IJAIR- Volume 3 Issue 4 (April 2014)

 


 

Title Pdf

1

Fast And Accurate Fault Detection In Transmission Line Using Phasor Measurement
Komal Singh, Surya Prakash

2

A Brief Survey on ICI Reduction Techniques in OFDM System
Monika Sahu, Prateek Nigam, Dr.Vijayshri Chaurasia

3

The Impacts Of Hiv/Aids On The Development Of Children And Social Parenting
M. Mudiappan, R. Mangaleswaran

4

Power Quality Improvement of Distributed System By using DVR
Nikita yadav,vinay tripathi

5

A Systematic Study of Test Case Design in Software Testing
A.Nirmal Kumar, Dr.B.G.Geetha

6

The Development of Eye Controlled HCI System for Paralytic Person
Bhagyshree Patil, Vishaka Asundkar, Pooja Khandebharad, Prof.Mrs. Prajwal Gaikwad

7

An Ontology Based Intelligent Information Retrieval System for Domain Documents
Priyadharshini.G, Saravana Balaji.B

8

High Temperature Effect On Concrete Using Fibres
Rahul S. Patil, Prakash M. Mohite

9

A Survey on Enhancing Cloud Data Security Using Rsa Algorithm
Rajendra H.Rathod, Ms.R.R.Tuteja

10

Multiphase Bidirectional Flyback Converter Topology for Hybrid Electric Vehicles
Tulasi Jasti, Rambabu Chunduri

11

Optimal Performance Measures of Retrial Queuing Model with Fuzzy Parameters Using Robust Ranking Technique
R.Ramesh , S.Kumara ghuru

12

Microaggregation For The Protection Of Microdata
G.Ramya , A.Selvaraj , N.Anandh

13

Query prophecy and implication for Itinerant phones
P.J.Sinijoy, A.Marthe Ranjani

14

Token Based Authentication with Decentralized Access Control in Clouds
Remya Ramakrishnan, Michael

15

Optimization of Process Parameters for Hardness of Aluminium Alloy 7068 During Friction Stir Welding by Taguchi Method
R.K.Suresh

16

New Identities Of Sybil Nodes Detection Based On Rss In Manets
P.S.Satheesh, M.Suresh Anand

17

Review Of Steganography Techniques
Shivani Yadav, Deepak Goyal

18

Image Reconstruction From Incomplete And Noisy Data Using Projection Based Deblurring
Mr. M.Yasin, Mr. AR.Arunachalam

19

Robust Face Recognition Technique Based on Granular Computation and Hybrid WLD Spatial Feature Extraction
P.Raghu,D.Kavi Bharathy,M.Suresh Anand,J.Jegan Amarnath,J.K.Periasamy,A.Kumaresan

20

Effect of aerobic training on percent body fat among High school girls
M. Gejalakshmi & Dr. V. Vallimurugan

21

Low Size And Low Power Consumption Wireless Capsule Endoscopy
Sushma Hattarki , Sanjay Pawar Sushma R. Hattarki

22

Software Model of “OSI” Layered Architecture
Syed Irfan Yaqoob, N.Priya

23

The Common Carotid Artery Intimal-Media Thickness Measurement Using Automated Segmentation In Ultrasound Scan Image
D.Tamil selvan, L. Ashok Kumar

24

Retrieving Information using Context Based Indexing Approach
Ms.M.Vanishree , Ms.R.Sudha

25

Deep Sentiment Analysis of Social Network Using Ontology
Umasri.M.L1, Suresh Kumar. S

26

Comparatively Study of An IHS-Based Color Distortion Reduction for Vegetation Extraction in IKONOS Imagery
A. Vakeswari, S.Brintha Rajakumari

27

ACity Bus Ignition Control Mechanism using Multilevel Security System
Barath Narayanan. P. B, Varun Sundar Gandhi.V, Prithvikar Reddy. B, Mrs. Rajeswari. S

28

Study of Wind Turbine Using Back to Back Converter
N.Veerakumar, P.Madasamy

29

Genetic Algorithm Trained Artificial Neural Network Maximum Power Point Tracking of PV Cells
G. Venkateswarlu, P. Sangameswar Raju

30

Genetic Algorithm Enhanced Fuzzy Logic Based Controller of MPPT of PV Cells under Partially Shaded Condition
G. Venkateswarlu, P. Sangameswar Raju

31

Intrusion Detection System for Secure Data Transmission in Mobile Ad hoc Network
Vijayakumar.P, Tamizharasan P.

