Welcome to Reseach & Development Manager (Member Login )


Research and Development Manager is the innitiative taken by our organization to serve the GENXT Researchers in field of

 

 

 

 Networking, Communication and Software Development and provide with the facility to explore more and more..............

 

 

IJAIR- Volume 2 Issue 5

 

 

 

 

 

   

Sr/ No Title Pdf
1 Aging End product in Iris Biometrics
Dr. Kashif Qureshi
2 DESIGN PORTAL OF A WIRELESS LINKED NAVAL SUBSTATION FOR INTERNATIONAL BOUNDARY SCANNING AND SURVEILLANCE SYSTEM
S.Abirami,M.Abinaya, Mrs.Philomina
3 ANALYSIS OF THE VARIOUS TYPES OF SECURITY ATTACKS ON VISUAL CRYPTOGRAPHY
Ankit Saxena , Abhishek Kumar Mishra
4 Design & implementation of FPGA based digital FIR filter
Ankit Jairath , Prof. Sunil Kumar Shah , Prof. Vinod Kapse
5 DNA Sequence Alignment in Bioinformatics
Archi Kataria, Dr.Amardeep Singh
6 Face detection using Automatic Bootstrapping technique
Bhaskar.S, Mrs.M.Jayasheela
7 Modified Secure Associativity Based Routing
K. Muthumayil, M.Chitty Babu, P.Senthil Kumar
8 Analysis and modeling of pickaxe
Virendra Kumar Nagar, Devendra Kumar
9 AN EFFICIENT DISTRIBUTED SYSTEM FOR PRIVATE INFORMATION RETRIEVAL IN PCLOUD
Durga.R and Nithya.L.M
10 OPTIMISTIC TOWER DEPLOYMENT TECHNIQUES
Gagandeep Mishra , Dr Shweta Rani
11 SECURITY IN WIRELESS SENSOR NETWORKS USING ELLIPTIC CURVE CRYPTOGRAPHY IN ARM 9
Dr.T.P.Saravanabava ,M.Gandhi
12 Internally Selective Jamming Attacks Prevention in Wireless Networks using Packet Hiding Techniques
N. Vijaya Gopal, Dr.V.Srikanth, M. Anil Kumar
13 Trust Model for File Sharing P2P Networks Using Fuzzy Logic
Jaishree S, Dr. Kumaravel A
14 Image Steganography Techniques in Spatial Domain, their Parameters and Analytical Techniques: A Review Article
kamaldeep
15 An Energy efficient optimal Shortest Path Routing for Mobile Ad-hoc Network using Genetic Algorithm
S.LakshmiNarasimman, Dr.A.Kumaravel
16 An Optimal Routing Approach for Improving Energy Efficiency in Wireless Ad-hoc Networks
S.LakshmiNarasimman,Dr.A.Kumaravel
17 Combined Effect of Zinc and Boron with Macronutrients on Growth and Performance in Maize- Blackgram Cropping System 1
M. Naveen Saviour, P. Stalin, S. Mani, P. Muthukrishnan and K. Valliappan
18 OVERVIEW OF LOCATION MANAGEMENT IN CELLULAR NETWORK
Manjit kaur, Jasvir Singh
19 INVESTIGATION ON PROPERTIES OF BAMBOO AS RAINFORCING MATERIAL IN CONCRETE
Tank Mihir P. , Prof. Suhasini M.Kulkarni
20 Extenuating Selective Forwarding Attacks with a Effective Channel-Aware Approach in WMNs
M. Mohan chandra, Dr.V.Srikanth, M. Anil Kumar
21 EFFECT OF CONCURRENT TRAINING ON SELECTED PHYSICAL AND PERFORMANCE RELATED VARIABLES AMONG KABADDI PLAYERS
A.Nagarajan & Dr.R.Kalidasan
22 Novel Scheme of Cryptography Based on Mixed Rule RCA and Dynamic Key Generation
Oinam nickson meetei, Dr.A. Kumaravel
23 A Novel Scheme of Encryption based on Random Rules Reversible Cellular Automata
Oinam nickson meetei, Dr.A. Kumaravel
24 MOBILE USER LOCALIZATION
Palminder Kaur, Dr. Shweta Rani
