SUBJECT CATEGORY : Computer Science Engg., Information Technology, Electronic and Telecommunication Engineering, Electrical Engineering

Volume 6, Issue 6, June 2016 ( ISSN 2250 – 2459 (Online))

An ISO 9001:2008 Certified Journal

S.No.

Title of Paper

Page No.
1.

Group Signature Protocol Based on Collective Signature Protocol and Masking Public Keys Mechanism

Authors: Nikolay Adreevich Moldovyan, Nguyen Hieu Minh, Dao Tuan Hung, Tran Xuan Kien

1-5
2.

Optimal Design of Structures by the Combined use of Mathematical Models of Corrosion Destruction

Author: George Filatov

6-15
3.

Analysis of Glass Fiber Reinforced Structural Insulated Panels (GSIPs) Under High Velocity Impact Loading

Authors: Rahul Kalyankar, Nasim Uddin, Li Dong, Amol Vaidya

16-27
4.

Vibration Suppression of a Cantilever Beam Using Multi-Mode Dynamic Vibration Absorbers

Authors: Yohan Mendez, Sebastiao Cunha, Rogerio Coimbra, Haylemar Rodriguez

28-38
5.

The Impact of Location of the Uptake of Telephone Based Healthcare: A UK Case Study

Authors: Erica Cook, Gurch Randhawa, Andy Guppy, Angel Chater, Dong Pang, Shirley Large

39-47
6.

Gradual Trends of Groundwater Table Depletion with Relevant Consequences on Water Quality in Dhaka City, Bangladesh

Authors: Md. Mahfujur Rahman, Nazia Nawrin, Mst. Maksuda Akter, Farha Khan, Shamina Nahar, Md. Tariqul Islam

48-56
7.

Design and Implementation of a Low-Cost Wireless Platform for Remote Bridge Health Monitoring

Authors: Shraddha Pandey, Mohammad Haider, Nasim Uddin

57-62
8.

Biomimetics and Its Applications- A Review

Authors: Sheelratan S. Bansode, Rahul B. Hiremath, Somnath Kolgiri, Ranjitsinh A. Deshmukh

63-72
9.

Review on Optimization Methods for HVAC Systems

Authors: D. Jayakumar, Dr. D. B. Jabaraj

73-76
10.

Threat of Miscoordination between Recloser-Fuse in Radial Distribution Networks during Multi DG Interconnections

Authors: Piyushkumar Dodiya, Pragnesh Shah, Ronak Doshi, Dhiraj Shrimali, Akash Faldu

77-84
11.

Translational attack analysis of Non Blind Multiplicative Watermarking using 2D-DWT

Authors: Ayush Sharma, Dr. Surender Yadav

85-91
12.

Near Field Communication: A Survey

Authors: Suriya Begum, Rohit Mulay, Ashhar

92-97
13.

Impact Analysis of DDoS Attacks on Video Streaming Service

Authors: Daljeet Kaur, Monika Sachdeva, Rinkle Mehto

98-102
14.

To Study the Tripper Movement with VFD in A Coal Handling Plant of A Coal Based Thermal Power Plant

Author: Niraj Kumar Sahu

103-106
15.

Routing Protocols to Defend Gray Hole Attacks: A Survey

Authors: Namrata Jain, Yogesh Rathore

107-111
16.

Validation and Modeling of FEA Welding Simulation and Parametric Study of TIG Welding Parameter

Authors: Akash B. Chovatiya, P. M. Ravanan, H. S. Mahadik

112-117
17.

Automatic Vehicle Speed Monitoring Systems Using Networking Principles & Instrumentation Concepts

Authors: S. Vishal, S. Subramanian

118-124
18.

Review of Industrial Metrology using Machine Vision

Authors: Ketaki N. Joshi, Dr. Bhushan T. Patil

125-131
19.

Inverted Stud Configuration in Steel Composite Beams

Authors: Akshay Sukhwani, Atul Vaibhav, Shivang Pathak

132-136
20.

Low-Power High Speed 1-bit Full Adder Circuit Design

Authors: Rohit Tripati, Paresh Rawat

137-142
21.

Finite Element Discretization of Rivet Structure

Authors: Pravin M. Patil, Sharad Kachave, Ekanath R. Deore

143-147
22.

Post Tensioned Duct in Concrete May Be Provided by Chemical & Electrical Method in Pre-Stressing.

Authors: Pradeep Nath Mathur, Prof (Dr.) Om Prakesh Reddy, Prof (Dr.) A. K. Sinha

148-154
23.

Energy Efficient Drives for Industrial Applications

Authors: Rohit S. Agarwal, B.E Narkhede, Chetan S. Borkar

155-161
24.

Network Security by Proposed DML and a New Data-Length Authentication Algorithm (DLAA)

Authors: Kiran Kant Priya, Taraun Kumar

162-166
25.

A Resourceful Technique for Virtual Machine Migration in Fog Computing

Authors: Ambika Gupta, Manish Kumar Mukhija

167-170
26.

Data Retrieval with security for Decentralized Disruptiontolerant Military Networks

Authors: Shradha A Dulange, Dr. Sujatha Terdal

171-173
27.

Cost Optimization of SPV System

Authors: Bhoomika Awasthi, Anurag Rai, N. K. Shukla

174-180
28.

FPGA Based Hybrid Power Supply System

Authors: Prashant R. Bhaskar, R. G. Dabhade

181-183
29.

Modelling and Analysis of a Mini Vertical Axis Wind Turbine

Authors: Amlan Das, Dr. Pradip Kumar Talapatra

184-194
30.

Code Generation Tool (CGT) and LDAP Integration

Authors: Kavita Arakeri, Prof. Santosh Bandak

195-198
31.

Influence of Fibre Size on the Compressive Strength of Ultra-High Performance Concrete

Authors: Karim, F.R., Abu Bakar, B.H., Kok Keong, Choong , Aziz, O.Q.

199-204
32.

Improvement in Security of Wimax using OFDM Technique

Author: Himani Rao

204-209
33.

Data Hiding with Cryptography and Steganography

Author: Meena kumari

210-213
34.

Comparative Study of Resource Managing Algorithms in Cloud Computing

Authors: P. K. Suri, Sunita Rani

210-220
35.

Natural Computing Algorithms – A Survey

Authors: Bharat V. Chawda, Dr. Jayeshkumar Madhubhai Patel

221-227
36.

Comparision between Rectangular Patch Antenna and Concentric Equilateral Triangular Patch Antenna Using Microstrip Feed for Wireless Applications

Authors: A. Manikandan, Dr. S. Uma Maheswari

221-231
37.

Observer Based Nonlinear Control of Robotic Manipulator Using Backstepping Approach

Authors: Vishakha Jalaik, B. B. Sharma

232-239
38.

Design and Analysis of an Ultra Low Power Clocked Regenerative Comparator

Authors: Avinash Kumar, Navneet Kaur

240-246
39.

A New Charecterization of Bounded Linear Operators on A Hilbert Space

Authors: U. K. Srivastava, A. U. Talukdar, Md. Shahabuddin, A. S.Pandit

247-251
40.

An Enhanced Detection of Remote Code Execution Vulnerability: on the JavaScript-to-Java Interface

Authors: Rachana Kamble , Dr. Amit Yadav

251-257