An ISO 9001:2008 Certified Journal
S.No. |
Title of Paper |
Page No. |
1. |
A Lean Manufacturing Model for Reducing Dead Time on A Labels Production Line Authors: Eduardo Gutierrez Gonzalez, Mario Aguilar Fernandez, Victor Manuel Cordoba Lobo |
1-7 |
2. |
Maintaining Location Privacy and Anonymity for Vehicle’s Drivers in VANET Authors: Eng. Marvy Mansour, Prof. Ahmed Fahmy, Prof. Mohammed Hashem |
8-40 |
3. |
An Innovative System for Home Tele-assistance in Real Time Authors: Dr. R. Marani, Prof. A. G. Perri |
41-44 |
4. |
The Ecological Study on the 3 Plus 1 Foreign Language Interactive Teaching Model in Police Academy Author: WEI Li |
45-50 |
5. |
Author: Alayaki F. M. |
51-57 |
6. |
Authors: J. Juansah, I W. Budiastra, K. Dahlan, K. B. Seminar |
58-64 |
7. |
Flood Behaviour Analysis Due to Dam Break (Case study in Cengklik Dam, Center Java of Indonesia) Authors: Lily Montarcih Limantara, Pitojo Tri Juwono |
65-69 |
8. |
Author : Marianne M. Kamal |
70-80 |
9. |
Authentication in Wireless Sensor Networks Using Virtual Certificate Authorities Authors:Manjula M. Ramannavar, Monica M. Jagtap |
81-85 |
10. |
Authors: Indra Prakash Mishra, Sanjiv Kumar |
86-93 |
11. |
Payment Gateway Model- Mobile Cash Wallet Authors: S.T. Bhosale, V. P. Desai |
94-96 |
12. |
An Innovative Approach for Traffic Management System Using Wireless Sensor Network (Suspended) Authors: S. Bala Basker, N. Venancia Pushpa Rani |
97-102 |
13. |
Authors : Selvathi D, N.B.Prakash, Neethi Balagopal |
103-108 |
14. |
Exploring the Serial Capabilities for 16x2 LCD Interface Authors: Pooja Soni, Kapil Suchdeo |
109-112 |
15. |
Glitch Power Minimization Techniques in Low Power VLSI Circuits Authors: J.Sudhakar, K. Tirupathi Rao, B. Suresh |
113-116 |
16. |
Life Cycle of Clustering Questions Based on Tags From Question Bank Authors:Rasendu B Mishra, Prof.(Dr.) Nilesh K Modi |
117-119 |
17. |
Comparision and Implementation of Cryptography Algorithm By Using VHDL Authors: Priya Jain, Dr. Rita Jain, Tarun Verma |
120-124 |
18. |
Design and Analyze the various m-sequences codes in MATLAB Authors: Anshul Khatter, Poonam Goyal |
125-129 |
19. |
Surface Modification of Nanotitania Using High Energy Electron Beam Irradiation Authors: Priyanka K P, Sunny Joseph, Anu Tresa Sunny, Jaseentha O P , Thomas Varghese |
130-134 |
20. |
Design and Analysis of Capacitive MEMS Viscometric Sensor for CGM Authors: P.N.Prabhakaran, M.Renuga |
135-138 |
21. |
Implementation Of Interferential Therapy (IFT) Using Microcontroller Author: Nikita. P. Joshi |
139-141 |
22. |
Authors: Kirti Sontakke, S. Ghosh |
142-150 |
23. |
Authors: Vimla Singh, Alok Dubey |
151-156 |
24. |
Monitoring of Diabetes with Data Mining via CART Method Authors: Kavitha K , Sarojamma R M |
157-162 |
25. |
Review of Pump as Turbine (PAT) for Micro-Hydropower Authors: Tarang Agarwal |
163-169 |
26. |
Survey on Auto-Calibration of Beacon Nodes in Indoor Location Computing Authors: Priyadharsini.C, Ann Saviour |
170-175 |
27. |
Authors: Dr. K. P. Chellamani, P. Sundaramoorthy, T. Sureshram |
176-184 |
28. |
