Volume-2 Issue-6, May 2013
- Version
- Download 53
- File Size 4.00 KB
- Create Date May 30, 2013
- .
Volume-2 Issue-6, May 2013, ISSN: 2278-3075 (Online)
Published By: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP)
Dual Modality: Mammogram and Ultrasound Feature Level Fusion for Characterization of Breast Mass
Minavathi1, Murali .S2, Dinesh M. S3
RF Energy Harvesting for Hybrid Application: Review and Analysis
Rajiv Dahiya1, A. K. Arora2, V. R. Singh3
Biosorption of Heavy Metals from Soil by Pseudomonas Aeruginosa
Vinod Nagashetti1, Mahadevaraju. G.K2, T.S. Muralidhar3, Aamir Javed4, Dwijendra Trivedi5, Khum Prasad Bhusal6
Three-Stage 18 level Hybrid Cascaded Multilevel Inverter using a Hybrid Method
Malgireddy Ravi1, Palarapu Sravan Kumar2, Devireddy Sathish3
Simulation of Temperature Field Distribution in Melting TiAl Alloy by PAM Process
Xia Xu1, Hui Chang2, Hongchao Kou3, Zhao Yang4, Jinshan Li5
Performance Evaluation of Zig Bee using Multiple Input Single Output (MISO) Architecture in the Secured Environment
Hari Kumar Choudhari1, Akhilesh A. Waoo2, P. S. Patheja3, Sanjay Sharma4
Integration of Quality Function Deployment and Value Engineering in Furniture Manufacturing Industry for Improvement of Computer Work Station
Chougule Mahadeo Annappa1, Kallurkar Shrikant Panditrao2
Absolute Moment Block Truncation Coding For Color Image Compression
D.Harihara Santosh1, U.V.S. Sitarama Varma2, K.S.K Chaitanya Varma3, Meena Jami4, V.V.N.S Dileep5
Sizing of a Right BLDC Motor for CNC Feed Drive
P.Ram Kishore Kumar Reddy1, P. Nagasekhara Reddy2, M. Ramachandra Rao3
Study of WEBCRAWLING Polices
Anish Gupta1, K. B. Singh2, R. K. Singh3
A Multiple Access Technique for Differential Chaos Shift Keying
Vijay Prakash Singh1, Anubhuti Khare2
Shoreline Changes Using Remote Sensing an Dgisen Vironment: A Case Study of Valinokkam to Thoothukudi Area, Tamil Nadu, India
Muthukumarasamy.R1, Mukesh.M.V2, Tamilselvi. M3, Singarasubramanian.S. R4, Chandrasekaran. A5, Sabeen.H.M6
An Efficient Facial Features Extraction Technique for Face Recognition System Using Local Binary Patterns
C.Nagaraju1, B.Srinu2, E. Srinivasa Rao3
Network Security Design Based on Internet Information System
S. U. Kadam1, P. D. Khawale2
Two of Three Threshold Visual Cryptography in Block Truncation Coding Scheme with Error Diffusion
Puneeth C. N1, Shetty Santosh Kumar2, Sachin R Naik3, Bhaskara Rao N4
Data Warehousing, Data Mining, OLAP and OLTP Technologies Are Essential Elements to Support Decision-Making Process in Industries
S.Saagari1, P. Devi Anusha2, Ch. Lakshmi Priyanka3, V.S.S.N.Sailaja4
An Approach of Bitwise Private-Key Encryption Technique Based on Multiple Operators and Numbers of 0 and 1 Counted From Binary Representation of Plain Text‘s Single Character
Ramkrishna Das1, Saurabh Dutta2
Diagnosis of Alzheimer’s Disease in Brain Images using Pulse Coupled Neural Network
Aiswarya.V.S1, Jemimah Simon2
Evaluation of Strength Characteristics of Concrete Using Crushed Stone Dust as Fine Aggregate
Er. Lakhan Nagpal1, Arvind Dewangan2, Er. Sandeep Dhiman3, Er. Sumit Kumar4
Permeability Behavior of Self Compacting Concrete
Sandeep Dhiman1, Arvind Dewangan2, Er. Lakhan Nagpal3, Sumit Kumar4
EEG Data Sets Signal Processing Using Wavelet Transforms
S. D. Bhagwat1, Vinod Jain2
BECAN: A Bandwidth Efficient Cooperative Authentication Scheme for Wireless Sensor Networks
Nithya Menon1, S.Praveena2
Numerical Characterization of Gene Sequences Based on Chaos Principle
Sunita1, Amrita Priyam2, Parikshit Munda3
Significance of Silica Fume in Enhancing the Quality of Concrete
Sumit Kumar1, Arvind Dewangan2, Lakhan Nagpal3, Sandeep Dhiman4
Design of Variable Pitch Punching Tool
Venkatareddy Chilakala1, Polisetti Lakshmi Manikanta2, Samuel Eda3, Medikonda Girija Prasad4
An Experimental Investigation to Study Energy Absorption Capabilities of Foam Filled Tubes in Oblique Loading Using Taguchi Method
B.D.Deshmukh1, P.W.Ingle2, S.V.Bhaskar3
Modified Back Propagation Algorithm of Feed Forward Networks
