Volume-3 Issue-1, March 2013

  • Version
  • Download 40
  • File Size 4.00 KB
  • Create Date March 30, 2013
  • .

Volume-3 Issue-1, March 2013, ISSN: 2231-2307 (Online)
Published By: Blue Eyes Intelligence Engineering & Sciences Publication

High Performance Simulator Analyzing the Efficient Cache Memory Simulation Behavior
Manoj Kumar Jain1, Ravi Khatwal2


On a r - GCD-Sum Function Over r-Regular Integers Modulo nr
V. Siva Rama Prasad1, P. Anantha Reddy2, M.Ganeshwar Rao3


A Novel Radio over Fiber System for Long Haul Single-Mode-Fiber Transmission
Anindya Sundar Das1, Banibrata Bag2, Akinchan Das3, Ardhendu Sekhar Patra4


InGaAs/GaAs HEMT for High Frequency Applications
N V Uma Reddy1, M V Chaitanya Kumar2


Tuning Of PID Controller Of Inverted Pendulum Using Genetic Algorithm
K.Chakraborty1, R. R. Mukherjee2, S.Mukherjee3


High Performance Optimization of Low Power Multi -Threshold Voltage Using Level Converters
S.Manikandan


A Comparative Analysis of Controllers Controlling Uncertainty in the Form of 2nd Order Load, Affecting the Robust Position Control of DC Motor
Er. Farhad Aslam1, Er. Birendra Kumar Yadav2, Ram Sharan Choudhary3, Gopal Kumar Choudhary4


Real-Time Software Profiler for Embedded Systems
Medhat H. A. Awadalla1, Kareem Ezz El-Deen2


Bug Tracking and Reporting System
A.S.Syed Fiaz1, N.Devi2, S.Aarthi3


Improvement in End-to-End delay and Energy Consumption using Routing Algorithms in Wireless Sensor Network
Sunita1, O.S Khanna2, Amandeep Kaur3


An Efficient Firefly Algorithm to Solve Economic Dispatch Problems
R.Subramanian1, K.Thanushkodi2


Short Term Load Forecasting using Artificial Neural Network
Amera Ismail Melhum1, Lamya abd allateef Omar2, Sozan Abdulla Mahmood3


Exact Solutions of Time Dependent Korteweg-de Vries Equation by The Extended Unified Method
H. I. Abdel-Gawad1, Mohamed Osman2, Nasser S. Elazab3


SVPWM Based DTC of OEWIM Drive Fed With Four Level Inverter with Asymmetrical DC Link Voltages
G. Satheesh1, T. Bramhananda Reddy2, CH. Sai Babu3


Clustered Evaluation of Implementing Fuzziness and Uncertainty in Deception Detection with the Randomness Bridge for the Teenager Communication System
S.Rajkumar1, V.Narayani2


An Approach for the Assessment of the Information Security and Its Measures
Kiran Kumar Kommineni1, Adimulam Yesu Babu2


Multi-Agent Secure Dynamic Carpooling
Deepak B. Nagare1, Kishor L. More2, Nitin S. Tanwar3, S.S.Kulkarni4


Image Information Retrieval Using Wavelet and Curvelet Transform
Muzhir Shaban Al-Ani1, Abdulrahman Dira Khalaf2


Exhaust Emissions and Combustion Characteristics of Jatropha Oil in Crude Form and Biodiesel of Low Heat Rejection Diesel Engine
N. Janardhan1, P.Ushasri2, M.V.S. Murali Krishna3, P.V.K. Murthy4


Design & Implementation of PID Controller Based On FPGA with PWM Modulator
Rajesh Nema1, Rajeev Thakur2, Ruchi Gupta3


Web Browsing Behaviors Based Age Detection
Misha Kakkar1, Divya Upadhyay2


Transient Thermal Analysis of Pulsed Silicon SDR IMPATT at 35 GHz
L. P. Mishra1, A. Acharyya2,M. Mitra3


Providing E-Governance Services To Technologically Challenged Grassroots Environments
Okoronkwo M. C1, Monica N. Agu2


Enhanced Object Tracking Using Davinci Processors
J. Navin Sankar1, S. Mary Joans2, S. J. Grace Shoba3, A. Arun4


Soft Computation Based Topographic Map Legend Understanding Prototype System
Nikam Gitanjali Ganpatrao1, Jayanta Kumar Ghosh2


