Vol. 3 No. 08 (2014)

Published: 2017-12-29

Articles

  • Effective Allocation of IPTV Services Through Virtualization in Cloud

    Tulasi Arjunappa, Dorababu Sudarsa
    212
    216
  • A Review on Region Detection And Matching For Object Recognition

    Manpreet Kaur, Silky Narang
    232
    239
  • Trust Based Opportunistic Routing Protocol for VANET Communication

    Mayuri Pophali, Shraddha Mohod, T.S.Yengantiwar
    213
    200
  • Dynamic Query Forms for Non-Relational Database Queries

    S.BhaskaraNaik, B.VijayaBhaskar Reddy
    219
    256
  • Detection and Prevention Of Black Hole Using Clustering In MANET Using Ns2

    Gurnam Singh, Gursewak Singh
    226
    266
  • A Framework for Polarity Classification and Emotion Mining from Text

    Sanjeev Dhawan, Kulvinder Singh, Vandana Khanchi
    196
    264
  • A new automatic finite element mesh generation scheme of all quadrilaterals over an analytical curved surface by using parabolic arcs

    H.T. Rathod , Bharath Rathod, K.V.Vijayakumar , K. Sugantha Devid
    209
    268
  • Design and Development of a Filtration Tool for an Online Job Recruitment Portal

    Ayangbekun, Oluwafemi J. , Yusuf, Maryam O.
    209
    282
  • Iris Segmentation & Recognition in Unconstrained Environment

    Sonia, Arpit Bansal
    191
    241
  • AN OVERVIEW OF BIG-DATA AND CLOUD COMPUTING

    K. Kala Bharathi
    232
    224
  • Multiscale Modeling For Image Analysis of Brain Tumor Detection And Segmentation Using Histogram Thresholding

    Vani Vijayarangan
    186
    240
  • Adaptive Data Rate Oriented Speed and Capacity Based Vertical Handoff Algorithm

    Apurva Agarwal, Ravi Sankar Shukla, Pradeep Kumar Keshwani
    240
    261
  • Performance Analysis and Study of Audio Watermarking Algorithms

    Seethal Paul, Sreelakshmi T.G
    209
    242
  • Data dissemination and effective Path Management on Wireless Sensor Network

    Tarun Mahajan, Sheetal
    216
    235
  • A survey and comparative analysis on different algorithms for Blind Source Separation

    Purnima Mittal
    224
    248
  • Dynamic histogram equalization, PCA & MAX-DCT based multi-focus image fusion

    Shivdeep kaur, Dr. Rajiv Mahajan
    176
    241
  • A Review on Performance Improvement of Wireless System via Smart Antennas

    Chander Shekher, Preeti Gulati
    228
    241
  • Detection and Isolation of Packet Droppers in Wireless Networks

    Dr.K.Kungumaraj , J.Vijayabharathi
    175
  • Automatic Discovery of Personal Name Aliases from the Web Using Lexical Pattern-Based Approach

    Ms. Trupti M. Marawar , Prof. Wyomesh Deepanker , Prof. Kailash Patel
    209
    275
  • Extraction of text from images

    Mamatha B S, Chaithra B P
    186
    247
  • Degradation of Keratinous Waste Products by Keratinolytic Bacteria Isolated from soil

    Harison Masih , Sandeep Singh
    221
    260
  • Multi-Level Encryption using SDES Key Generation Technique with Genetic Algorithm

    S.Devi, Dr.V.Palanisamy
    201
    262
  • Review of ALERT based on cryptography method

    Kanmani.P, Dr. Y.Kalpana
    220
    229
  • Comparative Study on Thresholding Techniques of Discrete Wavelet Transform (DWT) to De-noise Corrupted ECG Signals

    Mitra DJ, Shahjalal M, Kiber MA
    204
    233
  • Interactive Disk Platform for Teaching Kinematics of Machines

    Akande Theresa T, Momoh John J
    207
    218
  • Concept Identification Using Markov Logic Network

    K. Karthikeyan, Dr. V. Karthikeyani
    202
    264
  • Marathi WordNet Development

    Naik Ramesh Ram, C. Namrata Mahender
    279
    395
  • Improvement in Divide and Conquer Scheme Using Relay Nodes

    Archana Kumari, Vishal Walia, Rahul Malhotra
    215
    231
  • Low Power Booth Multiplier Using Radix-4 Algorithm On FPGA

    Prof. V. R. Raut , P. R. Loya
    198
    389
  • Memory Authentication using Soft PUFs

