Article # |
Article Title & Authors (Volume 8 Issue 1 Feb-Mar 2016) |
Page |
1. |
d-STC for Dual Polarized MIMO Transmission in the Hybrid Mobile Satellite System
Shaileena V. John, Dr. M.K. Gupta, Dr. Soni Changlani
Abstract | PDF |
1-8 |
2. |
A Practical, Almost Zero-knowledge Watermark Verification Algorithm
Priscilla Lee, Mohammed Awad, Ernst L. Leiss
Abstract | PDF |
9-16 |
3. |
Feature Extraction for the Analysis of Multi-Channel EEG Signals Using Hilbert- Huang Technique
Mahipal Singh, Rekha Goyat
Abstract | PDF |
17-27 |
4. |
A Modified K-Nearest Neighbor Algorithm Using Feature Optimization
Rashmi Agrawal
Abstract | PDF |
28-37 |
5. |
Thermodynamic Analysis of a Mixed-Mode Solar Dryer
I.A. Ikem, I.H. Aondover, O.E. Nyong, A.J. Adie
Abstract | PDF |
38-47 |
6. |
Switching Arithmetic for DC to DC Converters Using Delta Sigma Modulator Based Control Circuit
K.Diwakar, V.Vinoth Kumar, N.Vignesh Prasanna, D.Reethika
Abstract | PDF |
48-54 |
7. |
Performance Measurement of Water Desalination Supply Chain Using Balanced Scorecard Model
Hasan Balfaqih, Zulkifli Mohd Nopiah, Malak T. Al-Nory, Nizaroyani Saibani
Abstract | PDF |
55-63 |
8. |
Blind Source Separation with Conjugate Gradient Algorithm and Kurtosis Maximization Criterion
Sanjev N Jain, Chandra Shekhar Rai
Abstract | PDF |
64-74 |
9. |
Novel automatic tumor extraction method based on decision Tree Classifier
Sara SANDABAD, Yassine SAYD TAHRI, Achraf Benba, Ahmed HAMMOUCH
Abstract | PDF |
75-82 |
10. |
Data Encryption and Decryption using Reed-Muller Techniques
Upputuri Neelima, Fazal Noorbasha
Abstract | PDF |
83-91 |
11. |
Analyses of Nature Inspired Intelligence in the domain of Path Planning and searching in Cross Country with consideration of various constrained parameters
Monica Sood, Dr Ashish Kr Luhach, Dr Vinod Kr Panchal
Abstract | PDF |
92-97 |
12. |
Secure Semantic Multi-keyword Synonym Ranked Query over Encrypted Cloud Data
Veerraju Gampala, Sreelatha Malempati
Abstract | PDF |
98-107 |
13. |
Effect of Polyvinyl Alcohol (PVA) Blending and Gamma Irradiation on Compressive Strength of FHAp/FGel Composite as Candidate of Scaffold
Alva Edy Tontowi, Dian Pribadi Perkasa, Widowati Siswomihardjo, Darmawan Darwis
Abstract | PDF |
108-116 |
14. |
Cepstral Coefficients Based Feature for Real Time Movement Imagery Classification
Sumanta Bhattacharyya, Dr. Manoj Kumar Mukul
Abstract | PDF |
117-123 |
15. |
A Novel Approach of Load Balancing in Cloud Computing using Computational Intelligence
Shabnam Sharma, Dr. Ashish Kr. Luhach, Dr. Kiran Jyoti
Abstract | PDF |
124-128 |
16. |
A New Approach for Estimation of Penalty Parameter with Tolerance Stack-Up
C. A. Akhadkar, A. B. Deoghare, A. M. Vaidya, P. V. Walke
Abstract | PDF |
129-137 |
17. |
Elevating the Accuracy of Missing Data Imputation Using Bolzano Classifier
S. Kanchana, DR. Antony Selvadoss Thanamani
Abstract | PDF |
138-145 |
18. |
Prevention of Interapp Permission Leakage for Android Applications
Gayathri S, Nirmalrani V
Abstract | PDF |
146-154 |
19. |
Stresses and Deformations in Concrete Encasing Spiral Case of a Hydro-turbine by Finite Element Method