25 INTERNAL COMPONENTS COMBINATION TO DETECT MICROANEURYSM
Md. Muhid Ahmed, Dr. A Kumaravel
26 Dynamic Load and Bill Prediction using ARIMA Model in Cloud Computing
P.Rajeshwari, P.Sundaramoorthy, Dr.T.Rajendran
27 Condition Survey of the Buildings
R K Sharma, Saiful Islam
28 A survey on image compression Using 2D-DCT algorithms
Sanjeev,Abhilasha Jain
29 Improved 2-D DCT Image Compression Using optimal compressed value
Sanjeev Singla,Abhilasha Jain
30 COLLECTION OF EVENT DISCOVERY FOR VIDEO SURVEILLANCE – A SURVEY
Mr.U.Saravanakumar
31 INCREASED MOBILE COMMUNICATION ENVIRONMENTS FOR GLOBAL MOBILE NETWORKS
G.SREELAKSHMI & G. VENKATESAN
32 QUALITY OF SERVICE FOR GATEWAY RELOCATION IN IEEE 802.16e NETWORKS
SRIDHAR D., MOHAN.K.S
33 Secure Logging Mechanism of Distributed Accountability for Data Sharing
Peela Venkata Ganesh, Peri Srinivasa Rao
34 A New Performance Guarantee Approach for Data Replication in Data Intensive Scientific Applications
Aswadhati Sirisha, M.V.Rajesh
35 Energy Detection Using Min-Max Technique in Uncertain Noise Environment in Cognitive Radio Network
Surendra Kumar Singh , Rekha Gupta
36 A Survey on: User Impulsive Prediction and Mobile Mobility in M-Commerce
Tejal V. Deshmukh , A.M. Bagade
37 VOICE RECOGNITION USING FAST WAVE TRANSFORMATION
Varinderjit Singh, Dr Paramjitsingh
38 Biometrics Role in Evaluation of Attitude of Middle Management in Hotel Sector
Dr.Kashif Qureshi
39 Ecological Upshot in Biometrics
Dr.Kashif Qureshi
40 Face-Gait Biometrics usage in Identity Verification
Dr.Kashif Qureshi
41 Usage Of Keystroke Biometrics with Number-Pad Input
Dr.Kashif Qureshi
42 A MULTIPATH ALGORITHM FOR PREVENTION OF WORMHOLE ATTACK IN MANETs
Ajit Singh, O.S.Khanna, Sukhwinder Pal Singh, Jaspreet Singh
43 An Intelligent Traffic Light Controlled Vehicle Movement Using MIWI Technology For Reducing CO2 Emission
Akshay Joshi, Akshay Kumar, Gagan Deep
44 Routing Misbehavior Detection in MANETs Using an ACK based Scheme
ANNAPURNA VEMPARALA, Mr.VENKATESAN.K.G
45 Micro- Mobility Management Issues and Solution in Next Generation All IP Based Wireless Networks
Prof. Bhagyashri M. Patil , Prof.S.B.Patil
46 To Achieve Group Communication Using Mobility Model Based on Position Information in Manet
BHUVANESHWARI.S, RAJESWARI.M, RAJENDRAN.T
47 Cluster based Image Steganography using Pattern Matching
Chamkor Singh, Gaurav Deep
48 Dynamic Path Selection for Reliable Routing In Mobile Adhoc Network
T.Dhanalakshmi, P.Prema devi, Dr. T.Rajendran
49 Mining the Financial Multi-Relationship with Accurate Models
C.Durka, Kerana Hanirex.D
50 Enabling DUI Systems in Handheld Devices Using Cloud
S. Gowri, T.Gnanaprakasam, T.Rajendran
51 To evaluate the performance of stainless steel fiber in concrete
Mr. Jaimin shah, Ms. Suhasini Kulkarni, Mr. Vilin Parekh
52 A USER CONCEPT MODEL FOR PERSONALIZED INFORMATION GATHERING AND RETRIEVAL
Nageswara Rao.Yarlagadda, Mr.R.Chndrasekaran
53 RESPONSIBILITY OF SLA MANAGER FOR VIOLATION INDICATION IN CLOUD
Naveenkumar.A , Shankar.M, Dr.T.Rajendran
54 GenBank: Implementation Model and Retrieval Techniques
