Volume 2, Issue 6, June 2012 (ISSN 2250 – 2459)
S.No. |
Title of Paper |
Page No. |
1. |
Authors: ALLOU Kouassi, ISSALI Auguste Emmanuel, ...........LEKADOU Thierry, KONAN Konan Jean Louis, ...........ZAKRA Nicodème,KOUASSI Kouassi Philippe, ,,,,,,,,,,,BOURDEIX Roland, MORIN Jean Paul, SARAKA ,,,,,,,,,,,Yao Didier Martial |
1-6 |
2. |
An Iterative Technique for Solving Nonlinear Optimal Control Problems Using Legendre Scaling Function Authors: Hatem Elaydi, Hussein Jaddu, Mohammad Wadi |
7-11 |
3. |
Efficient Clustering Technique for Information Retrieval in Data Mining Authors: Anoop Jain, Aruna Bajpai, Manish Kumar Rohila |
12-20 |
4. |
Fuzzy Modelling of Voltage Standing Wave Ratio using Fuzzy Regression Method Authors: T. D. Dongale, T .G. Kulkarni, R. R. Mudholkar |
21-26 |
5. |
Cacheable Web Request Management at Dispatcher level in Cluster Web Server Systems Authors: Kamani Gautam J., Dr. N. N. Jani, ,,,,,,,,,,,,,,,,, ..............Dr. Y R Ghodasara |
27-30 |
6. |
Resource Management In Cloud Computing With Increasing Dataset Authors: Preeti Agrawal, Yogesh Rathore |
31-35 |
7. |
Authors:Priyanath Das, Sunita Halder nee Dey, Abhijit ............Chakrabarti, Madhumita Mandal |
36-45 |
8. |
Authors:Ms. K.Ramadevi, Ms. R. Manju |
46-47 |
9. |
Method Of Secret Splitting: Novel Way To Authenticate Rfid Tags And Reader Authors:Debashreet Das,Rasmita Rautray |
47-49 |
10. |
A Review of Various Methodologies Used for Shaft Failure Analysis Authors: V. S. Khangar, Dr. S. B. Jaju |
50-54 |
11. |
Authors: Amol Chausalkar, Harimohan Dubey |
55-61 |
12. |
Modelling and Simulation of Fuzzy Controlled SVC for Long Transmission Line Author : K.Srinivas |
62-68 |
13. |
Authors: Kannan Rassiah, Myia Yusrina, Z. A., Muhammad Hafiz K., Mohd Yuhazri Y., Haeryip Sihombing, Parahsakthi Chidambaram |
69-73 |
14. |
How to Manage Balance Tree (B-Tree) Authors: Mangesh Umak, Vijaya Sawarkar, Hemant ...............Gulhane |
74-82 |
15. |
Comparison of CSRZ, DRZ and MDRZ Modulation Formats for High Bit Rate WDM-PON System using AWG Authors: Malti, Meenakshi Sharma, Anu Sheetal |
83-87 |
16. |
Fault Analysis Using Mathematical Morphology and Fractal Geometry Authors: Ramkumar P.B |
88-91 |
17. |
Realization of low cost Bluetooth based visual sensor node for pest and disease detection in crops Author: Subhodip Maulik |
92-97 |
18. |
Authors: Varsha Prasad, Dr Chirag Sharma |
98-104 |
19. |
Authors: S. Yuvaraj, Dr.Sujimohankumar, N.Dinesh, C. ..............Karthic |
105-110 |
20. |
TCP and UDP Fairness in Vehicular Ad hoc Networks Authors: Forouzan Pirmohammadi, Mahmood Fathy, ...............Hossein Ghaffarian |
111-118 |
21. |
Temperature Control And Maintenance Of Polyester X-Ray Coating Station Authors: R.S.Kiruthika, G.Saranya |
119-126 |
22. |
Authors: Narendra Zinjad, S.S. More |
127-132 |
23. |
Authors: Parag M. Moteria, Dr. Y R Ghodasara |
133-135 |
24. |
Enhanced Uniform Distributed Clustering Algorithm (UDCA) In Wireless Sensor Network Authors: Rajnish Kansal |
136-140 |
25. |
Proficient Navigations using Concept Hierarchies Authors:Ramesh Kolluru, H.Devaraju,Y. Ramesh Kumar |
141-145 |
26. |
Authors: B.Sai Sreenivas, Dr.Ch.Sai Babu, Mr.D. Lenine |
146-150 |
27. |
Realization of Fuzzy Logic Temperature Controller Author: Srismrita Basu |
151-155 |
28. |
Colour Based Image Segmentation Using L*A*B* Colour Space Based On Genetic Algorithm Authors: Vivek Singh Rathore, Messala Sudhir Kumar, .............Ashwini Verma |
