Welcome to Reseach & Development Manager (Member Login )


Research and Development Manager is the innitiative taken by our organization to serve the GENXT Researchers in field of

 

 

 

 Networking, Communication and Software Development and provide with the facility to explore more and more..............

 

 

IJAIR- Volume 2 Issue 12

 

 

 

   

Sr/ No Title Pdf
1 Recent Survey of QOS Multicast Routing Protocols Based On Performance
A.H.Sharief, Dr.P.V.Naganjaneyulu
2 DESIGNING of LOW PASS FIR FILTER USING ARTIFICIAL NEURAL NETWORK
Meenal singh, Vandana Vikas Thakare
3 New modification of first integral method
Mohamed.A.Abdoon
4 A Comparative Study of PAPR Reduction Techniques in OFDM
Monika Sahu, Prateek Nigam , Dr. Vijayshri Chaurasia
5 Prevention of Black Hole attacks in MANETs Using Identification of Thick Node
Mukesh Goyal, P.S.Bhullar, Mamta Goyal
6 BIPOLAR FUZZY GRAPHS
D.Venugopalam, Naga Maruthi Kumari, M. Vijaya Kumar
7 Simulation of Buck-Boost Converter Using Coupled Inductor
P.Swathi, Y.Manju sree, M.M.Irfan
8 Comparison of Packets Loss and Packets Delay of TCP and SCTP Using NS2 over Linux Platform
Mr. Pradip G. Vanparia , Dr. Yogesh. R. Ghodasara
9 Blind Motion Deblurring from a Single Image
Mr. Prashant G. Kathe
10 Wormhole Attack Effects under Wireless Sensor Networks
Jagteg Singh, Er.Prabhdeep Singh
11 Analysis of Multiband Antenna for WLAN/Wi-Max/IMT Application
Neerat Sharma
12 Browser Friendly Media Integration of Adaptive Real-Time HTTP Media Streaming
R.Aishwarya1 and Ms. Sankari Subbiah
13 A new approach for extraction of pattern frames in text mining
Ramesh Kumar Mojjada
14 AN EFFECTIVE CLASSIFICATION APPROACH FOR RECOGNITION OF FACIAL AGE USING FURTHEST NEAREST NEIGHBOR CRITERION
G.RAMYA , A.SELVARAJ , N.ANANDH
15 Implementing Role Based Access in Healthcare Ad Hoc Networks
A Santhosh Kumar, G Mohan Raj
16 INFLUENCE OF CLIMATE ON WATERBALANCE OF A RIVERBASIN – A CASE STUDY
D.B.Sankar, K. Sankaraiah, K.S.Sai Prasad
17 The Solution of Nonlinear Volterra Integro-Differential Equations of Second Kind by Combine Sumudu Transform and Adomain Decomposition Method
Shams A. Ahmed, Tarig. M. Elzaki
18 THERMODYNAMIC BEHAVIOUR OF BILE SALTS WITH DISPRINE
SHWETA SINGH , SANTOSH K SAR
19 AN EFFICIENT TRANSMISSION OF DWT COMPRESSED VIDEO FRAMES OVER AN OFDM SYSTEM
SIRAPU TEJA , Mrs. T .VISHNU PRIYA
20 A New Detecting and Extracting Spread Spectrum Valuable Hidden Data from Digital Media
Lokesh Sirela, Sk Shafiulilah
21 CARVING: A Novel Technique to Prevent Membership Disclosure
G.Siva Kumar, K.V.Srinivasa Rao
22 Plant Irrigation System Using ARM Processor with Solar Power for Agricultural Applications
G.K.Srinivasulu, 2Dr.M.T.Naik,
23 Graphical Testing of Software Development
Supriya, Manish Mahajan
24 Graphical Testing of Software Development Model for Regression Testing
Supriya, Manish Mahajan
25 Optimum Utilization of Private cloud with predefined Reservation Policy
UDAYKUMAR I. LOKHANDE, DEVEN N. SHAH
26 ANALYSIS OF THE SELECTED PSYCHOLOGICAL VARIABLES AMONG CRICKET PLAYERS AT DIFFERENT LEVELS
S.Bharathiraja, G.Velmurugan & Dr.A.Palanisamy
27 Multimedia Based Authentication System - Restraint to Shoulder Surfing
G.Sravanthi , Harmeeth kaur S, Prof.T.Venkat Narayana Rao
28 Traditional and New Security Challenges - A Suggestive Review on Safe Computing
Hyma Birudaraju,V.Poorna Chander, N.Sukanya
29 DEPLOYMENT OF RFID TECHNOLOGY APPLICATIONS IN SILENT COMMERCE ON INDIAN RETAILING - AN OVERVIEW
J. Venkatesh
30 Identification of Misbehaviors and Packet Loss in Mobile Ad hoc Network
