1. |
A Comparative Study on Quantum Pushdown
Automata, Turing Machine and Quantum
Turing Machine
Pages : 2932 - 2935
TANISTHA NAYAK, TIRTHARAJ DASH
Abstract | PDF |
2. |
Bandwidth Improvement of a Left Arm Shorter U - Slot Micro Strip Antenna
Pages : 2936 - 2939
Lakhan Singh, Rajesh Kumar Verma and D.C. Dhubkarya
Abstract | PDF |
3. |
Using Contextual Inquiry as a subset of
Requirement Gathering Process
Pages : 2940 - 2942
Rajesh Kulkarni, Dr.P.Padmanabham
Abstract | PDF |
4. |
Clustering Technique in Data Mining for Text
Documents
Pages : 2943-2947
J.Sathya Priya and S.Priyadharshini
Abstract | PDF |
5. |
Intrusion Detection Technique -A Review
Pages : 2948 - 2956
Abstract | PDF |
6. |
Highly Accelerated Advanced Multiplier Design for
An Efficient Bandwidth Utilized FFT Computation
Pages : 2957 - 2963
M.Sahithi,Naseema Shaik, A.Jhansi Rani,J.Poornima,M.Jyothi and K.Purnima
Abstract | PDF |
7. |
Design of Modified Shannon Based Full Adder Cell
Using PTL Logic for Low Power Applications
Pages : 2964 - 2968
K.Purnima, S.AdiLakshmi, M.Sahithi, A.Jhansi Rani and J.Poornima
Abstract | PDF |
8. |
Simulation Result of Hybrid Routing Protocol
for Mobile Ad hoc Network
Pages : 2969 - 2974
Makarand R. Shahade and D. N. Choudhari
Abstract | PDF |
9. |
Development of Artificial Intelligent Model For Reduction Of Noise From
Biomedical Signal
Pages : 2975 - 2977
R.J.Gajbe and Dr. Y.B.Gandole
Abstract | PDF |
10. |
Disclosure Control of Sensitve Information from OLAP Query Results
Pages : 2978 - 2981
P.Kamakshi and A.Vinaya Babu
Abstract | PDF |
11. |
High Speed and Low Power Dynamic Latched
Comparator for PTL Circuit Applications
Pages : 2982 - 2991
N. Naga Sudha, V. Narasimha Nayak, Suneel Mudunuru,M. Nagesh Babu,B.K.V Prasad, M. Jyothi
Abstract | PDF |
12. |
Autonomous Network Security using Unsupervised Detection of Network Attacks
Pages : 2992 - 2995
Pragati H. Chandankhede and Sonali U. Nimbhorkar
Abstract | PDF |
13. |
Clustering technique to interpret
Numerical Weather Prediction output products for
forecast of Cloudburst
Pages : 2996 - 2999
Kavita Pabreja
Abstract | PDF |
14. |
Latest Trends in Wireless Mobile Communication
(3G to 4G Technologies)
Pages : 3000 - 3005
B.KiranKumar, R.VishnuMurthy, Kondapalli BalaKrishna
Abstract | PDF |
15. |
Pondering of agent technologies in road transportation
system and their critical issues
Pages : 3006 - 3011
V.Divya, M.Hema Madhuri, Movva N.V Kiran Babu
Abstract | PDF |
16. |
Analysis of Temperature and Humidity Data
for Future value prediction
Pages : 3012 - 3014
Badhiye S. S., Wakode B. V., Chatur P. N
Abstract | PDF |
17. |
A Generalized Framework for Building Scalable
Load Balancing Architectures in the Cloud
Pages : 3015 - 3021
Illa Pavan Kumar, Subrahmanyam Kodukula
Abstract | PDF |
18. |
Comparison study between Traditional and Object-
Oriented Approaches to Develop all projects in
Software Engineering
Pages : 3022 - 3028
Nabil Mohammed Ali Munassar and A. Govardhan
Abstract | PDF |
19. |
Component-Based Software Development with
Component Technologies: An Overview
Pages : 3029 - 3036
Jawwad Wasat Shareef, Rajesh Kumar Pandey
Abstract | PDF |
20. |
Geometric Invariant Digital Image
Watermarking Techniques for QR code
Pages : 3037 - 3041
Lakshmi Chetana Vemuri, Gogineni Krishna Chaitanya and Narasimham
Abstract | PDF |
21. |
Searching Images Segmented from Search Engine
database using sophisticated QIMERA method of
Algorithm
Pages :3042 - 3046
P.Daniel Ratna Raju, G.Neelima
Abstract | PDF |
22. |
Secure and Scalable Multicasting Services
in Wireless Mesh Networks
Pages : 3047 - 3052
B Tejaswi S . Sivanageswara Rao, S. Gopi Krishna and Y. K. Sundara Krishna
Abstract | PDF |
23. |
