Papers for Issue
Volume:2 Issue:10 Oct ' 2015
Volume:2 Issue:10 Oct ' 2015
Sr No. | Paper Title | Abstract | Page No | Download |
---|---|---|---|---|
1 | Design and Implement an Automatic Safety Driving System
Author(s):
R.Sumanth Kumar Reddy , M.Vinay Kumar.
|
1-6 | ||
2 | A Novel Routing Protocol strategy in CR-VANETs
Author(s):
Israa A. AbdUlmaged , Ahmed I. Saleh , Labib M. labeb .
|
7-26 | ||
3 | Comparison of ARMAX Model Identification Results Based on Least Squares Method
Author(s):
Adnan ALDEMİR , Hale HAPOGLU.
|
27-35 | ||
4 | A REVIEW ON MECHANICAL PROPERTIES OF HIGH STRENGTH SELF COMPACTING CONCRETE
Author(s):
M.KARTHICK , Dr.K.NIRMALKUMAR.
|
36-41 | ||
5 | LAYER SPECIFIC CLASSIFICATION OF THREATS TO WIRELESS SENSOR NETWORK
Author(s):
Viral B. Polishwala , P. H.Bhathawala.
|
42-48 | ||
6 | WSN-Based Smart Sensors for Power Management in Intelligent Buildings
Author(s):
K.RAJA (ME/APPLIED ELECTRONICS)-II nd year , M.SHOBANA(ME/APPLIED ELECTRONICS)-II nd year , M.Premalatha(ME-AE/II-year).
|
49-62 | ||
7 | A REVIEW PAPER ON STUDY OF FACTORS INFLUENCING QUALITY IN CONSTRUCTION
Author(s):
K.S.SHOBANA , D.AMBIKA.
|
63-65 | ||
8 | Aurdino based Advanced irrigation System using GSM and Solar Energy
Author(s):
Abid Khan , Neju K Prince , Paveen Singh Rathore , Sukrita Swarnkar.
|
66-70 | ||
9 | A Mobile Application for Quick Classification of Plant Leaf Based on Color and Shape
Author(s):
Mohammed Zaid Shahid Akhtar , Dr. Sunil A. Patekar , Mandar G. Sohani.
|
71-80 | ||
10 | A Multi-objective Zero-One Model for Determine the Optimal Portfolio Selection from a Set of Different Projects
Author(s):
Siavash Mohammadi.
|
81-86 | ||
11 | Biodiesel: Spent wash and By-Products
Author(s):
Chandrakant A. Shinde , Dr. Mujahid Husain , F.I.Chavan.
|
87-92 | ||
12 | System for Visitor Pass
Author(s):
Suraj Sahijwani , Parag Jain , Shantanu Jadhav , Ankush Jain , Prof. Abhay Gaidhani.
|
93-97 | ||
13 | A review on Image Processing Algorithms with Help of Field Programmable Gate Array
Author(s):
Amit Ranjan Sinha , Dr. G. R. Sinha.
|
98-104 | ||
14 | BIODIESEL: A Review
Author(s):
Chandrakant A. Shinde , Dr. Mujahid Husain , F.I.Chavan.
|
105-110 | ||
15 | Survey and comprehensive Analysis for performance improvement of AES Encryption
Author(s):
ASHUTOSH PANDEY , SITENDRA TAMARKAR , UMESH KUMAR.
|
111-117 | ||
16 | A New Modulation Technique Is Used In Matrix Converter for Reactive Power Control of Permanent-Magnet Synchronous Wind Generator
Author(s):
P SAIRAM , S.MUNIRAJA.
|
118-125 | ||
17 | A Realistic study of Mobile Ad Hoc Networks
Author(s):
R. Kalaiarasi , D. Sridharan.
|
126-131 | ||
18 | CSMA/SF: Carrier Sense Multiple Access with Shortest First in Multiple Layers
Author(s):
Jinsha Ummar , Asha J George.
|
132-137 | ||
19 | Finding the initial integer point near the solution on a hyper circle by the rhombus method
Author(s):
Mahammad Maharram Aliyev.
