Volume-1 Issue-6, August 2012

  • Version
  • Download 61
  • File Size 4.00 KB
  • Create Date August 31, 2012
  • Download

Volume-1 Issue-6, August 2012, ISSN: 2249-8958 (Online)
Published By: Blue Eyes Intelligence Engineering & Sciences Publication

QRS Detection Using Wavelet Transform
Gaurav Jaswal1, Rajan Parmar2, Amit Kaul3

Integration of Wireless Hart Into DCS For Asset Monitor Applications
Ashima Yadav

Performance Analysis in Cooperative Communication
Ashima Yadav

Development and testing of PTFE based Composite Bearing Material for Turbine Pump
Pushkar Venkatesh Kulkarni1, N. K. Chapkhhane2

An Efficient Attack Detection System for Mobile Ad-hoc Network
Dilip Vishwakarma1, Deepak Chopra2

Implementation of Carry-Save Adders in FPGA
S. Ravi Chandra Kishore1, K.V. Ramana Rao2

An Introduction to Component – Oriented Software Technology
Prashant1, Nidhi Sharma2

A Comparison of the SOFM with LVQ, SOFM without LVQ and Statistical Technique
Anjana Bhardwaj1, Manish2, A. K. Arora3

Comparative Study: The Nonaka Model of Knowledge Management
Bashar Sarayreh1, Ammar Mardawi2, Rakan Dmour3

Using Comfort Related Data of Indian Railways for Fault Finding on Track: A Case Study with Multiple Profile
Riju Bhattacharya1, Kamal K. Mehta2

Review on Shear Wall for Soft Story High-Rise Buildings
Misam Abidi1, Mangulkar Madhuri. N.2

Active Noise Control using IIR Adaptive Filter
Rintu S. Abraham1, Veen2a S2

Design & Simulation of Round Robin Arbiter for NoC Architecture
Suyog K. Dahule1, M. A. Gaikwad2

Anti-attack and Channel Aware Target Localization in Wireless Sensor Networks Deployed in Hostile Environments
Zhenxing Luo

Analysis of A Case study on Fuel Leakage in a Pre-Filter Bowl of a Diesel Engine Fuel Feed Pump using Ansys
Priyanka D1, B.V.Raghavendra2, Subhash P3

Efficient Frequent Item set Discovery Technique in Uncertain Data
Deepak Chopra1, Dilip Vishwakarma2

A Modified Approach for Symmetric Key Cryptography Based on Blowfish Algorithm
Monika Agrawal1, Pradeep Mishra2

Business Contingency Planning: A Road Map to Protect Company from Unforeseen Threats
Ankur Kumar Shrivastava1, Nitisha Payal2, Abhinav Kumar3, Amod Tiwari4

Natural Convection Heat Transfer of Nanofluids Due to Thermophoresis and Brownian Diffusion in a Square Enclosure
Aminreza Noghrehabadi1, Amin Samimi2

Dynamics of a Nonlinear Digital Resonator in Free Running and Injection Synchronized Mode: A Simulation Study
Saumen Chakraborty1, Bishnu Charan Sarkar2

Energy Efficient Query Optimization in Wireless Sensor Networks
Ankita Bharaktya1, S. G. Reddy2

An Extensive Literature Review on Lead Time Reduction in Inventory Control
Ajit Kumar Senapati1, P.C.Mishra2, B.C.Routra3, Amitabha Biswas4

Object Manipulation using a Humanoid Robot
El Sayed M. Saad1, Medhat H. Awadalla2, Hosam Eldin I. Ali3, Rasha F. A. Mostafa4

A new Compact Printed Antenna for UMTS, WiMAX, HiPERLAN & WLAN Applications
Barun Mazumdar

Dispute Resolution Process in Construction Sector: Causes and Prevention
Alaknanda Mane1, S. S. Pimplikar2

An Ultra Wideband Wide Beam Strip line Fed Taper Slot Antenna for Active Phased Array Jammer
Gaurav Dwivedi

Dispute Resolution Process in Construction Sector: Causes and Prevention
Alaknanda Mane1, S. S. Pimplikar2

Power of Network Stochasticity
Parimal Kumar Giri1, Akshaya Kumar Behera2

Advancement of Low-cost Medicare System for the Measurement of Physiological Parameters of Human Body
Raksha Iyer1, R. M. Potdar2, Neelam Dewangan3, Jayant Rajpurohit4

Comparison of BER Performance in OFDM Using Different Equalization Techniques
Anuj Kanchan1, Shashank Dwivedi2