Authors: Dhanisha N. kapadia, Priyesh. P. Gandhi |
185-190 |
29. |
Analysis of Straight and Skewed box Girder Bridge by Finite Strip Method Authors: Dr. S.A.Halkude, Akim C.Y. |
191-198 |
30. |
Detecting and Decoding Algorithm for 2D Barcode Authors: Nachiket A Rathod, Dr. Siddharth A. Ladhake |
199-202 |
31. |
Vibration Isolation of Diesel Electric Generator Used For Cell Tower Authors: A.R.Jadhav, Dr. Gawade S.S. |
203-205 |
32. |
Population based meta-heuristic techniques for solving optimization problems: A selective survey Authors: Kalyani Manda, Suresh Chandra Satapathy, B. Poornasatyanarayana |
206-211 |
33. |
Reactive Power Compensation by Controlling the DSTATCOM Authors: Alpesh Mahyavanshi, M. A. Mulla, R. Chudamani |
212-218 |
34. |
ATD Circuit for Asynchronous RAM Author: Dhaval Patel |
219-222 |
35. |
Face Recognition Using Eigen faces By ANN with Resilient Back propagation Algorithm Authors: Kishore Golla, Sunand G, Rajesh babu N |
223-228 |
36. |
Monitoring and Alerting System Integration in FMS Landing Phase using Image Fusion Techniques Authors: Vinothkumar. J, Subramanian. R, Kalaidhasan. D, Balasubramanian. M |
229-236 |
37. |
Effect of Height and Number Floors to Natural Time Period of a Multi- Storey Building Authors: Nilesh v prajapati, A.N.Desai |
237-239 |
38. |
Projectile parametric studies on bird impact behaviour of aircraft leading edges Authors: Kavitha Mol.S, Stanley C Salem |
240-246 |
39. |
SVD Based Detector for Cognitive Radio Network Using Average of Extreme Values of ICDF Authors: Mohd. Fahad Fahim, Mohd. Sarwar Raeen |
247-252 |
40. |
Review of Attacks on Databases and Database Security Techniques Authors: Saurabh Kulkarni, Dr. Siddhaling Urolagin |
253-263 |
41. |
Optimization of Shell and Tube Heat Exchangers for Sea Water Cooling by COMSOL Multiphysics Authors: S. Swaraj Reddy, Tania Dey, Haribabu K, Harshit Krishnakumar, Garima Vishal |
264-270 |
42. |
Survey on Keyword Searching in Cloud Storages Authors: Tritty Mamachan, Roshni. M. Thanka |
271-275 |
43. |
Author: Veerabhadragouda. P. Patil |
276-284 |
44. |
Data Hiding Using EDGE Based Steganography Authors: K. Naveen BrahmaTeja, Dr. G. L. Madhumati, K. Rama Koteswara Rao |
285-290 |
45. |
Consequence Assessment of Vapour cloud Explosion Involving Hydrogen Release Authors: A.R. Soman, G.Sundararaj |
291-297 |
46. |
A Survey: Detection of Duplicate Record Authors: Dewendra Bharambe, Susheel Jain, Anurag Jain |
298-307 |
47. |
Authors: Mubeena. M, M.Priyanka, K. John Singh |
308-314 |
48. |
High Performance Steel for Steel-Concrete Composite Girder Bridge Authors: Vikash Khatri, P. K. Singh, P. R. Maiti |
315-323 |
49. |
Shrinkage Effect and Transverse Cracking in Steel-Concrete Composite Bridge Deck Authors: Vikash Khatri, P. K. Singh, P. R. Maiti |
324-333 |
50. |
Simulation of 3rd Order 4-Bit Σ-Δ Modulator for Audio Application Authors: Yogita R.Gajare, Prof. Anuja A. Askhedkar, Dr. G.H. Agrawal |
334-337 |
51. |
FPGA Implementation of Low Power Recursive DFT for DTMF Application Authors: Arshad Khan, E.Mahendar reddy |
338-343 |