156-162 |
29. |
A survey report on Different Techniques of Image Encryption Authors: Abhinav Srivastava |
163-167 |
30. |
Trust Formalization in MANET within Multichannel Authors: Amandeep Kaur |
168-175 |
31. |
Authors : P. J. Kotak, P.R.Gadling |
172-176 |
32. |
Daughman’s Algorithm Method for Iris Recognition-A Biometric Approach Authors: Prateek Verma, Maheedhar Dubey, Praveen Verma, Somak Basu |
177-185 |
33. |
A New Prototype of XML Compression Technique Authors: V. S. Gulhane, Dr. M. S. Ali |
186-192 |
34. |
Design Methodology of Fuzzy Inference System for Cane Level Controlling Authors: Yogesh Misra, Prof. (Dr.) H R Kamath |
193-198 |
35. |
Study on Sand and paper reinforcement Authors: Dr. Amin Chegenizadeh, Prof.Hamid Nikraz |
199-202 |
36. |
Integration of Struts, Spring and Hibernate for an University Management System Authors: Ankur Bawiskar, Prashant Sawant, Vinayak ,,,,,,,,,,,,,,,Kankate, Dr. B.B.Meshram |
203-210 |
37. |
Feed forward current regulator for low voltage ride through of DFIG wind turbine Authors: Prof. Prabhugaonkar, Prof. D.S. Bankar, ,,,,,,,,,,,,, Dr. D.B. Talange |
211-217 |
38. |
Parametric Studies on Wrinkling and Fracture Limits in Deep Drawing of Cylindrical Cup Authors: P.V.R. Ravindra Reddy, B.V.S.Rao, G.Chandra ,,,,,,,,,,,,,,Mohan Reddy, P. Radhakrishna Prasad, ,,,,,,,,,,,,,,G. Krishna Mohan Rao |
218-222 |
39. |
Temperature Prediction in Orthogonal Machining of A1/SiCp Composites Authors: A.A. Sri Rama Krishna, Dr.P.Ravinder Reddy |
223-229 |
40. |
Authors: Zeghichi Leila, Noui Ammar, Lahmadi Azzeddine |
230-235 |
41. |
Smart Phone Access, Control & Security: A Survey Authors: Prof. P.L.Ramteke,Dr. D.N.Choudhary |
236-241 |
42. |
VHDL Implementation of Correlation Radar For Automotive Applications Authors: Pankaj Soni, Puran Gour |
242-244 |
43. |
Design of V-Slotted Trapezoidal Patch Antenna in WI-MAX Band Using Optimized Feed Location Method Authors:Parikshit Vasisht, Taruna Gautam |
245-248 |
44. |
Authors:Pragati Bhatnagar, N.K. Pareek |
249-256 |
45. |
Authors: Rahul Pachoriya, Vedansh Chaturvedi, ,,,,,,,,,,,,,,,, Jyoti Vimal |
257-262 |
46. |
Error Performance of Decoding of LDPC over AWGN Channel Author: G. Renuka |
263-271 |
47. |
Survey of Biometric Recognition System for Iris Authors: T. Rakesh, M G Khogare |
272-276 |
48. |
Evaluation of Text Detection and Localization Methods in Natural Images Authors: M. Swamy Das, B. Hima Bindhu, A. Govardhan |
277-282 |
49. |
Authors: Vivek Kumar, Deepak Rajouria |
283-287 |
50. |
Intersection of Service Oriented Architecture (SOA) and Data Integration Authors:Iqbal Kaur,Dr. Amita Malik, Charanpreet Chawla |
288-291 |
51. |
FPGA Implementation of Different Multiplier Architectures Authors: Laxman s, Darshan Prabhu R,Mahesh S Shetty , ,,,,,,,,,,,, Mrs.Manjula BM, Dr.Chirag Sharma |
292-295 |
52. |
Comparative Analysis of Image Denoising Techniques Authors: Jappreet Kaur, Manpreet Kaur, Poonamdeep ,,,,,,,,,,,, Kaur, Manpreet Kaur |
296-298 |
53. |
Design of Process Variation 3T1D-Based DRAM Using CADENCE Authors: Arpit Yadav, Prof. Aruna Tete |
299-305 |
54. |
Speech Compression with Voice Excited Linear predictive Coding Authors: Arpana Mishra ,Javed Ashraf |
306-309 |
55. |
Water Temperature Controller Using Microcontroller And Correction Using Fuzzy Logic Authors: Aritra De |
