Volume 3, Problème 3 (2015)

article de recherche

Design and Performance Evaluation of DWDM based Metropolitan Ring Networks

  • Jaspreet Minhas, Rajesh Kochher

article de recherche

Organ Abnormality Prediction Using Finger Vein Reader

  • S Tamilelakkiya, S Hemalatha, S Manimala, B Santhamala, P Sri Indhuganga

article de recherche

Fiber Fault Localization in FTTH Using Online Monitoring

  • S Sivakami, G Ramprabu, V Hemamalini, K Veronica, C Thirupoorani

article de recherche

Secure Crypto and ECG Steganography Based Data Communication for Wireless Body Sensor Network

  • G Sheeba, M I Anju, K Hari Priya, V Monisha, M M Sabbana Banu

article de recherche

Design of SCS Protocol and Analysis of Quality of Service Parameters for Wireless Sensor Networks

  • G Ramprabu, S Ananthi, R Chitra, J Saranya, G Saratha Preethi

article de recherche

Improved Crypto Analysis for Scrambling Digital Video Using Secret Key

  • S.Hemalatha, V.Hemamalini, S.Manimozhi, B. Revathi, S. Sridevi

article de recherche

VHDL Simulation of Image Compression Using LBG

  • Rahul R. Ade, Ashish B. Kharate

article de recherche

Survey on Intelligent Semantic Web Search Engines as Generic Search Engine

  • Deepika Dasari Soorasamharan, Pranamita Nanda

article de recherche

Designing of MCAM Using 22nm Technology

  • Komal J. Anasane, Ujwala A.Kshirsagar

article de recherche

Cloud Service Based Measuring Consumer's Preferences

  • T. Leema Rose, AR.Arunachalam

article de recherche

A Novel Security Issues Analysis and Evaluation of Security Method in WSNs

  • A.Senthilkumar, R.B.Sarooraj

article de recherche

Authenticated Deniable Internet Key Exchange

  • R.Pitchandi, S.Saranya

article de recherche

Preserving Privacy by Enhancing Security in Cloud

  • N.Vaitheeka, V.Rajeswari, D.Mahendran

article de recherche

Moral Hacking: A Way to Boost Data Security by Using Vulnerability Scanning Tools

  • Anish Kumar Anbukarsan, Ilampirai Nagarajan, K.G.S Venkatesan

article de recherche

OSDM Based Underwater Acoustic Communication

  • D.Arunkumar, M.Margarat

article de recherche

An Iaas Cloud System with Federation Threshold

  • B. Sundarraj, K.G.S. Venkatesan, M. Sriram, Vimal Chand

article de recherche

Thermodynamic Modeling and Optimization of a Dual Pressure Reheat Combined Power Cycle

  • Seema S. Billur, Vaijanath V. Yerigeri, Ravi V. Yerigeri

article de recherche

Design and Implementation of 2by3 Prescaler using Different Logic in CMOS 45nm Technology

  • Siddharth A. Koshiyar, Narendra J. Patadiya, Bharat H. Nagpara

article de recherche

Accident Detection System by Using Navigation Devices

  • Priyanka Dodmise, Priya Mahadik, Nihalahmad Shikalgar

article de recherche

Reduced Path, Sink Failures in Autonomous Network Reconfiguration System (ANRS) Techniques

  • K.G.S. Venkatesan, V. Khanaa, A. Chandrasekar

article de recherche

A Stochastic Model to Investigate Data Center Performance and QoS in Iaas Cloud Computing Systems

  • B. Sundarraj, K.G.S. Venkatesan, Vimal Chand

article de recherche

A Study on Content Based Image Retrieval Systems

  • L. Haldurai, V. Vinodhini

article de recherche

Implementation of a New Electro Magnetic Interference Filters Design to Diminish CM Noise

