Review of Information Authentication in Mobile Cloud over SaaS & PaaS Layers

Author(s): Vineet Guha, | Manish Shrivastava
Volume: 3
Issue: 9
Year: 2013





Association Rules Optimization: A Survey

Author(s): Anshuman Singh Sadh, | Nitin Shukla
Volume: 3
Issue: 9
Year: 2013





Implement Security using smart card on Cloud

Author(s): Amish Kumar Aman | Vijay Prakash
Volume: 3
Issue: 9
Year: 2013





Reactive Power Compensation on 132 KV Substation Using Soft Computing Techniques (Fuzzy Logic)

Author(s): Yojna Saratkar, | Arun Pachori
Volume: 3
Issue: 9
Year: 2013





An Efficient Image Denoising Method based on Fourth-Order Partial Differential Equations

Author(s): Anand Swaroop Khare, | Ravi Mohan, | Sumit Sharma
Volume: 3
Issue: 9
Year: 2013





Reactive Power Compensation in Transmission Line using Fuzzy Control Method: A Survey

Author(s): Yojna Saratkar, | Arun Pachori
Volume: 3
Issue: 9
Year: 2013





A Secure Mechanism to Supervise Automotive Sensor Network by Client on Smart Phone

Author(s): T R Yashavanth, | Ravi S Malashetty, | V R Udupi
Volume: 3
Issue: 9
Year: 2013





Extracting Person Name, Date and Place from Text Documents Using LEX Tool

Author(s): Roohi Sharma
Volume: 3
Issue: 9
Year: 2013





Result Analysis of Proposed Image Enhancement Algorithm Based on a Self Organizing Map Network and Wavelet Transform

Author(s): Shobhit Verma, | Hitesh Gupta
Volume: 3
Issue: 9
Year: 2013





Securing Routing Protocol by Distributed Key Management and Threshold Cryptography in Mobile Ad hoc Network
Author(s): Neha Gupta, | Manish Shrivastava
Volume: 3
Issue: 9
Year: 2013




Robust LQR Control Design of Gyroscope

Author(s): Ashok S. Chandak | Anil J. Patil
Volume: 3
Issue: 9
Year: 2013





Block Based Information Hiding using Cosine, Hartley, Walsh and Haar Wavelets

Author(s): H. B. Ke kre | Sude e p D. The pade | Ratne sh N. Chaturve di
Volume: 3
Issue: 9
Year: 2013





Adaptive job Scheduling for Computational Grid based on Ant Colony Optimization with Genetic Parameter Selection

Author(s): Saurabh Mandloi, | Hitesh Gupta
Volume: 3
Issue: 9
Year: 2013





A Survey of latest Algorithms for Frequent Itemset Mining in Data Stream

Author(s): U.Chandrasekhar, | Sandeep Kumar. K, | Yakkala Uma Mahesh
Volume: 3
Issue: 9
Year: 2013





A Review of Protein-DNA Binding Motif using Association Rule Mining

Author(s): Virendra Kumar Tripathi, | Hitesh Gupta
Volume: 3
Issue: 9
Year: 2013





Credential Clustering in Parallel Comparability Frequency Amplitude

Author(s): Ameela.T, | Kaleeswaran.D
Volume: 3
Issue: 9
Year: 2013





Speech parameterization based on AM-FM model and its application in speaker identification using AANN

Author(s): D. Giften Francis Samuel , | D. Synthiya Vinothini
Volume: 3
Issue: 9
Year: 2013





Attack Detection in Watermarked Images with PSNR and RGB Intensity

Author(s): Neha Chauhan, | Akhilesh A. Waoo, | P. S. Patheja
Volume: 3
Issue: 9
Year: 2013





Multi-Level Security for Automotive – RFID Based Technology with Lab VIEW Implementation

Author(s): Priya Darshini .V, | Prakash.R, | Prasannabalaje.S.M, | Sangeetha Monica.T
Volume: 3
Issue: 9
Year: 2013





Image Denoising based on Fourth-Order Partial Differential Equations: A Survey

Author(s): Anand Swaroop Khare, | Ravi Mohan, | Sumit Sharma
Volume: 3
Issue: 9
Year: 2013





A Bandwidth-Efficient Cooperative Authentication and an En-route Filtering Scheme for Filtering Injected False Data in Wireless Sensor Networks

Author(s): T.R. Yashavanth, | Ravi S Malashetty, | Rashmi C.R
Volume: 3
Issue: 9
Year: 2013





An Ensemble Method based on Particle of Swarm for the Reduction of Noise, Outlier and Core Point

Author(s): Satish Dehariya, | Divakar Singh
Volume: 3
Issue: 9
Year: 2013





An Efficient Partition Technique to reduce the Attack Detection Time with Web based Text and PDF files

Author(s): Animesh Dubey, | Ravindra Gupta, | Gajendra Singh Chandel
Volume: 3
Issue: 9
Year: 2013





A Survey of Middleware in different languages for Ubiquitous Services

Author(s): Neha Sharma, | Usha Batra, | Saurabh Mukherjee
Volume: 3
Issue: 9
Year: 2013





Modeling For Runtime Locality Optimizations of Distributed Java Applications Using Dynamic Localization Algorithm

Author(s): Daya Shankar Verma , Abhay Kumar , Amarto Chakrabarty , Haider Banka , Amrita Priyam
Volume: 3
Issue: 8
Year: 2013





Approaches for Disambiguation in Hindi Language

Author(s): Pankaj Kumar, Atul Vishwakarma and Ashwani Kr. Verma
Volume: 3
Issue: 8
Year: 2013





A Comprehensive study on Cloud Green Computing: To Reduce Carbon Footprints Using Clouds

Author(s): Chiranjeeb Roy Chowdhury, Arindam Chatterjee, Alap Sardar, Shalabh Agarwal, Asoke Nath
Volume: 3
Issue: 8
Year: 2013





Content Base Image Retrieval using Combination of Color, Shape and Texture Features

Author(s): Neha Jain, Sumit Sharma, Ravi Mohan Sairam
Volume: 3
Issue: 8
Year: 2013





An Unsupervised approach for augmentation of Protein Structure

Author(s): Geetika S. Pandey, R.C Jain
Volume: 3
Issue: 8
Year: 2013





A linear Fuzzy Goal Programming Method for Solving Optimal Power Generation and Dispatch Problem

Author(s): Bijay Baran Pal, Mousumi Kumar
Volume: 3
Issue: 8
Year: 2013





Switching of Picosecond Pulses under Third Order Dispersion Effects in a Non Linear Fiber Coupler

Author(s): Rekha S, James Raja S
Volume: 3
Issue: 8
Year: 2013





A study on implementing Green IT in Enterprise 2.0

Author(s): Shalabh Agarwal, Asoke Nath
Volume: 3
Issue: 8
Year: 2013





SEPIC Based PFC Converter for PMBLDCM Drive in Air Conditioning System

Author(s): Amit Kumar Sinha, Gandhi. R
Volume: 3
Issue: 8
Year: 2013





Analysis on Photovoltaic Assisted Three Phase five level Unipolar PWM Inverter for Induction Motor Driven Water Pumping System

Author(s): Ajay Kumar Maurya, Kishore Chahar, Y. K. Chauhan
Volume: 3
Issue: 8
Year: 2013





A Technique for Image Search Using Fractal Quadtree Partitioned Iterated Function System-A Survey

Author(s): Shraddha Viraj Pandit,Manish Shreevastava
Volume: 3
Issue: 8
Year: 2013





Implementation of ON/OFF and PID controller using TCP Protocol Based on Virtual Instrumentation

