SN |
Paper |
1 |
Biometric Technology: A Review.
Mohmad Kashif Qureshi
|
2 |
How to Secure Information Flow in Web based Mobile Ad Hoc Network.
Dheerendra Singh
|
3 |
An analysis on the Impact of Multi Agent Based E-learning System.
S.Prakasam
|
4 |
An Approximate mining of clustered patterns for retrieving user interesting sequential patterns using constraints
Prof. S. Machchhar, Prof. Madhuri Vaghasia, Prof. Priyanka Buch
|
5 |
Location Update Strategies in Mobile Computing
Mr. Kalpesh A. Popat
|
6 |
Next Generation Software Security through Testing Stage of SDLC
Vidyabhushan A. Upadhye, Prof. Shashank D. Joshi
|
7 |
Thread Based Cache Consistency Model for Mobile Environment
G.shanmugarathinam, Dr.K.ViveKanandan
|
8 |
Adaptive Round Robin Scheduling using Shortest Burst Approach Based on Smart Time Slice
Saroj Hiranwal, Dr. K.C. Roy
|
9 |
Neural Network Based Brain Tumor Detection using MR Images
Kadam D B, Gade S S, M D Uplane, R K Prasad
|
10 |
Design and implementation of probe fed equilateral triangular patch microstrip antenna for Wireless communications
Prasanna L. Zade, Dr. N. K. Choudhary
|
11 |
Efficient Knowledge Discovery using Data Clustering for Transportation Planning
Sai Hanuman A, Anand Sesham, Dr Vinaya Babu, Dr Govardhan, Dr Padmanabham
|
12 |
Overview of approaches to semantic web search
Meena Unni, Dr. K.Baskaran
|
13 |
An Enhanced Bi-orthogonal Wavelet Filter For Image Compression
Rattan Deep Aneja, Sorabh Gupta, Vishal Batra
|
14 |
Security issues in wireless sensor network
Manju Gupta, Dr. C. Ram Gupta
|
15 |
A Novel Approach Noise filtration for MRI Image Sample in Medical Image Processing
Lalitha Y. S, Mrityunjaya V. Latte
|
16 |
Topology in Medical Image Segmentation
M.C.Jobin Christ, Dr.R.M.S.Parvathi
|
17 |
An approach to analyze subparts of a 2D Image
Ravi Saharan, Raviraj Choudhary
|
18 |
Correlation studies of finger pulse profiles for detecting Ayurvedic doshas
Dr. Mandeep Singh, Spiti Gupta
|
19 |
PPG profile investigations for different fingers in a subject
Dr. Mandeep Singh, Spiti Gupta
|
20 |
A Predication Weather Parallel with Filter Model Based on Extract Event: Case Study Is Malaysian Weather for Short-Term
Wa’el Jum’ah Al_Zyadat, Rodziah Binti Atan, Hamidah Ibrahim, Masrah A. Azmi Murad
|
21 |
Connection and handover management in ATM networks using queuing model for QOS enhancement
G.Vijaya Lakshmi, C. Shoba Bindu
|
22 |
Consistency Analysis for determination of Ayurvedic doshas using prevalent questionnaires
Dr. Mandeep Singh, Anil Anand
|
23 |
Principal Component Analysis of combined questionnaire for determining Human Constituents
Dr. Mandeep Singh, Anil Anand
|
24 |
Optimization of questionnaire for determining Ayurvedic Imbalances
Dr. Mandeep Singh, Anil Anand
|
25 |
Analyzing Quick-Shot method for Ayurvedic Diagnosis
Dr. Mandeep Singh, Anil Anand
|
26 |
Two-Stage Authentication For Wireless Networks Using Dual Signature And Symmetric Key Protocol
Sushma Yalamanchili, K.V.Sambasiva Rao
|
27 |
An Improvement of AODV protocol Based on Threaded Routing in Mobile Ad Hoc Networks
Yogendra Kumar Jain, Nilesh Vani
|
28 |
Online Indexing For Databases Using Query Workloads
Ms. Shanta Rangaswamy, Dr. Shobha G.