|
138-142 | ||
20 | A Review on Economic Load Dispatch Using Evolutionary Technique
Author(s):
Sapna kapoor , Rameshwar Singh.
|
143-148 | ||
21 | MOSAIC IMAGE STEGANOGRAPHY BASED COLOUR TRANSFORMATION FOR ENHANCED SECURITY
Author(s):
Merin Joseph , Soumi CG.
|
149-155 | ||
22 | Identifying Text From An Image By Using Binarization and Normalization
Author(s):
Ninumol S , Riyamol Sidhic.
|
156-164 | ||
23 | Retrieval Based Face Annotation By WLRLCC With Supervised Learning
Author(s):
TINTU JOSE , ASHA GEORGE.
|
165-170 | ||
24 | Dye Penetrant Inspection Technique of Turbine Rotating Component
Author(s):
Alexander Nana Kwesi Agyenim-Boateng , Edward Kumi Diawuo , Psalmiel Nana Nti Agyei.
|
171-176 | ||
25 | Investigating the Determinants of the Social Performance of Non-Business Entities
Author(s):
Donghwan Cho , Jinhyuk Hong.
|
177-186 | ||
26 | DROUGHT A WATER SCARCITY – CASE STUDY BY STATISTICAL APPROACH
Author(s):
Venkatesan V.
|
187-200 | ||
27 | IMPACT OF MOTIVATION AT THE WORKPLACE ON EMPLOYEE PRODUCTIVITY
Author(s):
Dr. Venu Arelly.
|
201-207 | ||
28 | Controlling and Monitoring Applications of WLAN using Android phone
Author(s):
Nikam Vinayak S. , Katkar Gauri A. , Borse Mayuri A. , Prof. Zadbuke A.S..
|
208-212 | ||
29 | “A SURVEY ON SECURITY FRAMEWORKS FOR WIRELESS SENSOR NETWORKS”
Author(s):
RAMESH L , DR.A.MARIMUTHU.
|
213-224 | ||
30 | USER SEARCH FEEDBACK BEHAVIOR USING FUZZY C MEAN
Author(s):
Darshana Parikh , Prof S.M. Patil .
|
225-232 | ||
31 | A Review on Design, Development and Optimization of Air Intake Manifold
Author(s):
Mr. Nilesh B. Kakad , Dr. Sanjay B. Zope.
|
233-238 | ||
32 | MOBILE LEARNING APPLICATION WITH ONLINE QUERY SUPPORT
Author(s):
CHETAN B. UGALE , AKSHAY S. NIGAL , RAMDAS SHINDE , MAYURI METKAR , PROF. U.B. PAWAR.
|
239-243 | ||
33 | Effect of changing hidden neurons and activation function on Back-Propagation (BP) Speed
Author(s):
Rasha M. Hassoon , Safana H. Abbas.
|
244-251 | ||
34 | SURFACE FINISH ENHANCEMENT AND LEVEL OF VIBRATION REDUCTION USING TAGUCHI METHOD
Author(s):
Sonam B. Shinde , Prof. P.N.Deshmukh.
|
252-261 | ||
35 | COMPRESSING ENCRYPTED IMAGES VIA ADAPTIVE SAMPLING
Author(s):
Aida Kurian , Sharika TR.
|
262-267 | ||
36 | RNS Moduli Set {2^(n+1)-1,2^(n)-1,2^n} Implementation Based on Fast Sign Detection Algorithm
Author(s):
Prabu Venkateswaran S , Divyarajalakshmi M.
|
268-274 | ||
37 | Authentication Based Wi-Fi Calling For Mobile Phones
Author(s):
Aalisha R. Parekh , Sheetal B. Kshirsagar , Roshani J. Tandale , Shilpa A. Waghchaure.
|
275-280 | ||
38 | EVOLUTION OF MOBILE GENERATION TECHNOLOGY: 1G TO 5G AND REVIEW OF UPCOMING WIRELESS TECHNOLOGY 5G
Author(s):
Ms. Lopa Jilpesh Vora.