Author(s): Abhyarthana Bisoyi , Umesh Chandra Pati
Volume: 3
Issue: 8
Year: 2013





Steganography in MPEG V ideo F iles using MACROBLOCKS

Author(s): Lathikanandini. M , Suresh. J
Volume: 3
Issue: 8
Year: 2013





Numerical Analysis of Free Surface in Water Model for Design of Submerged Entry Nozzle

Author(s): Rajat Kumar Das, Sukanta Kumar Dash
Volume: 3
Issue: 8
Year: 2013





Efficient Frequent Pattern Mining Techniques of Semi Structured data: a Survey

Author(s): Leena A Deshpande, R.S. Prasad
Volume: 3
Issue: 8
Year: 2013





DEDD Symmetric-Key Cryptosystem

Author(s): Praloy Shankar De, Prasenjit Maiti
Volume: 3
Issue: 8
Year: 2013





An Evaluation of MANET Routing Protocol

Author(s): Neha Gupta, Manish Shrivastava
Volume: 3
Issue: 8
Year: 2013





Selection of suitable Topology and Switching Technique of ZSI for wind power application

Author(s): Tanmoy Maity, Santosh Sonar
Volume: 3
Issue: 8
Year: 2013





A Comprehensive Study on Animal miRNAs: A Computational approach to explore its implications in Biological and Chemical environments

Author(s): Joyshree Nath
Volume: 3
Issue: 8
Year: 2013





ECG signal analysis for detection of Heart Rate and Ischemic Episodes

Author(s): Goutam Kumar Sahoo, Samit Ari, Sarat Kumar Patra
Volume: 3
Issue: 8
Year: 2013





Cross Dumbbell Periodic Defected Ground Structure Characteristics

Author(s): Prakash K Kuravatti, T. S. Rukmini
Volume: 3
Issue: 8
Year: 2013





A Novel Approach for Improving the Performance of TCP by TCP Reno and SACK Acknowledgement in high traffic density conditions with cognitive radios

Author(s): Reena rai and Maneesh Shreevastava
Volume: 3
Issue: 8
Year: 2013





Genetic Algorithm Based Goal Programming Procedure for Solving Interval-Valued Multilevel Programming Problems

Author(s): Papun Biswas, Bijay Baran Pal, Anirban Mukhopadhyay, Debjani Chakraborti
Volume: 3
Issue: 8
Year: 2013





Ethics of E-Commerce in Information and Communications Technologies

Author(s): Santosh Kumar Das, Abhishek Kumar, Bappaditya Das, A.P.Burnwal
Volume: 3
Issue: 8
Year: 2013





Application of Green computing in Framing Energy Efficient Software Engineering

Author(s): Aritra Mitra, Riya Basu, Avik Guha, Shalabh Agarwal, Asoke Nath
Volume: 3
Issue: 8
Year: 2013





Microstrip Antenna with Centrally Loaded Inductive Discontinuity for Dual Band Operation

Author(s): A. Raaz, S. Chattopadhyay
Volume: 3
Issue: 8
Year: 2013





Pair Programming “Potential Benefits and Threats”

Author(s): Supriya Gupta , Vandana Bhattacharya, Madhumita Singha
Volume: 3
Issue: 8
Year: 2013





Verification of Data Reliability and Secure Service for Dynamic Data in Cloud Storage

Author(s): Nithiavathy.R, Suresh.J
Volume: 3
Issue: 8
Year: 2013





MRI Brain Image Segmentation based on Thresholding

Author(s): G. Evelin Sujji, Y.V.S. Lakshmi, G. Wiselin Jiji
Volume: 3
Issue: 8
Year: 2013





Semi-Automatic Mapping Generation for the DBpedia Information Extraction Framework

Author(s): Arup Sarkar, Ujjal Marjit, Utpal Biswas
Volume: 3
Issue: 8
Year: 2013





Research on Qualitative Analysis of LEACH with Wormhole attack in Wireless Sensor Network

Author(s): Priya Maidamwar and Nekita Chavhan
Volume: 3
Issue: 8
Year: 2013





Effect of Blur and Noise on Image Denoising based on PDE

Author(s): Meenal Jain , Sumit Sharma, Ravi Mohan Sairam
Volume: 3
Issue: 8
Year: 2013





A Piecewise Linear Approximation Method to Solve Fuzzy Separable Quadratic Programming Problem

Author(s): Shyamal Sen, Bijay Baran Pal
Volume: 3
Issue: 8
Year: 2013





A Survey on Different Approaches for Energy Conservation in Wireless Sensor Networks

Author(s): Rumpa Mukherjee,Arindom Mukherjee
Volume: 3
Issue: 8
Year: 2013





ANFIS Prediction Model of a Modified Greenhouse Dryer under Active Mode in No-Load conditions in Winter Season

Author(s): Om Prakash, Anil Kumar
Volume: 3
Issue: 8
Year: 2013





Design of Ultrasonic Transducer MEMS Model for Distance Measurement using Multiphysics

Author(s): Priyabrata Pattnaik, Jhansirani Jena, S.K.Pradhan, S. K. Kamilla, Mihir Narayan Mohanty
Volume: 3
Issue: 8
Year: 2013





Design of Rectangular Stepped DRA for Wireless Local Area Network (Wlan) Applications

Author(s): Chinmaya Sahoo, P. K. Sahu, S. K. Behera
Volume: 3
Issue: 8
Year: 2013





Renovated Cluster Based Routing Protocol for MANET

Author(s): Yuvraj Kumbharey, Suwesh Shukla, Sushil Chaturvedi
Volume: 3
Issue: 8
Year: 2013





Modeling and Simulation on Double Delta Wing

Author(s): Sukanta Saha, Bireswar Majumdar
Volume: 3
Issue: 8
Year: 2013





Fuzzy Goal Programming Approach to Chance Constrained Multilevel Programming Problems

Author(s): Mousumi Kumar, Bijay Baran Pal
Volume: 3
Issue: 8
Year: 2013





Monitoring and Analysis of Vibration Signal Based On Virtual Instrumentation
Author(s): Sunita Mohanta, Umesh Chandra Pati
Volume: 3
Issue: 8
Year: 2013




Performance Comparison of AODV & DSR Routing Protocol in a Fading Environmen

Author(s): D.D.Seth, Harpreet Jolly, Dipti Divya, Garima Aastha, Jewsree Brahma
Volume: 3
Issue: 8
Year: 2013





Privacy and Security: Online Social Networking

Author(s): Akriti Verma, Deepak Kshirsagar, Sana Khan
Volume: 3
Issue: 8
Year: 2013





Shaft MisalignmentDetectionusing Stator Current Monitoring

Author(s): Alok Kumar Verma, Somnath Sarangi and M.H. Kolekar
Volume: 3
Issue: 8
Year: 2013





Ethics of Reducing Power Consumption in Wireless Sensor Networks using Soft Computing Techniques

Author(s): Santosh Kumar Das, Abhishek Kumar, Bappaditya Das and A.P.Burnwal
Volume: 3
Issue: 8
Year: 2013





Spintronics: A New Nanoelectronics Adventure

Author(s): Rohit Apurva, Sonia Chandan, Abhilash Katkar, Prashant Shinde
Volume: 3
Issue: 8
Year: 2013





An effective algorithm for Image security based on Compression and Decomposition method

Author(s): Seetaiah Kilaru, Yojana Kanukuntla, K B S Chary
Volume: 3
Issue: 8
Year: 2013





Mechanical usage for Unused Mineral Insulating Oils for Transformers and Switchgear

