S.No. |
Title and Authors of Paper |
Page.No. |
1 |
Optimization of Electrical
Discharge Machining (EDM) with Respect to Tool Wear Rate
Shivendra Tiwari |
764-768 |
2 |
Amplifying Security for
Cipher-Text Policy Attribute-Based Data sharing
Lekshmy Aravind, M.Victor Jose |
769-777 |
3 |
Settlement Analysis of Modeled Wooden Piles in Clay
Taiye W. Adejumo |
778-782 |
4 |
A Survey on Web Services
Security and Its Specifications
Mrs. K. Rajasri, Mrs. S. Tamilarasi , S. Sathiyadevi |
783-788 |
5 |
WIRELESS COMMUNICTION FOR DUMB PEOPLE USING PIC18F452 MICROCONTROLER
s.Sreenivasulu, S.RamaKishore reddy,K.Prabhakar Reddy |
789-792 |
6 |
Formulation of a Field Data Based Model for a Surface Roughness using Response Surface Method
Mangesh R.Phate, Dr. V.H.Tatwawadi |
793-798 |
7 |
Survey paper on Data Mining techniques of Intrusion Detection
Harshna,NavneetKaur |
799-802 |
8 |
Survey Paper on Clustering
Techniques
Amandeep Kaur Mann ,NavneetKaur |
803-806 |
9 |
A Leaf Shaped Microstrip
Patch Antenna
ASHWANI PATEL SINGH |
807-809 |
10 |
webOsys: Web Browser towards an application platform
Swapnil Gawai, Swapneel Golapkar, Sagar Kirdat, Pankaj Shinde |
810-813 |
11 |
STUDY AND ANALYSIS OF EFFECT OF COATING ON HSS CUTTING TOOL
Assistant Prof. Abrar A. Arshi, Assistant Prof. Atish Dighewar |
814-817 |
12 |
Notions via β*-continuous maps in topological spaces
J.ANTONY REX RODGIO, JESSIE THEODORE |
818-822 |
13 |
Impact of U.G.C. Infonet
Consortia on the Users of Universities of Jharkhand in Eastern India
Bal Ram,Dr. Bhaskar Karn |
823-832 |
14 |
Hybrid Data Reduction Scheme for Energy Saving in Wireless Sensor Networks
M. Rajalakshmi, R. Karthika |
833-839 |
15 |
RELEVANCE OF ARTIFICIAL BEE COLONY ALGORITHM OVER OTHER SWARM INTELLIGENCE ALGORITHMS
Punam Bajaj, Harnoor Kaur |
840-844 |
16 |
High Performance Fault
Detection and Correction Scheme for Advanced Encryption Standard
Vinoth Vijay S, Swarna Tharini R, Muthu Ganesh S |
845-849 |
17 |
Thermal analysis of PCM based building wall for cooling
Dhanusiya.G, Rajakumar.S |
850-857 |
18 |
Survey of Clustering Algorithm in Wireless Sensor Networks
R.Juliana, S.Deepajothi |
858-864 |
19 |
INVESTIGATION OF PERFORMANCE ANALYSIS OF PV FED MULTILEVEL INVERTER FOR WATER PUMPING APPLICATIONS
Dr.H.Habeebullah Sait, S.Arunkumar, S.Jayaganesh, M.Kesavamoorthi, C.Rajagopal |
865-876 |
20 |
Implementing HASBE Scheme for setting up access controls in out-sourced data Clouds
Darwin v tomy, Dhanalakshmi.S, Dr.S.Karthik |
877-880 |
21 |
CHEMICAL REACTION EFFECTS ON MHD FLOW OF CONTINUOUSLY MOVING VERTICAL SURFACE WITH HEAT AND MASS FLUX THROUGH POROUS MEDIUM
J. Girish Kumar |
881-886 |
22 |
Classification and Comparative Analysis of Passage Retrieval Methods
Dr. K. Saruladha, C. Siva Sankar, G. Chezhian, L. Lebon Iniyavan, N. Kadiresan |
887-895 |
23 |
A Pragmatic solution to
mitigate energy demand by using available renewable energy resources: District wise potential analysis of renewable energy
MD. Muminur Rahman Sonic, Md. Rabiul Islam |
896-899 |
24 |
Tuning of PID Controller Using GA and PSO Optimization Technique and Compare with Integral Errors
Manish Rathore , Preeti Verma , Dr Rajeev Gupta |
900-905 |
25 |
Vibration Control of
Cantilever Beam Using Fuzzy Logic Controller
Preeti Verma , Manish Rathore, Dr Rajeev Gupta |
906-909 |
26 |
Detecting Anomalies Based On Entropy-Estimation
P.Karthik |
910-915 |
27 |
Design and Development of
receiver for utilization of concentrated solar power
Pradeep Reddy Anna Reddy |
916-921 |
28 |
Congestion management in Open Access: A Review
Abhishek Saxena, Dr. Seema N. Pandey, Dr. Laxmi Srivastava |
922-930 |
29 |
Real Time Healthcare System for Patients with Chronic Diseases in Home and Hospital Environments
Gouri Mohan,Sinciya P O |
931-936 |
30 |
COLORIZATION OF GRAYSCALE
IMAGES USING MULTIPLE KERNEL FUZZY C-MEANS CLUSTERING
DEVIPRIYA. J,ANGEL VIJI K. S |
937-941 |
31 |
Total Productive Maintenance: A Contextual View for Quality Assurance and Control for Innovative Object of TPM
Miss Ashwini Mate, Suhas Bamrotwar |
942-947 |
32 |
TA Secure Mass Data Storage and Integrity Verification Scheme in Cloud Computing
Nayana.S.R, VenifaMini G, Jeya A. Celin J |
948-953 |
33 |
Efficient RFID Authentication in Cloud Computing
Sherin Jobe, Venifa Mini.G and Jeya A.Celin J. |
954-958 |
34 |
CHEMICAL REACTION AND OHMIC DISSIPATION EFFECTS ON MHD MEMORY FLOW PAST A MOVING SURFACE THROUGH POROUS MEDIUM
K. Sreelatha, B. Rami Reddy, J. Girish Kumar |
959-968 |
35 |
A cryptographic algorithm
based on words database
Quist-Aphetsi Kester |
969-973 |
36 |
A SURVEY ON BIOMETRIC
RECOGNITION TECHNIQUES AND ALGORITHMS
K.Rajasri, S.Sathiyadevi, S.Tamilarasi |
974-978 |
37 |
Using SOA with web services for an effective integration approach of Rural Banks and existing mobile communications infrastructure in Providing Mobile Money Services
Quist-Aphetsi Kester |
979-984 |
38 |
Failure Prediction for
Scalable Checkpoints in Scientific Workflows Using Replication and Resubmission task in Cloud Computing
P.Palaniammal, R.Santhosh |
985-991 |
39 |
Vehicle Monitoring and Theft Prevention System Using ARM Cortex
Nurul Hutha.S, ArunKumar.B |
992-997 |
40 |
Autonomous Self Parking and Self Retrieving Vehicle With GPS Less Keyfob for Vehicle Tracking
Jagadhambal. K , Arunkumar.B |
998-1002 |
41 |
Inclined Heat Exchanger Unit Assisted Sk-14 PSC for off place cooking
V.V.S. Murty, Anuradha Gupta |
1003-1006 |