Secure Optimized Link State Routing Protocol for Ad-Hoc Networks
Pages : 3053 - 3058
Priyanka A. Hajare, Pritish A. Tijare
Abstract | PDF |
24. |
Smart Card Fraud Prevention Scheme Using
Fingerprinting Authentication
Pages : 3059 - 3062
Jayesh Gaurav, Sanjive Tyagi, Dr Jayanthi Ranjan
Abstract | PDF |
25. |
The Fault Management System Using Amazon
EC2: Web Application Deployment on Cloud
Pages : 3063 - 3067
K Raja Sekhar, Sarat Chalamalsetty, Prahasith Katuri and Varun Jajam
Abstract | PDF |
26. |
Undecryptable Encryption against Network and Forensic Attack
Pages : 3068 - 3072
Raana Syeda, S . U . Nimbhorkar
Abstract | PDF |
27. |
Web Usage Mining Using Neiural Network Approach: A Critical Review
Pages : 3073 - 3077
Vaishali A.Zilpe, Dr. Mohammad Atique
Abstract | PDF |
28. |
A New Multiresolution Algorithm for Image
Segmentation
Pages : 3078 - 3084
David Solomon Raju Y, Krishna Reddy D
Abstract | PDF |
29. |
A study of comparison of Network Simulator -3 and
Network Simulator -2
Pages : 3085 - 3092
Rachna Chaudhary, Shweta Sethi, Rita Keshari, Sakshi Goel
Abstract | PDF |
30. |
Stagnant Memory and Timing investigation
of Embedded Systems Code
Pages : 3093 - 3098
M.Shankar, Dr.M.Sridar, Dr.M.Rajani
Abstract | PDF |
31. |
Automated Green House Management Using
GMS Modem
Pages : 3099 - 3102
Sumit A. Khandelwal
Abstract | PDF |
32. |
Performance Analysis of Matrix Multiplication
Algorithms Using MPI
Pages : 3103 - 3106
Javed Ali ,Rafiqul Zaman Khan
Abstract | PDF |
33. |
Integrating Logic Analyzer Functionality into
VHDL designs
Pages : 3107 - 3111
S.Adilakshmi, K.Rajasekhar, T.B.K.Manoj kumar
Abstract | PDF |
34. |
Deriving Serial and Parallel Spikes Data in
Neural Science Using Data Mining Techniques
Pages : 3112 - 3115
Srinivas Bobba, Jammi Ashok
Abstract | PDF |
35. |
Track and Identify the Human Motion with Alert
Pages : 3116 - 3118
Thota Jeevana Krupa, Prof Koduru Prasada Rao
Abstract | PDF |
36. |
A Modified Feistel Cipher involving a pair
of key matrices,Supplemented with Modular
Arithmetic Addition and Shuffling of the
plaintext in each round of the iteration
process
Pages : 3119 - 3128
V.U.K. Sastry, K. Anup Kumar
Abstract | PDF |
37. |
Emphasizing Requirement Elicitation Process for
Electronic Payment Secured System using VORD
Methodology - A Practical Approach
Pages : 3129 - 3132
Md. Faisa1, Mohammed Hussain
Abstract | PDF |
38. |
A Modified Feistel Cipher Involving a Pair of
Key Matrices, Supplemented with XOR
Operation, and Blending of the Plaintext in each
Round of the Iteration Process
Pages : 3133 - 3141
V.U.K. Sastry, K. Anup Kumar
Abstract | PDF |
39. |
Counter Measure for Congestion in TCP/IP
using Bandwidth Estimation
Pages : 3142 - 3143
S.Priyadharshini,J.Sathya Priya
Abstract | PDF |
40. |
Microstrip Rectangular Patch Antenna :
Computer Aided Design Methology
Pages : 3144-3146
R.D.Kanphade, D.G. Wakade, N.T. Markad
Abstract | PDF |
41. |
Location Based Services on Mobile
E-Commerce
Pages : 3147 - 3151
B. Renuka, Manjula Poojary, B.Ramesh Babu
Abstract | PDF |
42. |
Social Networking:
Innovative Communication Technology
Pages : 3152 - 3156
S.T. Bhosale, B.S. Sawant, S.D. Munde
Abstract | PDF |
43. |
Secured Communication Protocol via Encrypted
Key Ensuring Message Integrity
Pages : 3157 - 3161
Devarakonda John Livingstion, P.Raja Sekhar
Abstract | PDF |
44. |
Analysis and Prevention of Malware in P2P
Pages : 3162 - 3169
Puram.Pradeep Kumar, Naini Shekar Reddy, Saleha Saudagar, T. Puneeth Chandra, Ch. Kishor Kumar
Abstract | PDF |
45. |
Study of Ant Colony Algorithm using Adaptive
Schematization Methodology Based on
Prognosticative Learning
Pages : 3170 - 3175
Arjun Arora, Ashish Pant, R P Arora, Suneet Kumar
Abstract | PDF |
46. |