Author(s): L.D.N. Sahdeo, Arvind Kumar
Volume: 3
Issue: 8
Year: 2013





PLST: Point Location Using Search Technique Algorithms

Author(s): Syed Jaffar Abbas ,Raju Manjhi
Volume: 3
Issue: 8
Year: 2013





New Lightweight Security Protocol for VANET by Using Registration Identity and Group Certificate

Author(s): Aditi Garg, Ankita Agrawal, Niharika Chaudhary, Shivanshu Gupta, Devesh Pandey, Tumpa Roy
Volume: 3
Issue: 8
Year: 2013





A Robust Technique for Feature-based Image Mosaicing using Image Fusion

Author(s): Vimal Singh Bind, Priya Ranjan Muduli, Umesh Chandra Pati
Volume: 3
Issue: 8
Year: 2013





Effective Performance Evaluation of On-Demand Routing Protocol for Cognitive Radio Ad Hoc Network

Author(s): Srinivas Sethi, Sangita Pal, Ashima Rout
Volume: 3
Issue: 8
Year: 2013





Implementing Log Based Security in Data Warehouse

Author(s): Amritpal Singh, Nitin Umesh
Volume: 3
Issue: 8
Year: 2013





Performance Evaluation Using J2ME with Android over Cloud Services: A Simulation Approach

Author(s): Bharat Prajapat and Manish Shrivastava
Volume: 3
Issue: 8
Year: 2013





Study on key Issues and Critical Success Factors of e - Supply Chain Management in Health Care Services

Author(s): Debashri Dey , Asoke Nath
Volume: 3
Issue: 8
Year: 2013





A Multi Maximal Length Multi Time Period Pseudorandom Bit Sequence (PRBS) Generator

Author(s): Aritra Sinha | Sunit Kumar Sen
Volume: 3
Issue: 8
Year: 2013





A Vectorial modeling for the pentaphase Permanent Magnet Synchronous Machine based on multimachine approach

Author(s): Abdelkrim Sellam,Boubakeur Dehiba,Mohamed B. Benabdallah,Mohamed Abid,Nacéra Bachir Bouiadjra,Boubakeur Bensaid,Mustapha Djouhri
Volume: 2
Issue: 7
Year: 2012





Towards a New Approach for Mining Frequent Itemsets on Data Stream

Author(s): Shailendra Jain, Sonal Patil
Volume: 2
Issue: 7
Year: 2012





Performance evaluation of DWT based image watermarking using error correcting codes.

Author(s): Shaikh Rakhshan Anjum, Priyanka Verma
Volume: 2
Issue: 7
Year: 2012





A review of Support Vector Clustering with different Kernel function for Reduction of noise and outlier for Large Database

Author(s): Deepak Kumar Vishwakarma, Anurag Jain
Volume: 2
Issue: 7
Year: 2012





Reduced Order Modelling and Optimal Control of Fluid Flow Instability

Author(s): Vinay Anand Yadav, Ganapati Joshi
Volume: 2
Issue: 7
Year: 2012





Wireless Sensor Network and Emergency Communication System for Fire Safety

Author(s): Yogesh.S.Kale,A.V. Bapat, Piyush Pande
Issue: 7
Year: 2012




Improving RBF Kernel Function of Support Vector Machine using Particle Swarm Optimization

Author(s): Smruti Rekha Das, Pradeepta Kumar Panigrahi, Kaberi Das3and Debahuti Mishra
Volume: 2
Issue: 7
Year: 2012





Comparison between Different Scheduling Strategies by Using Cost239 Optical Network

Author(s): Pooja Meena, Manish Shrivastava, Sushil Chaturvedi
Volume: 2
Issue: 7
Year: 2012





Design a New Methodology for Removing Fog from the Image

Author(s): Jyoti Sahu
Volume: 2
Issue: 7
Year: 2012





An Efficient Data Mining for Credit Card Fraud Detection using Finger Print Recognition

Author(s): V.Priyadharshini, G.Adiline Macriga
Volume: 2
Issue: 7
Year: 2012





Mine Classification with Imbalanced Data

Author(s): Madhuri Agrawal, Gajendra Singh, Ravindra Kumar Gupta
Volume: 2
Issue: 7
Year: 2012





A Low Cost Hardware Trojan horse Device based on Unintended USB channels and a Solution

Author(s): Pravin Phul
Volume: 2
Issue: 7
Year: 2012





An efficient Support Vector Clustering with combined core outlier and boundary value for pre-processing of data

Author(s): Deepak Kumar Vishwakarma, Anurag Jain
Volume: 2
Issue: 7
Year: 2012





Particle swarm optimization technique to solve unit commitment problem

Author(s): P.V. Rama Krishna, G. Poornachandra Rao, Dr Sukhdeo Sao
Volume: 2
Issue: 7
Year: 2012





Driver’s alertness detection for based on eye blink duration via EOG & EEG

Author(s): Yash S. Desai
Volume: 2
Issue: 7
Year: 2012





Character localization and recognition application for Smartphone

Author(s): Snehal Charjan, R. V. Mante, P. N. Chatur
Volume: 2
Issue: 7
Year: 2012





Transfer Capability Enhancement of Transmission Line using Static Synchronous Compensator (STATCOM)

Author(s): Arti Pateriya,Nitin Saxena ,Manoj Tiwari
Volume: 2
Issue: 7
Year: 2012





Vehicle License Plate Recognition Syst

Author(s): Meenakshi,R. B. Dubey
Volume: 2
Issue: 7
Year: 2012





Result Analysis of Blur and Noise on Image Denoising based on PDE

Author(s): Meenal Jain , Sumit Sharma, Ravi Mohan Sairam
Volume: 2
Issue: 7
Year: 2012





Design of Face Recognition System by Using Neural Network with Discrete Cosine Transform and Principal Component Analysis

Author(s): Rohit Jain, Rajshree Taparia
Volume: 2
Issue: 7
Year: 2012





To Study the Mathematical Analysis for Human area Networking using Finite Element Method

Author(s): Kakade Priyanka, Khobragade S V
Volume: 2
Issue: 7
Year: 2012





Segmentation of One and Two Hand Gesture Recognition using Key Frame Selection

Author(s): Ketki P. Kshirsagar
Volume: 2
Issue: 7
Year: 2012





Result Analysis on Content Base Image Retrieval using Combination of Color, Shape and Texture Features

Author(s): Neha Jain, Sumit Sharma, Ravi Mohan Sairam
Volume: 2
Issue: 7
Year: 2012





A Comprehensive Study in Data Mining Frameworks for Intrusion Detection

Author(s): R.Venkatesan, R. Ganesan, A. Arul Lawrence Selvakumar
Volume: 2
Issue: 7
Year: 2012





Semantic Web Mining: Benefits, Challenges and Opportunities

Author(s): Syeda Farha Shazmeen, Etyala Ramyasree
Volume: 2
Issue: 7
Year: 2012





T-Learning: An Interactive Learning Services Framework for Indian Educational Broadcasts

Author(s): Shubhanshu Gupta, Sayali Godbole, Yogesh Angadi, Sudesh Mudliar
Volume: 2
Issue: 7
Year: 2012





An Evaluation of Two Mammography Segmentation Techniques

Author(s): Sujata, R. B. Dubey, R. Dhiman, T. J. Singh Chugh
Volume: 2
Issue: 7
Year: 2012





Real Time Scheduling Services for Distributed RT-CORBA Applications

Author(s): Bineta Tresa Mathew
Volume: 2
Issue: 7
Year: 2012





An Efficient load balancing using Genetic algorithm in Hierarchical structured distributed system