Navreet Kaur
55 Tracing and Pursuing objects in Visual Surveillance System by Modified overlap tracker
NEELIMA K.S,Dr. T.NALINI
56 Efficient Hardware Resource Allocation to Achieve Performance in Multi-tenancy at DBaaS
Padmavathi.S , Selvi.S, Dr.T.Rajendran
57 Performance Analysis of AOFDM Systems
Parvin Shikalgar, S.Subbaraman
58 Data Preprocessing in frequent item-sets of webpage traversals
R.Pradeepa, A.Kumaravel
59 DECISION MAKING SCHEME TO ENSURE POWER AND RESOURCE USAGE FOR SERVICE PROVIDERS
Pradheeba.P,, Jeba.N, Dr. Rajendran. T
60 Double Guard: Detecting SQL Injection Attack in Web Applications
R.Prakash, M.Suguna, Dr.D.Sharmila
61 Comparison And Classification Of Pictures By SOM And Metaclassifiers
M.Priyadharshini, Dr.A.Kumaravel
62 Document and Network clustering with multiview point based similarity measure
Rizvana Parvin, Udhayakumar Pandian
63 Efficient Clustering for Gene Expression Data
K.sathishkumar,M.Ramalingam
64 DESIGN AND ANALYSIS OF FIVE SPEED GEAR BOX WITH ITS DIFFERENTIAL UNIT
T.Gowtham S.Prasanth T.Balamurugan
65 Productivity Index Scale- New Tool for Fish Stocking in Natural Water Bodies
Shivakumar, M
66 A Study of Channel Estimation Techniques Based on Pilot Arrangement in OFDM Systems
Shriram gupta, Praveen sharma
67 Comparison of two Multi-Classification Approaches for Detecting Network Attacks
A.Kumaravel , M.Niraisha
68 Improving prediction of intrusion detection of network attacks by computing clustering & classification.
Niraisha M, C.Anuradha
69 A Novel Approach for Semantic Based Deep Web Classification
M.Sreekrishna, P.Sundaramoorthy, Dr.T.Rajendran
70 Classification by Rules Mining Model with Map- Reduce framework in Cloud
SUJAY BASU , Dr. KUMARAVEL
71 TODV with Fault Tolerance for Quality of Service in Mobile Ad-hoc Networks
Sukhwinder Pal Singh, O.S.Khanna,Ajit Singh,Ritika
72 A Web Based Recommendation Using Association Rule and Clustering
Vidhu Singhal, Gopal Pandey
73 CORRELATION STUDY OF PSYCHOMOTOR PROFILE AND da PERFORMANCE OF UNIVERSITY VOLLEYBALL, BASKETBALL AND HANDBALL MEN PLAYERS IN TAMILNADU
s.narayanan, Dr. S. Prasath
74 COMBINED EFFECT OF YOGIC PRACTICES RESISTANCE AND PLYOMETRIC TRAINING ON SELECTED PHYSIOLOGICAL VARIABLE AMONG VOLLEYBALL PLAYERS
DR.k.chandraseakaran., s.narayanan
75 A Review of Soft Computing Technique to Increase the Accuracy of Software Development Time Estimation
Shina Dhingra, P.S. Mann
76 A Review of Surveys on Estimating Software Development Effort
Shiyna Kumar, Vinay Chopra
77 Study of Image Stitching using various models
Amrita,Nirvair Neeru
78 An Efficient Mining Procedure For Gene Selection By Using Tree Algorithms
S.ANUSUYA, R.KARTHIKEYAN
79 Analysis of a PKI-Based Secure Infrastructure for Mobile E-Commerce
Anirudh Kumar Srivastava, Aasha Singh, Awadhesh Kumar
80 Novel Super Resolution Algorithm based on LPGPCA & Interpolation for Natural Images
RAMEEZ R BELIM , DHARMESH N KHANDHAR
81 FDI PERCEPTION IN RETAIL BUSINESS OF FOOD ITEMS IN THE CAPITAL OF MANIPUR, INDIA.
