IJAIR- Volume 3 Issue 5 (May 2014)

 


Sr/No/ Title Pdf
1 Natural and Anthropogenic Environmental Effect on Livestock Husbandry: A Case Study of Shahjahanpur District, India
Mushir Ali, Syed Murshid Husain
2 QR Code Based Digital Academic Transcripts
Shraddha Nalkar, Monika Talekar, Priyanka Bamne, Snehal Patil
3 Design and Simulation of Cutting Slot Dual-Band PIFA Antenna for GSM System
Atul Nogia, P.K.Singhal
4 Human Powered Flywheel Motor By Using Double Lever Inversion Mechanism
A.P. Narkhedkar, Prof. A.K. Pitale, Prof J.P.Modak , K.K. Padghan
5 Software Requirement Prioritization Using Aging Process
Karthik.S, Kamalraj.R, Karthik.S
6 E2AACK—A Secure Intrusion Jamming Technique against Malicious agent using DSA algorithm
M.Saravanan , A.ThomasPaulRoy , Dr.N.Balasubadara
7 Reliable security for Multiple Applications in Wireless Networks using concealed data aggregation
A.V.Allin Geo, Dr.Kaliyamurthie
8 A Survey on Mitigation of Blackhole Attacks on AODV in MANET
Mohanapriya R , Saranya K, Rajesh Babu M
9 A New Approach To Vehicle Security System Using Face Recognition
J.K.Periasamy, B.Sneha, G.Sarangan, S.Madhumitha, G.Kalaivani
10 Hiding Data using Motion Vector and Linear Block Codes in Video Steganography
Rucha Bahirat, Amit Kolhe
11 Performance Of Synchronous Machine Dynamics Using A Novel Equivalent Circuit Model
Rajnish Kumar, Er.Pratibha Tiwari
12 Attribute Enhanced Sparse Codewords For Face Image Retrieval
Dr.K.Sakthivel, M.Pradeep
13 Comparative Analysis of OLSR, DSR, ZRP Routing Protocols in Mobile Ad-Hoc Networks
N. Durga Prasad, K.Divya
14 Competent System-on-Chip Energy Supervision with a Segmented Bloom Sieve
R.Deepa, M. Brundha
15 Analysis of Color Image Compression Using Wavelet Transform Method at Particular Decomposition Level
Mr.Y.S.Jagdale, Mrs.J.K.Patil, Mr.S.B.Jadhav
16 Performance variations in Digital CMOS circuit technologies due to temperature
Nikhil Saxena, Sushmita Dandeliya, Ravi Shrivastava
17 Heuristic Approach to Enrich Servers Performance
Sanket Lalge, Sonali Bhondve, Sucheta Jeurkar, Prasenjeet Paratwagh
18 Development of test rig for gear inspection
Tharesh K. Gawande, Prof. A.M.Bombatkar
19 Behavior of Mechanical Reinforcement in R.C.C. Exterior Beam-Column Joint
H. P. Patel, Prof. S. M. Kulkarni, Prof. A. A. Parikh, Prof. K. J. Parmar
20 Security Concerns in Cloud Computing
Anu Gupta
21 Parametric study of composite slab using ANSYS
Jatin Patel, Prof. S. M. Kulkarni, Prof. A. A. Parikh
22 Experimental Investigation Using Egg shell Powder in Concrete for Durability
N.H.Panchal, Prof. S. M. Kulkarni, Dr. V. P. Parekh, Prof. A. A. Parikh
23 Selection of Supplier’s Criteria by Using Interpretive Structural Modeling
Rachit Kumar Verma, Manish Kumar Sagar
24 Task Scheduling in Cloud Computing using Enhanced Genetic Algorithm
K.R.Prasanna Kumar, K.Kousalya
25 Color Texture Classification Using Local Feature Extraction
Subodh Shivaji Bhoite, Prof. Sanjay Shamrao Pawar
26 Fluid Structure Interaction based Flutter Prediction
A. A. Belkhede, Dr. K. S. Zakiuddin, P. B. Khope
27 A Survey Study On Electrocardiogram (ECG) Signal Noise Reduction Techniques
Sonu Singh Kaurav, Karuna Markam
28 Automatic Evaluation of Water Quality Based on High Speed Networking
Biplab Kumar Parida, Fahim Khan, Balmikee Kumar
29 Survey Study: Symmetric Key Encryption Algorithms
Dr. Madhu Goel ,Rupinder Kaur
30 Chameleon: A Load Balancing Model For Public Cloud
Abdul Jaleef P K, P Sivaprakash ,D Sumathi
31 Research Survey of RFID Security and Privacy Based on Identification and Authentication Protocols
Yunus Usman Memon,Sameen Ahmed Khan
32 A Secure Processing on Payment Reports with Advanced Encryption Standard in Multihop Wireless Networks
Kesavan P, Selvavinayagam G
33 A review on drive test and site selection for Mobile Radio Communication
Govind Sati, Dr. Sonika Singh
34 Performance Analysis Of Thermal Power Plant Sgtps
Pooja Talwar , Prof. S.K. Bajpai, Prof Shalini Vaishya
35 A review paper on Authentication Services in Cloud Computing Environment
Mamta Tewari
36 Monitoring Of Patients Using Wireless Sensor Feedback System
Neethu J Sivan, Mrs.Swati Kumari
37 Trust Based Secure Payment Scheme for Multihop Wireless Networks
T. Boobathy Ramkumar, Dr.T.Kalaikumaran ,Dr.S.Karthik
38 Efficient Clustering techniques for WSN- a survey
Mamta Tewari, Reenu Saini
39 Leakage power analysis Techniques for Nano CMOS Digital Circuits
Pankaj Agrawal, Nikhil Saxena, Waris junaid
40 Design and Realization of NIR Optical Spectroscopy Systems
Sarbjeet Kaur
41 A Comparative Study of the Total Domination with Paired Domination
Dr. J. Deva Raj, V. Sujin Flower
42 Co-ordinated Design of PSS and TCSC Damping Controllers in Multi-machine Power System using PSO
Prafull Kumar Verma, Dr.A.K.Bhardwaj
43 An Efficient Biometric Authentication System for Generating Virtual Identities
N.Parthiban, G.Selvavinayagam