Author(s): Priyanka Gonnade, Sonali Bodkhe
Volume: 2
Issue: 6
Year: 2012





Analysis of Information Systems Security Issues and Security Techniques

Author(s): Rakesh Kumar, Dr.Hardeep Singh
Volume: 2
Issue: 6
Year: 2012





Using the concept of Multi-Threaded Programming Preparing the Object Oriented Design Model

Author(s): Tauseef Ahmad, Tameem Ahmad
Volume: 2
Issue: 6
Year: 2012





Improved Tiled Bitmap Forensic Analysis Algorithm

Author(s): C. D. Badgujar, G. N. Dhanokar
Volume: 2
Issue: 6
Year: 2012





Real-Time Scheduling for Parallel Task Models on Multi-core Processors - A critical review"

Author(s): Mahesh Lokhande, Dr. Mohd. Atique
Volume: 2
Issue: 6
Year: 2012





Constant Modulus Blind Equalization for Time-Varying MIMO-FIR Channels with Pulse Estimation

Author(s): Rekha
Volume: 2
Issue: 6
Year: 2012





Comparative study of several Clustering Algorithms

Author(s): Prof. Neha Soni, Dr. Amit Ganatra
Volume: 2
Issue: 6
Year: 2012





Reduction of Negative and Positive Association Rule Mining and Maintain Superiority of Rule Using Modified Genetic Algorithm

Author(s): Nikhil Jain,Vishal Sharma,Mahesh Malviya
Volume: 2
Issue: 6
Year: 2012





Bit Level Generalized Modified Vernam Cipher Method with Feedback

Author(s): Prabal Banerjee, Asoke Nath
Volume: 2
Issue: 6
Year: 2012





Air Pollution Monitoring & Tracking System Using Mobile Sensors and Analysis of Data Using Data Mining

Author(s): Umesh M. Lanjewar, J. J. Shah
Volume: 2
Issue: 6
Year: 2012





Depiction of New Static - Starting and Excitation Systems to start Short Circuit Generators

Author(s): G.Venkateswarlu, N.R.Mondal, J.R.Gajbhiye, A.K.Khairwar
Volume: 2
Issue: 6
Year: 2012





Fuzzy Based Control Using Lab view For Temperature Process

Author(s): S.Kavitha, B.Chinthamani, S.Joshibha Ponmalar
Volume: 2
Issue: 6
Year: 2012





Study of an Intelligent Spider Algorithm & Metasearch Engines

Author(s): Govinda Borse, Ankita Baheti,
Volume: 2
Issue: 6
Year: 2012





Visualization Techniques for Digital forensics: A Survey

Author(s): Mr.Sushilkumar Chavhan, Ms.S.M.Nirkhi
Volume: 2
Issue: 6
Year: 2012





Computer Aided Design in Digital Human Modeling for Human Computer Interaction in Ergonomic Assessment: A Review

Author(s): Suman Mukhopadhyay , Sanjib Kumar Das and Tania Chakraborty
Volume: 2
Issue: 6
Year: 2012





Liver Ultrasound Image Analysis using Enhancement Techniques

Author(s): Smriti Sahu, Maheedhar Dubey, Mohammad Imroze Khan
Volume: 2
Issue: 6
Year: 2012





Softening Misbehaviour of Nodes and Enforcing Cooperation in Mobile Ad Hoc Networks

Author(s): Atul Kumar Purohit, Mukesh Kumar Baghel and Hitesh Gupta, Parmalik Kumar
Volume: 2
Issue: 6
Year: 2012





A Review of Network Forensics Techniques for the Analysis of Web Based Attack

Author(s): Mr. Sudhakar Parate, Ms. S. M. Nirkhi
Volume: 2
Issue: 6
Year: 2012





Study of Efficient Utilization of Power using green Computing

Author(s): Ms .Dheera Jadhwani, Mr.Mayur Agrawal, Mr.Hemant Mande
Volume: 2
Issue: 6
Year: 2012





A Review of the Fatigue Analysis of an Automobile Frames

Author(s): Jadav Chetan S., Panchal Khushbu C., Patel Fajalhusen*
Volume: 2
Issue: 6
Year: 2012





Intelligent Traffic System for VANET: A Survey

Author(s): Ganesh S. Khekare, Apeksha V. Sakhare
Volume: 2
Issue: 6
Year: 2012





Securing Storage Data in Cloud Using RC5 Algorithm

Author(s): Jay Singh, Brajesh Kumar, Asha Khatri
Volume: 2
Issue: 6
Year: 2012





A review of optimization of Automobile structures

Author(s): Khushbu C. Panchal, Chetan S. Jadav, Hirak Patel
Volume: 2
Issue: 6
Year: 2012





Secure Image Transcoding technique using chaotic key based algorithm

Author(s): Anoop B N , Sudhish N George , Deepthi P P
Volume: 2
Issue: 6
Year: 2012





A Study of Design and Implementation Techniques of Active Soft Orthotic Ankle Foot

Author(s): Ganesh K. Yenurkar, Swapnili P. Karmore
Volume: 2
Issue: 6
Year: 2012





Automated Verification of Memory Consistencies of DSM System on Unified Framework

Author(s): Dr. Pankaj Kumar, Durgesh Kumar
Volume: 2
Issue: 6




Finding Frequent Pattern with Transaction and Occurrences based on Density Minimum Support Distribution

Author(s): Preeti Khare | Hitesh Gupta
Volume: 2
Issue: 5
Year: 2012





A Review of Multi-Class Classification for Imbalanced Data

Author(s): Mahendra Sahare | Hitesh Gupta
Volume: 2
Issue: 5
Year: 2012





An Efficient Wavelength variation approach for Bend Sensing in Single mode- Multimode-Single mode Optical Fiber Sensors

Author(s): Abdul Samee Khan | Prof. Mohd. Sarwar Raeen
Volume: 2
Issue: 5
Year: 2012





Reduction of Noise Image Using LMMSE

Author(s): Joginder Singh | R. B. Dubey
Volume: 2
Issue: 5
Year: 2012





Analysis and comparison of the 4-PSK and 8-PSK STTC over Rayleigh fading Channels for determining Performance

Author(s): Pragya Gupta | Uday Pratap Singh | Vineet Richhariya
Volume: 2
Issue: 5
Year: 2012





Secure Query Processing and Routing in Wireless Sensor Networks

Author(s): R. Jebakumar | P. Vivekanandan
Volume: 2
Issue: 5
Year: 2012





Design and Comparative Study of Three Photovoltaic Battery Charge Control Algorithms in MATLAB/SIMULINK Environment

Author(s): Ankur Bhattacharjee
Volume: 2
Issue: 5
Year: 2012





An Optimized Feature Selection for Image Classification Based on SVMACO

Author(s): Priyanka Dhasal | Shiv Shakti Shrivastava | Hitesh Gupta | Parmalik Kumar
Volume: 2
Issue: 5
Year: 2012





Studies on IPTV over IMS test bed

Author(s): K. Sundara Raja Raja Perumal | D. Vinayagam | K. Porkamalapathandevi
Volume: 2
Issue: 5
Year: 2012





An Empirical Study on feature selection for Data Classification

Author(s): S.Rajarajeswari | K.Somasundaram
Volume: 2
Issue: 5
Year: 2012





Transmission of Power to the Island Using HVDC

Author(s): B. Vijayalakshmi | C. Ram Kumar
Volume: 2
Issue: 5
Year: 2012





Swing Detection Using Onto Tree

Author(s): Rakesh Pandit | Parag Sohoni | Sachin Patel
Volume: 2
Issue: 5
Year: 2012





