S.No. |
Title and Authors of Paper |
Page.No. |
1 |
Dual U-Shape Microstrip Patch Antenna Design for WiMAX Applications
Md. Amirul Islam, Sohag Kumar Saha, Md. Masudur Rahman |
231-234 |
2 |
Analysis of Depth of Penetration and Bead Width of Shielded Metal Arc Weld under Magnetic Field Applying Artificial Neural Networks
R. P. Singh, R. C. Gupta, S. C. Sarkar |
235-242 |
3 |
A SURVEY OF CLUSTERING OF PARTITONED DATA IN A DISTRIBUTED NETWORK
S.Harippriya, Prof.T.Kalaikumaran, Dr.S.Karthik |
243-245 |
4 |
Radiation and Mass Transfer Effects on MHD Mixed Convection Flow from a Vertical Surface with Ohmic heating in the Presence of Chemical reaction
Damala Ch Kesavaiah, A Sudhakaraiah, P V Satyanarayana, S Venkataramana |
246-255 |
5 |
A SURVEY ON LOSSLESS DICTIONARY BASED DATA COMPRESSION ALGORITHMS
NISHAD PM, Dr. R.Manicka Chezian |
256-261 |
6 |
Trends in the Development of Engineering Technologies for Sugarcane and Sugar Production in Nigeria
A. Gbabo, S.M. Dauda |
262-270 |
7 |
Removal of Cobalt (II) from Aqueous Solutions by Adsorption on Low cost activated carbon
R.PRABAKARAN, S.ARIVOLI |
271-283 |
8 |
Comparison between BBO and Genetic Algorithm
Mittu Mittal, Gagandeep |
284-293 |
9 |
A New Evolutionary Algorithm developed for Global Optimization (BBO)
Mittu Mittal, Gagandeep |
294-299 |
10 |
A Novel Approach to Reduce the Packet Pollution in Large Scale Network
S.Stewart Kirubakaran, D.Prabakar, Dr.S.Karthik |
300-303 |
11 |
ZIGBEE BASED WIRELESS PATIENT MONITORING
Ms. Amruta Nagarkar,Prof.M.N.Kakatkar |
304-308 |
12 |
Design and Fabrication of Portable Solar fryer and its comparative analysis with SK-14
Vikas Kumar, A.Pradeep Reddy, Anuprasad SG |
309-313 |
13 |
A Survey on: Resource Consumption Index of Denial of Service Attack in MANET
Pranita Joshi,Gajendra Singh Chandel,Shubham Joshi |
314-318 |
14 |
A Comparative analysis of orthogonal space time block code with trellis coded modulation over Rayleigh and Rician fading channel
SACHIN CHOURASIA, DR. PRABHAT PATEL |
319-324 |
15 |
An Effective Repeated Rule Acquisition Using Rule Ontology from Similar Web Sites based on Genetic Algorithm
G.Senthil Kumar, K.K.Kanaga Mathan Mohan |
325-329 |
16 |
Reusability concept using an “M” Component Based Model
Dr. Manju Kaushik |
330-335 |
18 |
Survey of Image Denoising using Different Filters
Govindaraj.V, Sengottaiyan.G |
344-351 |
19 |
A STUDY ON LOCATION VERIFICATION AND ROUTING STRATEGY FOR VANET
B.Anuradha, D.Gowtham Chakaravarthy |
352-358 |
20 |
Simulation and Analysis of PWM Inverter Fed Induction Motor Drive
C.S.Sharma, Tali Nagwani |
359-366 |
21 |
Design and Implementation of an Unmanned Vehicle using a GSM Network with Microcontrollers
Sourangsu Banerji |
367-374 |
22 |
Localized Routing and Cluster Technique in Mobile Adhoc Networks
Udaya Kumar. N,Suresh.S |
375-379 |
24 |
Cargo Loading Using Dynamic Programming and Comparative Software Study
Tom Jose V, Sijo M T, Praveen |
386-389 |
25 |
Hierarchical-Edge based Torus Automorphism for Digital Watermarking
G.Rosline Nesa Kumari, Dr.S.Maruthuperumal, Dr.V.Vijayakumar |
390-395 |
26 |
Implementation of JIT in industries- A Case Study
Tom Jose V, Sijo M T, Praveen |
396-399 |
27 |
A Survey On Web Search Result Clustering And Engines
Poonam B.Lohiya |
400-405 |
28 |
Industrial Safety and Accident Prevention; A Managerial Approach
Tom Jose V, Sijo M T, Praveen |
406-410 |
29 |
BRAND LOYALTY: A MULTI-DIMENSIONAL CONCEPT
Rajni Arora |
411-417 |
30 |
New Approach of Dynamic Web Components Composition using Cache Proxy Servers
U.Sridhar, Dr.G.Gunasekaran, P.Rajesh |
418-423 |
31 |
An Extensive Single-path Communication Scheme for Submerged Sensor Networks
Saran Thampy D |
424-428 |
32 |
SUSPICIOUS MOTION DETECTION IN SURVEILLANCE VIDEO
V.Padmavathi,Dr.M.Kalaiselvi Geetha |
429-434 |
33 |
5G WIRELESS TECHNOLOGIES-Still 4G auction not over, but time to start talking 5G
Ms. Neha Dumbre, Ms. Monali Patwa, Ms. Kajal Patwa |
435-440 |
34 |
Homography Estimation Techniques in Image Correction Using Points and Line With Known Epipolar Geometry
Mr. Devvrat Yadav, Mr. Shashikant Agrawal |
441-444 |
35 |
Improving the Performance of PM Wind Turbine Generator by Minimizing the Detent Torque Using Finite Element Method
Jayasankar.K.C, Dr. Rajashekhara |
445-448 |
36 |
A REVIEW ON MICROPROCESSOR AND MICROPROCESSOR SPECIFICATION
Anup A Pachghare, G.K.Andurkar,Amruta M. Kulkarni |
449-454 |
37 |
AUTOMATED TOLLPLAZA SYSTEM USING RFID
Sachin Bhosale,Dnyaneshwar Natha Wavhal |
455-460 |
38 |
A Survey Report for Design of FIR Filter with different method
Atul Bhargava |
461-465 |
39 |
Task level Analysis of Risks within Software Engineering Projects using Graph Theory
Quist-Aphetsi Kester |
466-472 |
40 |
Spatial and Temporal Aspects of Evapotranspiration in Tanjung Karang Paddy Field, Peninsular Malaysia
A.S. Abdullahi, D. Ahmad, M.S.M. Amin, W. Aimrun |
473-479 |
41 |
A Survey on Use of Cloud Computing in various Fields
Manoj Chopra, Jai Mungi, Kulbhushan Chopra |
480-488 |
42 |
Network Traffic Monitoring, Analysis and Anomaly Detection
Himanshu Kumar, Sunil Kumar Shrinarayan Singh, Ajay Kumar, 4Remya Joseph, Sudhanshu Kumar, Praveen Kumar |
489-496 |
43 |
Analyzing the Impact of Coupling Intensity on Software’s Future Attack Surface in Object Oriented Design
Pankaj Pandey, Prof. Niket Bhargava |
497-500 |
44 |
A SURVEY ON VARIOUS MEDICAL IMAGE COMPRESSION TECHNIQUES
Neelesh Kumar Sahu,Chandrashekhar Kamargaonkar |
501-506 |