Welcome to Reseach & Development Manager (Member Login )


Research and Development Manager is the innitiative taken by our organization to serve the GENXT Researchers in field of

 

 

 

 Networking, Communication and Software Development and provide with the facility to explore more and more..............

 

 

IJAIR- Volume 2 Issue 6

 

 

 

   

Sr/ No Title Pdf
1 GRID COMPUTING: An Overview to Architecture and Issues
Gurpinder Singh
2 Survey Paper on Handwritten Devanagari Numeral Recognition
Madhav Goyal, Naresh Kumar Garg
3 Realistic Simulation, Analysis and Result for VANET Using ZigBee Technology
Miss. Mamta A. Ramteke , Prof. Mr. R. K. Krishna
4 Medical Images Compression Techniques
Arshleen , Gagandeep Jindal
5 Testing of Software development by Graphical Interface Tool
Supriya, Dr.Navdeep Kaur
6 AN ENERGY EFFICIENT SECURITY MECHANISM FOR MEDICAL SENSOR NETWORKS
MuthuHariharan.R.M, ThamaraiSelvi.K
7 IMPACT OF CONTRAST TRAINING ON SELECTED PHYSIOLOGICAL AND PERFORMANCE RELATED VARIABLES AMONG KABADDI PLAYERS
A.Nagarajan, Dr.R.Kalidasan
8 Comparison of compression technique for medical application for Dicom CT images
Alka, Gagandeep Jindal
9 MODELING AND SIMULATION OF HYBRID MICROGRID AND ITS COORDINATION CONTROL
PRASAD ANIPIREDDY, PRASAD MODDULURI
10 CONTROL AND INTERFACING OF DFIM-BASED WIND TURBINE GENARATOR UNDER VOLTAGE DIPS WITHOUT CROWBAR PROTECTION
Anala.Siddardha & Mrs.M.Suneetha
11 PLL-AIDED FAULT DETECTION AND FAULT CURRENT LIMITERS FOR FAST PROTECTION OF POWER SYSTEMS
Yepuru Swathi, ch.rajeshkumar
12 A Novel Two Layer Constant Power Control Of 15 DFIG Wind Turbines With Supercapacitor Energy Storage
V.Krishnamurthy , Ch.Rajesh Kumar
13 SATISFYING BOTH DEADLINES AND RESOURCE CONSTRAINTS
Vikash Raikwar, Sanjay Tiwari
14 COLLISION AVOIDANCE IN VANET TO MAINTAIN INTER-VEHICULAR DISTANCE AND ALERTS ON HIGHWAYS
A. Srinivas , DR.V.RAAMA RAJU
15 Sustainable Concrete Alternative Construction Material
Abhinandan R.Gupta, Dr.S.K.Deshmukh
16 Implementation Of Mppt Algorithm For Solar Pv Cell By Comparing Short Circuit Method And Incremental Conductance Method
G.Venkateswarlu , CH.Moghal Babu , Dr.P.Sangameswar Raju
17 Resource Constrained Multi-Project Scheduling using GA - Slack Mode
Siva Vidya.S, Suguna.M, Sharmila.D
18 ANALYSIS OF ACHIEVEMENT MOTIVATION AMONG SOUTH ZONE INTER UNIVERSITY HANDBALL FOOTBALL AND HOCKEY PLAYERS OF MEN IN DIFFERENT STATES
S.Viswanath, K. Mohan, Dr. R. Kalidasan
19 SEMI-AUTOMATIC LOCKING DIFFERENTIAL
Bardade Nitin S. , Gurav Sadashiv D. , Shedage Dinesh A. , Zanwar Mayur S.
20 Effective Energy Efficiency In MAC Protocal
Amit Debnath, Swapan Debbarma
21 Detection and Elimination of Malicious Beacon Nodes in Broadband Based Wireless Networks
Dr.P.Suresh , Jeril Kuriakose , Shekeela N , Ananda Raj. M.D
22 INFLUENCE OF TWELVE WEEKS AEROBIC TRAINING ON SELECTED PHYSIOLOGICAL VARIABLES AMONG BP PATIENTS
Dr.V.Saminathan
23 Tensile strength of As-cast and heat treated Al based hybrid composites
Mallikarjun, M.Sreenivasa Reddy, Biradar Mallikarjun, & Dr.N.G.S Udupa