|
281-290 | ||
39 | A Saliency Detection Framework for Effective Saliency Measurement
Author(s):
RINNY T RAJ , NICE MATHEW.
|
291-295 | ||
40 | A New Security Primitive For Authentication And Data Transfer
Author(s):
Naveena Jose , Geethu Mohandas.
|
296-300 | ||
41 | Redesign of Roller Conveyor System for Weight Reduction
Author(s):
Mr. Ganesh Shantaram Sinare , Sanjay B Zope.
|
301-310 | ||
42 | Detection of Energy Hole in Wireless Sensor Networks
Author(s):
Nihar Samantaray , Pabitra Jena , Rakesh Kumar Kar , Chinmaya Kumar Nayak.
|
311-317 | ||
43 | A Review on Authentication of Message Through Hop By Hop With Source Privacy In Wireless Sensor Networks Using Optimal Technique
Author(s):
Ms. A. R. Kukade , Prof. N. M. Dhande.
|
318-322 | ||
44 | Face Recognition Using Singular Value Decomposition and Hidden Markov Model
Author(s):
Memane Swati Bhaskar , Prof. Dr. P.D.Bhamre.
|
323-332 | ||
45 | A Study on Strength Characteristics of BC Soil-Flyash Mixes
Author(s):
S.M. Mahajan , Dr. D. K. Parbat.
|
333-339 | ||
46 | Wireless Multiple Input Multiple Output System Analysis with Relaying
Author(s):
Rajeshvari Purohit , Priti Bhamre.
|
340-351 | ||
47 | Fly ash Utilization as an Adsorbent for Removal of Fluoride
Author(s):
Bhanudas Abhale , Dr. M.Husain , F.I. Chavan.
|
352-358 | ||
48 | An Overview of Micro-Architecture Design for 32-bit VLIW DSP
Author(s):
A. S. Korde , Prof. S. R. Kale.
|
359-362 | ||
49 | Detection of Leukemia in Human blood sample through Image Processing
Author(s):
Rege M.V , Dr. B.W. Gawli .
|
363-369 | ||
50 | A Multimedia Kiosk For Botanical Garden using ULK
Author(s):
M. Ashok.
|
370-372 | ||
51 | ADVANCED INTERCONNECT PROTOCOLS USING HIGH-PERFORMANCE DEADLOCK-FREE ID ASSIGNMENT
Author(s):
Deepasri , Sivasankari.
|
373-379 | ||
52 | Smart Cities
Author(s):
KIRTI SHUKLA , KIRTIKA GOEL.
|
380-386 | ||
53 | Privacy and Security using Traffic padding in web application
Author(s):
Sajeena Salim , Sharika T R.
|
387-392 | ||
54 | PERFORMANCE BASED SEISMIC DESIGN OF STRUCTURES – A REVIEW
Author(s):
SABA BANO , TABASSUM NAQVI , MEHBOOB ANWAR.
|
393-400 | ||
55 | A New Coordinates based caching strategy CBC in mobile ad hoc network
Author(s):
Aseel Faris Marzok , Ahmed I. Saleh , Mohammed F. Al Rahmawy .
|
401-419 | ||
56 | A Survey On Different Types Of Segmentation Techniques
Author(s):
Jisha Gopinath , Remya Krishnan.
|
420-425 | ||
57 | Altering one’s Attachment Style can lead to a blissful Life
Author(s):
Rakhi P. Kashikar , Ritika P. Khandelwal.
|
426-431 | ||
58 | Proposal of methodology for risk assessment in use of mobile phones
Author(s):
Ana Basic , Predrag Popovic.
|
432-442 | ||
59 | Hide Encrypted Secret Image into Audio File using Multi-Logistic Chaotic Map and Wavelet Transform
Author(s):
Dr. Mustafa Dhiaa Al-Hassani.
|
443-454 | ||
60 | The design of high-rise building with ecological approach in Iran
Author(s):
Atieh Rezvani Befrouie , Vahid Ghobadian , Mohammad Taghipour.
|
455-467 |