S.No. |
Title of Paper |
Page No. |
1. |
Analysis on Maha Myat Muni Pagoda Complex from the
Aspects of Fire Safety
Authors: Aye Thandar Phyo Wai, Theingi Shwe |
1-6 |
2. |
A Study on the Effect of Antimicrobial Agent from Aloe Vera Gel on Bleached cotton Fabric
Authors: Nan Thazin Hein, Dr. Swe Swe Hnin, Daw Htay Htay |
7-11 |
3. |
Dopant Activation in Ion-shower-doped Poly-Si
Author: Jae-Sang Ro |
12-16 |
4. |
Comparison between Green Area Ratio of Yangon’s Housing
Estates and Foreign Housing Estates
Authors: Hnin Su Mon Win, Maung Hlaing, Theingi Shwe |
17-23 |
5. |
A Study of Investigating the Relationship between Consumer
Satisfaction and Operations Strategies of Campus Restaurants
by Using Dynamic Simulation
Author: Pin-Chang Chen |
24-27 |
6. |
CFD Simulation for Manifold with Taperedlongitudinal Section
Authors: Jafar M. Hassan, Wahid S. Mohammed, Thamer A. Mohamed, Wissam H. Alawee |
28-35 |
7. |
Adaptive Study of Thermal Comfortin Equatorial Zone: Case of
Some Buildings in Cameroon
Authors: Modeste Kameni Nematchoua, ReneTchinda,Wagner Augusto Andreasi, Noel Djongyang |
36-47 |
8. |
Research and Development in Hybrid Renewable Energy
Systems.
Authors: S. Wijewardana, Member-IESL |
48-79 |
9. |
Passenger Car Equivalents at Signalized Intersections for Heavy
and Medium Trucks and Animal Driven Carts in Gaza,
Palestine
Author: Dr. Yahya R. Sarraj |
80-88 |
10. |
Study on Local Information Platform to Perform Integrated
Management for Local Sightseeing and Disaster Prevention
Information Diffused on Internet
Authors: Takeshi Tsuchiya, Hiroo Hirose, Tadashi MIyosawa, Tetsuyasu Yamada |
89-95 |
11. |
Android Play Station
Authors: Mahesh Vibhute, Rajesh Patil |
96-100 |
12. |
Proposed Local Data Mart Approach for Data Warehouse Architecture
Authors: Bhadresh Pandya, Dr. Sanjay Shah |
101-104 |
13. |
Odd and Even Switching Pattern in PV Generation System Coupled SHEPWM Inverter to Reduce Harmonics in Grid
Authors: D. Rajalakshmi, K. Geetha, M. Malathi |
105-109 |
14. |
Survey of Microarray Data Processing for Cancer Sub-Classification
Authors: Supriya Patil, G. M. Naik, K. R. Pai |
110-113 |
15. |
Real Time System for Monitoring and Improving the Flow of
Sewer System
Authors: M.K.Elango, S.Usha |
114-116 |
16. |
Computational Analysis of Load on Envelope of MAGLEV
Propelled Transportation Airship using FSI
Authors: Kiran Babu K M, M Subha |
117-120 |
17. |
EUCLBP Matching Algorithm for Forensic Applications
Authors: Gnanasoundari.V, Balaji.S |
121-126 |
18. |
The Detection and Visualization of Brain Tumors on T2-Weighted MRI Images Using Multiparameter Feature Blocks
Authors: Sushma Laxman Wakchaure, Ganesh Dynandev Ghuge, Dyandev S. Musale |
127-131 |
19. |
PSO Based an Optimal Power Flow with Economical
Generation and Dispatch by Inserting FACTS Devices
Authors: K.Venkateswarlu, Dr.Ch.Saibabu, K.Srikanth, Dr.G.Srinivasan |
132-143 |
20. |
A Search for Precursors of Earthquake from 9 kHz Sferic Signal observation Recorded at Kolkata
Authors: Pranab Hazra, Tamanna Islam |
144-148 |
21. |
An Evaluation of Capacity of Roundabout: A Case Study of Aanjali Roundabout at Ahmedabad
Authors: Miteshkumar N Damor, Harshad C Prajapati |