Nibedita Pradhan, Joygopal Jena
Abstract | PDF |
155-161 |
20. |
Study and development of various modules for an interactive G- CAPP using a novel approach for a 2.5D prismatic part
Viswa Mohan Pedagopu, Manish Kumar, Saroj patel
Abstract | PDF |
162-182 |
21. |
Secure Inter Hop Verification with Onion Protocol Implementation for Reliable Routing In Wireless Networks
Nagarajan Ravi, Jeyanthi. P
Abstract | PDF |
183-190 |
22. |
A novel approach to recognize and extract features from a 2.5D prismatic part for an interactive G-CAPP system
Viswa Mohan Pedagopu, Manish Kumar, Saroj patel
Abstract | PDF |
191-218 |
23. |
Reducing Errors of Judgment of Intoxication in Overloaded Speech Signal
Seong-Geon Bae, Myung-Jin Bae
Abstract | PDF |
219-224 |
24. |
Data Fusion in Underwater Environment
K.Lakshmi Prasanna, S.Koteswara Rao, B.Omkar Lakshmi Jagan, A.Jawahar, Sk.B.Karishma
Abstract | PDF |
225-234 |
25. |
A Study on Low Frequency Noise of Dehumidifier using Acoustic Characteristics
Seong-Geon Bae, Won-Hee Lee, Myung-Jin Bae
Abstract | PDF |
235-237 |
26. |
Novel Estimation Algorithm For Bearings-Only Target Tracking
B.Omkar Lakshmi Jagan, S.Koteswara Rao, K.Lakshmi Prasanna, A.Jawahar, Sk.B.Karishma
Abstract | PDF |
238-246 |
27. |
Power Optimization Techniques for Next Generation Wireless Networks
Ratheesh R, Vetrivelan P
Abstract | PDF |
247-256 |
28. |
Survey on Opportunistic Networks in Delay Tolerant Mobile Sensor Networks
Koushik.C.P, Vetrivelan.P
Abstract | PDF |
257-264 |
29. |
MPPT CONTROLLER BASED SOLAR POWER GENERATION USING A MULTILEVEL INVERTER
Kelam Bhargav, Santhi Mary Antony .A
Abstract | PDF |
265-273 |
30. |
Implementation of Video-Processing and Control on a Zynq Soc Platform
J.SriVarshini, V.NarasimhaNayak
Abstract | PDF |
274-279 |
31. |
Multiple Trust Model in Online Transaction by Trusted Third Party
R. Suganya, C. Merlin Pauliester
Abstract | PDF |
280-286 |
32. |
Self-regulating Exploration for Orthologous in Homologous Hematologic Gene Sequence Data Using UPGMA Method
Bipin Nair B J, Sujith M, Alphonsa M V
Abstract | PDF |
287-292 |
33. |
AN EFFICIENT VOICE SCRAMBLING TECHNIQUE FOR NEXT GENERATION COMMUNICATION SYSTEMS
Dhanya G, Dr. J. Jayakumari
Abstract | PDF |
293-299 |
34. |
A Smart Booster Approach In Wireless Ad Hoc Network
Anzar Ahmad, R.C Joshi, R.Gowri
Abstract | PDF |
300-304 |
35. |
Clustering of User Behaviour based on Web Log data using Improved K-Means Clustering Algorithm
S.Padmaja, Dr.Ananthi Sheshasaayee
Abstract | PDF |
305-310 |
36. |
HUMAN SPEECH EMOTION RECOGNITION
Maheshwari Selvaraj, Dr.R.Bhuvana, S.Padmaja
Abstract | PDF |
311-323 |
37. |
A Review of Cryptographic Algorithms in Network Security
B.Nithya, Dr.P.Sripriya
Abstract | PDF |
324-331 |
38. |
Wireless Secured Data Transmission using Cryptographic Techniques through FPGA
I.Rama Satya Nageswara Rao, B.Murali Krishna, Syed Shameem, Habibullah Khan, G.L.Madhumati
Abstract | PDF |
332-338 |
39. |
Estimation of Remaining Useful Life of Bearings Based on Nested Dichotomy Classifier – A Machine Learning Approach
R. Satishkumar, V.Sugumaran
Abstract | PDF |
339-349 |
40. |