|
29 |
Service Oriented Architecture Adoption in E-Education System
Jaspreet kaur
|
30 |
Parametric Maximum Flow Problem: Techniques and Algorithms
Deepika Sareen, Dr. Deepak Garg
|
31 |
A New Shortest Path Finding Algorithm for a Maze Solving Robot with Simulator
Amanpreet Singh, Gianetan Singh Sekhon
|
32 |
Web change monitoring and tracking tools
K.Thirugnana Sambanthan, Dr. S.S.Dhenakaran
|
33 |
An Alternative Method for Obtaining Initial Feasible Solution to a Transportation Problem and Test for Optimality
Shiv Kant Kumar, Indu Bhushan Lal, S.P.Varma
|
34 |
Enhancing Fingerprint Authentication System using Fragile Image Watermarking Technique
Jitendra K. Gothwal, Shyam Sunder Yadav, Dr. Ram Singh
|
35 |
Analysis of Facial Gesture Recognition using Eigen Faces
Rahul Kumar Tyagi, Neha Singh, Piyush Chaudhary
|
36 |
Fuzzy Based Congestion Control in Wireless Network
Smitha.k, Anand H U, J. D. Mallapur
|
37 |
Demographic Trends in Software Piracy among Students
Shubhnandan S. Jamwal
|
38 |
State of the art algorithms for frequent item mining in data Streams
J. Chandrika, Dr. K.R. Ananda Kumar
|
39 |
Domain-specific Modeling and Synthesis of Distributed Networked Systems
K.Ramesh, T.Ramesh
|
40 |
Conceiving a Intrusion Detection System in the Network by Mobile Agents
Aditya Vidyarthi, A.S. Saxena
|
41 |
Infant Monitoring System
P.Sushma chowdary, S.Aruna
|
42 |
Power management in mobile devices by various protocol
Kirtika Goyal
|
43 |
Efficient and Reliable Routing Protocol for Wireless Sensor Networks (WSNs)
Sunar Arif Hussain, Dr K.E.Sreenivasa Murthy
|
44 |
Resource Discovery for Job Submission using Dispute Solving in Grid Environment
Prakash M, Ravichandran T
|
45 |
Development of a Punjabi to English transliteration system
Kamal Deep, Dr. Vishal Goyal
|
46 |
Retailing Prospects in Rural Market
Poonam Talwar, Sunita Sangwan, Kuldeep Sharma
|
47 |
A Review on Computer Aided Mammography for Breast Cancer Diagnosis and Classification using image mining methodology
Aswini Kr. Mohanty, Pratap Kr. Champati, Sukanta kr. Swain, Saroj Kr. Lenka
|
48 |
Analysis of x – ray dental imaging with special reference to past and present scenario
S. Venkatakrishnan, Dr. V. Ramalingam
|
49 |
Speckle noise reduction in medical ultrasound images using particle swarm optimization with artificial neural networks: comparative approach
Manpreet kaur, Danvir mandal
|
50 |
A new pattern generator approach using built in self test for circuit under test
P.Rambabu, T.Kalpana
|
51 |
New Features for Automatic Text Independent Language Identification
A.Nagesh, V.Kamakshi Prasad
|
52 |
Investigation on Throughput of a Multi Hop Network with Identical Station for Random Failure
Manish Shrivastava, Ravi Sahu
|
53 |
Performance Evaluation and Simulation Based Modeling of Energy Aware Variable Range DSR (VRDSR) protocol
Radhika D. Joshi, Priti P. Rege
|
54 |
Performance Analysis of Multicast Protocols: ODMRP, PUMA and OBAMP
J. Rangarajan, Dr. K. Baskaran
|
55 |
Generalized on lattice of Boolean graph
M.Vijaya Kumar, P.Srinivas, Naga Maruthi Kumari
|
56 |
Wi-Fi (802.11) security issues and its solution
D.M. Gharge, S.V. Halse
|
57 |
Indian vehicle license plate extraction and segmentation
Chetan Sharma, Amandeep Kaur
|
58 |
Generalised Substitution Language: Proper Technique for Software Inspection
Neeraj Kumar
|
59 |
Software Reliability Growth Model with Logistic Testing-Effort Function Considering Log-logistic Testing-Effort and Imperfect Debugging
O.Naga Raju, Ch.Satyanaraya
|
60 |
Extracting Proverbs in Machine Translation from Hindi to Punjabi using Relational Data Approach
Monika Sharma, Dr. Vishal Goyal
|
61 |
Competitive advantage in mobile phone industry (Focus on value chain and core competency)
V V Vara Prasad, Dr P K Sahoo
|
62 |
Clustering in Knowledge Penetration Process
Lalita Narang, Dr. Vivek Chandra
|
63 |
Telemedicine using computer communication network
S.Saravanan, Dr. M.AnbuRajan., Dr. A. Venkatraman., Dr. N.Sriraam, Dr. P.Thirusakthi Murugan
|
64 |
Biometric Recognition System: An Introduction
Darshan Lal
|
65 |
Performance comparison between filters and wavelet transform in image denoising for different noises
Bobby, Manish Mahajan
|
66 |
Content based image retrieval by comparing color and shape features
Pooja Verma, Manish Mahajan
|
67 |
Investigate the performance of software defect prediction for Decision Tree Algorithm using Quantative and Qualatative Factors
Dr.R.P.S Bedi, Priyanka Anand, Sunil Khullar, Dr. P..S.Sandhu
|
68 |
To Generate Rule for Software Defect Prediction on Quantitative and Qualitative Factors using Artificial Neural Network
Harish Kundra, Neha Gautam, Sunil Khullar, Dr. P.S.Sandhu
|
69 |
Impact of Relay Nodes on Vehicular Delay Tolerant Network
Anand Mulasavalgi, Anand Unnibhavi
|
70 |
Study on Mobile Adhoc Network Routing Protocols
Monika
|
71 |
Research Scenario of Software Reuse
Ajay Kumar
|