VOLUME 3, ISSUE 12, DECEMBER 2014
Optimization of clustering process in heterogeneous wireless sensor network
SANJEEV KUMAR GUPTA, POONAM SINHA
Design of a Micro Strip Patch Antenna to Minimize Return Loss for Wi-MAX Application
A.S.M. BAKIBILLAH, MD. SAKHAWATH HOSSAIN, IVY SAHA ROY
Optimization Design of Query Processing Performance Using Appropriate Materialized View Selection & Preservation
S D CHOUDHARI
A novel approach to the hierarchical co-clustering in text mining with zone contents and metadata
RUCHA BHUTADA, D.A.BORIKAR
An efficient protocol for secure communication in Wireless Ad Hoc Networks
S.MOTHIVENKATA MANOJ, DR. S.VASUNDRA
Random Scan Algorithm for Image Steganography in Scilab for Security Purposes
ISHANT PREMI, MRS. SUKHJINDER KAUR
An open source approach for continuous speech recognition using hidden Markov models
GURUSIDDAPPA HUGAR, VISHWANATH HIREGOUDAR
Content based image retrival using invariant color and texture features
K.CHAITANYA SRUTHI, SHAIK.PEER AHAMED
Performance evaluation of adaptive bit interleaved coded modulation in OFDM with various fading channels
SIRUVURI UMA SANKAR RAJU, K.SURESH
Implementation of embedded shock and vibration monitoring system for underwater vehicles
P.RAGHAVA KUMARI, S.P.K.CHAITANYA, M.NIRMALA
Implementation of reversible vedic multiplier for low latency and reduced resources utilization applications
K.SRINIVASA RAO, G.SANKARA RAO
A strong and efficient privacy and security guarantee using CACHET
ADDANKI NAGESHWAR RAO, B.KAMESWARA RAO
Feasibility Study for Cloud Computing in Education Field Sudanese Research and Education Network (SudREN)
SHAKER KHAIRALLH SALEH, ASHRAF GASIM ELSID ABDALLA
A technical review on comparison of XEN and KVM hypervisors an analysis of virtualization technologies
MS JAYSHRI DAMODAR PAGARE, DR. NITIN A KOLI
Recognizing user activities in smart environments with automatically constructed fuzzy finite automata
H.KARAMATH ALI, DR. D.I.GEORGE AMALARETHINAM
A review on implementation of data scrambler & descrambler system using VHDL
NAINA K.RANDIVE, PROFESSOR G.P.BORKHADE
Comparative study and analyzes the power factor variation due to loading effect
JYOTI LALOTRA, ABHINAV SHARMA
A new modified RC6 algorithm for cryptographic applications
P.SRITHA, R.ASHOKKUMAR, S, BHUVANESWARI, M.VIDHYA
Watermark insertion and detection using contourlet and wavelet transforms
SHUBHRA BANERJI, DR. AVIJIT KAR
Delay sensitive analysis on wireless sensors network A Survey
S.THAMIZHARASAN, T.RAJAN BABU, S.SARAVANAN, V. PRASANNA VENKATESAN
A machine learning framework of neural network combined with PLS regression and artificial immune system for intrusion detection
G.V.PRADEEP KUMAR, D.KRISHNA REDDY
Implementation and analysis of real time obstacle avoiding subsumption controlled robot
VINAY S.DASMANE, MRYUTUNJAY R.MADKI
Preventing the falsified data injection attack through multiple relay network
M.PRIYANKA, G.PREMAPRIYA
Human thought controlled electrical switching using fast Fourier transform
PROF. GANESH S.DESHMUK, BHUSHAN P.RATHOD, TEJAS S.ZAGADE , NITIN D.PARKHE, PARESH L.WAGHMARE
Achieving low latency networks through high performance computing
CHANDRIKA PRASAD, VEENA G.S, CHIRAG AGRAWAL, ROBIN SRIVASTAVA
Subcarrier and power allocation in OFDM based cognitive radio networks A Survey
VIDHYA.B, RAMYAH.S.B, REVATHI.G
A Novel way of image encrption with piplining pixel scrambling and fractional fourier transform
SUNITA KUMARI, PRATAP SINGH PATWAL
A Novel routing protocol based on multipath routing for mobile adhoc networks
V.SRAVANI, K.C.K.NAIK, DR.CH.BALASWAMY
A Survey on various routing protocols in mobile ad hoc networks
SOMASUNDARAM R, SUMITHRA K, BHARATHI S
Swarm-based intelligent technique to prevent selective jamming attacks for dynamic topology
S.SURYA, D.SWATHIGAVAISHNAVE, T.KANIMOZHI
Automated attendance system using markov random field algorithm
ABHILASH MARADWAR, NIKITA SURYAWANSHI, TUSHAR PANPALIYA, SURAJ SONGIRE
A single natural image denoising based on independent component analysis
MR.VIPULPATIL, DR. A.J. PATIL
Survey the stochastic computing and probabilistic transfer matrix (PTM) in logic circuits
BAHRAM DEHGHAN, NASER PARHIZGAR
Comparison of cosine similarity and k-NN for automated essays scoring
DR. AHMED ABD EL-GHANY EWEES, DR. MOHAMED MOHAMED EISA, PROF. DR. MOHAMED MOHAMED REFAAT ELBASIONY
Arabic information retrieval system using the neural network model
ISSAM AL-HADID, SUHA AFANEH, HASSAN AL-TARAWNEH, HIBA AL-MALAHMEH
