Volume-1 Issue-6, August 2012

  • Version
  • Download 61
  • File Size 4.00 KB
  • Create Date August 30, 2012
  • .

Volume-1 Issue-6, August 2012, ISSN: 2249-8958 (Online)
Published By: Blue Eyes Intelligence Engineering & Sciences Publication

QRS Detection Using Wavelet Transform
Gaurav Jaswal1, Rajan Parmar2, Amit Kaul3


Integration of Wireless Hart Into DCS For Asset Monitor Applications
Ashima Yadav


Performance Analysis in Cooperative Communication
Ashima Yadav


Development and testing of PTFE based Composite Bearing Material for Turbine Pump
Pushkar Venkatesh Kulkarni1, N. K. Chapkhhane2


An Efficient Attack Detection System for Mobile Ad-hoc Network
Dilip Vishwakarma1, Deepak Chopra2


Implementation of Carry-Save Adders in FPGA
S. Ravi Chandra Kishore1, K.V. Ramana Rao2


An Introduction to Component – Oriented Software Technology
Prashant1, Nidhi Sharma2


A Comparison of the SOFM with LVQ, SOFM without LVQ and Statistical Technique
Anjana Bhardwaj1, Manish2, A. K. Arora3


Comparative Study: The Nonaka Model of Knowledge Management
Bashar Sarayreh1, Ammar Mardawi2, Rakan Dmour3


Using Comfort Related Data of Indian Railways for Fault Finding on Track: A Case Study with Multiple Profile
Riju Bhattacharya1, Kamal K. Mehta2


Review on Shear Wall for Soft Story High-Rise Buildings
Misam Abidi1, Mangulkar Madhuri. N.2


Active Noise Control using IIR Adaptive Filter
Rintu S. Abraham1, Veen2a S2


Design & Simulation of Round Robin Arbiter for NoC Architecture
Suyog K. Dahule1, M. A. Gaikwad2


Anti-attack and Channel Aware Target Localization in Wireless Sensor Networks Deployed in Hostile Environments
Zhenxing Luo


Analysis of A Case study on Fuel Leakage in a Pre-Filter Bowl of a Diesel Engine Fuel Feed Pump using Ansys
Priyanka D1, B.V.Raghavendra2, Subhash P3


Efficient Frequent Item set Discovery Technique in Uncertain Data
Deepak Chopra1, Dilip Vishwakarma2


A Modified Approach for Symmetric Key Cryptography Based on Blowfish Algorithm
Monika Agrawal1, Pradeep Mishra2


Business Contingency Planning: A Road Map to Protect Company from Unforeseen Threats
Ankur Kumar Shrivastava1, Nitisha Payal2, Abhinav Kumar3, Amod Tiwari4


Natural Convection Heat Transfer of Nanofluids Due to Thermophoresis and Brownian Diffusion in a Square Enclosure
Aminreza Noghrehabadi1, Amin Samimi2


Dynamics of a Nonlinear Digital Resonator in Free Running and Injection Synchronized Mode: A Simulation Study
Saumen Chakraborty1, Bishnu Charan Sarkar2


Energy Efficient Query Optimization in Wireless Sensor Networks
Ankita Bharaktya1, S. G. Reddy2


An Extensive Literature Review on Lead Time Reduction in Inventory Control
Ajit Kumar Senapati1, P.C.Mishra2, B.C.Routra3, Amitabha Biswas4


Object Manipulation using a Humanoid Robot
El Sayed M. Saad1, Medhat H. Awadalla2, Hosam Eldin I. Ali3, Rasha F. A. Mostafa4


A new Compact Printed Antenna for UMTS, WiMAX, HiPERLAN & WLAN Applications
Barun Mazumdar


Dispute Resolution Process in Construction Sector: Causes and Prevention
Alaknanda Mane1, S. S. Pimplikar2


An Ultra Wideband Wide Beam Strip line Fed Taper Slot Antenna for Active Phased Array Jammer
Gaurav Dwivedi


Dispute Resolution Process in Construction Sector: Causes and Prevention
Alaknanda Mane1, S. S. Pimplikar2


Power of Network Stochasticity
Parimal Kumar Giri1, Akshaya Kumar Behera2


Advancement of Low-cost Medicare System for the Measurement of Physiological Parameters of Human Body
Raksha Iyer1, R. M. Potdar2, Neelam Dewangan3, Jayant Rajpurohit4


Comparison of BER Performance in OFDM Using Different Equalization Techniques
Anuj Kanchan1, Shashank Dwivedi2


New Blind Digital Signature Based on Modified Elgamal Signature in Electronic Voting
Amir Aliabadian1, Ali Delavari Ghara2