24 ABE: Attribute-Based Encryption of Encrypted Data in Wireless Sensor Networks
Komali Pradeep Kumar , Ch.Satyananda Reddy
25 Analysis of a PA-UDP Flow Control Protocol for High Speed Data Transfer
R.Srinivasa Rao , G.Nageswara Rao
26 Six Square Cipher Algorithm for a Better Stenography
Mulagapati Durga Devi
27 Analysis of Fast Data Collection in Tree-Based Wireless Sensor Networks
Ch.Harsha Manjari , Ch.Satyananda Reddy
28 A New Web-Mining Technique for Web Information Gathering Based on Personalized Ontology (PO) Model
Andra Vijaya Krishna , A.Mary Sowjanya
29 A New Routing Technique of Weak State Identification in Large Scale Dynamic Networks
K.V.V.Haritha, S.Sowjanya
30 A New Ensuring Technique of Distributed Accountability for Data Sharing in the Cloud
Chaganty Mounika, Sathuluri Sravya
31 Cloud Computing via Parallel Information System supported by Harmonized Resource Appropriation
P.Sivaprakash
32 Various Image Enhancement Techniques- A Survey
Silky Narang, Madan Lal
33 A SURVEY ON THE RISK MANAGEMENT IN PPP PROJECTS
Sanjay Tiwari, Amit Ashish
34 A REVIEW ON CANCELLATION OF PPP PROJECTS IN INDIA
Sanjay Tiwari, Amit Ashish
35 Implementation of Different Operations for Data Transfer by AMBA-Advanced Extensible Interface
Manish A Lakhiyar, Dharmesh Khandhar
36 Comparision Study on methods of software size measure
Nitin M Shivale, Lalit V Patil,S D Joshi
37 Performance Evaluation of DSR, FSR and LAR Routing Protocols in MANETS
SAKE POTHALAIAH, Dr D SRINIVAS RAO
38 Comparison of Various Video Steganography Techniques
Ritej Gaba, Gaurav Deep
39 SOLITUDE SECURITY ADJACENT TO WARMHOLE ATTACKS IN MOBILE AD-HOC NETWORKS
Mr.B.Satheesh kumar , U.Saravanakumar
40 Survey of Transform Domain Digital Image Watermarking
Ms. Nitika Agarwal, Ms. Neha Singh
41 A Study of Knowledge Discovery Requisites for Business Intelligence
Pruthvi R, Panduranga Rao M.V
42 Algorithm for PAPR Reduction using Trimming and Differential Topping in OFDM Systems
D.V.N. Koteswara Rao, T. Prem Kumar, Khaddar Sharif Shaik
43 Background Modeling and Subtraction in Surveillance Application with Security
Kishore Kumar K, Anbu S
44 Categorization of obstructive respiratory disorder on the basis of spirometric tests
Mrs. Sheetal N. Ukunde, Mr Rahul Batra, Mrs .Sukeshini P. Balwir
45 EVALUATING SHORTEST PATH in VANET by USING DIJKASTRA and BELL MANFORD
Shivani, Jaswinder Singh
46 ANALYSIS OF MENTAL TOUGHNESS AMONG UNIVERSITY FIELD HOCKEY PLAYERS
BABU.P., Dr.N.GOPINATH and Dr.A.S.NAGESWARAN
47 High Altitude Platform Using Space-Time Block Coded Spatial modulation
Miteshkumar K. Chaudhari , Kunal M. Pattani
48 Service-Oriented Architecture for Smart Vision Application Based Cloud Environment
Mr. Sachin Darekar, Prof. D.R.Ingle
49 Assessment & Development Centre (ADC): An Innovative HR Practices
Dr.Goutam G. Saha
50 A Review of MANET Networks With Various Routing Protocols along With node Failure issue
Amritpal Singh,Amandeep Kaur
51 Review of Research on Pico Hydro Generation
S.S.Katre. , Dr. D.R.Patil
52 Multi Server Authentication System using PKI and Kerberos
Parvathi R , Shanthi Saravanan, Sankar M
