Volume 2 Issue 2 February-2013

S.No. Title and Authors of Paper Page.No.
1 Dual U-Shape Microstrip Patch Antenna Design for WiMAX Applications
Md. Amirul Islam, Sohag Kumar Saha, Md. Masudur Rahman
231-234
2 Analysis of Depth of Penetration and Bead Width of Shielded Metal Arc Weld under Magnetic Field Applying Artificial Neural Networks
R. P. Singh, R. C. Gupta, S. C. Sarkar
235-242
3 A SURVEY OF CLUSTERING OF PARTITONED DATA IN A DISTRIBUTED NETWORK
S.Harippriya, Prof.T.Kalaikumaran, Dr.S.Karthik
243-245
4 Radiation and Mass Transfer Effects on MHD Mixed Convection Flow from a Vertical Surface with Ohmic heating in the Presence of Chemical reaction
Damala Ch Kesavaiah, A Sudhakaraiah, P V Satyanarayana, S Venkataramana
246-255
5 A SURVEY ON LOSSLESS DICTIONARY BASED DATA COMPRESSION ALGORITHMS
NISHAD PM, Dr. R.Manicka Chezian
256-261
6 Trends in the Development of Engineering Technologies for Sugarcane and Sugar Production in Nigeria
A. Gbabo, S.M. Dauda
262-270
7 Removal of Cobalt (II) from Aqueous Solutions by Adsorption on Low cost activated carbon
R.PRABAKARAN, S.ARIVOLI
271-283
8 Comparison between BBO and Genetic Algorithm
Mittu Mittal, Gagandeep
284-293
9 A New Evolutionary Algorithm developed for Global Optimization (BBO)
Mittu Mittal, Gagandeep
294-299
10 A Novel Approach to Reduce the Packet Pollution in Large Scale Network
S.Stewart Kirubakaran, D.Prabakar, Dr.S.Karthik
300-303
11 ZIGBEE BASED WIRELESS PATIENT MONITORING
Ms. Amruta Nagarkar,Prof.M.N.Kakatkar
304-308
12 Design and Fabrication of Portable Solar fryer and its comparative analysis with SK-14
Vikas Kumar, A.Pradeep Reddy, Anuprasad SG
309-313
13 A Survey on: Resource Consumption Index of Denial of Service Attack in MANET
Pranita Joshi,Gajendra Singh Chandel,Shubham Joshi
314-318
14 A Comparative analysis of orthogonal space time block code with trellis coded modulation over Rayleigh and Rician fading channel
SACHIN CHOURASIA, DR. PRABHAT PATEL
319-324
15 An Effective Repeated Rule Acquisition Using Rule Ontology from Similar Web Sites based on Genetic Algorithm
G.Senthil Kumar, K.K.Kanaga Mathan Mohan
325-329
16 Reusability concept using an “M” Component Based Model
Dr. Manju Kaushik
330-335
18 Survey of Image Denoising using Different Filters
Govindaraj.V, Sengottaiyan.G
344-351
19 A STUDY ON LOCATION VERIFICATION AND ROUTING STRATEGY FOR VANET
B.Anuradha, D.Gowtham Chakaravarthy
352-358
20 Simulation and Analysis of PWM Inverter Fed Induction Motor Drive
C.S.Sharma, Tali Nagwani
359-366
21 Design and Implementation of an Unmanned Vehicle using a GSM Network with Microcontrollers
Sourangsu Banerji
367-374
22 Localized Routing and Cluster Technique in Mobile Adhoc Networks
Udaya Kumar. N,Suresh.S
375-379
24 Cargo Loading Using Dynamic Programming and Comparative Software Study
Tom Jose V, Sijo M T, Praveen
386-389
25 Hierarchical-Edge based Torus Automorphism for Digital Watermarking
G.Rosline Nesa Kumari, Dr.S.Maruthuperumal, Dr.V.Vijayakumar
390-395
26 Implementation of JIT in industries- A Case Study
Tom Jose V, Sijo M T, Praveen
396-399
27 A Survey On Web Search Result Clustering And Engines
Poonam B.Lohiya
400-405
28 Industrial Safety and Accident Prevention; A Managerial Approach
Tom Jose V, Sijo M T, Praveen
406-410
29 BRAND LOYALTY: A MULTI-DIMENSIONAL CONCEPT
Rajni Arora
411-417
30 New Approach of Dynamic Web Components Composition using Cache Proxy Servers
U.Sridhar, Dr.G.Gunasekaran, P.Rajesh
418-423
31 An Extensive Single-path Communication Scheme for Submerged Sensor Networks
Saran Thampy D
424-428
32 SUSPICIOUS MOTION DETECTION IN SURVEILLANCE VIDEO
V.Padmavathi,Dr.M.Kalaiselvi Geetha
429-434
33 5G WIRELESS TECHNOLOGIES-Still 4G auction not over, but time to start talking 5G
Ms. Neha Dumbre, Ms. Monali Patwa, Ms. Kajal Patwa
435-440
34 Homography Estimation Techniques in Image Correction Using Points and Line With Known Epipolar Geometry
Mr. Devvrat Yadav, Mr. Shashikant Agrawal
441-444
35 Improving the Performance of PM Wind Turbine Generator by Minimizing the Detent Torque Using Finite Element Method
Jayasankar.K.C, Dr. Rajashekhara
445-448
36 A REVIEW ON MICROPROCESSOR AND MICROPROCESSOR SPECIFICATION
Anup A Pachghare, G.K.Andurkar,Amruta M. Kulkarni
449-454
37 AUTOMATED TOLLPLAZA SYSTEM USING RFID
Sachin Bhosale,Dnyaneshwar Natha Wavhal
455-460
38 A Survey Report for Design of FIR Filter with different method
Atul Bhargava
461-465
39 Task level Analysis of Risks within Software Engineering Projects using Graph Theory
Quist-Aphetsi Kester
466-472
40 Spatial and Temporal Aspects of Evapotranspiration in Tanjung Karang Paddy Field, Peninsular Malaysia
A.S. Abdullahi, D. Ahmad, M.S.M. Amin, W. Aimrun
473-479
41 A Survey on Use of Cloud Computing in various Fields
Manoj Chopra, Jai Mungi, Kulbhushan Chopra
480-488
42 Network Traffic Monitoring, Analysis and Anomaly Detection
Himanshu Kumar, Sunil Kumar Shrinarayan Singh, Ajay Kumar, 4Remya Joseph, Sudhanshu Kumar, Praveen Kumar
489-496
43 Analyzing the Impact of Coupling Intensity on Software’s Future Attack Surface in Object Oriented Design
Pankaj Pandey, Prof. Niket Bhargava
497-500
44 A SURVEY ON VARIOUS MEDICAL IMAGE COMPRESSION TECHNIQUES
Neelesh Kumar Sahu,Chandrashekhar Kamargaonkar
501-506