310-314 |
56. |
CBR Improvement of Clayey Soil with Geo-grid Reinforcement Author: Pardeep Singh, K.S.Gill |
315-318 |
57. |
Design of Intelligent Multichannel Routing Processor Using VHDL Authors: Rajesh Nema, Parvinder Singh Khanna |
319-323 |
58. |
Design and Analysis of Low Power Full Adder Using Adiabatic Technique Authors: P.Sreenivasulu, M.V.Narasimha reddy, ,,,,,,,,,,,, ,,,,,,,,,,,,, G.V.K. Varaprasad Swamy |
324-328 |
59. |
WiMAX Networks:Services & their Quality Matrics Author: Ranjan Kumar Singh |
329-333 |
60. |
ANFIS Approach for Locating Precise Fault Points in Distribution System Authors: Rasli A Ghani, Mohd Fauzi Othman, A.M. Hashim |
334-342 |
61. |
Mapping of Power Distribution Network using Geographical Information System (GIS) Authors: H.T Hassan, M. Faheem Akhtar |
343-347 |
62. |
Scour Analysis in High Vertical Drop Shallow Using Numerical and Physical Models Authors: M. Habibi, M.J khanjani |
348-355 |
63. |
An Efficient Route Metric for Evaluating and Selection of Best Routes In Mobile Adhoc Networks Authors: B.Aruna Kumari, Ch.Sulochana Rani |
356-359 |
64. |
Cost Effective Fabrication of a Solar PV Panel for LED Lighting Authors: J. K. Bhartiya, A. Patra, C. S. Malvi |
360-366 |
65. |
Improving Performance of 802.11 MAC by Optimizing DCF in Mobile Ad-hoc Network Authors: P.S.Patheja, Akhilesh A.Waoo, Vaishali Tiwari |
367-371 |
66. |
Computerized Experimental Setup for Analysis of Four Bar Mechanism - A Demonstrative Model Approach Authors: Pranao G kalmegh |
372-376 |
67. |
Application of Distributed Control System in automation of Process Industries Authors: Megha Anand S.A., Suprathik Sarkar, Sree .............Rajendra |
377-383 |
68. |
Integrated Computing System for Measuring Driver Safety Index Authors: Shashanka Chigurupati, Sowmya Polavarapu, ............ Yasesvi Kancherla, A. Kousar Nikhath |
384-388 |
69. |
Privacy Preservation With Limited Side Effect Authors: Deepti Gatne, Prof. Manoj Jhade |
389-392 |
70. |
Data Encryption Using Square Grid Transposition With Cryptography DSA Technique Authors: Dhananjaya Singh, Parma Nand |
393-398 |
71. |
A Review on Text Fusion in Medical Images Authors:Naveen Kumar, Sukhwinder Singh |
399-403 |
72. |
Reduction of Power Dissipation in 32bit RISC Microprocessor using Clock Gating Authors: Puran Gaur, Swati Joshi |
404-408 |
73. |
Dynamic Balancing of Centrifugal Pump Impeller Authors: Amit Kalmegh, Santosh Bhaskar |
409-413 |
74. |
Construction Monitoring of Paving Fabrics Systems to Reduce Reflective Cracking - Lessons Learned Authors: Farshad Amini, Bradnado Turnquest, Randolph .............Ahlrich |
414-421 |
75. |
Authors: M. Zehsaz, F. Vakili, A. Fasihi, A.A. Majidi jirandi |
422-432 |
76. |
Night image Optimization Technique using hybrid Model of high intensity & low intensity images Authors: Preeti Gupta, Supreet Singh |
433-435 |
77. |
Authors: Gurbir Kaur, S P Singh, S K Kaushik |
436-445 |
78. |
Optimised FFT design using Constant Co-efficient Multiplier Authors:Chandan.M,S.L.Pinjare,Chandra Mohan Umapthy |
446-451 |
79. |
Authors: Seema sreekumar, Geetha, Sanoop M.K |
452-456 |
80. |
Authors: Jérémie Madjadoumbaye, Didier Fokwa, Gilbert Tchemou, Renaud Bertrand Pengu, Bertrand Ngopnang Tchewou, Thomas Tatietse Tamo |
457-463 |
81. |
Authors: Rajat Gupta, Nishant Suri, Harsh Bhatnagar, ............B.Persis Urbana Ivy |
464-466 |