Investigation of rerouting system in Optical Network

Author(s): Sushil Chaturvedi | Manish Shrivastava
Volume: 2
Issue: 5
Year: 2012





Analysis of fault using microcomputer protection by symmetrical component method

Author(s): Mr. Ashish Choubey | Ms. Latika Pande
Volume: 2
Issue: 5
Year: 2012





Biorthogonal Wavelet Transform Digital Image Watermarking

Author(s): B. Rajendra Prasad | k.Vinayaka Kota | B. Mysura Reddy
Volume: 2
Issue: 5
Year: 2012





Performance evaluation of cross layer QoS scheduling for Long Term Evolution Network

Author(s): D. Vinayagam | R. Kurinjimalar | D. Srinivasan
Volume: 2
Issue: 5
Year: 2012





Comparison and Analysis of an efficient Image Compression Technique Based on Discrete 2-D wavelet transforms with Arithmetic Coding

Author(s): Deepika Sunoriya | Prof. Uday Pratap Singh | Prof. Vineet Ricchariya
Volume: 2
Issue: 5
Year: 2012





Location Privacy Using User Anonymity and Dummy Locations

Author(s): Prince Kumar Sahu | Saroj Kumar Chandra
Volume: 2
Issue: 5
Year: 2012





A Review of Content Based Image Classification using Machine Learning Approach

Author(s): Sandeep Kumar | Zeeshan Khan | Anurag jain
Volume: 2
Issue: 5
Year: 2012





Prevention of Cross-Site Scripting Vulnerabilities using Dynamic Hash Generation Technique on the Server Side

Author(s): Shashank Gupta | Lalitsen Sharma | Manu Gupta | Simi Gupta
Volume: 2
Issue: 5
Year: 2012





Medical Image Protection using steganography by crypto-image as cover image

Author(s): Vinay Pandey | Manish Shrivastava
Volume: 2
Issue: 5
Year: 2012





Removal of cyclic prefix in Adaptive Non-Contiguous OFDM for Dynamic Spectrum Access using DWT and WT

Author(s): Saket kumar | Puspraj Tanwar
Volume: 2
Issue: 5
Year: 2012





Design and Experimental Implementation of Bipedal robot

Author(s): Sreejith C | Sreeshma K
Volume: 2
Issue: 5
Year: 2012





Modeling & Simulation of Multi-Pulse Converters for Harmonic Reduction

Author(s): Deependra Singh | Prof. Hemant Mahala | Prof. Paramjeet Kaur
Volume: 2
Issue: 5
Year: 2012





Survey paper on different approaches of Threshold Cryptography

Author(s): Neha Gupta | Dr. Manish Shrivastava | Dr. Aditya Goel
Volume: 2
Issue: 5
Year: 2012





Reduction of Co-Channel Interference in transmit/Receive diversity (TRD) in MIMO System

Author(s): Manisha Rathore | Puspraj Tanwar
Volume: 2
Issue: 5
Year: 2012





FPGA Based Quadruple Precision Floating Point Arithmetic for Scientific Computations

Author(s): Mamidi Nagaraju | Geedimatla Shekar
Volume: 2
Issue: 5
Year: 2012





Tag Based Client Side Detection of Content Sniffing Attacks with File Encryption and File Splitter Technique

Author(s): Syed Imran Ahmed Qadri, | Prof. Kiran Pandey
Volume: 2
Issue: 5
Year: 2012





BER Analysis of MIMO-OFDM System using BPSK Modulation Scheme

Author(s): Shruti Trivedi | Mohd. Sarwar Raeen | Shalendra Singh pawar
Volume: 2
Issue: 5
Year: 2012





Java Based Resource Sharing with Secure Transaction in User Cloud Environment

Author(s): Mr. Sanjay Kumar Brahman | Prof. Brijesh Patel
Volume: 2
Issue: 5
Year: 2012





A Review of Density-Based clustering in Spatial Data

Author(s): Pragati Shrivastava | Hitesh Gupta
Volume: 2
Issue: 5
Year: 2012





Feature Extraction of Mammograms

Author(s): Monika Sharma | R. B. Dubey | Sujata | S. K. Gupta
Volume: 2
Issue: 5
Year: 2012





A Study Paper on IDS Attack Classification Using Various Data Mining Techniques

Author(s): Mrs. Sneha Kumari | Dr. Maneesh Shrivastava
Volume: 2
Issue: 5
Year: 2012





Design Hybrid method for intrusion detection using Ensemble cluster classification and SOM network

Author(s): Deepak Rathore | Anurag Jain
Volume: 2
Issue: 5
Year: 2012





SVD Detection for Cognitive Radio Network based on Average of Maximum- Minimum of the ICDF

Author(s): Mohd. Fahad Fahim | Mohd. Sarwar Raeen
Volume: 2
Issue: 5
Year: 2012





A New Classification Approach for PolSAR Images

Author(s): T. J. Singh Chugh | R. B. Dubey | Sujata
Volume: 2
Issue: 5
Year: 2012





An Approach to Simplify Reversible Logic Circuits

Author(s): Pabitra Roy | Pabitra Roy | Samar Sensarma
Volume: 2
Issue: 5
Year: 2012





An Comparison and Evaluation for Data Gathering and Sharing with Inter Node Communication in Mobile-Sink

Author(s): Mr. Ravindra K. Gupta | Mr. Shashank Saxena | Dr. Shailendra Singh | Mr. Gajendra Singh
Volume: 2
Issue: 2
Year: 2012





A Study of Various Intrusion Detection Model Based on Data Fusion, Neural Network and D-S Theory

Author(s): Ramnaresh Sharma | Manish Shrivastava
Volume: 2
Issue: 2
Year: 2012





Web based Measurement System for Solar Radiation

Author(s): Shachi Awasthi | Dr. P. Mor
Volume: 2
Issue: 2
Year: 2012





Image Compression Technique Based on Discrete 2-D wavelet transforms with Arithmetic Coding

Author(s): Deepika Sunoriya | Prof. Uday Pratap Singh | Prof. Vineet Ricchariya
Volume: 2
Issue: 2
Year: 2012





Intrusion Awareness Based on Data Fusion and SVM Classification

Author(s): Ramnaresh Sharma | Manish Shrivastava
Volume: 2
Issue: 2
Year: 2012





An Efficient approach for Shielding Effect of the Grounding Electrodes under Impulse-Current Voltage based on Matlab

Author(s): Ms. Kalyani Pole | Mr. A.K. Sharma
Volume: 2
Issue: 2
Year: 2012





Web Usage Data Clustering Using Improved Genetic Fuzzy C-Means Algorithm

Author(s): Karunesh Gupta | Manish Shrivastava
Volume: 2
Issue: 2
Year: 2012





An Improved Single and Multiple association Approach for Mining Medical Databases

Author(s): Mr. Sachin sohra | Mr. Narendra Rathod
Volume: 2
Issue: 2
Year: 2012





An Efficient Range Partitioning Method for Finding Frequent Patterns from Huge Database

Author(s): Ms. Ruchita Gupta | Dr.C.S.Satsangi
Volume: 2
Issue: 2
Year: 2012





Using Local Binary Pattern Variance for Land Classification and Crop Identification

Author(s): Mr. Ashwin A. Shinde | Dr. Manish Shrivastava
Volume: 2
Issue: 2
Year: 2012





Review of Data Mining Techniques in Cloud Computing Database

Author(s): Astha Pareek | Dr.Manish Gupta
Volume: 2
Issue: 2
Year: 2012





Application of Value Engineering in Wireless Nano- sensor Network to Monitor Global warming Affected by Uncontrolled Urbanization

Author(s): Mr. Vimal Upadhyay | Dr. Sonali Agarwal | Dr. R. S. Sikarwar
Volume: 2
Issue: 2
Year: 2012