    Sunil Devidas Bobade, Dr. Vijay Mankar
    234
    223
  • A Novel Method for Classification of Lung Nodules as Benign and Malignant using Artificial Neural Network

    Rohit B Kuravatti, Sasidhar B, Dr.Ramesh Babu D R
    194
    252
  • An Evaluation of the Arrangement Transmitter System by Direction of Arrival (DOA) Estimation

    Manish Kumar Goyal Prof. Puran Gour
    235
    232
  • An Analysis of Wideband Phased Array Antenna System using with Micro strip Filter

    Rakesh Kumar Sharma, G. Kumar, Braj Bihari Soni
    226
    260
  • Comparison between NICE and NICE-1 Algorithms In Virtual network systems

    P. Suganya, G. Thailambal, M. Umadevi
    192
    223
  • Depletion of Energy Attacks in Wireless Sensor Networks

    S Himabindhu, G Sateesh
    216
    230
  • BER of Wireless Mesh Networks- A Review

    Kirti, Prof. Jatinder Singh Saini
    196
    239
  • Secure Data hiding in Multi-level using Digital Invisible Ink based on Spread Spectrum Watermarking

    T. Ezhil Sindhu, Guide - P. Sripriya
    181
    260
  • The Nonmonotone Motion

    Yu Han
    527
    238
  • QBIC, MARS and VIPER: A Review on Content Based Image Retrieval Techniques

    Amit Singla, Meenakshi Garg
    209
    225
  • Caesar Cipher Cryptographic Method Along With Bit-Manipulation to a Message to be encrypted and digest for RFID credit card security

    Rohit Sharma, Dr. P.K. Singh
    191
    306
  • Data Mining Approaches for Diabetes using Feature selection

    Thangaraju P, NancyBharathi G
    133
    205
  • Code controlling in DTN’s for progressive packet arrival dynamically

    Uma Upadhya, Dr. Shubhangi, D.C Rekha B Venkatapur
    121
    209
  • Weight Optimization and FEA Analysis of Al-Si Metal Matrix Composite Drive Shaft

    Bhimagoud Patil, Fayaz Kandagal, Vinoth M.A
    128
    225
  • Trust Understanding in Cloud and It’s Services

    Sushil Malik, Shalini Singh, Jyoti Rajpoot,Richa Parashar
    114
    204
  • Comparative Study on Currency Recognition System Using Image Processing

    S. Surya, G. Thailambal
    170
    227
  • Performance Analysis of MFCC and LPCC Techniques in Automatic Speech Recognition

    Dr.Mukesh Rana, Saloni Miglani
    164
    273
  • Character Recognition from Born Digital Images using Correlation

    Soumya soman
    130
    188
  • Conserve Energy by Optimally Executing Mobile Applications in Mobile device or Offloading to Cloud

    Bhavatharini M G, Veena A, Thejas Chikkalingappa M G
    156
    202
  • DWT Domain Data Encryption with Asymmetric key Cryptography

    Miss. Snehal C.Dinde, Dr.Mrs.Shubhangi B.Patil
    123
    204
  • Adaptive Constructive Algorithm for Artificial Neural Networks

    Prof. (Ms) A. B. Shikalgar, Prof. (Mrs) A. N. Mulla, Prof. T. A. Mulla
    140
    206
  • Disaster Event Dectection Reporting System Development Using Tweet Analysis

    Sunil.D.N, B.Pavan Kumar, P. Nirupama
    119
    206
  • Novel Resonant Pole Inverter for Brushless DC Motor Drive System using Fuzzy Logic controller

    Gaurav Kumar Mishra, A.K Pandey
    140
    325
  • A New Algorithm for QR Code Watermarking Technique For Digital Images Using Wavelet Transformation

    Alikani Vijaya Durga, S Srividya
    149
    267
  • A Novel Power Saving Framework for Emissive Displays Using Contrast Enhancement Based On Histogram Equalization

    Geetha Manikya Prasad R, S Srividya
    129
    207
  • Wireless Sensor Network For Landslide Assessment

    Mr.Sagar D. Solanki, Mr. Ankit Suthar
    152
    219
  • A Review on Fingerprint Recoginition Technique Using Real Minutia Identification

    Komal Sharma, Vinod Kumar Singla
    149
    211
  • Development of a Computer-Based Test Platform with a FOSS

    P. O. Ajewole, J. J. Momoh
    121
    192
  • Introducing Health Care Analytics for Cancer Treatment

    Nitesh Dugar, Surendra Yadav
    125
    215
  • Ternary wide-bandgap chalcogenides LiGaS2 and BaGa4S7 for the mid-IR