149-151 |
22. |
Distance Based Skyline Query Processing for Mobile Based Applications
Author: R. Sampath |
152-156 |
23. |
Secured Solutions for Mobility in Wireless Body Area Networks
Authors: Manisha Mittal, Dr. D. K. Chauhan |
157-161 |
24. |
Electromagnet for Plasma Chamber of CPS machine
Authors: S. Samantaray, R. Paikaray, G. Sahoo, J. Ghosh, A. Sanyasi |
162-165 |
25. |
Asymmetric Cascaded Multilevel Inverter Using Submultilevel Cells
Authors: P. Alagu Sundari, S. Dhinakaraj |
166-173 |
26. |
Analysis of Visual Cryptography, Steganography Schemes and its Hybrid Approach for Security of Images
Authors: Moumita Pramanik, Kalpana Sharma |
174-179 |
27. |
Image Retrieval by Using Sketches
Authors: S.A.Mache,R.D.Darkunde,R.L.Gangarde,Prof S.G.Rathod |
180-181 |
28. |
Single Objective Single Function Criteria for Selection of Manufacturing Method
Authors: Girish R. Naik, Dr. V. A. Raikar, Dr. Poornima G. Naik |
182-190 |
29. |
SoftServe (Software Server)
Authors: Omkar Indulkar, Tushar Waghmode, Ashish Jain, Swpneil Kadam |
191-193 |
30. |
Implementing And Comparison of MANET Routing Protocols Using NS2
Authors: M. Swathi, B. Pravallika, N.V. Muralidhar |
194-200 |
31. |
Research Caricature Based on Semantic Web Mining
Authors: M Swathi, N Roja Ramani, T Lekhana Praneetha, P Jyostna Mounica, R Kusuma Kumari |
201-204 |
32. |
Research Caricature Based on Semantic Web Mining
Authors: M Swathi, N Roja Ramani, T Lekhana Praneetha, P Jyostna Mounica, R Kusuma Kumari |
201-204 |
33. |
Effective Data Structure for Mining Frequent Itemset in Cloud Databases
Authors: Anitha. R, Saswati Mukherjee |
210-217 |
34. |
Privacy and Groups Maintaining in Social Networks
Authors: D. Rajeswara Rao, A. Raghuveer |
218-222 |
35. |
Data Migration In Heterogeneous Databases (ETL)
Authors: Tribhuvan Shweta M., Rasane Pratiksha V., M. R. Bendre |
223-227 |
36. |
Failure Diagnosis & Design Modification of Pivot Pin in
Gearbox for Avoiding Failure
Authors: Sneha S. Chavan, Dr. Shashank B. Thakre, Kiran R. Kaware |
228-232 |
37. |
Experimental Investigations on The Flexural Strength of PET Reinforced Concrete
Authors: M. L. Anoop Kumar, Dr. I. V. Ramana Reddy, Dr. C. Sasidhar |
233-240 |
38. |
Detection of Pulmonary Nodules Using MTANN in Chest
Radiographs
Authors: Preetha.J, G. Jayandhi |
241-246 |
39. |
Investigation into The Effectiveness of Stainless Steel as A
Material For The Production of Motor Cycle Exhaust Burn
Protector
Authors: D.K. Garba, W.C. Solomon, S.U. Mohammed, CO Izelu |
247-252 |
40. |
Structural Analysis of Ladder Chassis for Higher Strength
Authors: Abhishek Singh, Vishal Soni, Aditya Singh |
253-259 |
41. |
Unsupervised Change Detection in Remote Sensing Images Using Pulse Coupled Neural Network
Authors: Geeta Desai, Sonal Gahankari |
260-266 |
42. |
Contrivance of Optical Foam Detection System for Transformer Oil Filtering Machine
Authors: Dhiraj Ladhe, Pranay Chavan, Nikhil Jain, Animesh Degaonkar |
267-270 |
43. |
Quick Response Code for Fast Detection and Recognition of
Information
Authors: Rajeeva KR, BM Sagar |
271-275 |
44. |
Online Parameter Monitoring System with Program
Download Facility