  • G.Vengatesan, B.Karthik, T.V.U. Kiran Kumar

article de recherche

IVUS detection using Image Processing: A Review

  • Rahul Lanjewar, Kiran Barapatre, Mayur Petkar, Prasad Pande

article de recherche

Vehicular Ad hoc Network (VANETs): A Review

  • Divya Chadha, Reena

article de recherche

High Utility Itemset Mining with Selective Item Replication

  • V.Narendranath, P.S.Rajan, R.Karthikeyan

article de recherche

Comparative Study of Load Testing Tools

  • Sandeep Bhatti, Raj Kumari

article de recherche

Modification of Linux Kernel with Jumping Virtual Clock Round Robin Scheduling

  • Laxmi M. Gurnani, Anurag Sinha, Gurmeet Singh Gujral, Abhijeet Patil, Ashish T. Bhole

article de recherche

A Survey on Economic Denial of Sustainability Attack Mitigation Techniques

  • Rohit Thaper, Amandeep Verma

article de recherche

Managing XML Retrieval through Personalization Using Search Engine

  • B. Kurinchi Meenakshi, C.Nalini

article de recherche

Parallel Clustering of Gene Expression Dataset in Multicore Environment

  • Pranoti Kamble, Rakhi Wajgi

article de recherche

Intelligent Surveillance and Security System

  • Monali Chaudhari, Gauresh Vanjare, Dhairya Thakkar, Malay Shah, Amit Kadam

article de recherche

Neighborhood based Framework Active Learning

  • K.P.Kaliyamurthie, K.G.S. Venkatesan, S. Sriram, N.Vijay , Richard Solomon

article de recherche

Mat Lab Based Synthesis of Speech & Speaker Reorganization Using Data Driven Approach

  • Leela Kumari, Aakash Dadhich, Rahul Guha

article de recherche

Session Based Access Control Mechanism Using ECC in WMN- A Review

  • Rahul V.Bambodkar, Avinash P. Wadhe

article de recherche

FPGA Based Intelligent Potholes Detection System

  • Sumit Pawade, B.P. Fuladi, L.A. Hundikar

article de recherche

Fast Data Collection Using Two-Layer Multicast Communication Protocol in Wireless Sensor Networks

  • K.Priyadharshini, S.Bhuvenswari, R.Arun, K.Cholaraja

article de recherche

Geographic Random Forwarding for Ad-Hoc and Sensor Networks Multihop Performance

  • B.Sundar Raj, S.Naveenraj, A.Gopinath

article de recherche

CBPPP: Cloud Based Patient Centric Privacy Preserving System

  • Nishant Kumar, Nitish Kumar, C.Anuradha

article de recherche

Retinal Disparity Estimation and 2D Fusion in Stereo-Pairs

  • Priyanka.V.K, Vijayakumar.K, Sudheesh Madhavan

article de recherche

Recommendation System Based On Clustering and Collaborative Filtering

  • K. Dhanalakshmi, A.Anitha, G. Michael, K.G.S. Venkatesan

article de recherche

Traffic Identification Method Engine: An Open Platform for Traffic Classification

  • A.R. Arunachalam, K.G.S. Venkatesan, Abdul Basith.K.V, M. Sriram

article de recherche

QOS - Guaranteed Neighbour Selection & Distributed Packet Scheduling Algorithm by Using MANET Wireless Networks

  • Abhinav Kumar, Abhijeet Kumar, Dr. C. Nalini, K.G.S. Venkatesan

article de recherche

SLA Based Resource Allocation as a Service Provider (SaaS) in Cloud Computing Environments

  • K.Adithya Narayanan, Monish Joel Singh, D.Kerana Hanirex, K.G.S. Venkatesan

article de recherche

Pixel Steganalysis - A Novel Approach in Image Steganography Using F5 Algorithm

  • Prabhu Kumar, Nikhil Tirpathi, G.Michael

article de recherche

Association Rules Mining in Vertically Distributed Databases

  • P.Kalaivani, D.Kerana Hanirex, K.P.Kaliyamurthie

article de recherche

Secured Authentication for De-Duplication by Using Hybrid Cloud Approach

  • Anucia Devi D.S, Anuradha C, K.G.S. Venkatesan

article de recherche

Dynamic Annotation by Web Database Search Results

  • Bincy S Kalloor, Sheeja Agustin

article de recherche

Uncertain Bandwidth Calculation in Networks with Non-Linear Services

  • T.Keerthikala, L.Hemalatha, B.Sundarraj

article de recherche

Computer Intraction Based on Hand Gestures

  • Suresh.D, Subash.P, F.Noorullah Khan

article de recherche

Review on Various Face Recognition Techniques

  • Ashlesha D. Kolap,S.V. Shrikhande, Nitin K. Jagtap

article de recherche

Efficient Cloud Storage Management Using DHT Mechanism

  • D.K.Karthika, G.Sudhakar, D.Sugumar

article de recherche

Vehicle Locking Using Radio Frequency Identification with Theft Intimation and Smart Tracking System

