Volume 2 Issue 4 April-2013

S.No. Title and Authors of Paper Page.No.
1 Optimization of Electrical
Discharge Machining (EDM) with Respect to Tool Wear Rate

Shivendra Tiwari
764-768
2 Amplifying Security for
Cipher-Text Policy Attribute-Based Data sharing

Lekshmy Aravind, M.Victor Jose
769-777
3 Settlement Analysis of Modeled Wooden Piles in Clay
Taiye W. Adejumo
778-782
4 A Survey on Web Services
Security and Its Specifications

Mrs. K. Rajasri, Mrs. S. Tamilarasi , S. Sathiyadevi
783-788
5 WIRELESS COMMUNICTION FOR DUMB PEOPLE USING PIC18F452 MICROCONTROLER
s.Sreenivasulu, S.RamaKishore reddy,K.Prabhakar Reddy
789-792
6 Formulation of a Field Data Based Model for a Surface Roughness using Response Surface Method
Mangesh R.Phate, Dr. V.H.Tatwawadi
793-798
7 Survey paper on Data Mining techniques of Intrusion Detection
Harshna,NavneetKaur
799-802
8 Survey Paper on Clustering
Techniques

Amandeep Kaur Mann ,NavneetKaur
803-806
9 A Leaf Shaped Microstrip
Patch Antenna

ASHWANI PATEL SINGH
807-809
10 webOsys: Web Browser towards an application platform
Swapnil Gawai, Swapneel Golapkar, Sagar Kirdat, Pankaj Shinde
810-813
11 STUDY AND ANALYSIS OF EFFECT OF COATING ON HSS CUTTING TOOL
Assistant Prof. Abrar A. Arshi, Assistant Prof. Atish Dighewar
814-817
12 Notions via β*-continuous maps in topological spaces
J.ANTONY REX RODGIO, JESSIE THEODORE
818-822
13 Impact of U.G.C. Infonet
Consortia on the Users of Universities of Jharkhand in Eastern India

Bal Ram,Dr. Bhaskar Karn
823-832
14 Hybrid Data Reduction Scheme for Energy Saving in Wireless Sensor Networks
M. Rajalakshmi, R. Karthika
833-839
15 RELEVANCE OF ARTIFICIAL BEE COLONY ALGORITHM OVER OTHER SWARM INTELLIGENCE ALGORITHMS
Punam Bajaj, Harnoor Kaur
840-844
16 High Performance Fault
Detection and Correction Scheme for Advanced Encryption Standard

Vinoth Vijay S, Swarna Tharini R, Muthu Ganesh S
845-849
17 Thermal analysis of PCM based building wall for cooling
Dhanusiya.G, Rajakumar.S
850-857
18 Survey of Clustering Algorithm in Wireless Sensor Networks
R.Juliana, S.Deepajothi
858-864
19 INVESTIGATION OF PERFORMANCE ANALYSIS OF PV FED MULTILEVEL INVERTER FOR WATER PUMPING APPLICATIONS
Dr.H.Habeebullah Sait, S.Arunkumar, S.Jayaganesh, M.Kesavamoorthi, C.Rajagopal
865-876
20 Implementing HASBE Scheme for setting up access controls in out-sourced data Clouds
Darwin v tomy, Dhanalakshmi.S, Dr.S.Karthik
877-880
21 CHEMICAL REACTION EFFECTS ON MHD FLOW OF CONTINUOUSLY MOVING VERTICAL SURFACE WITH HEAT AND MASS FLUX THROUGH POROUS MEDIUM
J. Girish Kumar
881-886
22 Classification and Comparative Analysis of Passage Retrieval Methods
Dr. K. Saruladha, C. Siva Sankar, G. Chezhian, L. Lebon Iniyavan, N. Kadiresan
887-895
23 A Pragmatic solution to
mitigate energy demand by using available renewable energy resources: District wise potential analysis of renewable energy

MD. Muminur Rahman Sonic, Md. Rabiul Islam
896-899
24 Tuning of PID Controller Using GA and PSO Optimization Technique and Compare with Integral Errors
Manish Rathore , Preeti Verma , Dr Rajeev Gupta
900-905
25 Vibration Control of
Cantilever Beam Using Fuzzy Logic Controller

Preeti Verma , Manish Rathore, Dr Rajeev Gupta
906-909
26 Detecting Anomalies Based On Entropy-Estimation
P.Karthik
910-915
27 Design and Development of
receiver for utilization of concentrated solar power

Pradeep Reddy Anna Reddy
916-921
28 Congestion management in Open Access: A Review
Abhishek Saxena, Dr. Seema N. Pandey, Dr. Laxmi Srivastava
922-930
29 Real Time Healthcare System for Patients with Chronic Diseases in Home and Hospital Environments
Gouri Mohan,Sinciya P O
931-936
30 COLORIZATION OF GRAYSCALE
IMAGES USING MULTIPLE KERNEL FUZZY C-MEANS CLUSTERING

DEVIPRIYA. J,ANGEL VIJI K. S
937-941
31 Total Productive Maintenance: A Contextual View for Quality Assurance and Control for Innovative Object of TPM
Miss Ashwini Mate, Suhas Bamrotwar
942-947
32 TA Secure Mass Data Storage and Integrity Verification Scheme in Cloud Computing
Nayana.S.R, VenifaMini G, Jeya A. Celin J
948-953
33 Efficient RFID Authentication in Cloud Computing
Sherin Jobe, Venifa Mini.G and Jeya A.Celin J.
954-958
34 CHEMICAL REACTION AND OHMIC DISSIPATION EFFECTS ON MHD MEMORY FLOW PAST A MOVING SURFACE THROUGH POROUS MEDIUM
K. Sreelatha, B. Rami Reddy, J. Girish Kumar
959-968
35 A cryptographic algorithm
based on words database

Quist-Aphetsi Kester
969-973
36 A SURVEY ON BIOMETRIC
RECOGNITION TECHNIQUES AND ALGORITHMS

K.Rajasri, S.Sathiyadevi, S.Tamilarasi
974-978
37 Using SOA with web services for an effective integration approach of Rural Banks and existing mobile communications infrastructure in Providing Mobile Money Services
Quist-Aphetsi Kester
979-984
38 Failure Prediction for
Scalable Checkpoints in Scientific Workflows Using Replication and Resubmission task in Cloud Computing

P.Palaniammal, R.Santhosh
985-991
39 Vehicle Monitoring and Theft Prevention System Using ARM Cortex
Nurul Hutha.S, ArunKumar.B
992-997
40 Autonomous Self Parking and Self Retrieving Vehicle With GPS Less Keyfob for Vehicle Tracking
Jagadhambal. K , Arunkumar.B
998-1002
41 Inclined Heat Exchanger Unit Assisted Sk-14 PSC for off place cooking
V.V.S. Murty, Anuradha Gupta
1003-1006