Authors: Sushma B. Ambekar, Prof. D.D.Chaudhary |
276-279 |
45. |
Comparative Performance Analysis of Induction Motor Using Semiconductor Devices in Terms of Firing Angle
Authors: Umar Farooq Siddiqui, Ajit Verma, Shilpa Soni |
280-285 |
46. |
Light Sensor Based Automatic Solar Tracking System Using Parabolic Reflector And Lens Focussing Action For Maximum Power Point Tracking
Authors: Pramit Saha, Soumya Goswami |
286-293 |
47. |
Image Segmentation for Text Recognition using Boundary Analysis
Authors: Rohit Kolar, Akshay Thakar, Muzaffar Shabad |
294-298 |
48. |
Multimedia Keyword Spotting (MKWS) Using Training And Template Based Techniques
Authors: Jigar Patel, Kailash Singh Maurya, Sameer Kulkarni, Vaibhav Sakore, Shraddha Khonde |
299-302 |
49. |
M-Score and K-Anonymity: A Model for Detection And Protection of Data
Authors: D. Rajeswara Rao, S. Sahitya |
303-308 |
50. |
An Experimental Study on Rubberized Concrete
Authors: Er. Yogender Antil |
309-316 |
51. |
Audio Steganography And Security Using Cryptography
Authors: Arfan Shaikh, Kirankumar Solanki, Vishal Uttekar, Neeraj Vishwakarma |
317-318 |
52. |
High-efficiency Step-Up Converter by using PV system with Reduced Diode Stresses Sharing
Authors: V. Thirumurugan, S.Sugumar |
319-324 |
53. |
Grid Integration of AC and DC Energy Resources using Multi-Input Nine Switch Matrix Converter
Authors: V.Kandasamy, R.Manoj |
325-329 |
54. |
Numerical Method Based Single Machine Analysis for Transient Stability
Authors: Samita Padhi, Bishnu Prasad Mishra |
330-335 |
55. |
Design of High Speed, Area Efficient, Low Power Vedic Multiplier using Reversible Logic Gate
Authors: A. Shifana Parween, S. Murugeswari |
336-340 |
56. |
iSearch Location Based Mobile System
Authors: Amale Tejashree, Jagtap Priyanka, Shelke Priya, Hardas Preeti |
341-344 |
57. |
Design and Analysis of 32-b Arithmetic Logical Unit With
Modified CSLA
Authors: S. Suganyadevi, S. Brundha, A. Suganya, N. Pavithra, Dr. C. Ganesh Babu |
345-349 |
58. |
Adaptive Genetic Algorithm for Efficient Resource Management in Cloud Computing
Authors: S.R.Suraj, R.Natchadalingam |
350-356 |
59. |
Energy Efficient Shortest Path Routing in WSN Using Two point Crossover and External Mutation
Authors: Rigi C.R, Swapna B. Sasi, Anil Antony |
357-360 |
60. |
Implementation of ROI Based Baseline Sequential Adaptive
Quantization
Authors: G.Gowripushpa, G.Santoshi, B. Ravikiran, J. Sharmila Rani, K. Sri Harsha |
361-367 |
61. |
E-Brainstorm: Using PaaS Model of Cloud for Elearning
Authors: Devipriya.C, Lavanya.K, Sangeetha Priya.M, Shalini Merine George |
368-372 |
62. |
An Experimental Study of Pressure Cofficient and Flow Using Sub Sonic Wind Tunnel
The Case of A Circular Cylinder
Authors: Shrish Chandra Duve, Mahendra Kumar Agrawal |
373-376 |
63. |
Chem Text Mining- An Outline
Authors: Shidha M.V, Dr.T.Mahalekshmi |
377-386 |
64. |
Review Of Various GDI Techniques For Low Power Digital
Circuits
Authors: Pooja Verma, Rachna Manchanda |
387-390 |
65. |
Speech Recognition Based Wheelchair Using Device Switching
Authors: Atul Kumar, Prashant Singh, Amit Kumar, S. K Pawar |
391-393 |
66. |
Design of Feedback Controller of a Power Plant and Its
