Volume-2 Issue-3, February 2013

  • Version
  • Download 71
  • File Size 4.00 KB
  • Create Date February 28, 2013
  • .

Volume-2 Issue-3, February 2013, ISSN: 2278-3075 (Online)
Published By: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP)

An Approach to Find the Stresses Induced in a Flat Belt during Half Rotation of a Driving Pulley
Shrikant A. Thote1, M. K. Sonpimple2, G. D. Mehta3


A Holistic Mobile Security Framework for Nigeria
Fidelis C. Obodoeze1, Francis A. Okoye2, Calister N. Mba3, Samuel C. Asogwa4, Frank E. Ozioko5


Capacitance determination of a Vertical Parallel Junction Solar Cell under Multispectral Illumination in Steady State
Ali Hamidou1, Amadou Diao2, Séré Ahmed Douani3, ali Moissi4, Moustapha Thiame5, Fabé Idrissa Barro6, Grégoire Sissoko7


GUI Based Power System Simulation Tool
K. Suryasen1, Harish A.2


Cascaded Multilevel Inverter for PV Cell Application using PIC Microcontroller
V. Srimaheswaran1, R. Uthirasamy2


Design and Development of Mobile Campus, an Android based Mobile Application for University Campus Tour Guide
Sagnik Bhattacharya1, M. B. Panbu2


Preliminary Results – Hyperspectral Image Analysis for Dolomite Identification in Tarbela Dam Region of Pakistan
Jibran Khan


Distributed Database using Randomized Response Technique in FP Tree Algorithm
Jyotirmayee Rautaray1, Raghvendra Kumar2


A Novel Game Theoretic Approach for Cluster Head Selection in WSN
Sudakshina Dasgupta1, Paramartha Dutta2


High Performance Computation Through Slicing and Value Replacement with CCDD Approach
Deepti Tak1, Shalini Rajawat2, Vijay Singh Rathore3


Situation Analysis of Engineering Institutions for Interactive & Collaborative Web-based e-Learning: Case of Bangladesh
Md. Abu Raihan1, Seung Lock Han2


Survey on Efficient and Forward Secure Schemes for Unattended WSNs
Shibin D.1, Blessed Prince P.2


Anomaly Detections in Internet traffic using Empirical Measures
A. S. Syed Navaz1, S. Gopalakrishnan2, R. Meena3


Survey of Insurance Fraud Detection using Data Mining Techniques
H. Lookman Sithic1, T. Balasubramanian2


PCA-based Finger Movement and Grasping Classification using Data Glove “Glove MAP”
Nazrul H. Adnan1, Khairunizam wan2, Shariman Ab3, Juliana A. Abu Bakar4, Azri A. Aziz5


A Cost-Benefit Model for an Enterprise Information Security
Kiran Kumar Kommineni1, Adimulam Yesu Babu2


Lost of Pixel Recovery in Colored Images using Neural Network
Lakhwinder Kaur1, Tejinder Thind2


A Study on Edge Detection Techniques for Natural Image Segmentation
Saiful Islam1, Majidul Ahmed2


Image Quality Assessment for Partial Encryption using Modified Cyclic Bit Manipulation
Parameshachari B. D.1, K. M. Sunjiv Soyjaudah2, Sumithra Devi K. A.3


Study on Cryptanalysis of the Tiny Encryption Algorithm
Rajashekarappa1, K. M. Sunjiv Soyjaudah2, Sumithra Devi K. A.3


Destructive Strength Properties of Recycled Coarse Aggregate
Chetna M Vyas1, Darshana R. Bhatt2


Effective Thermal Conductivity of Polymer Composites using Local Fractal Techniques
Rajpal Singh Bhoopal1, Pradeep Kumar Sharma2, Ramvir Singh3, Sajjan Kumar4


Durability of Concrete with Partial Replacement of Cement by Paper Industry Waste (Hypo Sludge)
Jayesh Kumar Pitroda1, L. B. Zala2, F. S. Umrigar3


Pozzocrete: Modern Material Partially Replaced with Cement in Mortar
Rushabh A. Shah1, Jayeshkumar Pitroda2


