SN |
Paper |
1 |
National Software Industry Development: Considerations for Government Planners
Dr.Umesh Sehgal, Ms Kuljeet Kaur, Mr.Pawan Kumar
|
2 |
Security in Virtual machine is better than Real Machine
P.Felacy Silvia, R.Karthiha, R.Aarthy and Dr. C. Suresh Gnana Das
|
3 |
Secure Web Access Model for Sensitive Data
Anil Kapil, Atul Garg
|
4 |
Wireless Sensor for Effective Network Security Mechanism
P.Felacy Silvia, R.Karthiha, R.Aarthy and Dr. C. Suresh Gnana Das
|
5 |
Still image compression using Embedded Zerotree Wavelet Encoding
V.S.Shingate, Dr.T.R.Sontakke, Prof. Dr. S.N. Talbar
|
6 |
Adaptive analysis of throughput in mobile ad-hoc Network (IEEE-802.11)
Vikram Bali, Rajkumar Singh Rathore ,Amit Sirohi
|
7 |
Parallel FTP: Clusters using mirror servers in Grid
N.K.Prema , K.Prasadh , A.Arul Lawrence selvakumar
|
8 |
Risk Management Process for Information Security System
Prof. S. P. Datta, Prof. Pranab Banerjee
|
9 |
Software Patents and the Current Trends
Garima Goswami, Banasthali Vidyapeeth
|
10 |
Design and FPGA Implementation of Integer Transform and Quantization Processor and their Inverses for H.264 Video Encoder
N. Keshaveni, S. Ramachandran and K.S. Gurumurthy
|
11 |
Improving performance of Text Categorization: Using Multi Feature Co-selection Clustering Technique and Lsquare Machine Learning
Srinivas.M, K.P.Supreethi, S. Anitha Kumari
|
12 |
Design of Architecture and FPGA Implementation of a Video Encoder
Venugopal N and Dr S. Ramachandran
|
13 |
Performance Evaluation of Energy Consumption of Reactive Protocols under Self- Similar Traffic
Dhiraj Nitnaware , Ajay Verma
|
14 |
Survey of Various Number Systems and Their Applications
Satrughna Singha , Amitabha Sinha
|
15 |
Comparative analysis and Characterization of a Current Conveyor-II
Amisha P. Naik Nilesh K. Patel, N.M.Devashrayee
|
16 |
A novel Boundary based Image segmentation for image classification and analysis
A. Ramaswamy Reddy, M. Sitaram Prasad, C. Nagaraju
|
17 |
A novel method for aquamarine learning environment for classification of fish database
A. Ramaswamy Reddy, B. Srinivas Rao, G. Siva Nageswara Rao, C. Nagaraju
|
18 |
Optical Character Recognition (OCR) for Printed Devnagari Script Using Artificial Neural Network
Raghuraj Singh , C. S. Yadav, Prabhat Verma, Vibhash Yadav
|
19 |
Theory and Applications of the Double-Base Number System Using Bases 2 And 5
Satrughna Singha , Supriya Chakraborty and Amitabha Sinha
|
20 |
Consecutive Magic Labeling of N-Copies of Generalized Petersen Graphs
J.Joy Priscilla, DR.R.Sattanathan
|
21 |
BER Improvement using MIMO :2 x 2
Parveen Singhal, Rajeev Sharma
|
22 |
RF Controlled Terrorist Fighting Robot
Abhinav Kumar Singh , Nilaya Mitash Shanker , Anand Prakash Yadav
|
23 |
Analysis of Energy Efficient Routing Protocols in Wireless Sensor Networks
Sanjeev Saini , Ram Sewak Singh , V.K.Gupta
|
24 |
Application of Fuzzy Logic Approach for obtaining Composite Criteria based Network Contingency Ranking for Practical Power System Networks.