32

Mitigating Unemployment and Enhancing Sustainable Self Employment of Youths in Nigeria through Agricultural Education
Vincent C. Asogwa and Irimiah A. Ezhim

33

Power on wrist for women and school children to testimony By gps and gsm using wireless personal area network
A.Jyotsna, V. Sowmiya, Mrs.K.Subbulaksmi

34

Enhance the Reverse Dictionary Using Jaccard Indexing Algorithm
J.Mohan, Dr.K.P. Kaliyamurthie

35

Enhancement of Noise Corrupted ECG Beats Using Elman Artificial Neural Network: An Experimental Approach
Ajay Abrol

36

The Bluenet Switch Control Network Based on CAN and Android
Mohammed Fazil TK, Manu Varghese C, Mohammed Shabid, Jasmin M

37

Database attacks and security: a review
Ms. Mira K. Sadar, Mr. Pritish A.Tijare , Mr. Swapnil N.Sawalkar

38

An Intricate Information and Visual Treat for the Craft Rainfall Predication by region based segregation and Characteristic Segmentation of Clouds from Remote Sensing Images Using Multi-Kernel Fuzzy C-Means Algorithm (MKFCM)
D. Napoleon, K.Ragul

39

Survey on Various Ranking Algorithms
Manpreet Kaur Gill, Nidhi Bhatla

40

Design & Development of Coaxial Wing Micro Air Vehicle
Manoj J Watane, Dushyant B Pawar

41

Wireless Based Monitoring System For An Advanced Class Room
Manisha Toppo, Sweety Kumari , Ekta Kumari

42

Survey on Clustering Techniques in Data Mining for Software Engineering
Maninderjit Kaur, Sushil Kumar Garg

43

Surety and security of transactions using upgrading web-system
Manigandan, K.G.S. Venkatesh

44

A novel patient centric framework for secure sharing of confidential health records in cloud computing
Susmitha Mandava, Mrs.ANURADHA

45

Content Based and Link Based Page Ranking Algorithms: A Survey
Madhurdeep Kaur, Asst. Prof. Charanjit Singh

46

Efficient Cryptographic Image Compression by Pixel Reorganizing
Leena Roslin Jenifer.M, G.Sudha

47

A Novel Protocol Analysis For Data Consistency Using Graph Thory In Vanet Mddp
Lavanya.R,Kavitha.V M.E.

48

Fake Content Detection in an Image Hashing Approach with Feature Level Fusion
S.Narendhiran, K.Omprakash

49

A Comprehensive Review of Link Based Ranking Algorithms
Harleen Kaur , Dr. Raman Maini

50

Three Phase Single Stage Transformer Less Grid Connected PV System
S.Karthikeyan, P.Ganesan

51

Resonant PWM ZVZCS DC To DC Converters For Renewable Energy Applications
B.Karthikeyan, Prof.Jebasalma

52

A Novel Algorithm for the Generation of Secret-key
V.Kamaraj, K.J.Jegadish Kumar

53

A review of automatic speech Emotion recognition
Jagvir Kaur, Abhilash Sharma

54

Improving Reliability in Heterogeneous Wireless Sensor Networks
A.Hemalatha, Dr.R.Venkatesh

55

Labview Based Smart Irrigation System With Wsn And Fuzzy Choice Making Control
Aarthi.R and Mr.J.Manikandan

56

A Survey on Various Clustering Algorithms
Gurpreet Kaur, Nidhi Bhatla

57

A Paper on COMPOSITE SERVICE SELECTION
J. Gowtham Kumar , B. Sudheer Kumar, K.Narasimhulu

58

Aligning Performance of MSMEs with Economy
Dr E.B.Khedkar

59

Hybrid Intrusion Detection System Using Packet Header Anomaly Detection Algorithm
Sandeep Bhorde, Geetanjali Khabale, Priyanka Shinde , Prof. Minal Zope

60

Optimum DC motor speed control using PSO technique
Geeta Kumari, Surya Prakash

61

An Adaptive Distributed Computing with Fault Tolerance and Recovery
Mrs.K.Gayathri, Mr.B.Ganesh Prabu

62

Toxicity Of Organophosphorus Pesticide Malathion Influenced By Ph And Temperature On The Freshwater Fish Cyprinus Carpio
Dr. Atul Vasnt Rao Sagane, Dr.Pushpa Singh, Dr. Ashok Kumar Mishra and Dr. Pradeep Khampariya

63

Assessment Of Ambient Air Quality At Gare - Pelma Coal Blocks At Tamnar, District-Raigarh (C.G), India
Sandeep Kumar Mishra, Hemlata Verma, Vinod Mishra and Dr. Rashmi Arnold

64

Tourism And Resource Development: A Case Study Of Madhya Pradesh, India
Satyendra Kumar Mishra, Dr. Devendra N. Pandey, Hemlata verma and Dr. Sandeep Kumar Shukla

65

Assessment Of Water Quality In Tons River In And Around The Chakghat Area, Using Nsf-Wqi
Sandeep Kumar Mishra, Satyendra Kumar Mishra and Dr. Rashmi Arnold

