    231
    222
  • ATM Transaction Security System Using Biometric Palm Print Recognition and Transaction Confirmation System

    Asst. Prof. Sanjay S. Ghodke, Harshad Kolhe, Saurabh Chaudhari, Kedar Deshpande, Somesh Athavle
    260
    249
  • Mining Hashtags: The Tweet Suggestion System

    Anuraag Vikram Kate , Nikilav P V, Kasthuri Rengan
    187
    235
  • DEFENDING FLOOD ATTACKS BY LIMITING PACKET REPLICATION ON TIME INTERVAL

    V.Senthilvel, A.Arjun
    246
    223
  • Optimal Sizing And Placement Of Capacitor In A Radial Distribution System Using Loss Sensitivity Factor And Firefly Algorithm.

    Priyanka Das, S Banerjee
    197
    276
  • Evaluation of the Reduction in Switching Time and Stress in Constant Electric Power Dependent Public Utilities by Automatic Mains and Phase Changer

    Lasisi Hammed, Oladokun Ajibola Samson
    278
    238
  • iMobile: Remote Access for Android Phones

    Prof. Jayvant H. Devare, Sonali D.Kotkar, DipaliN.Nilakh, Priyanka S.Solat, Ms. Shradha S. Wabale
    268
    213
  • Providing Information Security Using ArcSight SIEM in an Organization

    Aamir Sohail
    248
    223
  • Identification of diseases of Soybean Using Cluster Analysis

    Mamta Tiwari, Dr. Bharat Mishra
    236
    316
  • Agile Development Methodology with cloud computing

    Neha Jain, Shipra Dubey
    310
    270
  • Twitance Twitter Recommendation and Analytic Tool

    Ashish Singh, Rohit Khatana, Jitendra Kumar, Aravind S, Gautam Rege, Geeta Patil
    257
    234
  • Local Route Repair Mechanism for AODV

    Arpit Dhingra, Anil Kumar
    289
    218
  • Fabrication Of Thin Film Transistor Using High K Dielectric Materials

    S.Arunprathap, A.Napolean, Cyril Robinson Azariah
    302
    233
  • DDOS Attack And Detection For Secured Cloud Computing Resources

    Danveer Singh, Basant Kumar Gupta , Harshit Gupta
    270
    219
  • Disease Identification in Iris Using Gabor Filter

    G.DurgaDevi, D.M.D Preethi
    232
    254
  • An explicit finite element integration scheme using automatic mesh generation technique for linear convex quadrilaterals over plane regions

    H.T. Rathod, Bharath Rathod Shivaram K.T , H. Y. Shrivalli Tara Rathod ,K. Sugantha Devi
    188
    242
  • Twilight in the Wireless Web: Light Fidelity

    Pankaj Mehendiratta, Surbhi Gupta, Rohit Sharma
    241
    227
  • Netflow Traffic Analyzer For worm detection- A Survey

    Manish Khule, Megha Singh, Deepak Kulhare
    201
    232
  • Customization Issues In Cloud Based Multi Tenant SaaS Applications

    Mala Dutta, Pritesh Gupta
    274
    0
  • Tracking A Dynamic Target in Wireless Sensor Network Using Enhanced Polygon Based Framework

    Ramya A R, P Mangayarkarasi
    259
    214
  • IMAGE SEGMENTATION- A REVIEW

    Ripandeep kaur, Manpreet kaur
    195
    219
  • Age Synthesis and Estimation From Face Image

    Ms. Deepali R. gadbail, Prof. S.S. Dhande, Prof.Kanchan M. Pimple
    234
    239
  • Digital Image Watermarking For Bank Security Using Arm Processor

    Purushottam Wadekar, Prakash S. Jadhav, Vishal Raj, Prof.N.K.Bhandari
    197
    226
  • PREDICTION OF ELASTIC MODULUS FROM COMPESSIVE MODULUS OF LIME STABILIZED LATERITIC SOIL FOR MECHANISTIC DESIGN USING THE SPLIT CYLINDER

    D.B.Eme, J.C.Agunwamba
    226
    213
  • POWER QUALITY IMPROVEMENT TECHNIQUES IN HYBRID SYSTEMS – A REVIEW

    V.Srikanth, A. Naveen kumar
    257
    269
  • Cloud Storage, Issues and Solution

    Jitendra Singh, Ashish Jha
    266
    258
  • Privacy Preservation of Sensitive Attributes Using Hybrid Approach

    M. Geetha , V. Uma Rani
    249
    220
  • Short Term Load Prediction of a Distribution Network based on an Artificial Intelligent Method

    K.Aruna, Dr.N.Yadaiah
    249
    203
  • Performance Studies of Three-Phase Cascaded H-Bridge and Diode-Clamped Multilevel inverters

    T.Rakesh, Dr.V. Madhusudhan, Dr.M.Sushama
    136
    192
  • Design of a Power System Stabilizer for aSynchronous Generator Using HybridIntelligent Controller

    V.Sanjeeva Rao, Dr.B.V.Shankarram
    129
    216
  • Satellite Image enhancement using Combination of Transform Techniques and Interpolation Methods

    R.Swaminathan, Dr.Manoj Wadhwa
    148
    195
  • River: A Reliable Inter-Vehicular Routing Protocol For Vehicular Adhoc Networks

    R.Mallika Devi., Dr.B.Srinivasan.
    115
    210
  • Network Security: Spoofing-The Online Attacks

    Mr. Vinod Saroha, Ritu Mehta, Sonia,Asha
    138
    201
  • IRCAR: Improved Reputation based Context-aware Routing Algorithm for Delay Tolerant Network

    Aditya Pancholi, Sapna Grover
    148
    208
  • Research on Android app Vs Apple app Market: Who is leading?

    Shivam Jaiswal , Ajay Kumar
    149
    323
  • CLOUD COMPUTING: BEGINNING OF A NEW TECHNICAL ERA

    Neha Jain,Shipra Dubey, ander.Rajesh Kumar
    151
    202
  • Comparative study of CPW-fed Bowtie antenna with ACS-fed Bowtie antenna for wireless applications

    Bathala V. Sindooja, T. Anita Jones Mary
    118
    209
  • Profit Maximization Using Prediction Model

    Devare Jayvant ,Phalke Vrushali, Ajabe Varsha,Phalke Ashwini Chaudhari Sheetal
    113
    205
  • Routing in Delay Tolerant Mobile Network: A Comparative Analysis

    Sapna Grover, Aditya Pancholi
    159
    201
  • Survey of MARS: Spatial Link Quality and Node Positioning in Wireless Relay Network

    Suganya.G, Mrs. A. Mary joycy
    135
    215