Improvement in surface properties with TiN thin film coating on plasma nitrided austenitic 316 stainless steel
Pankaj Kumar Singh, Arbind Kumar, Sanjay Kumar Sinha, Aman Aggarwal, Gajendra Prasad Singh
Abstract | PDF |
350-356 |
41. |
Video Retrieval System-An Approach based on Image Comparison
Tarun Sharma, Chinta Rahul, Shaik Shahul, M. Venkatesan
Abstract | PDF |
357-363 |
42. |
Traffic Collision Avoidance in VANET Using Computational Intelligence
Mayank Bhatt, Shabnam Sharma, Aditya Prakash, Dr. U.S.Pandey, Dr. Kiran Jyoti
Abstract | PDF |
364-370 |
43. |
An Automated Detection and Classification of Suspicious Lesions in Mammograms
Dr. S. Chidambaranathan
Abstract | PDF |
371-378 |
44. |
Experimental Investigation and Optimization of Air-Water SprayImpingement Cooling to Enhance Heat Transfer
Santosh Kumar Nayak, Purna Chandra Mishra, S. K. S. Parashar
Abstract | PDF |
379-390 |
45. |
Visualization and Statistical Analysis of Multi Dimensional Data of Wireless Sensor Networks Using Self Organising Maps
Mr.Thendral Puyalnithi, Dr.V Madhu Viswanatham
Abstract | PDF |
391-395 |
46. |
Experimental Analysis of Cellular Outdoor Propagation at 1800 MHz over Dense Urban Regions of Ghaziabad
Ranjeeta Verma, Garima Saini, Chhaya Dalela
Abstract | PDF |
396-404 |
47. |
Neural Network Controller Based Dstatcom for Voltage Sag Mitigation and Power Quality Issue
Husham Idan Hussein
Abstract | PDF |
405-420 |
48. |
Multi Cloud Deploymentwith Containers
Baskaran Jambunathan, Dr.Y.Kalpana
Abstract | PDF |
421-428 |
49. |
A REVIEW ON CONTEXT MODELLING TECHNIQUES IN CONTEXT AWARECOMPUTING
K.S.Sagaya Priya, Dr.Y.Kalpana
Abstract | PDF |
429-433 |
50. |
Sensitivity Analysis of MEMS Flexure FET with Multiple Gates
K.Spandana, N.Nagendra Reddy, N.Siddaiah
Abstract | PDF |
434-439 |
51. |
Changes in Densities of Basic Constituents during CRMB Production
Naeem Aziz Memon, Pervez Shaikh, Fareed Ahmed Memon, Nafees Ahmed Memon, Noor Ahmed Memon
Abstract | PDF |
440-451 |
52. |
Morphological Analysis of Arabic Words Using Parsing
Majed AbuSafiya, Mohammed Awad
Abstract | PDF |
452-453 |
53. |
Double Ridge Magic-Tee Coupler Using AG and FEM Methods
Fayza BOUSALAH, Nour-Eddine BOUKLI-HACENE
Abstract | PDF |
454-464 |
54. |
A NEW INVENTION OF ALARM REMINDER LOCKING (ARL) SECURITY SYSTEM
M.S.M. Effendi, Z. Shayfull, M.S. Saad, S.M. Nasir, A.H. Badrul Azmi
Abstract | PDF |
465-472 |
55. |
Designing Of Effective Shopper Purchase Analysis Model Based On Chrip Likes
Palla Jyothsna, S.Igni Sabasti Prabu
Abstract | PDF |
473-485 |
56. |
Robust Audio Watermarking Scheme with Synchronization Code and QIM
N.V.Lalitha, Ch.Srinivasa Rao, P.V.Y.Jaya Sree
Abstract | PDF |
486-500 |
57. |
AT-SITE FLOOD ANALYSIS USING EXPONENTIAL AND GENERALIZED LOGISTIC MODELS IN PARTIAL DURATION SERIES (PDS)
M.K.Bhuyan, Joygopal Jena, P.K. Bhunya
Abstract | PDF |
501-514 |
58. |
To design a belt drive scissor lifting table
Corrado Andrea, Polini Wilma, Canale Luca, Cavaliere Costanzo
Abstract | PDF |
515-525 |
59. |
More geometric tolerances on the same surface for a variational model
Polini Wilma
Abstract | PDF |
526-535 |
|
|
|