Volume 2, Issue 1, January 2012 (ISSN 2250 – 2459)
S.No. |
Title of Paper |
Page No. |
1. |
Improved Performance Analysis of Clamp Circuits with Flyback Converter Authors: T.Halder |
1-8 |
2. |
An Experimental Approach for Simple Swarm Robots Authors: Shanu K Rakesh |
9-14 |
3. |
Wavelet Based Edge Detection Technique for Iris Recognition Using MATLAB Authors: Raju K.Dehankar, Seema C.Bhivgade, Athar ..............Athar Ravish Khan |
15-19 |
4. |
Authors: Abd El–Naser A. Mohamed, Ahmed Nabih Zaki ..............Rashed, Mahmoud M. A. Eid |
20-31 |
5. |
Author: Amrinder Singh Brar, Mandeep Kaur |
32-36 |
6. |
Detecting Black and Gray Hole Attacks in Mobile Ad Hoc Network Using an Adaptive Method Author: Disha G. Kariya, Atul B. Kathole, Sapna R. Heda |
37-41 |
7. |
Features Preserving Data Encryption Used to Secure Multimedia Data Author: Radha.S.Shirbhate, Anushree A.Yerawar, ................Ankur M. Hingane |
42-44 |
8. |
Minimization of Dross Formation During the Continuous Galvanizing Process in the Steel Industry Authors: Pranay Sawaitul, S.A. Chowriwar, I.P. Lade |
45-51 |
9. |
A Review on Efficient Temperature Prediction System Using Back Propagation Neural Network Authors: P.P. Kadu, K.P. Wagh, Dr. P.N. Chatur |
52-55 |
10. |
ECG Signal Analysis and Classification using Data Mining and Artificial Neural Networks Authors: K .O. Gupta, Dr. P. N. Chatur |
56-60 |
11. |
Development Of Smart Controller For Multisegment-SMC For Synchronous Reluctance Motor Servo Drive Authors: Ami T Patel |
61-66 |
12. |
Spirometry Data Analysis and Classification Using Artificial Neural Network: An Approach Author: Kamlesh A. Waghmare, .Bhushan V. Wakode, .............Dr. P. N. Chatur |
67-70 |
13. |
Author: Ramya C, Dr. Shreedhara K S |
71-77 |
14. |
Compensating Frequency Response Mismatches in Time Interleaved Analog to Digital Converters Author: Monika Agrawal, Rajesh Nema |
78-82 |
15. |
Authors: Dinesh V. Attarde, Ratnesh R. Gaikwad, Pankaj .............Pankaj C. Jadhav, Vijayendra Bari |
83-87 |
16. |
Authors: Badhiye S. S., Dr. Chatur P. N., Wakode B. V. |
88-91 |
17. |
Review of Impedance Matching Networks for Bandwidth Enhancement Authors: Rashmi Khare, Prof. Rajesh Nema |
92-96 |
18. |
Image Enhancement Techniques by Texture Synthesis Authors: Ankit Shah, Parth Bhatt, Prof. Kirit J. Modi |
97-101 |
19. |
Temperature and Humidity Analysis using Data Logger of Data Acquisition System: An Approach Author: M.B. Waghmare, Dr. P. N. Chatur |
102-106 |
20. |
Medical Image Protection by Using Cryptography Data-Hiding and Steganography Author: Vinay pandey , Angad Singh, Manish Shrivastava |
106-109 |
21. |
Classification and Prediction of Future Weather by using Back Propagation Algorithm-An Approach Author: Sanjay D. Sawaitul, K. P. Wagh, Dr. P. N. Chatur |
110-113 |
22. |
Kernel Fisher Analysis Method for Face Recognition Authors:Amruta S. Moon, Yogdhar Pandey,Megha Kamble |
114-117 |
23. |
Underwater Image Segmentation using CLAHE Enhancement and Thresholding Authors: Rajesh kumar Rai, Puran Gour, Balvant Singh |
118-123 |
24. |
Motion Detection based on Multi Frame Video under Surveillance System Authors: Neelam Patel |
124-129 |
25. |
Area Based Image Matching Methods – A Survey Authors: Jyoti Joglekar, Shirish S. Gedam |
130-136 |
26. |
Optimization of Repeater Spacing for Terrestrial and Undersea Fiber Optic Communication Authors: T. Sabapathi,M. S. Ajay Gautham,R.Pranthaman |
137-142 |
27. |
Design and Analysis of On-Chip Router for Network on Chip Authors: Anuprita.S. Kale, Prof. M.A. Gaikwad |
143-147 |
28. |
On The Rainfall Time Series Prediction Using Multilayer Perceptron Artificial Neural Network Authors: Rohit R. Deshpande |
148-153 |
29. |
Efficient Information Hiding Technique Using Steganography Authors: Dilip Vishwakarma, Satyam Maheshwari, .............Sunil Joshi |
154-159 |
30. |
An Evolutionary Approach: Analysis of Artificial Neural Networks Authors: Gopal Datt |
160-164 |
31. |
The Methods of Non-optimum Analysis and the Application of Economic Reform Authors: Ping He |
165-169 |
32. |
Performance Analysis of Various Routing Protocols in Ad-hoc Network-A Survey Authors: Ashutosh Yadav |