  • Manu Poduval, Nitish Pokharkar, Anirudha Punekar, S. D. Borde

article de recherche

Multilevel Anti-Discrimination Privacy Preserved Data Transmission

  • Naveena M.S, Merlin Shoerio

article de recherche

A Review: Eulerian Video Motion Magnification

  • Kranti Kamble, Nitin Jagtap, R.A Patil, Ankit Bhurane

article de recherche

Review of Botnet Attacks and its Detection Mechanism

  • D.Kavitha, Rani S.K

article de recherche

Multi Threshold Low Power SRAM Using Floating Gates

  • Sushree Sangita Das, Kanan Bala Ray, Prangya Parimita Nanda

article de recherche

Detection of Intrusions in KDDCup Dataset using GA by Enumeration Technique

  • Vishal R. Chaudhary, R. S. Bichkar

article de recherche

Search Me If You Can Privacy-Preserving Location Query Service

  • Akash Mishra, Shefali Kadam, Avinash Kumar, Sharvari Shinde

article de recherche

Intersection RSU in VANET

  • Rohini Avinash Nere, Uma Nagaraj

article de recherche

Vedic Multiplier in VLSI for High Speed Applications

  • G.Ramachandran, T.Muthumanickam, P.M.Murali, Sajith.S.Nair, L.Vasnath

article de recherche

A Review On the Development of GEDIT 3 Plug-In: Go-To Definition for C Using Exuberant-Ctags

  • P.S. Bangare, Pramod Sonar, Pallab Pain and Sadhna Advani

article de recherche

Advanced Adaptive Routing Algorithm for Highway and City Scenarios in VANET

  • Shubhrant Jibhkate, Smith Khare, Ashwin Kamble, Amutha Jeyakumar

article de recherche

Prevention of SQL Injection Attack on Web Applications

  • Shakti Kumar, Subhendu Dey, R.Karthikeyan, K.G.S. Venkatesan

article de recherche

Broadband Double Psi (Ψ) Shaped Patch Antennas for Wireless Communications

  • Kavita Gundappa Talandage, U. S. Sutar

article de recherche

Design of Microstrip Patch Antenna for GPS Applications using EBG Structures

  • Naveen JVSS, Varun Kumar.K, Ramesh.B, Vinay. K.P

article de recherche

An Empirical Performance Analysis of Relative Keyword Search Techniques

  • Avinandan Kumar, Dipankar Nag, G.Michael

article de recherche

Handling Load Balancing using Genetic Algorithm in Cloud Based Multimedia System

  • E.Naveen Karki, S.Venkateswaran, AR.Arunachalam

article de recherche

Data Access Service through Web Service by Auto-Updation Mechanism

  • Sneha Kalbande, N.M.Tarbani

article de recherche

Preserving Privacy using Secret Sharing in Distributed Environment on Perturbed Data

  • Sagar S. Phake, Vikrant S. Moon, Avinash A. Waghmare, Gaurav B. Ijare

article de recherche

Survey of DOS Defense Mechanisms

  • Anup Ranekar, A. R. Bhagat Patil

article de recherche

Behavioural Model of Adult Obesity by Childhood Predictors using Crowd Sourcing

  • Mohd Zareef Affani, Uma N. Dulhare

article de recherche

Comparing the Performance of Frequent Itemsets Mining Algorithms

  • Kalash Dave, Mayur Rathod, Parth Sheth, Avani Sakhapara

article de recherche

Defense against DDoS Attacks Using IP Address Spoofing

  • Archana .S. Pimpalkar, A. R. Bhagat Patil

article de recherche

A Context-Aware Relation Extraction Method for Relation Completion

  • B.Sivaranjani, Meena Selvaraj

article de recherche

Hybrid Based Energy Efficient Wireless Sensor Network Routing Algorithm for Farmland