Shital Solanki1, H.B.Jethva2
Efficient Load Re Balancing Algorithm for Distributed File Systems
Revathy R1, A.Illayarajaa2
Security Metric for Object Oriented Class Design-Result Analysis
Soham H. Gandhi1, D. R. Anekar2, Mahevash A. Shaikh3, Ajinkya A. Salunkhe4
Design And Implementation of Special Symbol Recognition System using Support Vector Machine
Sanjay S. Gharde1, Vidya A. Nemade2, K. P. Adhiya3
Reliable Testing of Capacitors
Anoosha Movva1, Singavarapu Navya2, Alisha3
Dispatch, Control Strategies and Emissions for Isolated Wind-Diesel Hybrid Power System
Bindu U. Kansara1, B. R. Parekh2
Design and Development of Laminated Aluminum Glass Fiber Drive Shaft for Light Duty Vehicles
M. Arun1, K. Somasundara Vinoth2
Standardization of Inspection Processes Incorporated in a Precision Machining Centre
S. Pratheesh Kumar1, S. R. Devadasan2
Performance Analysis of Multi Level Inverter with DC Link Switches for Renewable Energy Resources
Karthika N1, Sangari A2, Umamaheswari R3
Discovering Patterns to Produce Effective Output through Text Mining using Naïve Bayesian Algorithm
Kavitha Murugeshan1, Neeraj RK2
Flexi Sort Algorithm
Uthaya Vasanthan S1, Karthikeyan B2, Senthil Kumar M3
An Approach of Secured Ecommerce Transaction Model without using Credit or Debit Card
Nilanjan Das1, Ramkrishna Das2
Estimation of Failure Count Data using Confidence Interval
R. Satya Prasad1, V. Goutham2, N. Pawan Kumar3
A Study of Backbone Based Approaches Use for Data Dissemination in Wireless Sensor Network: A Survey
Awadhesh Kumar1, Neeraj Tyagi2, Vinay Kumar3, Prabhat Singh4
Comparison of Harris Detector and Ridge Bifurcation Points in the Process of Fingerprint Registration using Supervised Contactless Biometric System
Tahirou DJara1, Marc Kokou Assogba2, Amine Nait-Ali3, Antoine Vianou4
Energy Efficienct Coal Gasification for IGCC Power Plant
Harsh Rai1, Abhinav Bharti2, Rakesh Singh3, Neeraj Kr. Prasad4
Automation of Business Process by Optimization of Data Extraction and Loading
Mohan G1, Madhu M2
An Improved Hybrid Face Recognition Based on PCA and Subpattern Technique
A.R Kulkarni1, D.S Bormane2
Implementation of Multiplier using Vedic Algorithm
Poornima M1, Shivaraj Kumar Patil2, Shivukumar3, Shridhar K P4, Sanjay H5
Design and Implementation of Low Power 4:1 Multiplexer using Adiabatic Logic
Sarita1, Jyoti Hooda2, Shweta Chawla3
Misben: Reliable and Risk Free Approach of Blocking Misbehaving users in Anonymizing Networks
Nikita L. Vikhar1, G.R.Bamnote2
Secure Image Authentication of a Grayscale Document using Secret Sharing Method and Chaotic Logistic Map with Data Repair Capability
S. Kavitha Murugesan1, Shanavas K. A2
Implementation of an Environment to Analyze Object-Oriented Software and Quality Assurance
Devendrasingh Thakore1, Akhilesh R Upadhyay2
Optimization of Wireless Network MAC Layer Parameters
M A Khan1, Tazeem Ahmad Khan2, M T Beg3
A Framework for Performance Analysis of Computing Clouds
Mintu M. Ladani1,Vinit Kumar Gupta2
Failure of Camshaft
R. V. Wanjari1, T. C. Parshiwanikar2
A Study on WEKA Tool for Data Preprocessing, Classification and Clustering
Swasti Singhal1, Monika Jena2
Partial Replacement of Sand with Quarry Dust in Concrete
Chandana Sukesh1, Katakam Bala Krishna2, P. Sri Lakshmi Sai Teja3, S. Kanakambara Rao4
Medical Image Segmentation using CT Scans-A Level Set Approach
Sajith A. G1, Hariharan S2
Identification of a Person by Palm Geometry using Invariant Features
Himanshu Maurya1, Shikha Maurya2, B. C. Sahana3
Simulation of Quasi Z-Source Converter Based Zero Voltage Electronic Loads
Sivagamasundari1, P. Melba Mary2
A Pixel Based Signature Authentication System
A. Vinoth1, V. Sujathabai2
Alternative Walling System for Low Cost Housing by using Bamboo
Sushil G. Nikam1, A.C. Attar2
OWI-535 EDGE Robotic Arm Control using Electro Myo Gram (EMG) Signals
Shobhitha Ann Job1, R.Jegan2, Melwin Abraham C3
Contrast of Wavelets Order Behavior for Sine Signal
Roopali Goel1, Javed Ahmed2