66

Gender and age-wise indices Of plasmodium spp. In mauganj of rewa city M.P.
Dharmendra Kumar Patel, Dr. Devendra N. Pandey, Gaurav Yadav and Dr. Sandeep K. Shukla

67

Effect of tetracycline on Early development of Chick embryo
Gaurav Yadav, Dr. Devendra N. Pandey and Dharmendra Kumar Patel

68

Monthly Variation Of Primary Productivity Of Obar Pond Rewa (M.P.), INDIA
Sangita Mishra, Neha Pandey, Dr. Devendra N. Pandey, and Dr. Sandeep Kumar Shukla

69

Identifying Clone Attack In Mobile Sensor Network Using Localized Algorithm
Divya.S, Mrs. V. Kavitha

70

Review of Watermarking relational database Using Optimization Techniques
Monika Gharu, Deepak Sharma

71

A Fast Fuzzy Minimum Spanning Tree Clustering Based Feature Subset Selection Algorithm For High-Dimensional Data l
V.Deepa, T. Deepa

72

Real Time MMS Security For Mobile Communication Using Steganography
Chinar Bhandari , Ashish Bandi, Sonu Gupta , Avinash Jadhav

73

Security Analysis of Exclusive 128 Bit NLFSR Based Stream Cipher
Biju N, Jegadish Kumar K. J

74

An Effective Treematch Algorithm For Xml Tree Pattern Matching
Balamurugan.V, Rajeswari.D

75

Implementation of Packet Scheduling With Buffer Management to Improve Network Performance
Dr. R. Shanmugasundaram , V. Azhaharasan , Dr. S. Pannirselvam

76

Analysis Of A Two-Unit Cold Standby System With Instructions And The Accidental Effects
Archana Malik

77

Dispersed Store Cancellation Technique For Maintain Reverse Consistancy In Wireless Mobile Network
S.Ashwini ,G.Michael

78

Shockless Power Generation: an Alternative Energy Source
Mr. Ashish Fande, Mr. Sunil Dewangan, Mr. Rahul Pillai, Mr. Sourav Kumar Gupta, Mr. Rajesh Dewangan, Ms. Aakanksha Choudhary

79

Optimization Of Solar Energy Harvester System For Wireless Sensor Networks
J.Aruljustin, A.Arunya Revathi

80

Medical Image Segmentation based on Thresholding
Aparna M. Nichat, S. A. Ladhake

81

An adaptive risk management and access control framework with obligation to mitigate insider threats
Annamma Monisha.I, Dr.A.Grace Selvarani

82

Preventing Phishing Attack Using Visual Cryptography
Prof. Prajwal Gaikwad, Akanksha Chimote, Shubhangi Bhaladhare, Mayuri Dahiwal, Ankita Ambade

83

Sms Spam Detection Techniques An Analytical Research Method
Anchal, Abhilash Sharma

84

Protection Intimidation in Prepaid Cellular Phone
Dr.K.P.Kaliyamurthie , M.Anbarasu

85

Survey on Encryption Algorithms to Overcome Security Issues in Cloud Computing
Amandeep Kaur Gill, Charanjit Singh

86

Improving Security of Content Distribution Using Hash Function and Random Linear Network Coding
Akshay Chindarkar, Amey Gujar, Swati Shishupal

87

An Effective Video Annotation of Semantic and Visual Context Using Spatiotemporal Fuzzy KMeans Clustering
Akileshwari R, Grace Selvarani A

88

Energy aware routing algorithm of Green communication in Energy Renewable Wireless Mesh Networks
M. Sudharsan, Ms.R.Jananee, C. Yaamini

89

Diversity Of Entomofauna In Northern Chhattisgarh India
K.Venu Achari, K. R. Sahu

90

Comparative Analysis of Maximized Efficiency and Power Factor of Power Converters for Photovoltaic System Application
C.Rajesh Kumar, R.Radhamani

91

Cut Detection Techniques In Wireless Sensor Networks: A Review
Ranjit Kaur, Mr. Sukhwinder Singh Sran

92

Performance analysis of optical Communication system with SPM and GVD
Sumit Parouha, Anubhuti Khare

93

Vanet Routing On City Environment Using Real-Time Routing History And BAHG
M. Vijayakumar, S. Madhavi

94

Biometric authentication using mouse Gesture dynamics
Kaushal Kumar,Sanjay Kumar

95

Wading into wetlands of manipur: Sustainable management strategies and action plans
Arambam Sanatomba Singh

96

Analysis of Si-Ge based n-channel Tunnel FET with High-k Spacers
A.Simon Prabu , G.Sudhagar, M.Muthamizhan

97

VICTOR Data Center Network Virtualization Architecture: A Review
Ms. Pratiksha R. Yewale, Mr Vishwas T. Gaikwad, Mr. Harshal N.Datir
106 Review of Solar Water Heating Systems
Download