A Study and Simulation of Cloudburst event Over Uttarkashi Region using River Tool and Geomatic Techniques
V.V.Govind Kumar1, Kamal Jain2, Ajay Gairola3


Intellectual Behavior of a Group of Wild Animals: A Computational Intelligence Study
Avtar Singh Buttar1, Ashok Kumar Goel2, Shakti Kumar3


A Study on Security Requirements in Different Cloud Frameworks
Ramandeep Kaur1, Pushpendra Kumar Pateriya2


Bit-Mask Based Compression of FPGA Bitstreams
S.Vigneshwaran1, S.Sreekanth2


Multi-Sensor Based Forest Fire Detection System
Parul Mohindru1, Rajdeep Singh2


A Hybrid Approach Based On Association Rule Mining and Rule Induction in Data Mining
Kapil Sharma1, Sheveta Vashisht2, Heena Sharma3, Richa Dhiman4, Jasreena Kaur Bains5


Segmentation of Image Using Enhanced Morphological Gradient Hit Method
D.Gladiya Lincy1, S.Mary Joans2


Analysis of PSO and Hybrid PSO in Calculation of Epileptic Risk Level in EEG
R.Harikumar1, T.Vijayakumar2, R.Kasthuri3


In-Silico Identification of LTR type Retrotransposons and Their Transcriptional Activities in Solanum Tuberosum
Chandra Bhan Yadav1, Himansu Narayan Singh2


Novel Design of High Polarized Inverter Using Minimum Number of Rotated Cells and Related Kink Energy Calculation in Quantum dot Cellular Automata
Angshuman Khan1, Ratna Chakrabarty2


Feeding Techniques to Improve Bandwidth of MPA
Meenu Chinwan1, Harshpreet Kaur2


Design of High Speed Ladner-Fischer Based Carry Select Adder
Pakkiraiah Chakali1, Madhu Kumar Patnala2


Design of Ladner-Fischer and Beaumont-Smith Adders Using Degenerate Pass Transistor Logic
Adilakshmi Siliveru1, M. Bharathi2


A New Approach to Object Based Fuzzy Database Modeling
Debasis Dwibedy1, Laxman Sahoo2, Sujoy Dutta3


Data Security in Cloud based on Trusted Computing Environment
Vijay. G.R1, A.Rama Mohan Reddy2


Speed Regulation of DC Drive Using Mobile Communication
Shakti Bajaj1, Ravinder Kumar Bhataia2, J. Sandeep Soni3


Technique for Searching of Similar Code Segments
Akshat Agrawal1, Sumit Kumar Yadav2


Homer Optimization Based Solar PV; Wind Energy and Diesel Generator Based Hybrid System.
Ajay Sharma1, Anand Singh2, Manish Khemariya3


Enhanced Control of Power System by Using Smart Grid and Possibility of Applying it in Iraq
Mohammed Hammed Yasen


Various Attacks in Wireless Sensor Network: Survey
K.Venkatraman1, J.Vijay Daniel2, G.Murugaboopathi3


Study on Cloud Computing and Security Approaches
G. Murugaboopathi1, C.Chandravathy2, P. Vinoth Kumar3


Evolving a New Software Development Life Cycle Model SDLC-2013 with Client Satisfaction
Naresh Kumar1, A. S. Zadgaonkar2, Abhinav Shukla3


Fuzzy Logic Based Alternate Routing Scheme for the Minimization of Connection Set up Time and Blocking Rate in WDM Optical Network
Abdur Rahaman Sardar1, J. K. Sing2, Subir Kumar Sarkar3


Flexible AC Transmission Devices as a Means for Transmission Line Congestion Management -A Bibliographical Survey
N. Ashok Kumar1, M. Rathina Kumar2, M.Yogesh3


Reliability and Availability Analysis of Database System with Standby Unit Provided by the System Provider
Sukhvir Singh1, Rahul Rishi2, Gulshan Taneja3, Amit Manocha4


Reliability and Availability Analysis of Database System with Standby Unit Provided by the System Provider
Sukhvir Singh1, Rahul Rishi2, Gulshan Taneja3, Amit Manocha4


Mobile Positioning System Using a Mathematical Approach
Akansha Rao1, Vijay Trivedi2, Vineet Richaria3


