Welcome to Reseach & Development Manager (Member Login )


Research and Development Manager is the innitiative taken by our organization to serve the GENXT Researchers in field of

 

 

 

 Networking, Communication and Software Development and provide with the facility to explore more and more..............

 

 

IJAIR- Volume 2 Issue 9

 

 

 

   

Sr/ No Title Pdf
1 An Unsupervised Approach to Co-channel Speech Separation
Pilla mohan ganesh , M Jaganmohan Reddy , Naresh Jeggumanthri
2 PROTOCOL ARCHITECTURE
A.Swetha
3 EFFECT OF JACOBSON’S RELAXATION TRAINING AMONG CORPORATE CRICKETERS
SOLOMON M,AHMED SHAHIN
4 Implementation of multi-serials to Ethernet Gateway based on Field Programmable Gate Array
D.YESUBABU, B.SRIHARI
5 PRIVACY PRESERVING DECISION TREE LEARNING USING UNREALIZED DATA SETS
R. Ch. VARMA, PETER PRAVEEN J
6 Data Protection in Outsourcing using JOIN operation
RESHMA SULTANA, CHEEKATLA SWAPNA PRIYA
7 DESIGN OF A 6 U-SLOT PATCH ANTENNA WITH DUAL BAND CHARACTERISTICS
Usha Kothamasu, K.Jagadeesh Babu
8 A Mechanism To avoid Data Flooding Attacks in Adhoc Networks
A.JITENDRA & T.SAHITHI
9 Mining Periodic Interaction Patterns in Social Networks
S.RAVI KISHAN & P.DEVI
10 Resourceful Solution for Finding Shortest Path in Networks
K.Jyothana, CH.Mounica, K.Anudeep
11 A INNOVATIVE WIND SYSTEM BASED RENEWABLE ENERGY SYSTEM WITH POWER QUALITY IMPROVEMENT FEATURES
Vishvaneeta Patel1 , Nitesh Tatwal
12 APPLICATION OF ARTIFICIAL TECHNIQUE IN POWER SYSTEM STABILITY ENHANCEMENT: STATE OF ART
Sita Singh, Nitesh Tatwal
13 An Advanced Two Level Frequency Hopped CDMA Technique for Wireless Fading Channels
Bhise Shruti Kishor , K.Praveen
14 A Survey on Certificate Revocation In Mobile Ad-hoc Networks
Honey mol C.S
15 Development and Charecterization of High Performance Reinforced Carbon-Fiber and Glass-Fiber Composites
Santhosh.N , Rudra Naik.M, Dr.U.N.Kempaiah , Praveen Kumar.S , Mahendra.M.A
16 Simulation of Buck-Boost Type Unity Power Factor Rectifier with and without controlled switch
Saidarao.Nerella, T.Raghu, N.Leela Jaya Syamala
17 DATA LEAKAGE DETECTION
Renuka Sabale ,Supriya Chambule, Eshaan Gupta ,Vidya Waghmode
18 Internet Architecture
Venkata Rama Lakshmi Gundala
19 Periodical and On-Demand Topology Dissemination in routing protocols: A comprehensive Analysis based on Delay, Delivery Ratio and Throughput
Ramalingam. M, Dr.Thiagarasu.V, Narendran.P
20 Implementation of Predictive Current Control With State Space Model in the Sensor less Induction Motor Drive
B V S Prahasith Dasari
21 Solar Aided Green Power Generation and Eco-strategic Challenges
Prabha Malviya
22 Efficient Database Indexing Techniques using Cluster, Non cluster and Full Text Indexing
Nikhil Dasharath Karande
23 Spray and Wait Based P2P Content Search Mechanism for ICMANs
N Durga Prasad, K R Sitarama Raja ,P Narendra Kumar, P Arun Kumar
24 PRESERVING EDGE INFORMATION OF A SATELLITE IMAGE USING DWT
Naga Swathi.N
25 Socio-economic Analysis of Livestock Traders: A Case Study of Uttar Pradesh, India
Mushir Ali, Syed Murshid Husain
26 A Comparative Analysis of Different Encryption Techniques of Cryptography
Md Imran Alam
27 Novel Design of Multiple-Input Single-Output DC-DC Converter