Stability Study
Authors: Chandra Mohan Khan, Sukumar Chandra Konar, Chandan Kumar Chanda |
394-403 |
67. |
Voice Based System in Desktop and Mobile Devices for Blind People
Authors: Jagtap Nilesh, Pavan Alai, Chavhan Swapnil, Bendre M.R |
404-407 |
68. |
Shared Cryptographic Scheme with Efficient Data Recovery
and Compression for Audio Secret Sharing
Authors: Sagar A. Yeshwantrao, Vilas J. Jadhav, Pravin S. Rahate |
408-414 |
69. |
Local Fractional Fourier Transform With Applications In Local Fractional Derivative: Another Approach
Author: S. D. Manjarekar |
415-417 |
70. |
An Efficient Image Compression Algorithm to Improve The Compression-Ratio of Dual-Color Image
Authors: D. Saranya, G. Balasubramani |
418-422 |
71. |
Performance Analysis of Joint Network Channel Coding In Various Network Topologies
Authors: D. Rajeswari, K.Vijayalakshmi |
423-429 |
72. |
Data hiding in Motion Vectors of Compressed Video
Authors: Deepak Angadi, Satyajeet Bhujbal, Raj Pimpale, Yogesh Vibhute, B.S.Kamble |
430-433 |
73. |
Estimation of Tool life and Optimization of Parameters for a CNC Parallel shank End Mill Tool Using Genetic Algorithm Approach
Authors: N.S. Pohokar, L. B. Bhuyar |
434-442 |
74. |
A study on Rainfall-Runoff Relationship using NRCS-CN
and Remote Sensing Technology in Deh Sabz sub basin,
Kabul Afghanistan
Authors: Raja Sekhar.P, Lakshmi Sruthi.P, Folad Malwan |
443-449 |
75. |
Estimation Of Confined Aquifer Parameters Of Polecharkhi
Sub-basin Of Kabul Basin
Authors: Raja sekhar.P, Lakshmi Sruthi.P, Mansoor Mansoori |
450-456 |
76. |
Achieve Fine Grained Data Access Control in Cloud
Computing using KP-ABE along-with Lazy and Proxy
Re-encryption
Authors: Hulawale Kalyani, Paikrao Rahul, Pawar Ambika |
457-461 |
77. |
Design of low-Consumption Piezoelectric Transducer
for High Current Measurement.
Authors: Arvind S. Pande, Rakesh Kumar Jha, B.E. Kushare |
462-465 |
78. |
Mobile And Computer Interactive Communication Protocol on Linux
Authors: Sharad Jondhale, Ganesh Admane, Dipak Mene |
466-470 |
79. |
Prevention of Battery Violation in WSN using Routing Loop
Authors: Samadhan Manore, Chandan Singh, Dhanashree Badhan, Harshala Patil |
471-476 |
80. |
A Comparative Study of Performance and Emission Characteristics of Four Stroke Diesel Engine with Jatropha and Cotton Seed Bio Diesels
Authors: V. Naga Prasad Naidu, V. Pandu Rangadu |
477-481 |
81. |
A Survey on QoS Ranking in Cloud Computing
Authors: M. Subha, M. Uthaya Banu |
482-488 |
82. |
ANT Algorithm for Load Balancing Problem in FTP Server
Authors: C. R. Barde, Snehal Kasar, Samruddhi Nikam, Shradha Shelar, Nikita Wagh |
489-491 |
83. |
Advance XML Search Engine
Authors: Bushra K. Shaikh, Aanchal S. Boob, Ravikant N. Shejwal |
492-494 |
84. |
Property Analysis of Aluminium (LM-25) Metal Matrix Composite
Authors: Akhilesh Jayakumar, Mahesh Rangaraj |
495-501 |
85. |
Analysis of Rectangular Platform Subjected to Transverse Load Using Galerkin Functional
Authors: Ezeh, J. C, Ibearugbulem, Owus M., Ozuluonye, Chioma G. |
502-505 |
86. |
RLNG Conversion, Boiler Dynamics and Control
Author: Manju A Sathyan, Lethakumary B. |
506-510 |