Dr. N. Tejmani Singh and P. Chinglen Singh
82 Design of Cylindical EBG-PRS Antenna for Enhanced Gain for WiMax Application
Darshankumar D Billur, Shambulingappa K V
83 A STUDY ON DEVELOPMENT OF CAREER IN KNOWLEDGE MANAGEMENT IN IT SECTOR
Dr.N.Shani, P.Divyapriya
84 SECURITY GOALS OF MANETs ALONG WITH RESEARCH CHALLENGES & ISSUES
Rajni Jain, Sohan Garg
85 SENSORLESS ILLUMINATION CONTROL SYSTEM FOR POWER MANAGEMENT AND RFID ATTENDANCE SYSTEM WSN
RAJESHWAR KUMAR SAH, RAJEEV RANJAN, FAZAL AHMAD
86 NEW UNICASTING APPROACH IN DSR PROTOCOL
Harmandeep Kaur, Mandeep kaur, Harjinder Singh, Nikita
87 Study of Salt and Pepper Noise Removal Filters- A Review
Harpreet Singh, Nirvair Neeru
88 Energy Efficient MAC Layer Protocol for Mobile Ad-Hoc Networks
Himanshu M Prajapati , Sagar A. Patel
89 ANTHROPOMETRIC STUDY OF THE 2ND TO 4TH DIGIT RATIO OF THE IGBO NIGERIANS: A RADIOGRAPHIC APPROACH
GWUNIREAMA, I. U. BOB-MANUEL, I. F., YORKUM, L. K. COOKEY, K. P
90 ANTHROPOMETRIC STUDY OF THE AURICULAR DIMENSIONS IN ADOLESCENTS AMONG THE SOUTH-SOUTH NIGERIANS
Gwunireama I.U; Ukoba .O ;Allison T.A and Okezie .E. O.
91 ESTIMATION OF ASSOCIATION MINING TO DETERMINE THE PERFORMANCE OF APRIORI ALGORITHM
P.Kalaiselvi , Dr. C.Nalini
92 CONGESTION AVOIDANCE IN COMPUTER NETWORKS USING FUZZY LOGIC
G.Praneeth Kumar,M.R.Narasinga Rao,A.Ankaiah
93 Enhancing WLAN Performance by Load Balancing Scheme for Quality of Service
Manjit Singh, Omkara Murthy
94 Torque Control of Three Phase Induction Motor Using Intelligent Controller
Mr. A. A. Mohamed Faizal , Prof. Dr. P.Subburaj
95 Bullying in School: Warnings and Solutions
Muhammed Miah, Adnan Omar
96 A Survey on Efficient Audio Watermark Embedding & Extraction DWT Method with Noise Removing Technique
Mr.Munna lal Verma, Prof Miss Lakhwinder Kaur
97 Movie Recommendation using K – Means Clustering and Collaborative filtering Algorithm
S.R.Navneeth, Mr. Arunachalam
98 WIRELESS SMART COUNTING SYSTEM WITH RFID VERIFICATION
ABISHEKRAJ, GNANAPRAKASH, DHANASAKER
99 IMPLEMENTATION OF CAN BUS IN AN AUTONOMOUS ALL-TERRAIN VEHICLE
Likhana Latheef. T Monica Devi, Prathyusha V.S Dr. T. Saravanan
100 TERRITORIAL COLLATERAL SYSTEM FOR INSTITUTION AND PLACES WITH GSM ALERT USING WPAN
PRAVEENBUBBY, MANI MUTHU, KANNAN, RAMKUMAR
101 SURVEY OF DATA MINING AND WAREHOUSING
Prem kumar, Dhanabakyam
102 SA Survey on Bluetooth Security Threats & Solutions
Ms.V.Priya
103 Trust-based Aggregation and Ant Colony Optimization Routing in Wireless Sensor Network
Remya .K , D .Kerana Hanirex
104 Cluster Based Video Steganography Using Pattern Matching
Ritej Gaba, Gaurav Deep
105 RAILWAY TRACK FAILURE INSPECTION AND WARNING SYSTEM USING ZIGBEE AND MEMS
GOPAL KUMAR PANDEY ,CHANDRAMANI DIVEDI ,PRANAV PRABHAKAR , SONU KUMAR GUPTA
106 Efficient Mac Enforcement Approach For Intruders In Commercial Operating System
Mr.J.Satheesh kumar Mr.V.Dinesh
107 INFLUENCES OF GAME-SPECIFIC FIELD TRAINING WITH AND WITHOUT MENTAL PRACTICE STRATEGIES ON SELECTED PHYSICAL FITNESS COMPONENTS PSYCHOLOGICAL AND PERFORMANCE VARIABLES AMONG VOLLEYBALL PLAYERS