52. |
Design of DACS (Data Acquisition and Control System) using Linux Authors: P. Stephen Nischay, S. Latha |
344-346 |
53. |
Comparison of Fibroid Syndrome Using Data Mining Techniques Authors: Girija D.K, Dr. M.S. Shashidhara |
347-352 |
54. |
Authors: Atif Ali Khan, Adnan I. Elberjaoui Yakzan, Oumair Naseer, Bilal S. Chehab |
353-359 |
55. |
Extraction Of Retinal Blood Vessels Using Curvelet Transform And Kirsch’s Templates Authors: M. Kalaivani, M. S. Jeyalakshmi, Aparna.V |
360-363 |
56. |
Study of Corrosion Behavior of Mufflers for High Heat Resistance Coatings Authors: A. B. Jadhav, S. T. Vagge |
364-369 |
57. |
News Video Indexing and Retrieval Using Combination of S.A.D and E.C.R Scoring Techniques Authors: Sanjoy Ghatak, Abhishek Pradhan, Dhiraj Khandelwal, Pema Lhamu Tamang |
370-373 |
58. |
Performance of Cementitious Soil Authors: Ninija Merina R, Sribanu Vallimaan M |
374-381 |
59. |
A Survey of Recommender Systems Techniques, Challenges and Evaluation Metrics Authors : Tranos Zuva, Sunday O. Ojo, Seleman M. Ngwira, Keneilwe Zuva |
382-386 |
60. |
Application of Taguchi Method in Indian Industry Authors: Shyam Kumar Karna, Dr. Ran Vijay Singh, Dr. Rajeshwar Sahai |
387-391 |
61. |
Accurate Object Detection using Static Camera and Security Alert to Mobile Authors: D.Beulah David, Dr.M.A.DoraiRangaswamy |
392-396 |
62. |
Agile Product Development in Submersible Pump through CAD Modelling (CFD) Authors: P. Vijaya Rajan, A. Saravanapandi Solairajan, C. Godwin Jose |
397-400 |
63. |
Analysis of Routing Protocols for Wireless Sensor Networks Authors: P. Krishnaveni, Dr. J. Sutha |
401-407 |
64. |
Authors: A. Fouathia, A. Mekroud, A. Benmeddour, K.Bellagh |
408-414 |
65. |
Authors:John Leju Celestino Ladu; Xiwu Lu; Martin K. Loboka |
415-420 |
66. |
Target parametric studies on bird impact behaviour of aircraft leading edges Authors: Kavitha Mol.S, Stanley C Salem |
421-428 |
67. |
Cyber forensics-The art of decoding the binary digits Authors: Prof. (Dr.) Yashpal Singh Bist, Dr. Charu Agarwal, Uttara Bansal |
429-435 |
68. |
Learning Based Obstacle Detection For Textural path Authors: Pradeep Kumar, Vikas Gupta |
436-440 |
69. |
Combating Automated Teller Machine Frauds through Biometrics Authors: Oludele Awodele, Adeniyi Akanni |
441-444 |
70. |
Authors: K.Srinivas, S.Karunakar Reddy, M.Madan Gopal |
445-447 |
71. |
FPGA based Scaled down Model for Heterogeneous Spectrometers in Radio Astronomy Applications Authors: T.Siva, S.Latha, Y. Naga Supraja |
448-453 |
72. |
Native-IP and Technical Cornerstone of Fifth Generation Network Authors: Dr. Oludele Awodele, Enem Theophilus Aniemeka |
454-459 |
73. |
Variational Background Modeling Using Grid Point Sampling for Document Image Binarization Authors: J. Bharathi, Dr. P. Chandrasekar Reddy |
460-468 |
74. |
Experimental Evaluation of Effectiveness of E-Government Websites Authors: A. Basit Darem, Dr. Suresha |
470-473 |
75. |
Pavement Condition Forecasting Through Artificial Neural Network Modelling Authors: S.K. Suman, S. Sinha |
474-478 |
76. |