87. |
Traffic Signal Optimization for Important Routes In Nagpur
City: A Review
Authors: Kishor Bambode, Vishal Gajghate |
511-514 |
88. |
Robust Object Tracking under Cluttered Environment
Authors: Prashant Kumar, Rupak Chakraborty, Arup Sarkar |
515-523 |
89. |
Two-Stage Fixed-Point Quantization of LDPC Min-Sum
Decoding
Authors: Meng Zhu, Lixin Li, Huisheng Zhang |
524-527 |
90. |
Secured Multiple-keyword Search over Encrypted Cloud Data
Authors: C. R. Barde, Pooja Katkade, Deepali Shewale, Rohit Khatale |
528-532 |
91. |
Wireless Power Transmission
Authors: Vikash Mishra, Lavya Nigam, Anand Mohan |
533-537 |
92. |
A Novel Method for Data Hiding in Encrypted Image and
Video
Authors: A. Kaja Moideen, K. R. Siva Bharathi |
538-542 |
93. |
Distributed Apriori for Malls
Authors: Devare Jayvant, Minal Hadawale, Anuja Gajare, Mukta Gajare, Sonal Auti |
543-546 |
94. |
Effective Stress Method on Failure Mechanism of Deep Foundation Adjacent to Underground Constructions
Author: WU Ke |
547-550 |
95. |
Management of Parking Guidance Information System based on
WSN
Authors: Divya Jyoti, Sharad Wagh |
551-555 |
96. |
Simulation of Metal Chloride based Hydrogen Production using ASPEN PLUS
Author: Ankur |
556-561 |
97. |
Interactive Services of College Databases
Authors: Kalpita Wagh, Madhura Dudwadkar, Dakshata Toraskar, Vaibhav Patil |
562-564 |
98. |
A Critical Review of Liquid Limit – Plasticity Index Relationships
Authors: Beshy Kuriakose, Benny Mathews Abraham, A. Sridharan, Babu T. Jose |
565-568 |
99. |
Analysis of Camera Restriction-Free View-Based 3-D Object
Recovery
Authors: Vinod Kumar Upadhyay, Padmashree Kunthe, Sameena Zafar |
569-573 |
100. |
Analysis of Challenges in the Design and Development of Multi-Level Secure Databases
Authors: Pooja Sapra, Suresh Kumar |
574-580 |
101. |
Mobile Browser Used In Iraqi Airline
Author: Mohanad Ali Meteab Al-Obaidi |
581-584 |
102. |
Adaptive Stock Tracker For Personalized Advice
Authors: Shinde Ajinkya, Palanpurwala Sara, Pabrekar Nandadeep |
585-588 |
103. |
Energy Efficient Routing Protocol for Wireless Sensor
Networks
Authors: Nandkumar Girase, Parag Pawar, Gaurav Joshi, Amol Pawar, S.R. Lahane |
589-591 |
104. |
Simulation studies on Energy Requirement, Work Input and
Grindability of Ball Mill
Author: Abanti Sahoo |
592-597 |
105. |
Using Remote Sensing Data for Yellowfin Tuna Fishing
Ground Forecasting in Vietnamese Offshore Areas
Authors: Nguyen D.T., Doan V. B. |
598-605 |
106. |
Determination of Weld loads by using Design of Experiments
for low carbon steel sheet for Automobile Application
Authors: Kancha. Sammaiah, N. Nagabhushana. Ramesh, D. Govardhan3, V.V.S.H.Prasad |
606-611 |
107. |
Parametric Analysis of Combined Cycle Power Plant
Using Inlet Vapour Compression Cycle
Authors: L. J. Nayak, D. Mahto |
612-618 |
108. |
Analysis of Confined Aquifer Parameters of Logar Sub-Basin
of Kabul Basin
Authors: Raja Sekhar.P, Lakshmi Sruthi.P, Mansoor Mansoori.P |
619-625 |
109. |
Improving Production Performance through Lean Manufacturing Techniques in a Manufacturing Firm
Authors: Cigil Sebastian, Nidhin Babu AV, Rajneesh P, Sinosh NK, Sreeraj E5, Jibi R |
626-630 |
