Volume-4 Issue-2, July 2014

  • Version
  • Download 48
  • File Size 4.00 KB
  • Create Date July 30, 2014
  • .

Volume-4 Issue-2, July 2014, ISSN: 2278-3075 (Online)
Published By: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP)

Preparation of Activated Carbon from the Stem of the Natural Plant Vitex Negundo and Evaluation of Their Physical and Chemical Properties
A. Arun Kumar1, T. Chandra Sekaran2, K. Riaz Ahamed3


Secure Search Engine for Mobile Users for Countering the Attacks over Internet
Mohan Gowda G S1, Janardhan Singh2


Evaluation and Analysis of Active RFID Protocol in Wireless Sensor Networks
Kiranpal Kaur1, Naveen Kumari2


Performance Optimized DCT Domain Watermarking Technique with JPEG
Jyoti Rani1, Tazeem Ahmad Khan2


A Novel Approach to Trustable Data Storage in Cloud Computing
Vegi Srinivas1, V. Valli KumariS2


Arm 7 Based Theft Control, Accident Detection & Vehicle Positioning System
M.S. Joshi1, Deepali V. Mahajan2


Improvement of Network Efficiency by Preventing Black Hole Attack in Manet
Gurnam Singh1, Gursewak Singh2


Design of Op-amp, Comparator and D Flip-Flop for Fifth Order Continuous-Time Sigma-Delta Modulator
Sunita Arvind Rathod1, Siva Yellampalli2


Big Data: Challenges and Opportunities
Anuranjan Misra1, Anshul Sharma2, Preeti Gulia3, Akanksha Bana4


Optimizing Big Data
Anuranjan Misra1, Anshul Sharma2, Preeti Gulia3, Akanksha Bana4


Optimization of Stereolithography Process Parameters for Part Strength using Taguchi Technique
Raju B. S1, Chandra Sekhar U2, Drakshayani D. N3


Impact Toughness of Concrete Reinforcement Bars Produced by the THERMEX Process and Ordinary Rolling Process
Mohammad Sharear Kabir1, Md Moinul Islam2, Md Mohar Ali Bepari3


Use of Overhead Water Tank to Reduce Peak Response of the Structure
Bhosale Dattatray1, G. R. Patil2, Sachin Maskar3


Linear-Quadratic Regulator Control for Human Following Robot in Straight Path
Chetan Naik J1, S. L. Pinjare2, Jharna Majumdar3


Level-Based Data Security Model in Cloud Computing
Kanupriya1, Meenakshi Sharma2


Enhanced Information Security using DNA Cryptographic Approach
Abhishek Majumdar1, Meenakshi Sharma2


A New Approach of Intrusion Detection System with a Combination of Multilevel and Multiagent
Arpita Biswas1, Meenakshi Sharma2


Evaluation of an Energy Efficient Cluster Based Routing in MANET
Jaspinder Singh1, Meenakshi Sharma2


Code Quality Evaluation for Open Source Software System
Ravinder Kaur1, Meenakshi Sharma2, Hardeep Singh3


Frequent Pattern Mining for XML Query-Answering Support
Alfiya Iqbal Ahmed Shaikh1, Sanchika Bajpai2


Performance of Concrete Walls with Waste and Recycling Materials for Industrial Building Systems
Seyed Yaser Mousavi Siamakani1, Abdul Kadir Bin Marsono2, Neelam Memon3, Shariwati Binti Mansor4, Hares Nikookar5