Privacy Preserving Association Rule Mining in
Horizontally Partitioned Databases Using
Cryptography Techniques
Pages : 3176 - 3182
N V Muthu lakshmi,Dr. K Sandhya Rani
Abstract | PDF |
47. |
A Fine Grained Access Control Model for
Relational Databases
Pages : 3183 - 3186
Neha Sehta, Dr. Suresh Jain
Abstract | PDF |
48. |
Key Distribution Approaches for
Wireless Sensor Networks
Pages : 3187-3190
Ramu kuchipudi, N Md Jubair Basha
Abstract | PDF |
49. |
Enhanced Dynamical Hierarchical Mobile
Internet Protocol for Mobile IP Networks
Pages : 3191 - 3194
U.Thirupathi Rao, Sk.Mastan Vali, P.sankar Rao, Ch.Samba Siva Rao, Krishna Sah, K.V.D.Kiran
Abstract | PDF |
50. |
Analysis and Individualization of Clients concern
based on the Internet Browsing History
Pages : 3195 - 3198
V.Ravindranadhan, P.Sarath, M.Gopi Mahesh, M.Rajasekhar. K.V.D.Kiran
Abstract | PDF |
51. |
GUI Based Data Acquisition System
Using ARM-Cortex M3 Microcontroller
Pages : 3199 - 3204
Patel Hiren, Patel Dipak
Abstract | PDF |
52. |
Novel Approach to Identify Relevant and
Irrelevant Questions Using Text Categorization
Pages : 3205 - 3207
C.M.Nalayini, J.Keerthika
Abstract | PDF |
53. |
Design and Implementation of Pipelined 32-bit
Advanced RISC Processor for Various D.S.P
Applications
Pages : 3208-3213
J.Poornima, G.V.Ganesh, M.jyothi,M.Sahithi,A.jhansi RaniB. Raghu Kanth
Abstract | PDF |
54. |
Implementation of Low Complex and High
Secured SPI Communication System for
Multipurpose Applications
Pages : 3214-3219
M.Jyothi, L.Ravi Chandra, M.Sahithi,A.Jhansi Rani,J.Poornima,N.Naga Sudha
Abstract | PDF |
55. |
Fault Torelant Distributed Intrusion Detection
System Using Advanced Honeypots
Pages : 3220-3224
Akshay Kulkarni, Sujal Raul, Vidhya Suresh
Abstract | PDF |
56. |
A Survey On: Attacks due to SQL injection and
their prevention method for web application
Pages : 3225-3228
Shubham Srivastava
Abstract | PDF |
57. |
Column wise DCT plane sectorization in CBIR
Pages : 3229-3235
H.B.Kekre, Dhirendra Mishra, Chirag Thakkar
Abstract | PDF |
58. |
SCTP over MIPv4 for Multi-homed Mobile Host
Pages : 3236-3240
Surmila Thokchom, Thoudam Doren Singh
Abstract | PDF |
59. |
Cloud Computing Technology for
Effective e-Governance
Pages : 3241-3244
R.Siva Rama Prasad, Veera RaghavaRao Atukuri
Abstract | PDF |
60. |
Exemplar-Based Image Inpainting for
Region Filling & Object Removal
Pages : 3245-3248
Rashmi Bijwe, P. R. Deshmukh
Abstract | PDF |
61. |
Watermarking of 3D Meshes using Matlab
Pages : 3249 - 3254
Deepti Gaidhane, Uzma Ansari
Abstract | PDF |
62. |
Regression Testing Using Coupling and Genetic
Algorithms
Pages : 3255 - 3259
Harsh Bhasin, Manoj
Abstract | PDF |
63. |
Fundamental of Content Based Image
Retrieval
Pages : 3260 - 3263
Ritika Hirwane
Abstract | PDF |
64. |
Sram Cell Static Faults Detection and
Repair Using Memory Bist
Pages : 3264 - 3268
Shaik Moulali, Dr. Fazal Noor Bhasha, B.Srinivas, S.Dayasagar chowdary , P.Srinivas, K. Hari Kishore
Abstract | PDF |
65. |
A Brief Review of Handover schemes in
Wireless communication
Pages : 3269 - 3278
Madhuri R. Pawar, Prof. Santosh Sheshrao Sambare
Abstract | PDF |
66. |
The File Encryption Method in Cryptographic
Key Management Wireless Ad Hoc Networks
Pages : 3279 - 3282
D. Raghu, Munagala. Srinivasa Rao, Ch. Raja Jacub
Abstract | PDF |
67. |
Cloud Network: Integration of Cloud
Computing and Virtualization with Network
Pages : 3283-3286
Puram.Pradeep Kumar, R.Sai Krishna,.Kishor Kumar, Naini.Shekar Reddy, M.Ramesh
Abstract | PDF |
68. |
Implementation of Random Number Generator Using LFSR for High Secured Multi Purpose Applications
Pages : 3283-3286
M.Sahithi, B.MuraliKrishna,M.Jyothi,K.Purnima,A.Jhansi Rani,N.Naga Sudha
Abstract | PDF |
|
|