  • Pramod T. Shitole, UmeshL. Kulkarni

article de recherche

Online Voting System Using Three Factor Authentication

  • Rashmi Nade, Monali Raut, Punam Agawane, Jayshree Shinde

article de recherche

Detection of Parkinson's Disease by Speech Analysis

  • Ch.Rajanikanth, A.Amardeep, B.Kishore, Shaik Azeez

article de recherche

Biometric Secured Voting Machine to Avoid Bogus Voting Based on AADHAR CARD

  • Umang Shah, Trupt Shah, Marteen Kansagara, Saagar Daxini

article de recherche

Comprehensive Study and Review Various Routing Protocols in MANET

  • Manish Sharma, Jaspreet Kaur

article de recherche

Real Time GPRS- Fuel Tracking and Monitoring Entity Using Telematics

  • Dhivyasri G, Rajeshwari Mariappan

article de recherche

Simulation of Algal Bloom Detection System Using Modified ABR Algorithm

  • S.Nithya Kamatchi, S.Suresh Kumar.

article de recherche

Document Image Binarization Using Threshold Segmentation.

  • Rekha Chaudhari, Dinesh Patil

article de recherche

Energy Efficient Design for Full Adder Logic Implementation

  • Rakhi Saha, Sambita Dalal, Satyasis Mishra

article de recherche

Survey on Web-Scale Image Search and Re-Ranking With Semantic Signatures.

  • Darshana C. Chaudhari, Priti Subramanium.

article de recherche

Scalable Learning for Collective Behaviour Using Sparse Social Dimensions

  • V.Priyadharshini, K.Thamaria Selvi, P.Sowmiyaa

article de recherche

Detecting and Preventing DDoS Attacks in Cloud.

  • S.SaravanaKumar, R.SenthilKumar, R.Arun prasad, S.Thiraviam, J.Vignesh

article de recherche

Design of Smart Home Energy Management System.

  • Vaibhavi Sunil Yardi

article de recherche

Digital Watermarking of Audio in Time Domain Multiple Bit Plane based on Chaotic Scrambling.

  • Jeebananda Panda, Indu Kumari, Nitish Goe

article de recherche

Virtual Makeover and Virtual Trial Dressing

  • Jaychand Upadhyay, Divya Shukla, Nidhi Patel, Sheetal Nangare

article de recherche

Healthcare Data Security in Cloud Computing

  • G. Rathi, Abinaya. M, Deepika. M¸ Kavyasri. T

article de recherche

Study of Algorithms for Separation of Singing Voice from Music

  • Madhuri A. Patil, Harshada P. Burute, Kirtimalini B. Chaudhari, Pradeep B. Mane

article de recherche

Robust Video-based Face Recognition.

  • Subashini.T, S.T.Munusamy, Srinivasan. R

article de recherche

Secure Internet-Banking with Visual Authentication Protocols

  • S.Saravana Kumar, R.Senthil Kumar, P.Venkatraman, M.Thamodharan, S.Vishnu Prashod

article de recherche

Providing Consistency in Cloud Using Read after Write Technique to Endusers

  • R.Jeena, S.Saravanakumar, B.Poornima Bharathi, R.P.Priyancaa

article de recherche

Smart Antennas for Communications in Line of Sight

  • Surayamubeen, A.M.Prasad, A.Jhansi Rani

article de recherche

Accent Recognition using MFCC and LPC with Acoustic Features

  • Reena H. Chaudhari, Kavita Waghmare, Bharti W. Gawali

article de recherche

U-Slot Microstrip Patch Antenna for Wireless Application

  • J.Venkatachalapathi, M.Kaanchana, T.Adhilakshmi, B.Vaishnavi, D.Sriganesh

article de recherche

Optimized Energy Conserving Using Selective Forwarding Algorithm (SFA) for Wireless Sensor Network (WSN)