A Novel Association Rule Mining with IEC Ratio Based Dissolved Gas Analysis for Fault Diagnosis of Power Transformers

Author(s): Ms. Kanika Shrivastava | Mr. Ashish Choubey
Volume: 2
Issue: 2
Year: 2012





29 A Novel Approach for Identify Small and Capital Handwritten Letter

Author(s): Ms. Ekta Tiwari | Dr. Maneesh Shreevastava
Volume: 2
Issue: 2
Year: 2012





Finding the Chances and Prediction of Cancer through Apriori Algorithm with Transaction Reduction

Author(s): Shashank Singh | Manoj Yadav | Hitesh Gupta
Volume: 2
Issue: 2
Year: 2012





Real Time Eye Template Detection and Tracking

Author(s): Richa Mehta | Manish Shrivastava
Volume: 2
Issue: 2
Year: 2012





Estimating Lower Bound and Upper Bound of a Markov chain over a noisy communication channel with Poisson distribution

Author(s): Mr. Vinay Mahajan | Prof. Rajesh Nema
Volume: 2
Issue: 2
Year: 2012





A hybrid method for image Denoising based on Wavelet Thresholding and RBF network

Author(s): Sandeep dubey | Fehreen hasan | Gaurav Shrivastava
Volume: 2
Issue: 2
Year: 2012





Congestions control through cloud computing with MANET

Author(s): Mr. Ajey Singh | Dr. Maneesh shrivastava
Volume: 2
Issue: 2
Year: 2012





Web Usage Mining Clustering Using Hybrid FCM with GA

Author(s): Karunesh Gupta | Manish Shrivastava
Volume: 2
Issue: 2
Year: 2012





Document Fraud Detection with the help of Data Mining and Secure Substitution Method with Frequency Analysis

Author(s): Ms.Namrata Shukla | Ms. Shweta Pandey
Volume: 2
Issue: 2
Year: 2012





A Novel Approach for Improving Communication by Wavelength Utilizati

Author(s): Mr. Shrangesh Dahat | Dr. Maneesh Shreevastava
Volume: 2
Issue: 2
Year: 2012





A Secure Data Sharing and Communication with Multiple Cloud Environments with Java API

Author(s): Ms. Shikha Joshi | Ms. Pallavi Jain
Volume: 2
Issue: 2
Year: 2012





A Novel Technique to Read Small and Capital Handwritten Character

Author(s): Ms. Ekta Tiwari | Dr. Maneesh Shreevastava
Volume: 2
Issue: 2
Year: 2012





A Wireless Sensor Network in Vibration Monitoring of Equipments

Author(s): Mr. Vimal Upadhyay | Dr. R. S. Sikarwar | Shuchi Sharma | Shivalika Singh
Volume: 1
Issue: 2
Year: 2011





Cloud Computing Utility and Applications

Author(s): Mr. Pradeep Kumar Tiwari | Mr. Rajesh Kumar Shrivastava | Mr. Satish Pandey | Mr. Pradeep | Kumar Tripathi
Volume: 1
Issue: 2
Year: 2011





Generation of Multiresonator Based RFID System with Accurate Attenuation and Fill until Complete Mechanism (AAFCM)

Author(s): Ms. Shazia Shireen | Prof. Rajesh Nema | Prof. Puran Gour
Volume: 1
Issue: 2
Year: 2011





A Study of Analytics Driven Solutions for Customer Targeting and Sales Force Allocation in Data Mining

Author(s): Santosh Soni
Volume: 1
Issue: 2
Year: 2011





A Practical approach for fault component network for Current and Voltage Phasor Diagram in Power Electronic Environment

Author(s): Mr. Ashish Choubey | Ms. Latika Pande
Volume: 1
Issue: 2
Year: 2011





Improving Performance of Wi-Fi by Compact MIMO Systems by using Gama Frequency-Selective Fading Channels

Author(s): Mr. Sudesh Gupta | Prof. Rajesh Nema | Prof. Puran Gour
Volume: 1
Issue: 2
Year: 2011





Result Analysis and Benefits of Detecting Replicate Documents Using MD5 Hash Function

Author(s): Mr. Pushpendra Singh Tomar | Dr. Maneesh Shreevastava
Volume: 1
Issue: 2
Year: 2011





Artificial Neural Network Based Approach for short load forecasting

Author(s): Mr. Rajesh Deshmukh | Dr. Amita Mahor
Volume: 1
Issue: 2
Year: 2011





Recovery of Alum Coagulant from Water Treatment Plant Sludge: A Greener Approach for Water Purification

Author(s): Ms. Smita Joshi | Ms. Kriti Shrivastava
Volume: 1
Issue: 2
Year: 2011





Comparisons of Short Term Load Forecasting using Artificial Neural Network and Regression Method

Author(s): Mr. Rajesh Deshmukh | Dr. Amita Mahor
Volume: 1
Issue: 2
Year: 2011





Comparative study of space time trellis code using two transmitter and various receiver anteena using rayleigh fading scenario

Author(s): Mr. Sujeet Singh Bhadouria | Dr. Manish Shrivastava | Miss Kavita Deshmukh
Volume: 1
Issue: 2
Year: 2011





Applying Frequent Pattern Mining in Cloud Computing Environment

Author(s): Mr. Dheresh Soni | Mr. Atish Mishra | Mr. Satyendra Singh Thakur | Mr. Nishant Chaurasia
Volume: 1
Issue: 2
Year: 2011





Web Log Mining using Improved Version of Proposed Algorithm

Author(s): Dr. Manish Shrivastava | Mr. Kapil Sharma | MR. Angad Singh
Volume: 1
Issue: 2
Year: 2011





Advanced Instrumentation

Author(s): Mr. Yogendra Dubey | Ms. Madhurima Bose | Mr. Priyesh Jiaswal
Volume: 1
Issue: 2
Year: 2011





A Novel Reconfigurable Character based Token Set Pruner (RCBTSP) for Heterogeneous Environment

Author(s): Reeta Budhani | Dalima Parwani | Meenu Tahilyani | Subuhi Kashif Ansari
Volume: 1
Issue: 2
Year: 2011





A Novel Java Based Computation and Comparison Method (JBCCM) for Differentiating Object Oriented Paradigm Using Coupling Measures

Author(s): Sandeep Singh | Geetika S.pandey | Dr.Yogendra Kumar Jain
Volume: 1
Issue: 2
Year: 2011





Cloud Computing Services Accounting

Author(s): Igor Ruiz-Agundez | Yoseba K. Penya | Pablo G. Bringas
Volume: 2
Issue: 2
Year: 2012





Performance Analysis of Image Classification Algorithm Based on Feature Fusing Technique Model

Author(s): Mukul Yadav | Gaje ndra Singh Chandel | Ravindra Gupta
Volume: 3
Issue: 10
Year: 2013





An Efficient Algorithm for Calculating Maximum Bipartite matching in a Graph

Author(s): Neha Bo ra | Swati Arora | Nitin Arora
Volume: 3
Issue: 10
Year: 2013





Performance of coop MAC P rotocols over C SMA/CA 802.11 protocols

Author(s): H.Srikanth.Kamath
Volume: 3
Issue: 10
Year: 2013





Data Authentication Using Cryptography

Author(s): Sagar Chouksey | Rashi Agrawal | Dushyant Verma | Tarun Metta
Volume: 3
Issue: 10
Year: 2013





An efficient Synchronization Aspects in Cognitive Radio Systems

Author(s): Dhawal Beohar | V.B . Baru
Volume: 3
Issue: 10
Year: 2013





Video Object Tracking based on Automatic Background Segmentation and updating using RBF neural network

