Volume 2, Issue 3, March 2012 (ISSN 2250 – 2459)
S.No. |
Title of Paper |
Page No. |
1. |
Cloud Computing with Green Virtual Systems Authors: Brent Hafner, Yanqing Zhang |
1-6 |
2. |
Simulation and Analysis for Real and Reactive Power Control with Series Type FACTS Controller Authors: Vatsal J. Patel, C.B.Bhatt |
7-12 |
3. |
Horizontal Line and Window Based Stereo Matching Method Authors: Khyati N.Patel, Sameena Zafar |
13-20 |
4. |
Authors: Bhaskar Chandra Kandpal, Rajesh Ku. Verma, ........Dalip Malhotra, Ashish Ku., Anuj Ku., Mallika Taneja |
21-27 |
5. |
Evolution from 3rd Generation Generic Access Networks to Voice over LTE via Generic Access (VoLGA) Author: Farzeen Qureshi, Muhammad Usama bin Aftab |
28-31 |
6. |
SysGen Architecture for Visual Information Hiding Framework Authors: Abhishek Basu, Tirtha Sankar Das, Subir Kumar .............Sarkar |
32-40 |
7. |
Effect of Working Fluid on Thermal Performance of Closed Loop Pulsating Heat Pipe: A Review Authors: S.G. Khedkar, P. R. Pachghare, Ashish M. ...............Mahalle |
41-48 |
8. |
Simulation and Development of Automatic Excitation Control for Synchronous Motor Authors: Devansh K. Shah, Swapnil N. Jani |
49-53 |
9. |
Investigations and Experiments on Delaying Streamer Air Terminal Author: Prof. Dr. Ahmed A. Hossam-Eldin, Mahmoud .............I.Houssin |
54-59 |
10. |
Authors: A. Das, M.Sarkar, R. Das, D. Das, P. Debnath |
60-64 |
11. |
The BlueBooster – Mobile Bluetooth Range Expansion Authors: Kulkarni Amit Anil, Shirole Bajirao Subhash, ..............Waghmare Arun I., Kolhe Sunil Bhausaheb, ..............Jadhav Yogita Prakash,Jagdale Rohit Jaywant |
65-70 |
12. |
A Comparative Study of Routing Protocol in Vehicular Ad Hoc Network Author: Pooja Duddalwar, Atul Deshmukh, S. S. Dorle |
71-76 |
13. |
A PZT Based Capacitor for Direct Solar Energy Harvesting and Storing Authors: Pranjal Barman, Dr. Roy Paily |
77-82 |
14. |
A New Way to Save Energy and Cost – Cloud Computing Authors: Satyendra Singh Rawat, Niresh Sharma |
83-89 |
15. |
SAHMS - Scatternet Assisted Health Monitoring System Authors: Janani.K, V.R.Sarma Dhulipala, N.Prabakaran |
90-96 |
16. |
Tracking Scrum projects Tools, Metrics and Myths About Agile Authors: Monika Agarwal, Rana Majumdar |
97-104 |
17. |
Design and Development of A Plug in for A Browser Against Phishing Attacks Authors: Akanksha Upadhyaya |
105-111 |
18. |
Removing Inconsistencies and Errors from Original Data Sets through Data Cleansing Authors: G.Siva Nageswara Rao, Dr.K.Krishna Murthy, ..............Dr.B.V.Subba Rao, Dr.J.Rajendra Prasad |
112-115 |
19. |
Performance Enhancement of Secured Mobile Agents in Distributed Database Using Local Database Author: Bharti Chouksey, Ravi Mohan |
116-120 |
20. |
A Survey on User Future Request Prediction: Web Usage Mining Authors: Ujwala Patil, Sachin Pardeshi |
121-124 |
21. |
Feasibility Study of Solar-Wind Hybrid Power System Authors: Parita G Dalwadi, Chintan R Mehta |
125-128 |
22. |
Biochip Technology –A Gigantic Innovation Authors: T.Venkat Narayana Rao, Sai Sukruthi.G, Gloria ..............Raj |
129-135 |
23. |
Best effort Quality of Services provided to random traffic demands in WDM networks Authors:Mritunjay Kumar Sinha, Ajay Shekhar Pandey, ............Sunil Kumar Sinha, Anuj Kumar |
136-145 |
24. |
Modeling, Simulation and Implementation of Speed Control of DC Motor Using PIC 16F877A Authors: Payal P.Raval, Prof.C.R.mehta |
146-151 |
25. |
Generic Approach in Automation and Sensors for Enhanced Efficiency Authors: Pravin Kshirsagar, Ambarish Salodkar, Roshan .............Bhaiswar |
152-156 |
26. |
Power Saving Analysis of Different OpticalAccess Networks Authors: Deepti Punjabi, Vikram Mehta, Dr. Neena Gupta |
157-164 |
27. |