Vijayakumar R, Muralidharan R, Dhanarasan P
31 Synthesis and characterization of polypyrrole- zinc oxide nano composites by ex- situ technique and study of their thermal &Electrical properties
V.T. Bhugul , G.N. Choudhari
32 High Throughput Multicast Routing Metrics in Wireless Mesh Networks
Anu S, Umarani R
33 Dual Bridge Multilevel Dc Link Inverter Fed Induction Motor
Mr. G Madhu SagarBabu , Mr. G DURGA PRASAD, Dr. V Jegathesan
34 FINDING AN OPTIMAL FOREST GRAPH TO IDENTIFY THE CARDIOVASCULAR DISEASES
K.Sudha, P.Lekha
35 Efficient Extended Boolean Retrieval
Padma Reddy , C.Nagesh
36 Automatic Boar Motor Control by Using Cell Phone
Boda Sudheerbabu , md shabeenabegum
37 HUMANOID ROBOT DEVELOPMENT
V.BALAJI
38 A Study on Characteristics of MANET Routing Protocols
R.M.Bhavadharini, Dr.T.Kalaikumaran, Dr.S.Karthik
39 INTERACTIVE FOREGROUND AND BACKGROUNG SEGMENTATION USING ACTIVE CONTOURS
K.Radha, G.Bhuvana
40 A HYBRID CASCADED FIVE-LEVEL INVERTER WITH INTERLEAVED TECHNIQUE FOR FUEL CELL APPLICATION
CH.Sravya, Dr.M.T.Naik
41 ENTITY RECOGNITION IN A WEB BASED JOIN STRUCTURE
J.KAVITHA M.TECH, A.PASCA MARY
42 A Fuzzy Ontology Based Automatic Video Content Retrieval
P.Anlet pamila suhi,S.Deepika
43 A Distributed Cost Effective Cluster Algorithm
J.Jacqulin Margret, R.Devipriya.
44 AUTOMATIC DETECTION OF LICENSE PLATE
D.ANITHA , A.DHIVYA
45 RECOGNIZING AND MASK REMOVAL IN 3D FACES EVEN IN PRESENCE OF OCCLUSIONS
M.Dhivya,S.Ramya,R.C.Bhuphathi,P.Purushothaman
46 On The Unbiased Windmill Graphs
S.Kalyana kumar, Dr.Mata Ambar
47 PROTECTED AREAS NETWORK OF MANIPUR: SUSTAINABLE MANAGEMENT STRATEGIES FOR TAPPING HUGE ECO-TOURISM POTENTIALS
Arambam Sanatomba Singh
48 Monitoring of Potential Evapo-Transpiration of Abha City, Kingdom of Saudi Arabia
Dr Ram Karan Singh, Mr. Saiful Islam
49 SOCIO-ECONOMIC IMPACT OF TRIBAL THROUGH SERICULTURE; A CASE STUDY OF AMBIKAPUR BLOCK OF SURGUJA DISTRICT, CHHATTISGARH, INDIA
Smt. Jermina Tirkey, Dr. K. Venu Achari and Dr. K.R. Sahu
50 Study on the Fish Species Diversity of Gorama Dam Hanumana at Rewa (M.P.), India
Jitendra Kumar Patel, Dr.Satanand Patel
51 Studies on Anthelmintic activity of Ficus religiosa fruits
Dr. Devendra N. Pandey and Dr. Sandeep Kumar Shukla
52 LARGE-SCALE MULTIMEDIA STORAGE SYSTEMS (LMSS) FOR LOAD BALANCING
R.ARULSELVI, S.ELAMATHI
53 DETECTING THE INRUSION IN THE PERVASIVE ENVIRONMENT USING COMBINED LEARNING APPROACH
A.KRISANTHA, M.KALIMUTHU
54 MYCOBACTERIUM TUBERCULOSIS ON GRID COMPUTATIONAL ALGORITHM
Ms. R. Geetha and Dr. D. Ramyachitra
55 E-Business Application Model
Hari Prasad.A, Gokul Ram. T, Rajesh Kumar N.S.R
56 Iterative feedback tuning method for PID controller
Hardik Agravatt, Dr. Sorum Kotia
57 AUTOMATIC WIRELESS BATTERY CHARGER FOR PERMANENET PACEMAKER
Hari Mohan Rai, Chandra Shekhar Singh, Arun Kumar, Anish Kumar, Abhishek Sharma
58 YIELD ANALYSIS AND IMPROVING THE VIA INSERTION RATE WITH MULTI-VIA MECHANISMS
Y. Jhansirani
59 PrefixSpan Algorithm: An Approach for Mining User’s Traversal Patterns from Server Log Files
Prof. Komal N. Porwal, Prof. S. B. Patil, Prof. Pallavi S. Kadam
60 A new approach for measuring latency and bandwidth in wireless Ad hoc network
Thottadi Hemendra
61 A Secured removal code based cloud storage system with safe records a head
Polaki Tarakeswara Rao, Sri. M.V.B Chandra Sekhar
62 Secure Group Key Management in Adhoc networks for peer node to group nodes communication
Kasi Sravani, YVD Pushpa latha
63 A new approach for marking for mined text for perfect navigation in data hierarchical design