New Blind Digital Signature Based on Modified Elgamal Signature in Electronic Voting
Amir Aliabadian1, Ali Delavari Ghara2

Design Analysis and Characterization of a Piezoelectric Actuated Microvalve for Drug Delivery Applications
Meysam Chegini1, Milad Chegini2, Payam Khazael Pour3, Bani Rezaei4

ARM-based Embedded Ethernet Interface Design using DAC System
S. A. N. Sandeep1, P. Malyadr2

Zone Radius Optimization Based On Maximum Node Velocity, Number of Transmitting Nodes and Total Number of Nodes
Amir Aliabadian

A Novel Approach for Signature Verification using Artificial Neural Network
Vibha Pandey1, Sanjivani Shantaiya2

ECG Signal Compression Implementation by a New 2-Dimensional Transform Technique
Pushpendra Singh1, Om Prakash Yadav2, Yojana Yadav3

Intelligent Classification and Retrieval of Software Components
N. Rajasekhar Reddy1, R.Saraswati2

Optimal Allocation of DG Units for Radial Distribution Systems using Genetic Algorithm
Md. Anisa Shereen

Effect of Variation in Pitch of Tube on Heat Transfer Rate in Automobile Radiator by CED Analysis
P. K. Trivedi1, N. B.Vasava2

Sleep Pass Gate Approach for Static Power Reduction in 8*8 Wallace Multiplier
R. Naveen1, K.Thanushkodi2, C. Saranya3

A Cogitate Study on Text Mining
Y. Jahnavi1, Y. Radhika2

Supply Chain Management: A Business Centric Approach
Saumendra das1, Prasant Kumar Padhy2, K.Venugopal3, Santosh Ranganath .N4

Job Execution Framework for Performance Testing
Mangala S Joshi1, K Nirmala Kumari2, Saumil G Merchant3

Security and Privacy in Vanets
Akshay Goswami1, Roopali Goel2

Design and Implementation of OFDM (Orthogonal Frequency Division Multiplexing) using VHDL and FPGA
Manjunath Lakkannavar1, Ashwini Desai2

Novel Encoding Scheme in Genetic Algorithms for Better Fitness
Rakesh Kumar1, Jyotishree2

An Improved Binarization Based Algorithm using Minutiae Approach for Fingerprint Identification
S. M Rajbhoj1, P. B. Mane2

Incremental Frequent Pattern Mining
Jyoti Jadhav1, Lata Ragha2, Vijay Katkar3

Comparative Study of K-means and Bisecting k-means Techniques in Wordnet Based Document Clustering
B.S.Vamsi Krishna1, P.Satheesh2, Suneel Kumar R.3

Nonlinear Dynamics and Chaos in Second Order ZC1- DPLLs with Inherent Time Delay
Madhusudan Ghosh1, Tanmoy Banerjee2, Bishnucharan Sarkar3

Classification of Abnormalities in Brain MRI Images using GLCM, PCA and SVM
Daljit Singh1, Kamaljeet Kaur2

Role of Biometric Technology over Advanced Security and Protection in Auto Teller Machine Transaction
Navneet Sharma1, Vijay Singh Rathore2

Design and FPGA Implementation of Systolic Array Architecture for Matrix Multiplication
Rakesh Birle1, Lalit Bandil2

Comparision between Optimization and Conventional Catilever Retaining Wall by using Optimtool in Matlab
Sable K. S.1, Patil Archana A.2

Dynamic Event Based Energy Efficient Routing Protocol for Wireless Sensor Networks (WSNs)
Ashish Xavier Das1, Charlie Eapen2, A. Ashok3, Sudhanshu Tripathi4, Ridha Mabruk Shadi5

A Comprehensive Study on Threat Classification and Security Service in P2P
M.Seetha1, Y.J.Sudha Rani2

K- Means Algorithm with Different Measurements in Clustering Approach
P.C.Chenna Reddy1, R. Siva Sankara Reddy2

Optimal Solution Of 14 Bus System using MATLAB Simulation Incorporating with FACTS Devices
Nanda Kumar Easwaramoorthy1, R. Dhanasekaran2

Complexity Reduction of Fast Block Matching Algorithm
P. Muralidhar1, A. Vishnupriya2, C. B. RamaRao3

Ambient Data Collection with Modeling and Implementation of QoS in Wireless Sensor Networks
Arun Kumar Shukla1, Sudhanshu Tripathi2, Charlie Eapen3, A. Ashok4

Analysis of Spasm and Periodic Leg Movement in Spinal Cord Injury
G. Suresh1, T.V. Sreerama Reddy2

Management of Storm Water Quality in Urban Areas
Ranjan Sarukkalige