S. Mohamed Yusuf, L. Valluvan
28 FLEXURAL PROPERTIES OF CALCIUM META SILICATE REINFORCED POLYAMIDES
Mithun V Kulkarni , K Elangovan , K Hemachandra Reddy , Arun S Bhide
29 SHAPE BASED EDGE DETECTION USING FUZZY C-MEANS CLUSTERING ALGORITHM
D. Napoleon, A.Shameena, R.Santhoshi
30 Development of Data Communication and Acquisition System
K. S. Padmaja , A. Naresh , M. Nageswar Rao , Manikanta Prahlad M
31 Impact Of Vsc-based Multiline Generalized Facts Controllers On Distance Protections
Shaik.Abbas Ali,T.Ranjani
32 Turk solution as corrosion inhibitor for mild steel in acid medium
S.ANANTH KUMAR A.SANKAR, M.KUMARAVEL S.RAMESHKUMAR
33 Corrosion Behaviour of Mild Steel in Acidic Medium in Presence of Aqueous Extract of Nelumbo nucifera flower
S.ANANTH KUMARa A.SANKAR,M.KUMARAVEL,S.RAMESHKUMAR
34 Ensete superbum (Roxb) leaves extract as corrosion inhibitor for mild steel in acid medium
A.SANKAR, S.ANANTH KUMAR, M.KUMARAVEL,S.RAMESHKUMAR
35 CLASSIFICATION OF POWER QUALITY DISTURBANCE IN GRID CONNECTED WIND ENERGY SYSTEM
Ankita borban
36 SPARSE COLOR INTEREST POINTS FOR IMAGE RETRIEVAL
Lakesar Archana L ,Shinde Sunita S, Tamboli.S.S.
37 A Novel Application for Secure Transmission of Data on Sensor Networks
S. Bala Subrahmanyam, Y. Ramesh Kumar
38 An FPGA Implementation of Faster Compression of the Partial Product Array in Two’s Complement Multiplier
P.Bala kishore, Mrs. P. Pushpa latha
39 An Optimistic approach to routing protection in IP Networks
Devisetti Sri Balaji ,Ms. K.Sudha MS.M.Sandhya
40 Constraints Perceived by Dairy Farmers in Adoption and Repayment of Dairy Loans A case study of Sangrur
Renuka Rani, Anita Gill, Gagan Bajaj and Puneet Malhotra
41 Gait Recognition technique using SVM and BPNN Classifiers-Review
Arun Joshi, Mr. Shashi Bhushan,Ms Jaspreet Kaur
42 Student learning Channel by Using Cloud Computing for Advanced Computer Science Course
Siddarth.P,Ganesh Kumar.Nune and Vasanth Sena.P
43 Speech Emotion Recognition based on Mel-Frequency Cepstral Coefficients and Support Vector Machine
An Hoa Ton-That, Nhan Thi Cao, Hyung-Il Choi
44 Facial Expression Recognition based on A Completed Modelling of Local Binary Pattern
Nhan Thi Cao, An Hoa Ton-That, Hyung-Il Choi
45 A Comparative Study on Multimodal Biometric System with Compression Techniques
Anusha.Ch, Srinivasarao.B, Lavanya.k
46 Recognition of Handwritten Text: Artificial Neural Network Approach
Apash Roy, N. R. Manna
47 STREAM CONTROL TRANSMISSION PROTOCOL
G.Bhagyasree
48 IL-6: AN IMPORTANT MEDIATOR OF OBESITY BASED INFLAMMATION
Vidhate Deepali, Thomas J, Gupte A M
49 A Step Up Dc – Dc Converter With High Voltage Gain for Microsource Applications
Dinesh Kumar Munigala , J.Srinivas Rao
50 LAN NETWORK TOPOLOGIES
Vemuri. Bhavani Himaja
51 Analysis & Implementation of PUEA in Cognitive Radio Network
Manish Saxena , Khyati Chourasia, Vipin D.Bondre
52 Hardware design of Real time Configurable Variable point FFT for multi-rate applications
K.L.Ramesh ,Smt. K. Jhansi Rani
53 Weather Data logger using ARM Processor
Mahesh1, Mrs.Y.Syamala
54 SECURE AND DEPENDABLE DATA CORRECTNESS APPROACH OVER CLOUD ARCHITECTURE
BODDU NANDA KISHORE, Vegi Srinivas
55 An Efficient Technique to protect unrealized data over classification