Comparative Analysis of De-Noising on ECG Signal Authors: Md.Tarek Uz Zaman, Delower Hossain, Md.Taslim Arefin, Md.Azizur Rahman, Syed Nahidul Islam, Dr. A.K.M .............Fazlul Haque |
479-486 |
77. |
Simplified HEDI Method For Progressive Transmission of 3-D Medical Image Author: Archana J.N |
487-492 |
78. |
Design And Construction of Automated Barrier For Car Park Gates Authors: Amusa K. A., Nuga O. O., Adetomi A. A. |
493-497 |
79. |
Positioning And Motion Control For Mobile Robot Authors:S. I. Amer , M. N. Eskander, Aziza M. Zaki |
498-504 |
80. |
Data Retrieval from Distributed Data by using Mobile Agents Authors: Lipte Vishal D., Gunjal Baisa L., Gore Santosh I. |
505-509 |
81. |
Mobile-Agent System for Homogeneous Data Retrieval Using NLP & PQR Authors: Shipra Kesharwani, Santosh Gore |
510-516 |
82. |
Seismic Hazard And Its Mitigation: A Review Authors: Dr. Th. Kiranbala Devi |
517-522 |
83. |
Operating Three Phase Induction Motor Connected to Single Phase Supply Authors: Shivanagouda.B.Patil, M. S. Aspalli |
523-528 |
84. |
Design and Implementation of a Guided Object Launcher Authors: M. Manjusha, M. Veda Chary |
529-533 |
85. |
Authors: Ali Tighnavard Balasbaneh, Abdul Kadir Bin Marsono |
534-540 |
86. |
Extended Group Key Transfer Protocol for Authentication Using DES based on Secret Sharing in Authors: Yamini Indla, M. Sampath Kumar |
541-551 |
87. |
A Novel Approach for Super Resolution in Medical Imaging Authors: G. S. Sable , Dr. A.N. Gaikwad |
552-559 |
88. |
Enhancing Data Delivery with Path Predictable Mobile Observer in Wireless Sensor Networks Authors: Queen.R, Renganayagi.G, Anne Persial.P |
560-564 |
89. |
Developing of Eembedded Gadget Used to Interact with IP-PBX Authors:Idrish Shaik, P V L N Phani, I Aditya Abhilash |
565-568 |
90. |
Reliability based Analysis of Steel Truss Member Authors:Dr. K. Manjunath, Santhosh Kumar.C.N |
569-572 |
91. |
Authors:Cherrylyn Buenaflor, Hee-Cheol Kim |
573-580 |
92. |
Analysis For Operating Cost Of Split Case Pump For Its Life Cycle Authors: P. S. Bolade , S. J. Madki |
581-585 |
93. |
Authors: N.NR.Sharavanan, N.Balu |
586-598 |
94. |
Extraction of Silver From Photographic Waste Authors: Ashish Modi, Kishan Shukla, Jaimin Pandya, Kalpesh Parmar |
599-606 |
95. |
OBEF (Odd Backward Even Forward) Page Replacement Technique Authors: Kavit Maral Mehta, Prerak Garg, Ravikant Kumar |
607-611 |
96. |
Authors: Sakaros Bogning Dongue, Donatien Njomo, Jean Gaston Tamba, Lessly Ebengai |
612-619 |
97. |
Authors: Kalley Harinarayana, N.Nagabhushana Ramesh, Dr. B. Balu Naik |
620-626 |
98. |
Evolutionary Multiobjective Optimization Algorithms For Induction Motor Design – A Study Authors: S.Yasodha, K.Ramesh, P.Ponmurugan |
627-633 |
99. |
Solving Asymmetric Travelling Salesman Problem using Memetic Algorithm Authors: Misba Shaikh, Prof. Mahesh Panchal |
634-639 |
100. |
Fatigue Analysis of High Performance Cement Concrete for Pavements using the Probabilistic Approach Authors: Suresh Kumar K.S., Kamalakara G.K., Sagar Kamble, Amarnath M.S. |
640-644 |
101. |