S N R K Srinivas Tanniru , Dr. K Ramesh Reddy , Dr.V K D Devi
|
25 |
Secure Routing in Mobile Ad hoc Network
Tirthraj Rai , Ashish Jain
|
26 |
The Development & Implementation of Reed Solomon Codes for OFDM Using Software-Defined Radio Platform
Hamood shehab , Widad Ismail2
|
27 |
An approach for Concurrency Control in Distributed Database System
Arun Kumar Yadav , Dr. Ajay Agarwal
|
28 |
Analysing Latency and Link Utilization of Selfish Overlay Routing
S.Prayla Shyry , V.Ramachandran
|
29 |
A Study on Latency Minimization in Selfish Overlay Routing by Cost Pricing
S.Prayla Shyry, VRamachandran ,T.S. Rekha
|
30 |
Multi Step Motion Estimation Algorithm
Deepak J. Jayaswal and Mukesh A. Zaveri
|
31 |
A Survey on Congestion Control in Wireless Sensor Networks
Rekha Chakravarthi ,Dr. C.Gomathy,Suraj K.Sebastian, Pushparaj.K, Vinu Binto Mon,
|
32 |
Anomaly Intrusion Detection System using Hamming Network Approach
Muna M. Taher Jawhar & Monica Mehrotra
|
33 |
System Design for Packet Sniffer using NDIS Hooking
Muna M. Taher Jawhar & Monica Mehrotra
|
34 |
Simplified Watershed Transformation
Manisha Bhagwat , R.K.Krishna , Vivek Pise
|
35 |
Performance evaluation of various wavelets for Image compression of Natural & Artificial images
Vinay U. Kale, Nikkoo N. Khalsa
|
36 |
Transmit Diversity Technique for Wireless Communication over Raleigh/flat Channels using M-ary Modulation Schemes
N.S. Murthy, S. Sri Gowri, P.Satyanarayana
|
37 |
A Survey on Neighborhood Dependant Topology Control in Wireless Sensor Networks
S. Emalda Roslin , Dr. C.Gomathy , P. Bhuvaneshwari
|
38 |
Microcontroller Based Clockwise/Anticlockwise Stepper Motor Controller Using PC Keyboard via Com Port
Mandeep Singh, Rekha and Balwinder Singh
|
39 |
Performance comparison of On Line Auto Tune PID Controller with Conventional PID Controller
Mr. S. S. Gade, Mr. S. B. Shendage, Mr. M. D. Uplane
|
40 |
Digital In-painting Based Image Restoration
S. R. Goyal
|
41 |
A Production Lot-size Inventory Model for Weibull deteriorating item with Quadratic demand, Quadratic production and Shortages
A.Kalam, D.Samal, S.K.Sahu, M.Mishra
|
42 |
QoS Provisioning in VANETs using Mobile Agent
Shraddha Saharan, Rakesh Kumar
|
43 |
Controller based IDS architecture in distributed Nodes
Kuldeep Tomar, Anupma Sehrawat, Swati Phogaat
|
44 |
An inventory model for constant deteriorating items with Price dependent demand and time-varying holding cost
N.K.Sahoo, C.K.Sahoo, S.K.Sahoo
|
45 |
Window Based Optimization for Real-Time Surveillance
Bhaskar Kapoor and Anamika Chhabra
|
46 |
Design approach towards improving the overall Quality of Driving Experience in VANET
Suresh Kurumbanshi , Dr.Avichal Kapur ,Dr.P.R.Bajaj
|
47 |
A Tajima -NEI Method for detecting HIV
Raninder Kaur, Vijay Shakti, Shavinder Kaur
|
48 |
Separation of Tabla from Singing Voice using Percussive Feature Detection
Parveen Lehana, Neeraj Dubey, and Maitreyee Dutta
|
49 |
OGSA-DAI---Uses and Applications
Richa Batra Ramandeep Kaur
|
50 |
Effective Secure Encryption Scheme [One Time Pad] Using Complement Approach
Sharad Patil, Ajay Kumar
|
51 |
Dynamic Power Allocation For Transmission Of 2-D Signals Over Wireless Channels
M Padmaja , P Satyanarayana , K.Prasuna
|
52 |
Query Optimizer Model for Performance Enhancement of Data Mining Based Query
Deepak Sukheja, Umesh K Singh
|
53 |
Development of Spectral Signatures and Classification of Sugarcane Using ASTER data
Kumar Vikesh, Kumar Vinod, Jain Kamal
|
54 |
Review of Rice Crop Identification and Classification Using Hyper-spectral Image Processing System
Shwetank, Jain Kamal and Bhatia K. J.
|