Using Artificial Neural Network(ANN) Machinability Investigation Of Yttria Based Zirconia Toughness Alumina (Y-ZTA) Ceramic Insert

Author(s): Ishani Bishnu | Jyoti Vimal | Neha Kumari
Volume: 3
Issue: 5
Year: 2013





A Three Engine Application Level Firewall for Web Servers

Author(s): Gowtham. Mamidisetti | T.Divya
Volume: 3
Issue: 5
Year: 2013





Distributed Transaction System Application Using Design Pattern

Author(s): Jayashree D. Jadhav | Manjusha Joshi | Dr.S.D.Joshi,
Volume: 3
Issue: 5
Year: 2013





Formulation of the Internal Stress Equations of Pinned Portal Frames Putting Shear Deformation into Consideration

Author(s): Okonkwo V. O, | Onyeyili I. O, | Aginam C. H., | Chidolue C. A,
Volume: 3
Issue: 5
Year: 2013





Electronic Noses Application to Food Analysis Using Metal Oxide Sensors: A Review

Author(s): S.E.Zohora | A.M.Khan | A.K.Srivastava
Volume: 3
Issue: 5
Year: 2013





Comparative Performance Analysis of PID Based NARMA-L2 and ANFIS Control for Continuous Stirred Tank Reactor

Author(s): Bharti Panjwani | Vijay Mohan
Volume: 3
Issue: 5
Year: 2013





Effective Routing Protocol (DSDV) for Mobile Ad Hoc Network

Author(s): Jaya Bhatt | Naveen Hemrajani,
Volume: 3
Issue: 5
Year: 2013





Predicton With Smart Phones

Author(s): Gowtham.Mamidisetti | B.Venkatesh
Volume: 3
Issue: 5
Year: 2013





Optimal Tuning of PI Controller using Bacterial Foraging Algorithms for Power Electronic Converter

Author(s): B.Achiammal | Dr. R.Kayalvizhi
Volume: 3
Issue: 5
Year: 2013





Data Mining and Service Customization in Leisure and Hospitality

Author(s): I A K C Samarasinghe | S. R Kodithuwakku | S.D Yapa
Volume: 3
Issue: 5
Year: 2013





Survey on Lightweight Block Cipher

Author(s): Swarnendu Jana | Jaydeb Bhaumik | Manas Kumar Maiti
Volume: 3
Issue: 5
Year: 2013





Time Varying Moving Object Acceleration/ Deceleration Detection in Region of Interest Using Motion of Center of Gravity

Author(s): Mr. E.M.C.L Ekanayake | Dr. J.V Wijayakulasooriya
Volume: 3
Issue: 5
Year: 2013





Influence of Information and Communication Technology in Health Sectors

Author(s): Saraswati Mishra | Abhishek Kalra | Kavita Choudhari
Volume: 3
Issue: 5
Year: 2013





MDT: Middle Tire Automation Testing Framework

Author(s): Yogesh M Gajmal | Vandana M. Gaikwad
Volume: 3
Issue: 5
Year: 2013





Design and Performance Antenna Diversity for MIMO WiMAX Mobile Terminals

Author(s): Mohannad J Mnati
Volume: 3
Issue: 5
Year: 2013





Increase the Security of Web Service without Effect on Its Performance by Using Blowfish Cryptography Algorithm

Author(s): Shaymaa Mohammed Jawad Kadhim | Mrs.manjusha Joshi | Dr.Shashank Joshi
Volume: 3
Issue: 5
Year: 2013





A Modified Differential Evolution Algorithm trained Pi-Sigma Neural Network for Pattern Classification

Author(s): Sibarama Panigrahi | Ashok Kumar Bhoi | Yasobanta Karali
Volume: 3
Issue: 5
Year: 2013





Mnfc-Operation Modes and Risks

Author(s): Gowtham.Mamidisetti | P.N.S.L. Sravani | P.Anusha
Volume: 3
Issue: 5
Year: 2013





Improvement of Fixed WiMAX OSTBC–OFDM Transceiver Based Wavelet Signals by Non-Linear Precoding Using SDR Platform

Author(s): Dr.Mohammed Aboud Kadhim | Dr.Hamood Shehab Hamid | Nooraldeen Raaoof Hadi
Volume: 3
Issue: 5
Year: 2013





Study of a Queue Model Using an Estimation of Distribution Algorithm

Author(s): Ricardo Pérez | S. Jöns, | Arturo Hernández
Volume: 3
Issue: 5
Year: 2013





Automated Test Data Generation Using Fuzzy Logic-Genetic Algorithm Hybridization System for Class Testing Of Object Oriented Programming

Author(s): Swapan Kumar Mondal | Hitesh Tahbildar,
Volume: 3
Issue: 5
Year: 2013





Transportation Noise and Vibration-Sources, Prediction, and Control

Author(s): Dr.Sharad R.Mahajan | Shri. Rahul D.Rajopadhye
Volume: 3
Issue: 5
Year: 2013





Diagnosis of Neuromuscular Disorders Using Softcomputing Techniques

Author(s): Akhila Devi.B.V | S.Suja Priyadharsini
Volume: 3
Issue: 5
Year: 2013





A Combined Approach of Data Mining Algorithms Based on Association Rule Mining and Rule Induction