110. |
Leverage Data Mining Techniques in Intrusion detection
Authors: S. Neelima, N. Satyanarayana, P. Krishna Murthy |
631-634 |
111. |
Dielectric Constant of Poly (ortho-Phenylenediamine) Modified on Pt disk Microelectrode in Presence of Hydrogen Peroxide and Ascorbic Acid
Authors: Aziah Ahmad Ariffin, Norazreen Zakaria, Muhd Zu Azhan Yahya, Zainiharyati Mohd Zain |
635-640 |
112. |
Task Scheduling in Homogeneous Multiprocessor Systems Using Evolutionary Techniques
Authors: Aparna Vishwanath, Ramesh Vulavala, Sapna U. Prabhu |
641-647 |
113. |
A Comprehensive Study on Various Visual cryptography Schemes with an Application
Authors: Madhuri Ghuge, Kanchan Doke |
648-652 |
114. |
Intrusion Detection System using K- means, PSO with SVM
Classifier: A Survey
Authors: Harshit Saxena, Vineet Richariya |
653-657 |
115. |
A Survey on Multiple Mismatch Corrections in Two-Channel
TI-ADC System
Authors: Kamini Singh, Praveen Kumar Malviya |
658-664 |
116. |
Digitally Controlled Delay Lines Based On NAND Gate for Glitch Free Circuits
Authors: Krishna Priya N, Vinothini V |
665-667 |
117. |
Review Techniques of Data Privacy in Cloud Using Back Propagation Neural Network
Authors: D. J. Bonde, Shaikh Akib, Pokharkar Shubhangi, Auti Surbhi, Shelke Satish |
668-672 |
118. |
Software Testing, Mythology & Methodologies
Authors: Sonali Waje, Vandana Gaikwad, Pranchal Chaudhari |
673-677 |
119. |
Self-Heating Outcomes in AlGaN/GaN HEMTs
Author: Towhid Adnan Chowdhury |
678-685 |
120. |
A Review on V-BLAST Detection Method in Wireless
MIMO-OFDM System
Authors: Sarita Sidam, Pankaj Vyas |
686-690 |
121. |
Comprehensive Node Acknowledgement and Reliability
Value (CNA-RV) Based IDS for AODV in MANET
Authors: Deepak Chavan, Pradeep Raghav |
691-696 |
122. |
Investigation of Thermal Resistance of Diamond Shaped Pin Fin by CFD
Authors: Ravishankar Prasad Maurya, Ankesh Kumar Pataskar |
697-701 |
123. |
Security Threats and Detection Technique in Cognitive radio
Network
Authors: Sandeep Thakre, Shruti Dixit |
702-703 |
124. |
An Automated ANN Based Intelligent System for Vehicle Identification and Trail
Authors: B. Karunamoorthy, Anupama J Nair |
704-707 |
125. |
Design and Analysis of Wheel Shaped Antenna
Authors: Poornima R. Pai, Sonal Gahankari |
708-712 |
126. |
A Loop-Free Method on Ethernet Using Undirected Connectivity Graph
Authors: Huu-Hung Phan, Tuyet-Thi Anh Mai, Tae-Wan Kim, Chul-Soo Kim |
713-723 |
127. |
Voltage Balancing in Impedance Source Inverter
Authors: B.Karunamoorthy, N.Gopinath, D.Somasundareswari |
724-729 |
128. |
REV Technology
Authors: Puneet Mahana, Akshay Mungekar, Jyoti Singh Rathore, Puja Singh, K.T.V Reddy |
728-730 |
129. |
Analysis of Audio Descriptor Contribution in Singer
Identification Process
Authors: Saurabh H. Deshmukh, S. G. Bhirud |
731-737 |
130. |
A Study of QoS Aware MAC Protocols for Wireless Multimedia Sensor Networks
Authors: Shubha Rao V, Dr. M. Dakshayini |
738-744 |
131. |
Security Protection of WDM FSO Network
Authors: Rakhi. J. Nair, S.Manikandan |
745-751 |
132. |
Unwanted Message Filtering System from OSNs User’s Wall
Using Customizable Filtering Rules and Black list
Techniques.