C. Sathianarayanamoorthi
108 XML SIMILARITY EVALUATION USING STRUCTURAL AND SEMANTIC SIMILARITY
P.Selvakumar
109 Proxy Based Pre Cluster Model for Detecting Tumor and Lymph Nodes
Sneha.G, Suguna.M, Sharmila.D
110 Feature Based Generic Middleware
V. Subashini , R. Vivadha , J. Madhusudanan
111 Study on induced enrofloxacin toxicity in broiler birds
A. Paul, S. K. Mukhopadhayay, S. Ganguly, S. Pal and D. Niyogi
112 Effect of acute selenium toxicity in broiler birds
D. Kumar, S. K. Mukhopadhayay, S. Ganguly, D. Niyogi, S. Jana and S. Pal
113 A Wireless Sensor for Monitoring Sewerage in Urban Area
Singh Sumit , Bharati Dutta, B.Malti, B.Karthik
114 Monte Carlo Simulation Applied to Stochastic Frontier Production Function in the Parameter Estimation
V. S. Mathu Suresh, Dr. G. Easwara Prasad
115 STUDIES AND REVIEWS ON ENERGYBASED KEYING IN WIRELESS SENSOR NETWORKS
V. Lokeshwari vinya, V. Sreedhar, Sai Sagar N, Eswar Patnala
116 Density-Based Multi feature Background Detraction using K-Means
Udit Narayan Pradhan, Naik Atish Devidas,Ms Prathiba
117 Design and Implementation of Industrial Robot by the use of Embedded Remote Control System
Vaishnavi Sundar,P.J. Hsrini,C.S. Sujai,Mrs.K.Subbulakshmi
118 Falcon Concept Search-Based Automated Service Discovery
R. Gowri , M. Malaimalavathani
119 EFFICIENT POWER CONSUMPTION MANAGEMENT USING PLCC
P.Vidhya, S.Vaishnavi, P.Rubiya, Mrs.K.Subbulakshmi
120 Survey of Reactive Protocols in Ad-hoc Networks
Vishal S. Kore, Shailendra A. Shete, virendra Thoke
121 Sensitivity Character Graph Analysis and its Robustness to Intrusion
K.Yogitha Sri Lakshmi,K.Subrahmanyam,D.Harika
122 Inventory management system for construction
D.Gowtham,B.Veeramallu
123 A Review paper on the survey on honeypot technology
Heena
124 Color Image Quantization using CMYK Model based on Bacteria Foraging Optimization
Heena, Sanjeev Singla
125 ANALYSIS & DESIGN OF DOME USING VBA APPLICATION
Jayanti Dangar, Arpit Parikh
126 EXPLORING DATA ANALYSIS IN PHYSICAL SCIENCE RESEARCH
DR. MCCHESTER ODOH
127 AN EVOLUTION OF INTERNET AS THE NEW BUSINESS ENVIRONMENT
DR. MCCHESTER ODOH
128 Distributed Dynamic Routing Algorithm to Enhance- Security in Wired and Wireless Networks
P Kiran Kumar, G Yedukondalu, R Praveen Kumar
129 EFFECT OF VARIOUS STRENGTH TRAINING PROGRAMMES ON SELECTED PHYSIOLOGICAL AND PERFORMANCE VARIABLES AMONG MALE ATHLETES
M. Arunkumar & Dr.A.Surendar
130 Differential Multidimensional Principal Component Analysis Based Face Recognition System against Light Variation
Tomesh Verma, Raj Kumar Sahu, Deepak Sharma
131 Job Scheduling Algorithm in Windows Grid
Akash Bhatt, Nitin Pandya
132 Design based Object-Oriented Metrics to Measure Coupling and Cohesion
K.G.S.VENKATESAN, M.ELAMURUGASELVAM
133 Implementing Android Application security
Puli Rushyanth
134 Novel Super Resolution Algorithm based on LPGPCA & Interpolation for Natural Images
RAMEEZ R BELIM , DHARMESH N KHANDHAR
135 THE STUDY ON FACTORS AFFECTING KNOWLEDGE MANAGEMENT AND CAREER DEVELOPMENT IN IT SECTOR
Dr.N.Shani, P.Divyapriya