Author(s): Er. Amarjeet Kaur | Er. Gurpreet Singh
Volume: 3
Issue: 5
Year: 2013





Suspended Solid Measurement System with Two Frequency Four Beam Technique for Distillery Spent Wash

Author(s): M.L.Dongare
Volume: 3
Issue: 5
Year: 2013





Texture Segmentation: Different Methods

Author(s): Mr. Vaijinath V. Bhosle | Dr. Vrushsen. P. Pawar
Volume: 3
Issue: 5
Year: 2013





A short survey of Advantages and Applications of Skip Graphs

Author(s): Dr. Shalini Batra | Amritpal Singh
Volume: 3
Issue: 5
Year: 2013





Design and Development Of MOKHTAR Wind Tracker

Author(s): Ata Jahangir Moshayedi | Damayanti C Gharpure | Arvind D Shaligram ,
Volume: 3
Issue: 5
Year: 2013





GA-SVM and MLP-BBO to estimate Robot Manipulator Joint Angles

Author(s): Amel SERRAT | Mohamed Benyettou
Volume: 3
Issue: 5
Year: 2013





Comparison of LSB Steganography in BMP and JPEG Images

Author(s): Eltyeb E. Abed Elgabar
Volume: 3
Issue: 5
Year: 2013





Organizing Information in the Blogosphere: The Use of Unsupervised Approach

Author(s): Dr. Ramesh Kumar Ayyasamy
Volume: 3
Issue: 5
Year: 2013





Implementation Of High Reliable Fine Grain Fault Tolerance Redundant Technique For FPGA

Author(s): K. Sreelaxmi | B. Srinivas | M.J.C.prasad
Volume: 3
Issue: 5
Year: 2013





Critical Parameters for Coupling and Cohesion of S/W Reusability Problem Domain

Author(s): A. Ravi | Dr.Nirmala,
Volume: 3
Issue: 5
Year: 2013





Design of GA based PID Controller for three tank system with various Performance Indices

Author(s): P.Srinivas, | K.Vijaya Lakshmi | V.Naveen Kumar
Volume: 3
Issue: 5
Year: 2013





Private Cloud Implementation for Centralized Compilation

Author(s): Mehare Suraj | Paliwal Poonam | Pardeshi Mangesh | Begum Shahnaz
Volume: 3
Issue: 5
Year: 2013





Development of a Model for Determining Realistic Contract Period

Author(s): Alex John Kalume | Stephen Diang’a
Volume: 3
Issue: 5
Year: 2013





A Model Based Approach for Gait Recognition System

Author(s): Mohammed Rafi | Hédi Khammari | R.S.D Wahidabanu | Yasmeen Taj
Volume: 3
Issue: 5
Year: 2013





Run Time Evaluation by using Object Oriented Debugging Tool

Author(s): Ashvini A. Patil | Swapnil V. Suryawanshi,
Volume: 3
Issue: 5
Year: 2013





A Secure And Efficient Authentication Protocol Based On Elliptic Curve Diffie-Hellman Algorithm And Zero Knowledge Property

Author(s): Manoj Kumar
Volume: 3
Issue: 5
Year: 2013





Big Data Challenges for E-governess System in Distributing Systems

Author(s): M. Suresh, | R.Parthasarathy | M. Suresh, | S.Raja,
Volume: 3
Issue: 5
Year: 2013





A Novel RISC Processor with Crypto Specific Instruction Set

Author(s): Bhagyasree. P | C. Silpa | Dr. M.J.C.Prasad
Volume: 3
Issue: 5
Year: 2013





Student's Performance Measuring using Assistant Algorithm

Author(s): Dr. N. Venkatesan | N. Chandru
Volume: 3
Issue: 5
Year: 2013





Parallel and Digit-Serial Implementations of Area- Efficient 3-Operand Decimal Adders

Author(s): Tso-Bing Juang | Hsin-Hao Peng | Han-Lung Kuo
Volume: 3
Issue: 5
Year: 2013





A Two-Warehouse Production Inventory Model with Variable Demand and Permissible Delay in Payment under Inflation

Author(s): S, R. Singh, | Pinky Saxena
Volume: 3
Issue: 5
Year: 2013





Intelligent Agents for the Semantic Annotation of Educational Resources

Author(s): Aziz Oriche | Abderrahman Chekry | MOHAMED KHALDI
Volume: 3
Issue: 5
Year: 2013





Data Integrity Verification by Third Party Auditor in Remote Data Cloud

Author(s): Anne Sriyanya.K | Dr.N.Kasiviswanath
Volume: 3
Issue: 5
Year: 2013





Benefits And Challenges of E-Governance Portal

Author(s): Bhavneet Dhindsa | Malika Narang | Kavita Choudhary
Volume: 3
Issue: 5
Year: 2013





Multi-Language Compiler on Private Cloud Based System

Author(s): Sachin Lonare | Rututja Paripagar | Roshani Channe
Volume: 3
Issue: 5
Year: 2013





Helping Hands: Enabling the Disabled

Author(s): Prof: Nihar M. Ranjan | Rahul Pardeshi | Piyush Bhattad | Pavan Shah | Nirav Shah
Volume: 3
Issue: 5
Year: 2013





CBR Traffic Based Performance Investigations of DSDV, DSR and AODV Routing Protocols for MANET Using NS2

Author(s): Payal | Sudesh Kr. Jakhar
Volume: 3
Issue: 4
Year: 2013