  • K.Esthar, N.Aravindhan, S.Srinath, S.Sudharshan, D.Sriganesh

article de recherche

Automatic Generate CNC Code for Symmetrical Object

  • V.Naga Arjun, D.Nagarathinam

article de recherche

Survey on Text Classification Based on Similarity

  • Kavitha Sri.M, Hemalatha.P

article de recherche

Detection of Implanted Devices In Underground By Using UWB Penetrating Radar with Support of PN Code

  • P.Navaganesh, P.Ananda Ramunaidu, K.Sudha Rani, N.Raja, Shaik.Azeez

article de recherche

Personalized Search of User Search Behaviour with Ontology

  • N.Hemamalini, M.Gomati, V.Indumathi, S.Jegadeesan

article de recherche

Design of Space-Time Coded Single-Carrier and Multi-Carrier MIMO-CDMA systems

  • P. Sreesudha, B.L. Malleswari

article de recherche

Prepaid Energy Meter with GSM Technology

  • JaychandUpadhyay, Namita Devadiga, Alrina D’mello, Glenie Fernandes

article de recherche

Interactive Voice Response System by Using Asterisk

  • Ankita Bhondge, Aditi Bhatkar, Sapna Fender, Sonali Thakre, Megha Goel

article de recherche

Performance Evaluation of Advanced OLSR against Black Hole Attack and Wormhole Attack in MANET

  • K.Sivagurunathan, K.Manojkumar, D.Sounder, Midhun Sebastian

article de recherche

Elimination of Baseline Fluctuation in EMG Signal Using Digital Filter

  • Jeet Singh, Jitendar yadav

article de recherche

A Review of Bike Security System Using Fingerprint GSM&GPS

  • K.Dineshkumar, G. Nirmal, S.Prakash, S.Raguvaran

article de recherche

Review on Intelligent Traffic Management System Based on VANET

  • Nikhil Suresh Kshirsagar, U. S. Sutar

article de recherche

D-Matrix: Fault Diagnosis Framework

  • Tinal R. Thombare, Lalit Dole

article de recherche

Security and Privacy Issues in Private Cloud Storage

  • Girija Rajendra

article de recherche

Review of Automatic Attendance Using Facial Recognization

  • Rahul S. Rode , Nikhil A. Dahelkar, Nikhil R. Nagdive, Anagha S. Gajbhiye, Manish K. Shriwas

article de recherche

Identification of Cup-Disk Ratio for Glaucoma Prone Eyes

  • Niladri Halder, Dibyendu Roy, Arnab Chattaraj, Tanumoy Chowdhury

article de recherche

One Bit-Line Multi-Threshold SRAM Cell With High Read Stability

  • Prangya Parimita Nanda , Kanan Bala Ray, Sushree Sangita Das

article de recherche

Accessible Display Design to Control Home Area Networks

  • Rohini B. Thube, Archana A. Hatkar

article de recherche

A Review on Implementation of QAM on FPGA

  • Ravindra H. Sharma, Kiritkumar R. Bhatt

article de recherche

Automatic Integration of Drug Indications from Multiple Health Resources

  • S. Srivenkatesh, R. Karthikeyan

article de recherche

Unified Data Access Security on Revocable Multi Authority CP-ABE in Cloud

  • Suresh Kumar.P, Tamilselvan.D, Anuradha.C

article de recherche

Survey on Feature Subset Selection Algorithm in Brain Interaction Patterns

  • K.Vidhyadevia, M.Beema Mehraj, K.P.Kaliyamurthie

article de recherche

Performance Comparison of POLY Protocol with Existing CDS Protocols

  • Shimrose S.Mulla, S.V.Sankpal

article de recherche

An Image Removal Using Local Tetra Patterns for Content Based Image Retrieval

  • Manish K. Shriwas, Vivek. R. Raut

article de recherche

LOBOT: Low-Cost Robotic Vehicle

  • Snehal D. Patil, Archana A. Hatkar

article de recherche

Human Effects to Enhance Clustering Techniques That Assists User in Grouping the Friends