Authors: M.V.S. Murali Krishna, S. Narasimha Kumar, . .............P.V.K.Murthy, D.N.Reddy, K. Kishor |
165-173 |
28. |
Liquefaction Potential Evaluation of Alluvial Soil by Neuro-Fuzzy Technique Authors: Vijay Kumar, Kumar Venkatesh, .............Yeetendra Kumar |
174-184 |
29. |
Hybrid Nodal Architecture for Traffic Grooming In WDM Networks Authors: Mritunjay Kumar Sinha, Ajay Shekhar Pandey, .............Sunil Kumar Sinha, Anuj Kumar |
185-194 |
30. |
Experimental Study of Diethyl Ether and Ethanol Additives with Biodiesel-Diesel Blended Fuel Engine Authors: D. D .Nagdeote, M. M. Deshmukh |
195-199 |
31. |
Remote Sensing and GIS based wheat crop acreage estimation of Indore district, M.P.. Authors:Goswami S.B.,Dr.Aruna Saxena,Dr.G. D. Bairagi |
200-203 |
32. |
Wavelet: A Technique for Analysis Of ECG Authors: Sagar Singh Rathore, Naveen Dewangan |
204-209 |
33. |
Performance Behaviour of Static Sensor Nodes Using AODV and DSR Authors:Manas Ranjan Katual,Subhash Chander Sharma, ............Dambarudhar Seth |
210-214 |
34. |
Experimental and Numerical Study of Surface Flow Pattern on Delta Wing Author: Sukanta Saha, Bireswar Majumdar |
215-222 |
35. |
Modelling and Analysis of TCSC Controller For Enhancement of Transmission Network Authosr: J. V. Kadia, J. G. Jamnani |
223-229 |
36. |
Authors: Dr. R.Seyezhai |
230-237 |
37. |
Automated Test Approach for Web Based Software Authors: Indrajit Pan, Subhamita Mukherjee |
238-242 |
38. |
A Technique for Proper Feature Selection with Automated Text Categorization in the Vector Space Model Authors: Sukanya Ray, Nidhi Chandra |
243-246 |
39. |
The Reverse Re Engineering of Capacitive Touch Screen System Authors: Vinit tarey, Kaushal Bhatt, Pradeep Rupayla |
247-251 |
40. |
Authors:Tushar kanti, Vineet Richariya, Vivek Richariya |
252-256 |
41. |
Optimizing Query execution over Linked Data Authors:Bhaumik Nagar, Ashwin Makwana,Chirag Pandya |
257-259 |
42. |
Exploring the Forecasting Behaviour: Findings from Indian SMEs Author: Biju Augustine, M Bhasi, G Madhu |
260-267 |
43. |
Development of a Local GPS-Leveling Geoid Model for the Gaza Strip Area Authors: Maher A. El-Hallaq |
268-273 |
44. |
Using The Genetic Algorithm, Security Enhancement of Aircraft Landing Control System Authors: Parul Dewangan, Somesh Kumar Dewangan |
274-278 |
45. |
Performance Evolution of RSA and New Cryptosystem Authors: Sachin Mahajan, Santhosh Easo |
279-283 |
46. |
Authors:Tulika Bhattacharjee,Ajoy Kumar Chakraborty |
284-289 |
47. |
Image Segmentation using Graphical Models: A Survey Authors: Ashish Kumar, Uday Pratap Singh |
290-294 |
48. |
A Novel e-Learning Model in Social Networking Paradigm Author:Sourav Ghosh, Subhamita Mukherjee,Indrajit Pan |
295-300 |
49. |
Incorporating Data Mining Techniques on Software Cost Estimation: Validation and Improvement Author: Narendra Sharma,Ratnesh Litoriya |
301-309 |
50. |
Tuning of PID Controller for DC Servo Motor using Genetic Algorithm Authors: Bindu R., Mini K. Namboothiripad |
310-316 |
51. |
An Application for Resource Discovery in a Peer to Peer Network using Mobile Agents Author: Jayashree Nair |
315-317 |
52. |
Implementation of Guilt Model with Data Watcher for Data Leakage Detection System Authors: N. P. Jagap, S.S.Patil |
318-322 |
53. |
Image Denoising Using Trivariate Shrinkage Filter In Wavelet Domain Authors: Sumit A.Raokhande, Narayan V. Marathe |
323-326 |
54. |
Study and Performance Evaluation of SH-ANM And SH-ANM-E Authors: Sarkarsinha H. Rajput, Manoj E. Patil |
327-330 |
55. |
Performance Analysis and Improvement in Packet Loss Measurement Technique using BADABING Approach Authors: Sandeep J. Patil, Ashish T. Bhole, K. P. Adhiya |
331-337 |
56. |
Prediction of User’s Next Web Page Request By Hybrid Technique Authors: Poonam Kaushal |
338-342 |
57. |
