S.No. |
Title and Authors of Paper |
Page.No. |
1 |
MULTI LAYER INTRUSION DETECTION AND PREVENTION IN WSNs USING SELF HEALING MODULE
M. VIDHYA, V. SRINIVASAN, R.SUDHA |
424-429 |
2 |
Simulation & Performence Analysis Of HVDC Multigrid Transmission System Using Statcom
Satya Prakash, Roshan Nayak |
430-434 |
3 |
Compensated Power through Unified Power Flow Controller
Dilip Kushwah, Ramdas Yadav |
435-438 |
4 |
Performance Analysis of Energy Utilization in Static and Mobility Relaying in WSN
S.Girija, Mr.S.Arunmozhi, Mr.S.Anbazhagan |
439-443 |
5 |
Veteran resolution tocontrol hiring and assimilation retards
Tulasi Krishna KumarKandhati, K. Sai Chandu, Y.Thejaswi |
444-450 |
6 |
DEVELOPMENT OF CASCADE FULL- BRIDGE INVERTER WITH VARIOUS PWM TECHNIQUES
M.Kaleeswari, S.Vijayabaskar |
451-457 |
7 |
AN EFFICIENT TEXT HIDING APPROACH FOR H.264/AVC VIDEO
Harishma S, T.K.Parani |
458-463 |
8 |
Hand Gesture Recognition for Sign Language Recognition: A Review
Pratibha Pandey, Vinay Jain |
464-470 |
9 |
Investigation of Mechanical Properties and Grain Structure of Titanium BT20 Alloys under Precisely Controlled Annealed Conditions
Sanal Antony, Rijo Tony, George Thomas, Arun Shankar A, Jobin K Jose, Sivadasaniyan T.S |
471-474 |
10 |
Industrial Area Mapping using High Resolution Satellite data: Sahaspur Block in Dehradun District (Uttarakhand) India
Satyawan, Manjit Singh, Saroj, Savita, Sushma Gairola |
475-478 |
11 |
Floating Captcha Security Technique for authentication
Laiji George |
479-482 |
12 |
Cloud Computing: PCI DSS Requirements for Compliance
Sangana kotireddy, Rajashekar MB, Priyadarshan.P |
483-487 |
13 |
DESIGNING SOP FOR HIGH PRESSURE DIE CASTING BY RISK ASSESSMENT TECHNIQUE
K.VIGNESH, P.DHIRAVIDAMANI |
488-491 |
14 |
Human Detection Robot using PIR Sensors
Saravana Kumar K, Priscilla P, Germiya K Jose, Balagopal G |
492-496 |
15 |
EMBEDDING OF MEDICAL DATA IN DIGITAL MRI IMAGE
Mrs.SamataR. Bhosale |
497-504 |
16 |
VIDEO WATERMARKING ALGORITHM FOR CONTENT AUTHORISATION
V.Rajendhiran, J.Elavanthan, M.Vengadapathiraj, R.Vinothkumar, Dr.M.Saravanan |
505-509 |
17 |
EXPLORATION OF SYBIL ATTACK REVELATION METHODS FOR PROTECTED DATA COMMUNICATION IN MOBILE NETWORK
V.Rajendhiran, M.Vengadapathiraj, K.Rajkumar, M.Malarvizhi, Dr.M.Saravanan |
510-513 |
18 |
A Survey on Accountability of Data usage in Cloud Computing
Nitin P. Doiphode, Prof. H. P. Channe |
514-516 |
19 |
A Survey on Aspect based Opinion Mining
Pooja A. Rangari , Prof. Kalyani C. Waghmare |
517-520 |
20 |
Survey onFiltration of Unwanted Messages from OSN Using Customizable Filtering Rules
Dhivya S, Kalaivani J |
521-523 |
21 |
Enabling Protection and Well-Organized MRSE over Encrypted Cloud Data Using CP-ABE
Revathy B.D, Tejaswini .B |
524-528 |
22 |