Design Analysis and Characterization of a Piezoelectric Actuated Microvalve for Drug Delivery Applications
Meysam Chegini1, Milad Chegini2, Payam Khazael Pour3, Bani Rezaei4


ARM-based Embedded Ethernet Interface Design using DAC System
S. A. N. Sandeep1, P. Malyadr2


Zone Radius Optimization Based On Maximum Node Velocity, Number of Transmitting Nodes and Total Number of Nodes
Amir Aliabadian


A Novel Approach for Signature Verification using Artificial Neural Network
Vibha Pandey1, Sanjivani Shantaiya2


ECG Signal Compression Implementation by a New 2-Dimensional Transform Technique
Pushpendra Singh1, Om Prakash Yadav2, Yojana Yadav3


Intelligent Classification and Retrieval of Software Components
N. Rajasekhar Reddy1, R.Saraswati2


Optimal Allocation of DG Units for Radial Distribution Systems using Genetic Algorithm
Md. Anisa Shereen


Effect of Variation in Pitch of Tube on Heat Transfer Rate in Automobile Radiator by CED Analysis
P. K. Trivedi1, N. B.Vasava2


Sleep Pass Gate Approach for Static Power Reduction in 8*8 Wallace Multiplier
R. Naveen1, K.Thanushkodi2, C. Saranya3


A Cogitate Study on Text Mining
Y. Jahnavi1, Y. Radhika2


Supply Chain Management: A Business Centric Approach
Saumendra das1, Prasant Kumar Padhy2, K.Venugopal3, Santosh Ranganath .N4


Job Execution Framework for Performance Testing
Mangala S Joshi1, K Nirmala Kumari2, Saumil G Merchant3


Security and Privacy in Vanets
Akshay Goswami1, Roopali Goel2


Design and Implementation of OFDM (Orthogonal Frequency Division Multiplexing) using VHDL and FPGA
Manjunath Lakkannavar1, Ashwini Desai2


Novel Encoding Scheme in Genetic Algorithms for Better Fitness
Rakesh Kumar1, Jyotishree2


An Improved Binarization Based Algorithm using Minutiae Approach for Fingerprint Identification
S. M Rajbhoj1, P. B. Mane2


Incremental Frequent Pattern Mining
Jyoti Jadhav1, Lata Ragha2, Vijay Katkar3


Comparative Study of K-means and Bisecting k-means Techniques in Wordnet Based Document Clustering
B.S.Vamsi Krishna1, P.Satheesh2, Suneel Kumar R.3


Nonlinear Dynamics and Chaos in Second Order ZC1- DPLLs with Inherent Time Delay
Madhusudan Ghosh1, Tanmoy Banerjee2, Bishnucharan Sarkar3


Classification of Abnormalities in Brain MRI Images using GLCM, PCA and SVM
Daljit Singh1, Kamaljeet Kaur2


Role of Biometric Technology over Advanced Security and Protection in Auto Teller Machine Transaction
Navneet Sharma1, Vijay Singh Rathore2


Design and FPGA Implementation of Systolic Array Architecture for Matrix Multiplication
Rakesh Birle1, Lalit Bandil2


Comparision between Optimization and Conventional Catilever Retaining Wall by using Optimtool in Matlab
Sable K. S.1, Patil Archana A.2


Dynamic Event Based Energy Efficient Routing Protocol for Wireless Sensor Networks (WSNs)
Ashish Xavier Das1, Charlie Eapen2, A. Ashok3, Sudhanshu Tripathi4, Ridha Mabruk Shadi5


A Comprehensive Study on Threat Classification and Security Service in P2P
M.Seetha1, Y.J.Sudha Rani2


K- Means Algorithm with Different Measurements in Clustering Approach
P.C.Chenna Reddy1, R. Siva Sankara Reddy2


Optimal Solution Of 14 Bus System using MATLAB Simulation Incorporating with FACTS Devices
Nanda Kumar Easwaramoorthy1, R. Dhanasekaran2


Complexity Reduction of Fast Block Matching Algorithm
P. Muralidhar1, A. Vishnupriya2, C. B. RamaRao3


Ambient Data Collection with Modeling and Implementation of QoS in Wireless Sensor Networks
Arun Kumar Shukla1, Sudhanshu Tripathi2, Charlie Eapen3, A. Ashok4


Analysis of Spasm and Periodic Leg Movement in Spinal Cord Injury
G. Suresh1, T.V. Sreerama Reddy2


Management of Storm Water Quality in Urban Areas
Ranjan Sarukkalige