  • S. Srigowthem, K.G.S Venkatesan, Sourav Kumar Nag, Suraj Raj

article de recherche

Design of 'V' Shape Microstrip Patch Antenna

  • Deepak Sabale, Ranjeet Landge, Vaibhav Salke, A.A.Trikolikar

article de recherche

Fingerprint Based Gender Classification Using Block-Based DCT

  • Akhil Anjikar, Suchita Tarare, M. M. Goswami

article de recherche

Communication through Photon Using Quantum Cryptography: A Survey

  • Leenata B. Isal, Chetan J. Shelke

article de recherche

Study of Ridge Based and Image Based Approach for Fingerprint Gender Classification

  • Alok Chauhan, Akhil Anjikar, Suchita Tarare

article de recherche

A Review on Software Fault Injection Methods and Tools

  • K. Umadevi, S. Brintha Rajakumari

article de recherche

Detecting Cars In Traffic Using Cascade Haar With KLP

  • Kiruthika R, Mythili S

article de recherche

Opinion Mining From Text Reviews Using Machine Learning Algorithm

  • Poobana S, Sashi Rekha k

article de recherche

Dynamic Pricing for Usage of Cloud Resource

  • K.Sangeetha, K.Ravikumar

article de recherche

Mining User Profile Exploitation Cluster from Computer Program Logs

  • K.G.S. Venkatesan1, V. Khanna, Jay Prakash Thakur, Banbari Kumar

article de recherche

Design and Development of Efficient Content Independent Genealogy

  • Rahul S. Dudhabaware, Mangala S. Madankar

article de recherche

Despeckling of SAR Images Using Wavelet Based Spatially Adaptive Method

  • B.Leela Kapil, M.Santosh Kumar, M.Avinash, K.Suhasan, K.Prasanna Kumar

article de recherche

Survey on Different Phases of Digital Forensics Investigation Models

  • Priya S. Patil, A. S. Kapse

article de recherche

Legal Implication of Human and Physical- Activity Monitoring System Using Android Smartphone

  • K.P.Kaliyamurthie, H.Ajmal Hasan, Abhishek Mishra

article de recherche

Facial Feature Extraction Based On FPD and GLCM Algorithms

  • S. Vijayarani, S. Priyatharsini

article de recherche

Sybil Attack Resistant Cryptographic Traffic Information Dissemination in VuC

  • Vandana C.P, Nitty Sarah Alex

article de recherche

Adaptation Backoff Exponent Mechanism in Zigbee Sensor Network for Improving Through put

  • Priyanka Deshpande, Mangala S. Madankar

article de recherche

DOGGY- a Graphical Security Technique to prevent Online Guessing Attacks

  • S.Sachin Shriram, K.P.Kaliyamurthie

article de recherche

Review on Anonymous Routing Protocol for High Anonymity Protection in MANETs

  • Namrata R. Borkar, Avinash P. Wadhe

article de recherche

Hill Cipher Modifications: A Detailed Review

  • Narendra B. Parmar, Kirit R. Bhatt

article de recherche

Evaluation of Keyword Search System with Ranking

  • P.Saranya, S.Babu

article de recherche

Analysis of the Effect of Harmonics Due To Switching Devices W.R.T. Experimental & Simulation Point of View

  • Rajesh Maharudra Patil, M.S. Nagaraj, P.S.Venkataramu

article de recherche

Avoiding Network Performance Degradation Problem in Zigbee

  • Jothi.S, Daniel.D, Jackulin Durairani.A, Rekha.A

article de recherche

Survey of Various Opinion Mining Approaches

  • Gayathri R Krishna, Jothi S, Minojini N, Sowmiyaa P

article de recherche

Detection of Hacking nodes using Dynamic Sensor with Ant Colony Optimization

  • R.Balaji, V.Abhishek, D.Kerana Hanirex

article de recherche

Secured Data Transmission Using Elliptic Curve Cryptography

  • K.S.Abitha, Anjalipandey, K.P.Kaliyamurthie

article de recherche

Performance Analysis of PAPR Reduction Using DFT-Spreading OFDMA Technique

  • Alcardo Alex Barakabitze, Tan Xiaoheng