Author(s): Pushpender Prasad Chaturvedi | Amit Singh Rajput | Aabha Jain
Volume: 3
Issue: 10
Year: 2013





Monitoring Greenhouse using Wireless Sensor Network

Author(s): Rohit.K.Nikhade | S.L.Nalbalwar
Volume: 3
Issue: 10
Year: 2013





Implementation of FFT by using MATLAB: SIMULINK on Xilinx Virtex - 4 FPGAs: Performance of a Paired Transform Based FFT

Author(s): Ranganadh Narayanam | Artyom M. Grigoryan | Bindu Tushara D
Volume: 3
Issue: 10
Year: 2013





Behaviour of OFDM System u sing MATLAB Simulation

Author(s): S.S.Ghorpade | S.V.Sankpal
Volume: 3
Issue: 10
Year: 2013





A Study of Video Object Tracking based on Automatic Background Segmentation and updating using Different Technique

Author(s): Pushpender Prasad Chaturvedi | Amit Singh Rajput | Aabha Jain
Volume: 3
Issue: 10
Year: 2013





An Auto ranging Data Converter Implementation in FPGA

Author(s): Jithin Krishnan | Sreekumari B | Jiju K
Volume: 3
Issue: 10
Year: 2013





Implementation of 64-Point Reconfigurable FFT Processor for ASIP Architecture

Author(s): B.S.Mahant | L.P.Thakare
Volume: 3
Issue: 10
Year: 2013





Efficient Retrieval of Images for Search Engine by Visual Similarity and Re Ranking

Author(s): Viswa S S
Volume: 3
Issue: 10
Year: 2013





Angular Skew Correction Al g o rithm for Handwritten Hindi Text

Author(s): Rohit Sharma | Utkarsh Mathur | Naveen Srivastava
Volume: 3
Issue: 10
Year: 2013





Apriori and Ant Colony Optimization of Association Rules

Author(s): Anshuman Singh Sadh | Nitin Shukla
Volume: 3
Issue: 10
Year: 2013





Classification of Cancer Gene Selection Using Random Forest and Neural Network Based Ensemble Classifier

Author(s): Jogendra Kushwah | Divakar Singh
Volume: 3
Issue: 10
Year: 2013





Cross Layer Energy Conservation in Routing Protocol for MANET

Author(s): Pandit Savyasaachi J | Shah Niyati
Volume: 3
Issue: 10
Year: 2013





Comparative Result Analysis of Novel Algorithm based on RBF Network for Image Enhancement

Author(s): Shobhit Verma | Hitesh Gupta
Volume: 3
Issue: 10
Year: 2013





OFDM Channel Estimation using a MMSE Estimator of a Comb - type System

Author(s): Sonali .D.Sahu | A.B.Nandgaonkar
Volume: 3
Issue: 10
Year: 2013





Content Sniffing Attack Detection in Client and Server Side: A Survey

Author(s): Bhupendra Singh Thakur | S apna Chaudhary
Volume: 3
Issue: 10
Year: 2013





A Distributed DB Architecture for Processing cPIR Queries

Author(s): Sultan.M | Karthi.M | ManikandaPrabhu.M | Muruganandham.N | Tashelat Masleena.S
Volume: 3
Issue: 10
Year: 2013





A survey of Performance Analysis in MIMO - OFDM Systems

Author(s): J itendra K umar D aksh | Ravi Mohan | Sumit Sharma
Volume: 3
Issue: 10
Year: 2013





Energy Efficient Routing Protocol for Wireless Sensor Networks

Author(s): H.Srikanth.Kamath
Volume: 3
Issue: 10
Year: 2013





Performance Analysis with Space - time coding in MIMO - OFDM Systems with Multiple Antennas

Author(s): itendra K umar D aksh | Ravi Mohan | Sumit Sharma
Volume: 3
Issue: 10
Year: 2013





An Efficient Algorithm for Auto Upload and Chi - Square Test on Application Software

Author(s): Sampada Kembhavi | Ravindra Gupta | Gajendra Singh
Volume: 3
Issue: 10
Year: 2013





Harmonics Mitigation Using Active Power Filter

Author(s): Sourabh Gupta | Preeti Gupta
Volume: 3
Issue: 10
Year: 2013





Topology control in MANET for efficient energy conservation

Author(s): Krushna J. Pandit | Shah Niyati
Volume: 3
Issue: 10
Year: 2013





Reduction of Data Sparsity in Collaborative Filtering based on Fuzzy Inference Rules

Author(s): A tisha Sachan | Vineet Richhariya
Volume: 3
Issue: 10
Year: 2013





Triangulated Irregular Network Model from Mass Points

Author(s): Neeraj Bhargava | Ritu Bhargava | Prakash Singh Tanwar
Volume: 3
Issue: 10
Year: 2013





Implementation of Co-Operative Communication Protocol

Author(s): H.Srikanth.Kamath
Volume: 3
Issue: 10
Year: 2013





Performance Analysis of Generalized MC DS-CDMA System

Author(s): Rishi Choubey | Ravi Mohan | Sumit Sharma
Volume: 3
Issue: 10
Year: 2013





Improved registration system of Cloudtarun over Android Devices

Author(s): Tarun Goyal | Aakanksha Agrawal | Somil Jain | Vaibhav Doshi
Volume: 3
Issue: 10
Year: 2013





Design of Intrusion Detection Model Based on FP-Growth and Dynamic Rule Generation with Clustering

Author(s): Manish Somani | Roshni Dubey
Volume: 3
Issue: 10
Year: 2013





Personal Identification with F ace Bio metrics using Co lor Local Texture Features

Author(s): Vani A.Hiremani | Sanjeevakumar | M.Hatture
Volume: 3
Issue: 10
Year: 2013





Review of various Techniques in Clustering

Author(s): Megha Gupta | Vishal Shrivast a va
Volume: 3
Issue: 10
Year: 2013





A survey of BER Performance of Generalized MC DS - CDMA System

Author(s): Rishi Choubey | Ravi Mohan | Sumit Sharma
Volume: 3
Issue: 10
Year: 2013





The Study of Detecting Replicate Documents Using MD5 Hash Functio

Author(s): Mr. Pushpendra Singh Tomar | Dr. Maneesh Shreevastava
Volume: 1
Issue: 1
Year: 2011





Secure Three Prime RSA from Hardware Fault Attack

Author(s): Mr. Ravi Rai Chaudhary | Prof. Deepali Kelkar | Mr. Vikas Arya
Volume: 1
Issue: 1
Year: 2011





A Novel Data Gathering Protocol with Node Detection and Sharing (DGPNDS) in Mobile-Sink Based Java Environment

Author(s): Mr. Yogesh Rai | Prof. Vineet Richhariya | Prof. Vivek Richhariya
Volume: 1
Issue: 1
Year: 2011





Biometrics-A Way of Brain Fingerprinting

Author(s): Ms. Ruby Tiwari | Mr. Yogendra Dubey | Ms. Madhurima Bose
Volume: 1
Issue: 1
Year: 2011





An Object Oriented Record Management System (OORMS) for M-Commerce System Based on J2ME Wireless Tool Kit

Author(s): Mr. Santosh Kushwaha | Prof. Shiv Kumar | Prof. Neetesh Gupta
Volume: 1
Issue: 1
Year: 2011





Analysis of Function generation on the basis of Object Oriented paradigm

Author(s): Mr. Kamlesh Gujar | Prof. Surendra Mishra | Mr. Pankaj Kawadkar
Volume: 1
Issue: 1
Year: 2011