V.Sita Rama Prasad, Dr L PRASANNA KUMAR
56 VIDEO SEGMENTATION & SUMMARIZATION
Pratyush Pranjal, Rohit Lakhdive, AtulKumar Varma ,Aditya Vasave
57 Different Techniques to Reduce the PAPR and Their Comparative Study in OFDM System
Saurabh kumar jain,Chandrica Saxena, Anubhuti khare
58 IMPACTS OF THE DISTRIBUTED GENERATOR AND DSTATCOM DEVICES ON POWER QUALITY OF UTILITY CONNECTED GRID
Sunil Kumar Bandari, S. Mani kuchibhatla
59 A Novel Low Power, Low Area Multiplier
P.Surendranath, K.Suvarna, H.Devanna
60 A Novel Key Pre-distribution for Wireless Sensor Networks
A.M.Bharath Kumar,Ashok Kumar Balijepalli
61 A Review of Physical Attacks and Trusted Platforms in Wireless Sensor Networks
A.M.Bharath Kumar
62 An SPIHT Algorithm with Huffman Encoder for Image Compression and Quality Improvement
Geetha Madhuri , P.Srinivas
63 Electronic Toll Collection System based on Global Positioning System Technology
Boddupalli Venkata Ravi Kumar
64 A Cascaded H-Bridge and Novel Multilevel Inverter Topology for Induction Motor Drive
Kesana gopi krishna, M. Bala Subbareddy , Mr.Kasa Sudhee
65 Monitoring Cryptographic Strength of Wireless Sensor Networks using Knowledge-zero protocol
V.Shanmukha Rao, Aparna Allada, Syed Ahmad Mohiddin
66 Framework for XML Document Classification
N.J.Divya Sree, P.Kavya Lekha, M.Divya
67 AN INVESTIGATION INTO THE STATUS OF WOMEN TEACHERS WORKING IN PRIVATE AND GOVERNMENT COLLEGES OF MANIPUR AND THEIR RELATIONSHIP BETWEEN THE LEVEL OF EDUCATIONAL QUALIFICATION AND RESEARCH PUBLICATIONS
Y. NUNGSHITOMBI DEVI
68 Secure communication with Encryption of AES and RC4 hybrid algorithm with Hash Function
Ravinder Kaur, Minakshi Sharma, Pankaj Sharma
69 Test Case Prioritization with Branch Coverage with Multiple Criteria for Regression Testing
Navleen , Mr. Manish Mahajan
70 Enhanced system reliability of HCS model as compared to existing systems in a typical thermal power plants
B.S. Kumar, U.V Ratna Kumari
71 An efficient working for secure hash algorithm-256
Govind Singh, Siddharth Choubey
72 Secure & Robust Higher LSB Audio Stenography with Cryptography for Secure Data Transmission
Preeti Singh, Praveen Yadav
73 Parameter Identification of unknown system using Big Bang-Big Crunch Optimization Algorithm
Ms. Rashmi Singh, Mrs. Sadhana Tiwari, Ms. Neha Sharma, Mr. Jitendra Patidar
74 Key Establishment and Authentication of User by Specialized Digital Certificate for Secure Communications
DASARI REVENTH RAJ, VASUPALLI MAHESH, Y.RAMESH KUMAR
75 Frequent Data Updating Using Random Checkpointing Arrangement in Decentralized Mobile Grid Computing
Mr. S. P. Santhoshkumar , Mr. D. Prabakar , Dr. S. Karthik
76 A New Technique with Provable Performance for Congestion Control in DHT Networks: ERT
Palakollu Pavani , Mrs. Syed Shaheen
77 A New Method of Automatic and Accurate Image Registration through Histogram Based Image Segmentation
D. Sujana , M. Joseph Prakash , Dr.S.Maruthu Perumal
78 Performance Analysis of MAC protocols in Energy Consumption of Wireless Sensor Networks
Mrs. Urmila A. Patil, Ms. Suma B. J, Ms. Smita. V Modi
79 A New Extraction Mechanism for Web Information Gathering Using Personalized Ontology Model
Pilli VijayaKumar, Pydipala LaxmiKanth