170-173 |
33. |
Authors: Nidhi Mishra, Dr. G. Kumar, Manish Yadav |
174-179 |
34. |
The Future of Satellite Communication Antennas: Negative Refractive Index Metamaterials – A Review Author: Trushit Upadhyaya, Ved Vyas Dwivedi,.......... .............Shiv Prasad Kosta, Zalak Patel |
180-183 |
35. |
Performance Evaluation of BATMAN, DSR, OLSR Routing Protocols - A Review Author: Davinder Singh Sandhu, Sukesha Sharma |
184-188 |
36. |
Author: J.Aravinth, Dr.S.Valarmathy |
189-197 |
37. |
Finfo1: Web-based system for Fishermen Community Planning and Development – A Prototype Authors: D. Sudharsan, Selvamathy, Dhivya |
198-207 |
38. |
Implementation Of Scalable Framework To Reduce Core Development Of Cloud Computing Relevants Authors: Harshal A.Pagar, Cijo J. Vithayathil, Mosim N. ..............Mosim N.Pathan, Ghanshyam N. Nimbalkar |
208-211 |
39. |
3-Dimensional Finite Element Analysis of Single lap Bolted joint under Clamping load(Suspended) Authors: Amar A. Bhoyar, Sharad S. Chaudhari, Nitesh ..............Nitesh K. Ingole |
212-219 |
40. |
Nephrology Expert Advisory System Authors:Kinzal K. Patel, Atul B. Kathole, Dinesh G. Katare |
220-224 |
41. |
Optimal Service Pricing for Cloud Based Services Author: Deepak Mishra, Dr. Maneesh Shreevastava |
225-234 |
42. |
Study of the Power Analysis Methods and Calculations for High Performance VLSI Designs Author: Soumitra S Pande , Rajesh Rai, Mohd.Abdullah |
230-234 |
43. |
A Novel Handoff Technique for Heterogeneous Wireless Network Author: Abhijeet V. Shinde, A.D.Bijwe |
235-238 |
44. |
Comparative Study of Different Approaches of Image Compression Authors: Harsha D.Zope, Pallavi Y. Patil |
239-244 |
45. |
Cloud computing: A security problem or solution Authors: Saurabh Sharma, Randeep Kaur Chhabra, ...............Ashok Verma |
245-252 |
46. |
Novel Web Usage Mining for Web Mining Techniques Authors: Mahendra Pratap Singh Dohare, Premnarayan Arya, Aruna Bajpai |
253-262 |
47. |
Performance Analysis Of Quadratic Prime Code For Modified Bluetooth FH Communication System Authors:Mayuri Shrivastava, Sachin Murarka,............. ............Smriti Narware |
263-268 |
48. |
Enhancing Retrieval of Geological Text using Named Entity Disambiguation Author: Sobhana N.V |
269-277 |
49. |
Simulation Based on An Effective Defence Against Duplicate Node Attacks in Wireless Networks Author: Selvam E, A. Siles Balasingh |
278-285 |
50. |
A New Modified Playfair Algorithm Based On Frequency Analysis Author: Harinandan Tunga, Soumen Mukherjee |
286-290 |
51. |
Edge Detection of Images Using Sobel Operator Authors: Manoj K.Vairalkar, S.U.Nimbhorkar |
291-296 |
52. |
Incorporating CMMI with Agile Methods: Using Change Management Authors: Hassan Haghighi, Afrooz Khormaee, Mohammad Shir Mohammadi |
297-304 |
53. |
Power Dissipation In WCDMA- A Study Authors:Smriti Narware,Mayuri Shrivastava,Rajesh Nema |
305-308 |
54. |
A Survey on Classification of Imputation Methods in Data Mining Authors: Bhavisha Suthar, Hemant Patel, Ankur Goswami |
309-313 |
55. |
Feature Extraction of Product from Customer Feedback through Blog Authors: Sumeet V.Vinchurkar, Smita M. Nirkhi |
314-323 |
56. |
An Improved Techniques Based on Naive Bayesian for Attack Detection Authors: Manish Jain, Vineet Richariya |
324-329 |
57. |
Comparative Analysis of PCA and 2DPCA in Face Recognition Authors: Dhiraj K. Das |
330-336 |
58. |
Performance Improvement of 802.11 MAC by enhancements in DCF Authors: Vikram Jain, Siddharth Dutt Choubey, .............. ..............Rohit Singh, Sandeep Gupta |
337-342 |
59. |
Authors: Tilotma Sharma, Sumit Jain |
343-346 |
60. |
A General Study of Associations rule mining in Intrusion Detection System Authors: Vikas Markam , Shirish Mohan Dubey |
347-356 |
61. |
Wireless Network Security Protocols:A Comparative Study Authors: Swati Sukhija, Shilpi Gupta |
357-364 |
62. |
Authors: Ziad M. M. Ali |
365-368 |
63. |
Indicators for Detecting Sinkhole Attack in MANET Authors: Sonal R. Jathe, Dhananjay M. Dakhane |
369-372 |
64. |
A Review:Ant Based Ad Hoc Routing Protocols Authors: Dr. S.A. Ladhake, Shradha A. Thakare |
373-375 |