Cloud Aggregation and Bursting for Object Based Sharable Environment

Author(s): Mr. Pradeep Kumar Tripathi | Prof. Surendra Mishra | Mr. Pankaj Kawadkar
Volume: 1
Issue: 1
Year: 2011





Dynamic Dropped packet regulation of contention window for enhancement of IEEE_802.11e

Author(s): Mr. Nakul Vyas | Prof. Ashutosh Kumar Dubey | Prof. Yogeshver Khandagre
Volume: 1
Issue: 1
Year: 2011





Object Oriented Mutation Applied in Java Application programming Interface and C++ Classes

Author(s): Mr. Titu Singh Arora | Prof. Ravindra Gupta
Volume: 1
Issue: 1
Year: 2011





An Analytical Approach for Efficient OFDM Modulator and Demodulator Communication Systems Based On Discrete Hartley Transfor

Author(s): Ms. Sonal Sharma | Prof. Sumit Sharma
Volume: 1
Issue: 1
Year: 2011





Impact of Cloud Computing Platform Based on Several Software Engineering Paradigm

Author(s): Ms. Monika Kherajani | Mr. Ajit Shrivastava
Volume: 1
Issue: 1
Year: 2011





Analytical Approach for Analyzing Trusted Security System for Data Sharing in Cloud Environment

Author(s): Mr. Anand Srivastava | Prof. Surendra Mishra | Mr. Pankaj Kawadkar
Volume: 1
Issue: 1
Year: 2011





A Novel Cloud Computing Mapping and Management through Class and Object Hierarchy (CCMMCOH)

Author(s): Mr. Naveen Gurjar | Prof. Ravindra Gupta
Volume: 1
Issue: 1
Year: 2011





Comprehensive Analysis with KVM Techniques and Implementation Of Object Pool Based On J2ME RMS

Author(s): Ms. Nandika Sood | Mr. Amit Sinhal
Volume: 1
Issue: 1
Year: 2011





Performance of Turbo Code for UMTS in AWGN channel

Author(s): Ms. Bhavana Shrivastava | Mr. Yudhishthir Raut | Dr. Ravi Shankar Mishra
Volume: 1
Issue: 1




Multi-Input Multi-Output Fading Channel Equalization with Constellation Selection and Space-Time Precoders

Author(s): Ms. Ankita Shukla | Prof. Abhishek Choubey
Volume: 1
Issue: 1




An Approach Based on MIMO and PN Sequence coding for Reduction of Peak to Average Power Ratio (PAPR) in Clipped OFDM

Author(s): Ms. Hema Singh | Mr. Aaditya Khare
Volume: 1
Issue: 1
Year: 2011





Exploiting need of Service-Oriented Framework for Executing Data Mining Services

Author(s): Ms. Sonali Jain | Mr. Niket Bhargava
Volume: 1
Issue: 1
Year: 2011





A Novel Open Service Framework Mining (OSFM) For Executing Data Mining tasks

Author(s): Mr. Asif Ali | Prof. Gajendra Chandel
Volume: 1
Issue: 1




An Analysis of Cloud Model-Based Security for Computing Secure Cloud Bursting and Aggregation in Real Environment
Author(s): Mr. Pritesh Jain | Vaishali Chourey | Prof. Dheeraj Rane
Volume: 1
Issue: 1
Year: 2011




Performance Analysis and Simulation Result of MC-CDMA for AWGN Channel and Raleigh Based on SNR/BER

Author(s): Mr. Vikas Gupta | Ms. Ruby Tiwari
Volume: 1
Issue: 1
Year: 2011





A Modern Non Candidate Approach for sequential pattern mining with Dynamic Minimum Support

Author(s): Ms. Kumudbala Saxena | Dr. C.S. Satsangi
Volume: 1
Issue: 1
Year: 2011





Uses of ICT in Agriculture

Author(s): Manish Mahant | Abhishek Shukla | Sunil Dixit | Dileshwer Patel
Volume: 2
Issue: 1
Year: 2012





Overview of Security issues in Cloud Computing

Author(s): Mr. Ajey Singh | Dr. Maneesh Shrivastava
Volume: 2
Issue: 1
Year: 2012





Comparative Study between Traditional and Heuristic Approach on Close-degree Concept Lattice for better Attribute Reduction

Author(s): Mr. Ravindra k. Gupta | Ms. Sapna Sahu | Dr. Shailendra Singh
Volume: 2
Issue: 1
Year: 2012





A Profound Survey on Swarm Intelligence

Author(s): Manish Mahant | Bharat Choudhary | Abhishek Kesharwani | Kalyani Singh Rathore
Volume: 2
Issue: 1
Year: 2012





Investigation on TCP/IP Congestion Control in Optical Burst Switched (OBS) Network

Author(s): Ms. Payal Daryani | Prof. Sanjay Sharma
Volume: 2
Issue: 1
Year: 2012





Performance of ANN using Back Propagation Algorithm for Medical Diagnosis System

Author(s): Arti Gupta | Dr. Manish Shrivastava
Volume: 2
Issue: 1
Year: 2012





Recent Research and Comparison of QoS Routing Algorithms for MPLS Networks

Author(s): Dr. Santosh Kulkarni | Mrs. Reema Sharma
Volume: 2
Issue: 1
Year: 2012





Secure Handshake in Wi-Fi Connection (A Secure and Enhanced Communication Protocol)

Author(s): Ranbir Sinha | Nishant Behar | Devendra Singh
Volume: 2
Issue: 1
Year: 2012





A Reducing Data Traffic and Enhancing Data Availability to Deliver Packet in Mobile Ad-Hoc Network

Author(s): 1Prashant Shrivastava | Dr. Manish Shrivastava | Kavita Deshmukh
Volume: 2
Issue: 1
Year: 2012





Authentication of Primary User in Cognitive Radio

Author(s): Mr. Sudesh Gupta | Prof. Rajesh Nema | Prof. Puran Gour
Volume: 2
Issue: 1
Year: 2012





Performance Improvement of TCP by TCP Reno and SACK Acknowledgement

Author(s): Mrs. Reena Rai | Dr. Maneesh Shreevastava
Volume: 2
Issue: 1
Year: 2012





Exploring Quantum Dot Cellular Automata Based Reversible Circuit

Author(s): Saroj Kumar Chandra | Deepak Kant Netam
Volume: 2
Issue: 1
Year: 2012





Email Spam Filter using Bayesian Neural Networks

Author(s): Nibedita Chakraborty | Anjani Patel
Volume: 2
Issue: 1
Year: 2012





Identification of current attacks and their counter measures in Optical Burst Switched (OBS) network

Author(s): Siddharth Singh Chouhan | Prof. Sanjay Sharma
Volume: 2
Issue: 1
Year: 2012





The Efficient SVM Kernel Method for Image Compression and Image Recognition

Author(s): A.Athiraja | A.Baranidharan | S.Vignesh Manickam
Volume: 2
Issue: 1
Year: 2012





Examining of Blocking Probability Computation in Optical Network

Author(s): Mr.Anurag Anant Mishra | Prof. Sanjay Sharma
Volume: 2
Issue: 1
Year: 2012





An Analytical Approach for Optimal Clustering Architecture for Maximizing Lifetime in Large Scale Wireless Sensor Networks

Author(s): Mr. Yogesh Rai | Prof. Vineet Richhariya
Volume: 1
Issue: 1
Year: 2011





A Novel Class, Object and Inheritance based Coupling Measure (COICM) to Find Better OOP Paradigm using JAVA

Author(s): Mr. Narendra Pal Singh Rathore | Prof. Ravindra Gupta
Volume: 1
Issue: 1
Year: 2011