Dynamic Analysis of Railway track Authors: Sunita Kumari, Pragyan P Sahoo, Dr. V A Swant |
645-650 |
102. |
Fluidization Behaviour of Binary Mixtures Using Sand and Biomass Authors: M K Karmakar, S Haldar, P K Chatterjee |
651-657 |
103. |
Validation Study Illustrates the Accuracy of Operational Modal Analysis Identification Authors: Gomaa, F., Tayel, M., Kandil, K., Hekal, G. |
658-667 |
104. |
Authors: D.Pradeepkannan, Dr.S.Sathiyamoorthy |
668-672 |
105. |
A Review of Performance Evaluation of AODV Protocol in Manet With and Without Black Hole Attack Authors: Arunima Patel, Sharda Patel, Ashok Verma |
673-677 |
106. |
Maximal Ratio Combining SC-FDMA Performance over Land Mobile Satellite Rice fading Channel Authors: Jyoti Gangane, Mari Carmen Aguayo-Torres, Juan J.Sanchez, Sharad Wagh |
678-683 |
107. |
Authors: Amit Tripathi, Dr. Rajesh Nema |
684-687 |
108. |
A Survey on Selfishness Handling In Mobile Ad Hoc Network Authors: Jim Solomon Raja.D, Immanuel John Raja.J |
688-692 |
109. |
Effect of Thermal Properties on Delaminated Fibre Metal Laminate Authors: Sundaravalli. S, Majumder, M.C., Vijayaraghavan G.K |
693-702 |
110. |
Authors: Aprajita Salgotra, Sumit Verma |
703-713 |
111. |
Hybrid Recommendation Techniques for Improving Wireless Information Delivery Authors: Govind Jhanwar, Prof. Kshitij Pathak |
714-720 |
112. |
Survey on Credit Card Fraud Detection Methods Authors: Krishna Kumar Tripathi, Mahesh A. Pavaskar |
721-726 |
113. |
Author: Dr. Reshma Chengappa |
727-733 |
114. |
Analysis of Intrusion Detection System Using Trusted Clients Authors: Gargi Agrawal, Megha Kamble |
734-740 |
115. |
Design Optimization and Installation of the Evaporative Cooler in the Perspective of Bangladesh Authors: Md. Almostasim Mahmud, Dr. Md. Alamgir Hossain, M. A. Muktadir |
741-749 |
116. |
Implementation of a New Approach to Mine Web Log Data Using Mater Web Log Analyzer Authors: Mahadev Yadav, Arvind Upadhyay |
750-756 |
117. |
Top-K Spatial Objects Ranking by Quality Features Authors: Narne Srikanth, A.Ramana Lakshmi |
757-761 |
118. |
Authors: Selvathi D, N.B.Prakash, Neethi Balagopal |
762-767 |
119. |
Authors: Atkar Geeta B., Gore Sonal |
768-771 |
120. |
Clustering of News Articles to Extract Hidden Knowledge Authors: A.D. Thakare, Nikita Muthiyan, Deepali Nangde, Dipti Patil, Minal Patil |
772-775 |
121. |
Genetic Algorithm-Based Physicians Non-Cyclic Rostering Authors: Ismaila Wasiu O., Adeosun Olajide O., Adigun Abimbola A., Agunbiade Adebayo D. |
776-781 |
122. |
A Novel Approach For Enhance Security On Database Using Proposed Algorithms Authors: Anjana Nigam, Prof. Roopali Soni |
782-787 |
123. |
Customer Ordered Software Projects And Aristotle Value Theory Authors: Hasan Asil, Amir Asil, Haniyeh Asil |
788-790 |
124. |
The Salient Points of Adam Smith, David Ricardo, and Stuart Mill's Theories and Software Engineering Authors: Hasan Asil, Amir Asil, Atefeh Asil |
791-795 |
125. |
The Effect of Programmers on Software Project Management Based Upon Personality Five Traits Theory Authors: Amir Asil, Hasan Asil, Mohsen Asil |
796-798 |