53 Review Article on Various sensor networks with Inter- Node connectivity Failure Issue
Gagandeep singh,Amandeep Kaur
54 Introduction on PHP - Hypertext Preprocessor
Shravan Kumar, Jawahar Kumar, Sagar Kumar
55 PREVENTION OF ONLINE PASSWORD HACKING PROCESS USING PASSWORD HACKING OBSTRUCTIVE PROTOCOL
Dusmant Kumar Sahu,Santosh Kumar, G. Michael
56 SMSSearch: An Enhanced Mobile Searching Application
Manoj Kapil, R.P.Yadav
57 Quintuple Slotted Squares with Circular Disks Structure Amalgamated over RMPA for Enhancement of Variant Parameters for WLAN
BIMAL GARG, ANUPAM DAS
58 BDD and Pre-computation based strategy for Power optimization of a 4-bit Comparator
Satish.Ajjappanavar ,Dr.AnilkumarV.Nandi
59 Fuzzy PID Self Tuning Controller Using Speed Control of DC Motor
Umesh Kumar Bansal, Rakesh Narvey
60 A REVIEW ON HAND GESTURES RECOGNITION
Mrs.Kashmera Khedkkar Safaya, Prof. (DR.). J.W.Bakal
61 ENERGY EFFICIENCY IN WSN USING MOBILE SINK’S
Simarjeet Singh, Jaswinder Singh
62 Multi-hop Stable Selection with Mobile Sink in Wireless Sensor Network
Simarjeet Singh, Jaswinder Singh
63 Optimized network node architecture evaluation for packet switching networks based on Optical Time Division Multiplexing in WDM
Sachidanand Gupta, Salil Trivedi
64 Group Performance and Intergroup Relations
Cholchul Hadi
65 Remote Location Service in Intermittently Connected MANETs
Nandini Reddy Paila , Ch.Satyananda Reddy
66 Comparative Analysis of TCP FRCP for Congestion Control Mechanism in Mobile Ad-hoc Network Protocols
Saab Singh, Amandeep Singh, Satwinder Singh
67 Hiding Secret Message using Enhanced MSA Algorithm
Dr. M. Nandhini
68 Optimized Processor scheduling for job management in Grid computing
Daljit Singh , Sarpreet Singh
69 Evaluation of the Role played by Design for Emotions and Product Aesthetics when a Customer is buying a Product
Sharad Sharma, N.M Suri
70 Performance Evaluation of FTP application in MANETs using an Optimized Scalable Simulation Model
Sumit Kumar Yadav, Surendra Pal Singh
71 Simulation Based Performance Comparison of Proactive and Reactive Routing Protocols in MANET using FTP and HTTP Traffics
Sukhwinder Singh, Renu Dhir
72 Compare the Performance and Effectiveness of Proposed Edge Detector against Conventional Edge Detection Techniques
Somya Saxena, Sunil Kumar, Vijay Sharma
73 To Study the Impact of Varying Nodes Density and Traffic types of 802.16e based OPNET Model
Prabhjot, Sonia
74 Performance Comparison of Routing Protocols of MANETs using Vector and Random way point Mobility Model
Narinder Pal, Renu Dhir
75 Performance Analysis of MANET Routing Protocols AODV, OLSR and TORA under the different Traffics (CBR and VBR)
Bhavneet Singh, Renu Dhir
76 Exploration of Energy consumption in Cloud computing
Gopinath.S,Jegan.R.R
77 Cloud Computing With Two Factor Authentication for Government Information System and Security
Hardayal Singh Shekhawat
78 Cloud Computing on Mobile Devices: Security Issues
Hardayal Singh Shekhawat
78 FPGA Implementation of Image Segmentation Using Gradient Algorithm
Hithaishi.B, Anitha.M