A Modern Approach for Planar Inverted F Antenna Miniaturization Authors: R. Shantha Selva Kumari, M. Krishna Kumar |
343-351 |
58. |
An Invisible Watermarking Technique for Image Verification Authors: Rashel Sarkar, Hemavathy R., Dr. Shobha G. |
352-355 |
59. |
Author:Basu Dev Shivahare,Charu Wahi,Shalini Shivhare |
356-359 |
60. |
HTML Parser to Extract Tabular Data into A Two Dimensional String Array Authors: V.Kiran Kumar, K.Rajasekhara Rao |
360-363 |
61. |
Data Portal in Digital Libraries of Indian Universities Authors: Nagaraja B. Naik, Vanaja D. Kumari, Lokanatha .............C. Reddy |
364-366 |
62. |
Optimization of Test Case Using Genetic Algorithm Authors:Abhishek Singhal, Swati Chandna, Abhay Bansal |
367-369 |
63. |
Tamper Detection & Recovery in Medical Image with secure data hiding using Reversible Authors: Madhuri B. Kulkarni, Ramesh T. Patil |
370-373 |
64. |
Empirical Analysis and Optimization of Fallback Authentication Manager Authors: Archana Burujwale, Akhil Khare |
374-378 |
65. |
Wavelet Packet Transform Based Energy Detector for Spectrum Sensing Authors: Shrutika S. Sawant, M. S. Kumbhar |
379-382 |
66. |
Trends in Fractional Order Controllers Authors:Karanjkar D.S.,Chatterji. S.,Venkateswaran P.R. |
383-389 |
67. |
Authors: Manjunath G, Dr. T S Rukmini, Rajine Swetha R |
390-395 |
68. |
Authors: Rajakumar D.G, N. Nagesha |
396-402 |
69. |
Authors: Kallol Das, Priyanath Das, Sharmistha Sharma |
403-409 |
70. |
Array Antenna Performance Evaluation Based on Element Spacing between the Patches Authors: B.T.P.Madhav, K.Guru Pavani, M.Raveendra, ............N.Revanth Teja |
410-417 |
71. |
Neural Network Based Steganalysis Framework to Detect Stego-Contents in Corporate Emails Authors:P.T.Anitha, Dr.M.Rajaram, Dr. S.N.Sivanandham |
418-424 |
72. |
Author: Mohamed Ouda |
425-429 |
73. |
Apparatus design for suffusion characterization Authors: O. Plé, J. Monnet, D.M. Nguyen |
430-435 |
74. |
Multipath Dynanic Source Routing Protocol for.. Ad-Hoc Network Authors: P.S. Patheja, Akhilesh A. Waoo, Lokesh Malviya |
436-439 |
75. |
BER Performance for OFDM Using Non-Conventional Transform and Non-Conventional Mapping Schemes Authors: Shilpi Gupta, Dr. Upena D. Dalal |
440-444 |
76. |
Authors: B.S. Bhadouriya, M. K. Gaur, C. S. Malvi |
445-448 |
77. |
Algorithms for Cost-Effective Video Compression Author: Angel DeCegama |
449-455 |
78. |
Manufacturing and performance analysis of solar flat plate collector with phase change material Authors: B.K. Gond, M. K. Gaur, C. S. Malvi |
456-459 |
79. |
Cryptanalysis of Feistel cipher using Back propagation Neural Network Authors: Shweta Pandey, Megha Mishra |
460-462 |
80. |
Simulation & Experiment for Eddy Current Studies due to Current Quench Authors:Ravi Prakash.N,Rajan Babu,Ranjana Gangradey, ............Megha M.Patel, Prof. S.N.Jani |
463-467 |
81. |
Authors: Jai Shree Gupta, K. P. Singh, Dr. A. N. Tiwari |
468-473 |
82. |
Authors: J. S. Awati, S. B. Awati |
474-477 |
83. |
Analytical Solution for Inverse Kinematics of SCORBOT-ER-Vplus Robot Authors: Vivek A Deshpande, Dr. P M George |
478-481 |
84. |
Generation Amount Prediction of Hazardous Substances from Computer Waste: A Case Study of India Authors: Pamela Chawla, Neelu Jain |
482-490 |
85. |
Generation of UML Class Diagram, Database & Workspace from EER Diagram Authors : Bhandare Milind, Deshmukh Dipali,Jagtap Rajnandini,Kolhal Devyani,Sanap Kanchani |
491-493 |
86. |
Experimental Analysis of Condenser Length Effect on the performance of Thermosyphon Authors: P. G. Anjankar, Dr. R. B. Yarasu |
494-499 |
87. |
Review of Pruning and Performance Enhancement Techniques over Classification Algorithms Authors: Anshu Katare, Dr. Vijay Anant Athavale |
500-505 |
88. |
Authors: M.Shashidhar, K.Kishan Rao, P.V.D. Somasekhar Rao |
506-512 |