Real Time Industrial Colour Shape And Size Detection System Using Single Board
Geda.Karthik Kumar and S.Kayalvizhi |
529-533 |
23 |
SURVEY ON DATA WAREHOUSE REPORT VISUALIZATION USING CODE APPROACH
Soundarya S, Nancy Nightingale C |
534-536 |
24 |
SURVEY ON RICE DISEASES CLASSIFICATION BASED ON FERMI ENERGY AND DISTANCE REGULARIZED LEVEL SET EVOLUTION
Preeti.T, Hemalatha.P |
537-542 |
25 |
ECG Signal Compression Technique based on DWT & QRS Complex Estimation
Pragati S. Kharate, Ruchika D. Raghorte, Sakshi B. Gabhane, Samrudhi R. Khasare, Komal D. Nikhar, Priyanka Chauke, Miss. Nilu Mishra |
543-548 |
26 |
SPACE DETECTING ROBOT USING ULTRASONIC SENSOR
P. VENKATESAN, V.SUGANTHI |
549-554 |
27 |
Survey on Secured Proxy Based Distributed Data Storage in Public Cloud Database
NasrinBanu A, Sindhuja K, Mrs Suganthi V |
555-558 |
28 |
Detection of Outliers in Data Stream Using Clustering Method
SREEVIDYA S S |
559-563 |
29 |
A Survey on Online Shopping Recommendation Based on Customer Transactions
Priya Kathirvel, Jeba Moses T |
564-566 |
30 |
GPS-Directed TED Smart Agri Bot (G-SAB)
Bala Kumar L, Joyal Isac S, Kaviya G |
567-571 |
31 |
Survey On Detection Of Low Rate Denial Of Service Attack
Sujatha P, Kalaivani J |
572-576 |
32 |
AUTOMATIC RAIN WATER AND CROP SAVING SYSTEM USING EMBEDDED TECHNOLOGY
R.Balathandapani, D.Boopathi, S.Jotheeshwaran, G.Arundeva, C.Saranya |
577-580 |
33 |
SPYGUARD USING RFID
Ankita Ramrao Patil, Khushboo Vijay Rane, Bharat Deore |
581-584 |
34 |
A Survey on Interactive E-learning Environment Using Animated Avatars
A.Krithika, T.JebaMoses |
585-588 |
35 |
Application of Super Capacitor Energy Storage in Microgrid System
Mr.Prashant Gorakhnath. Patil, Asst. Prof. Kotha Venkateshwarlu, Mr. Mohan Tukaram Pate |
589-594 |
36 |
Non-genetic influences on growth performance of a population of farm-bred New Zealand White rabbits
M. Sakthivel, D. Balasubramanyam, H. Gopi, P. Kumarasamy, A. Raja and R. Anilkumar |
595-598 |
37 |
THERMODYNAMIC ANALYSIS OF A DOMESTIC REFRIGERATOR USING R290 AS AN ALTERNATIVE TO R134a
S.S.Dhanaprabhu, V.Murugan, R.Saravanakumar and V.Deepak |
599-605 |
38 |
Time Optimization for Resource-Constrained Project Scheduling Using Meta-heuristic Approach
Malvika.Rajeevan, R.Nagavinothini |
606-609 |
39 |
Calculation of Aerodynamic Characteristics of NACA 2415, 23012, 23015 Airfoils Using Computational Fluid Dynamics (CFD)
Himanshu Parashar |
610-614 |
40 |
DESIGN OF HIGH SPEED 128X 128 BIT VEDIC MULTIPLIER USING HIGH SPEED ADDER
Vengadapathiraj.M, Rajendhiran.V, Gururaj.M, Vinoth Kannan.A, Gomathi.R |
615-619 |
41 |
A RAIN PIXEL RESTORATION ALGORITHM FOR VIDEOS WITH DYNAMIC SCENES
V.Sridevi, P.Malarvizhi, P.Mathivannan |
620-624 |
|
Remaining Paper will be available soon… |
|