    Rena J. Kasumova, .A. Safarova, N.V. Kerimova
    163
    212
  • Preserving Data Integrity and Public Auditing for Data Storage in Cloud Computing

    M. Pavani, D. Jayanarayana Reddy Dr. S.PremKumar
    133
    210
  • Ranking on Data Manifold with Sink Points

    R.Kanimozhi, Dr. Y. Kalpana
    158
    194
  • Car Number Plate Recognition System

    Melba Lira D’souza, Brenda Meena D’souza
    130
    751
  • Survey on Cloud Computing In Health Care Systems

    Sushma S.A, Priyadarshini D.Kalewad
    170
    223
  • Security Issues in Health Care

    Sonia K Savant, Prof. Aruna S. Nayak
    144
    201
  • Data Security for Wireless Mesh Network Using Onion Routing Algorithm

    Shruti Patil, Suvarna Kanakaraddi, Chetankumar Patil
    147
    230
  • Load Balancing In Clustered Network

    Suwaathy Kayalvily. D , Mangayarkarasi. S
    132
    157
  • A Review on Basic Principles of an E-Assessment System

    S.S. Vora, S.A.Shinde
    126
    206
  • Image Compression Techniques Review: DCT, DWT, VQ and Fractal Compression

    Mahinderpal Singh, Meenakshi Garg
    246
    232
  • Robust Feature Based Automatic Text-Independent Gender Identification System Using Ergodic Hidden Markov Models(HMMs)

    R. Rajeswara Rao
    147
    225
  • Study of Web Content Mining and Its Tools

    Dr.P.Sujatha, G.Thailambal, R.Sheela Angalin Ruby
    143
    224
  • Tutorial review on existing image compression techniques

    Bhavna Pancholi, Reena Shah, Mitul Modi
    154
    245
  • Pyramid Based Image Fusion

    Chhamman Sahu, Raj Kumar Sahur
    139
    271
  • Regression Testingin Software Development

    Jaidutt Tyagi, Bhumika Garg
    174
    203
  • “The Advanced Prolong Montroller & Recording System” using Wireless, Distributed DAS Technology

    Mr. Manesh V.Raut , Prof. Rupali S.Khule
    116
    211
  • Optimization of Repeater Spacing in Optical Fiber Communication

    Mr.Ashwin V. Goswami, Mr.Mayur Parmar
    158
    264
  • A Review of Invisible Image Steganography Using Mid Band DCT Coefficients

    Shinu, Vijay Laxmi
    122
    204
  • Hadoop – from where the journey of unstructured data begins…

    Mrs. R. K. Dixit, Sourabh Mahajan, Suyog Kandi
    114
    217
  • Probabilistic Broadcasting based on Neighbor Coverage for CBR and VBR Traffic in MANET

    Arathy O, Binu Mathew
    167
    189
  • Extended Round Robin Load Balancing in Cloud Computing

    Priyanka Gautam, Rajiv Bansal
    141
    222
  • Highly Secure Invertible Data Embedding Scheme Using Histogram Shifting Method

    Parvathy S, Abubeker K M
    134
    210
  • Fault Detection and Tolerant System (FDTS) for SaaS Layer in Cloud Computing

    Shweta Jain, Prof. Ashok Verma, Prof. Rashween Kaur Saluja
    143
    225
  • A Review Paper on Energy Efficient Routing in Wireless Sensor Networks

    Jamna Kaur, Rachna Rajput
    117
    209
  • A Review Paper On Web Page Ranking Algorithms

    Seema Rani, Upasana Garg
    145
    303
  • CMOS Digital Based Technology for Static Power Reduction in Nanoscale Circuits

    Srivnivas kolli
    144
    183
  • Implementation of Discrete Wavelet Transmission for Color Image Transmission in OFDM

    Leman Kumar, Yojana Yadav
    158
    226
  • Efficient Routing in VANETs using Traffic Awareness

    B. V. Visweswar Reddy, Dr. P. Bhargavi
    130
    190
  • ANALYSIS OF FFT AND DWT BASED OFDM

    Cheenu, Aruna Tyagi
    133
    213
  • A Wheeling and Steering based route reconstruction approach in congested MPLS network

    Mrs. Babita
    145
    191
  • Various Techniques for Denoising EEG signal : A Review

    Simranpreet Kaur, Sheenam Malhotra
    143
    436