Authors: Amruta Kachole, S. D. Jondhale |
752-755 |
133. |
RNC: Remotely Network Control Protocol
Authors: Kunal S. Patil, Prasad Nikumbh, Prashant Mahatme, Bhavesh Shimpi |
756-759 |
134. |
Energy Prediction Based Intrusion Detection in Wireless Sensor Networks
Authors: Nancy Alrajei, George Corser, Huirong Fu, Ye Zhu |
760-767 |
135. |
Copyright Protection to Secure Images
Authors: Ashish Vijay Lakamale, Mohan Dhapodkar, Suraj Jadhav, Sagar Jadhav, D. B. Satre |
768-773 |
136. |
Determination the Cracks and Holes in Copper Wires by Seed
Filling Technique
Authors: Azmi Tawfik Alrawi, Mohammad Kassem Abdulrahman |
774-781 |
137. |
Buckling Analysis of Roll Cage Using Finite Element Analysis
Authors: Santanu Chakraborthy, Anshuman Mehta, Aprajita Kapoor |
782-789 |
138. |
A Fault Analysis in Reversible Sequential Circuits
Authors: B. Anuradha, S. Sivakumar |
790-797 |
139. |
Design & Development of a System for Automation Gas Distribution Test for ESP
Authors: S. Madhava Reddy, G. Dayanand |
798-807 |
140. |
Optimization of Variables Influencing The Stability of Betaxanthin Pigments From Yellow Prickly Pears Juice By Experimental Design
Authors: Fatima Dehbi, Aziz Hasib, Hicham El Batal, Aziz Ouatmane, Abderrahim Jaouad |
808-815 |
141. |
A Review on Subspace Methods for Face Image Recognition
Authors: Fousiya K K, Kumary R Soumya |
816-820 |
142. |
Static Analysis of Roll Cage
Authors: Santanu Chakraborty, Hemant Kumar Neopaney |
821-828 |
143. |
Towards the Modeling and Simulation of Quantum Key
Distribution Systems
Authors: Jeffrey D. Morris, Douglas D. Hodson, Michael R. Grimaila, David R. Jacques, Gerald Baumgartner |
829-838 |
144. |
Mitigation and Analysis of Three Phase Transformer Magnetizing Inrush Current By Using Point on Wave Switching Method
Authors: Nilesh Deokar, Harpreet Singh |
839-844 |
145. |
A Comparative Study of Low Power Technology Mapping like
Single Supply voltages with Multiple Supply voltages in FPGA
Architecture
Authors: Pooja Rajput, Radhika, Teena Soni, Shivani Saxena |
845-849 |
146. |
An Analysis the Effect of Process Parameters on Heat Affected
Zone in Laser Cutting Using Response Surface Methodology
Authors: Kaushal Pratap Singh, Susheel Kumar Upadhyay, Deepak Kumar Gupta, Sahil Panu, Girish Dutt Gautam |
850-855 |
147. |
ARM7 Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology
Authors: Khatmode Ranjit P, Kulkarni Ramchandra V, Ghodke Bharat S, P. P. Chitte, Anap S. D |
856-860 |
148. |
A Review on Mitigation of Harmonics in Cascaded H- Bridge
Multilevel Inverter using optimization Techniques
Authors: Amrita Tuteja, Amita Mahor, Aarti Sirsat |
861-865 |
149. |
Service-Oriented Field Inspection Integration Model
Authors: Ibrahim S Abdullah, Abdullah M Basahel |
866-871 |
150. |
Influence of Micro Jets on Wall Pressure for Area Ratio 3.24
Authors: Syed Ashfaq, S. A. Khan |
872-880 |
151. |
A Review on Turbine Design and Optimization ― A State of Art
Authors: Akhya Kumar Behera
, Tushar Choudhary
, P. Kumar
|
881-884 |
152. |
Fast Convergent Differential Evolution Algorithm
Authors: Amrata Pupneja, Chakradhar Verma
|
885-890 |
153. |
A Review: On Mobility Prediction for Wireless Networks
Authors: J. Ananthi, V. Ranganathan
|
891-902 |
154. |
A Survey of Trust related Routing Protocols for Mobile
Ad Hoc Networks
Authors: R. Menaka, V. Ranganathan
|
903-910 |
155. |
A Review of Cordic Algorithm in DDS Based
Communication Systems
Authors: Godbole B. B., Nikam R.H., Pandit M.D.
|
911-915 |
156. |
Concreting at Low Ambient Temperatures at Salma Dam Project Afghanistan - A Case Study
Authors: Raj Kumar, A.N.N. Prasad, N. V. Mahure, Pankaj Sharma, S. L. Gupta, Murari Ratnam
|
916-920 |
157. |
Video Inpainting using Nearest Neighbor Field Algorithm
Authors: Ankita S. Bagul1, Asha S. Bhalerao2, Vaishali N. Dhage
|
921-925 |
158. |
Power Reduction for Sequential Circuit using Merge Flip-Flop Technique
Authors: S.Tamil Selvi, P.Sukumar
|
926-932 |
159. |
Design of Area Efficient Low Latency Sorting Units
Authors: Guru Deepthi.R, K.Sharmilee
|
933-938 |
160. |
Diagnosis of Diabetes Mellitus Type 2 using Neural Network
Authors: Poonguzhali.E, Sabarmathi Kabilan, Sandia Kannan, Sivagami.P
|
939-942 |
161. |
Security Model for Multi-Tier Web Application by Using
Double Guard
Authors: Snehal Khedkar, Mangal Vetal, Surekha Kotkar, R. S. Tambe
|
943-947 |