Modelling and Simulation of Grid Connected Wind Energy System
D Mary1, Shinosh Mathew2, Sreejith K3


Low Power Configuration Logic Block Design Using Asynchronous Static
Debarshi Datta1, Partha Mitra2, Avisek Sen3


Efficient VLSI Architectures of Split-Radix FFT using New Distributed Arithmetic
Ansuman DiptiSankar Das1, Abhishek Mankar2, N Prasad3, K. K. Mahapatra4, Ayas Kanta Swain5


Performance of BER for BPSK and DPSK (Coherent and Non-Coherent) Modulation in Turbo-Coded OFDM with Channel Equalization
Saruti Gupta1, Geetanjali Wassson2


Optimal Ordering Policy for Stock-Dependent Demand Inventory Model with Non-Instantaneous Deteriorating Items
Kumar Karan Gupta1, Aditya Sharma2, Parth Raj Singh3, A K Malik4


Improving The Sink Roll Life In Galvalume Using Material AT101 & The various Thermal-Spray Coating on SS3l6L Roll Surface
Saurabh A. Bobde1, S.D. Kshirsagar2


Thermal Study of Viscoelastic Material between Two Rotating Concentric Annuli: Application at Drilling Process
Meriem Amoura1, Noureddine Zeraibi2


Power Optimization Technique for Pulsed Latches
P.Sreenivasulu1, K.Srinivasa Rao2, J.I.R Prakash3, A.Vinaya babu4


Unite Clinic: Connecting Clinics Online
Supriya Dadabhau Tambe1, Nikhil Gorksh Pawar2, Mahadev Sudhakar Garad3, Sagar Ravindra Patil4


An Overview of Digital Watermarking Techniques
Barun K. Pandhwal1, Devendra S. Chaudhari2


Reducing Delay Data Dissemination Using Mobile Sink in Wireless Sensor Networks
Dattatray S. Waghole1, Vivek S. Deshpande2


Amigos: Social Networking with Advertisement Management
Devika Joshi1, Rutuja Kulkarni2, Arundhati Rao3, Pooja Wagh4, Roma Kudale5


Digital ANFIS Model Design
Prasad R. Pande1, Prashant L. Paikrao2, Devendra S. Chaudhari3


A Meliorated Defense Mechanism for Flooding Based Attacks
Gayatri Bhatti1, Upma Goyal2, Prabhdeep Singh3


Control of Irrigation Automatically By Using Wireless Sensor Network
Rashid Hussain1, JL Sahgal2, Anshulgangwar3, Md.Riyaj4


Significance of Data Warehousing and Data Mining in Business Applications
Madhuri V. Joseph


Modeling Of Transport Phenomena in A PEM Fuel Cell
Kerkoub Youcef1, Kerboua Ziari Yasmina2, Benzaoui Ahmed3


Microcontroller Based Mobile Platform with Fiber Optic Sensors
P.B.Buchade


A Proposed Framework to Implicit Measures of User Interests through Country and Predicting Users’ Future Requests in WWW
Pragya Rajput1, Joy Bhattacharjee2, Roopali Soni3


Mining Technique Defined For Improving User- Based Recommendations in Diverse Environment (MTIURD)
Sangeetha G M1, Prasanna Kumar M2


Comparative Study of Test DrivenDevelopment with Traditional Techniques
Shaweta Kumar1, Sanjeev Bansal2


Comparison and Monitoring of Glacier Retreat using Satellite and Ground Methods
Asha Thapliyal1, M.M. Kimothi2


Wind Turbine Transient Stability Improvement in Power System Using PWM Technique and Fuzzy Controller
S.Radha Krishna Reddy1, JBV Subrahmanyam2, A. Srinivasula Reddy3


Estimation of Software Quality by using fuzzy (FIS)
Pinky Chandwal1, A. S. Zadgaonkar2, Abhinav Shukla3


Single Image Super-Resolution VIA Iterative Back Projection Based Canny Edge Detection and a Gabor Filter Prior
Rujul R Makwana1, Nita D Mehta2


Efficient and Enhanced Algorithm in Cloud Computing
Tejinder Sharma1, Vijay Kumar Banga2


A Cloud Storage System with Data Confidentiality and Data Forwarding
N. Jenefa1, J. Jayalakshmi2


Efficient Solution for SQL Injection Attack Detection and Prevention
Munqath H. Alattar1, S.P. Medhane2