The Online Home Security System: Ways to Protect Home from Intruders & Thefts
Pallavi S. Bangare1, Ashwini Pote2, Sunil L. Bangare3, Pooja Kurhekar4, Dhanraj Patil5


DSP Based Performance Improvement for Horizontal Axis Wind Turbine Generator Model
B. Santhosh Vino1, Dheepak Mohanraj2, G. Gurumoorthy3


Smoothing the Performance of Hybrid System Output Power using Fuzzy Wavelet Transform
S. Thangamari1, M. S. Jayakumar2


Rebalancing the IT Equation with Cloud Computing to Drive Business Agility
Yuvraj Singh Gurjar1, Vijay Singh Rathore2


Stand – Alone Wind Energy Supply System using Permanent Magnet Synchronous Generator
Udhayakumar P.1, Saravanan C.2, Lydia M.3


Dynamic Carpooling Application Development on Android Platform
Deepak B. Nagare1, Kishor L. More2, Nitin S. Tanwar3, S. S. Kulkarni4, Kalyan C. Gunda5


Selection of Web Services Based on Provider’s Reputation
M. Mohemmed Sha1, K. Vivekanandan2


Advanced Speech Compression VIA Voice Excited Linear Predictive Coding using Discrete Cosine Transform (DCT)
Nikhil Sharma1, Niharika Mehta2


Determination of Sulphydryl and Disulphide Groups in Lysozyme
Harikrishna Yadav. Nanganuru1, Enzo Polambo2


Free Convection MHD Flow Past a Vertical Plate with Constant Suction
Dinesh Verma1, Monika Kalra2


Design and Development of an Innovative Mobile Fish Vending Unit for Retailers
Bikash Sarkar1, B. B. Sahu2, B. C. Mohapatra3, N. K. Barik4, D. Majhi5, P. Jayasankar6, P. R. Bhatnagar7


Stress Distribution Analysis of the Kaolinite Layer at the Kaolinite –Geotextile
Arvind Dewangan1, D. P. Gupta2, R. K. Bakshi3, Ram K. Manchiryal4


Background Subtraction Techniques-Review
Bharti1, Tejinder Thind2


Design and Develop a Honeypot for Small Scale Organization
Gurleen Singh1, Sakshi Sharma2, Prabhdeep Singh3


Security Enhancing of a LAN Network using Hardening Technique
Sakshi Sharma1, Gurleen Singh2, Prabhdeep Singh3


Evaluation of Groundwater for Irrigational Purposes in Cumbum Valley Theni District Tamil Nadu India
R. Ayyandurai1, M. Suresh2, S. Venkateswaran3


FPGA Implementation of Efficient Hardware for the Advanced Encryption Standard
Amandeep Kaur1, Puneet Bhardwaj2, Naveen Kumar3


Geochemical Studies in Edapatty Puthur Village, Salem District, Tamil Nadu, India
P. Palpandian3, R. Jayagopal2


Computational and Experimental Study for Rational Design of Proteins
Devajit Mahanta1, Prabodh Sarmah2, Gautam Kr. Handique3


Benthic Diatoms in River Influenced by Urban Pollution, Bhavani Region, Cauvery River, South India
R.Venkatachalapathy1, P. Karthikeyan2


Hamming Distance Polygram Substitution Algorithm for Coding Optimization & Security
Atul S. Joshi1, P. R. Deshmukh2


Generating More Reusable Components while Development: A Technique
Navneet Kaur1, Ashima Singh2


Hypervisor: A Survey on Concepts and Taxonomy
Ankita Desai1, Rachana Oza2, Pratik Sharma3, Bhautik Patel4


Dynamic Data Aggregation Tree for Data Gathering in Wireless Sensor Network
Deepali Virmani1, Gargi Mandal2, Nidhi Beniwal3, Saloni Talwar4


Development of Battery Charge/Discharge Regulator for Photovoltaic Systems
Dianguina Diarisso1, Mamadou Saliou Diallo2, Amadou Diao3, Ousmane Sow4, Idrissa Gaye5, Fabé Idrissa Barro6, Grégoire Sissoko7


Automatic Fragmentation and Storage of Code in Component Repository w.r.t their Input and Output Interfaces: A Tool
Pankaj Vohra1, Ashima Singh2