Adireddi prasanna kumar prasanna
64 Privacy and integrity preserving in two- tiered sensor networks using IBMC
Kalyani Bantupalli , Prabhakara rao
65 A Fare Attentive Routing Structure for Wireless Sensor Networks
M.John Timothy
66 TRAFFIC ANALYSIS IN HIGH SPEED NETWORK USING DATA MINING TECHNIQUES
G.Loganathan, M.Lakshmipriya
67 Caching Strategies Based on Information Compactness Assumption in Wireless Ad Hoc Networks
Sirisha Dandu
68 Interactive image segmentation with adhoc selection with base threshold
A. Roopakalyani
69 Efficient Parallel Data Processing for Dynamic Resource Allocation in the Cloud
Anand Prabu P,Dhanasekar P ,Sairamprabhu S G
70 COMPUTER PROGRAMMING FOR SAFE BEARING CAPACITY CALCULATION OF FOOTING AS PER IS CODE & EUROCODE 7 USING VB-6.0
NILAM PRAJAPATI, K. N. SHETH
71 Mining E-Shoppers’s Purchase Rule and Protecting Outsourced Database
S.N.Saravana Sai, T.Subha
72 Secure Position Based Opportunistic Routing For Efficient Packet Delivery In Manet
Sathya S.
73 AN EFFICIENT TRANSMISSION OF DWT COMPRESSED VIDEO FRAMES OVER AN OFDM SYSTEM
SIRAPU TEJA , Mrs. T .VISHNU PRIYA
74 A New Secure Method of Privacy Publication For Data Publishing
Harsha Cherukuri , Akash Kashyap
75 A New Cooperative Caching Mechanism in Distributed Social Wireless Networks
G Raja Sekharam , A.Santosh Sagar , B.Naga Suresh
76 A New MDS Code Based Re-Keying for Efficient Multi Cast Key Distribution
Nagabhushanam Vennela
77 STRENGTHENING PASSWORD USING ER IMAGE MATRIX MODEL WITH PCCP BASED GUI SCHEME
S.Uthayashangar , R.Srinivasan, Jayamoorthy.S
78 A Literature Survey on Lung Lobe Segmentation Method
K.K.Thanammal, Dr.J.S.Jayasudha
79 Isolated and Combined effects of Yogic practices and Aerobic Exercise on Flexibility among College Women Basketball players Method
Mrs. Ezhilarasi, Dr. Amsanatarajan
80 Effective Utilization Technique for Simplified Navigation through Website Structure Improvement
Devakinanda K Kiriti K , Mr. S.Venkatarao
81 RANGE BASED SEGMENTATION FOR WORMHOLE DETECTION IN WSN
Archna, Sukhjinder Kaur
82 A Survey Paper: Knitting Machine and its Microcontroller based Automization
Mrs.Bhagyashri Patil, Prof. Dr. D.G.Chougule
83 IMPLEMENTATION OF LOW-POWER LOW-FREQUENCY MULTIPLIERS
S.Rakesh Sharma, Dr .Arunesh Kumar Yadhav
84 DESIGN AND DEVELOPMENT OF DRIVER AND CONTROLLER MODULE FOR HIGH POWER LASER DIODE ARRAY
Manohar Tanuku, Rajasekhar K, Adwaita Goswami
85 Optimized Background Preservation for Image Enhancement
Manpreet Kaur
86 Optimized Regression Testing with Hybrid Criteria based Test Case Priority
Navleen, Mr. Manish Mahajan
87 Faster SDRAM Controller with Inbuilt Memory Using AHB Interface
S. Gopala Krishna, M. Nagarani
88 OFDM Baseband Modulation Technology based on Verilog
Vinay kumar, Ankireddy, B.Srinivas
89 Security Attacks by the Compromised Machines with Monitoring Outgoing Messages
T. S. Mani Kanth, G. Yedukondalu, U. Shubhangi
90 Fast Fault Tolerance Mechanism in Border Gateway Protocol
Shalley Bakshi, Ms Suman
91 IMPLEMENTATION OF PRETEND MODEL TRAVELING WAVE SOLUTION OF TWO-DIMENSIONAL K-DV EQUATION
Dr. S.Mahalingam
92 Optimal Component Software Development based on Meta Data Repositories
Tamanna Sood
93 Security in services for central cloud services to various cloud services
A.Yamuna
94 Motion Detection: A Survey
Ashish Kumar Sahu, Abha Choubey
95 Criteria Selection Of Supplier By Implementation Of Interpretive Structural Modeling
Rachit Kumar Verma, Manish Kumar Sagar
96 Energy Conservation in Cloud computing - A review
Shveta, Shivali Puri