Volume-2 Issue-4, September 2012

  • Version
  • Download 23
  • File Size 4.00 KB
  • Create Date September 5, 2012
  • Download

Volume-2 Issue-4, September 2012, ISSN: 2231-2307 (Online)
Published By: Blue Eyes Intelligence Engineering & Sciences Publication

Identification of Stator Winding Faults and Remedial Operation of Permanent Magnet Synchronous Motors with Suppress Noise and Ripple
Hamdy Mohamed Soliman1, S. M. EL. Hakim2


Edusat Satellite Based Education: Study of Scope for Enhancement of Audio-Video Quality- A Case Study of Madhya Pradesh Bhoj (Open) University
Daulat Singh1, Shiv Kumar2, Rakesh Shrivastava3, Dinesh Varshney4


Some New Operations of Intuitionistic Fuzzy Soft Sets
Manoj Bora1, Tridiv Jyoti Neog2, Dusmanta Kumar Sut3


Movie Piracy Detection Based on Audio Features Using Mel-Frequency Cepstral Coefficients and Vector Quantization
B. Srinivas1, K.Venkata Rao2, P. Suresh Varma3


Configuring the System to Share Internet from Single User to Multi-user with Single Internet Dongle
Kapil Kumar1, Prateek Sharma2, Ajay Kumar Singh3


Optimal Fuzzy Supervisor Controller for an Active Suspension System
N. Ebrahimi1, A.Gharaveisi2


Improved Hysteresis Current Controller to Drive Permanent Magnet Synchronous Motors through the Field Oriented Control
Hamdy Mohamed Soliman1, S.M.EL. Hakim2


Multimedia Streaming Technology in 4G Mobile Communication Systems
Geeta Chandna1, Mohit Bansal2, Saloni3, Saru Sehgal4


Identifying Faulty Node and Alternative Path in a Network
Ramander Singh1, Vinod Kumar2, Ajay Kumar Singh3, Santosh Kumar Upadhyay4


A Coding and Decoding Scheme for Energy- based Target Localization in Wireless Sensor Networks
Zhenxing Luo


Voice-Based Humanoid Robot Interaction
El Sayed M. Saad1, Medhat H. Awadalla2, Hosam Eldin I. Ali3, Rasha F. A. Mostafa4


Reduction in Bit Error Rate from Various Equalization Techniques for MIMO Technology
Vinay Dawar1, Ritu Sharma2


Power Factor Improvement in a Sugar Mill: An Analysis
Neena Malhotra1, Shivani sehgal2


A Comparative Study of Training Algorithms for Supervised Machine Learning
Hetal Bhavsar1, Amit Ganatra2


An Elaborative Approach To Enhance Access Control Model: Demostrated By 7-Tier Architecture
Ankur Kumar Shrivastava1, Abhinav Kumar2, Richa Bhatnagar3, Nidhi Chaudhary4, Mariya Khurshid Ansari5, Amod Tiwari6


Development of Genetic Algorithm based Neural Network model for parameter estimation of Fast Breeder Reactor Subsystem
Subhra Rani Patra1, R. Jehadeesan2, S. Rajeswari3, S. A.V. Satya Murty4, M. Sai Baba5


Hotspot Analysis Based Partial CUDA Acceleration of HMMER 3.0 on GPGPUs
Fahian Ahmed1, Saddam Quirem2, Gak Min3, Byeong Kil Lee4


Framework for a Knowledge Management Platform in Higher Education Institutions
Parul Sinha1, Monika Arora2, N. M. Mishra3


Hindi Speaking Person Identification using Zero Crossing rate and Short-Term Energy
L. P. Bhaiya1, Arif Ullah Khan2


Effect of Energy Conservation on Environmental Loads
Yogendra Singh1, R. K. Agarwal2, C. Srivastava3


Analysing the Inclusion of Soft Computing Techniques in Denoising EEG Signal
Ashish Raj1, Akanksha Deo2, Mangesh S. Tomar3, Manoj Kumar Bandil4


A Simple Block Based Content Watermarking Scheme for Image Authentication and Tamper Detection
L. Sumalatha1, G. Rosline Nesa Kumari2, V.Vijaya Kumar3


A Novel Snapshot Based Approach for Direction of Arrivial Estimation with Least Bias
Kishore M.1, H. M. Guruprasad2, S. M. Shashidhar3


TOrBAC: A Trust Organization Based Access Control Model for Cloud Computing Systems
Mustapha Ben Saidi1, Anas Abou Elkalam2, Abderrahim Marzouk3


A Comparative Analysis of Selection Scheme
Sonali Gandhi1, Deeba Khan2, Vikram Singh Solanki3


Generation of Frequent Patterns with Weights Over Continuous Flow of Data Efficiently
P. Satheesh1, B. Srinivas2, A. Satish Kumar3


Decomposed Fuzzy Controller for Reactive Mobile Robot Navigation
Munaf S. N. Al-Din


ADATPM: Analysis and Design of Author’s Trait Processing Module for textual Data
Gaurav Kansal1, Maneesha2


NoC Based Approach to Enhance the Existing Network Architecture
Saurabh Yadav1, Ajay Kumar Singh2


Biometric Authentication as a Service on Cloud: Novel Solution
Himabindu Vallabhu1, R. V. Satyanarayana2


Apply Pruning Algorithm for Optimizing Feed Forward Neural Networks for Crack Identifications in Francis Turbine Runner
Raza Abdulla Saeed1, Loay Edwar George2


Flexible Arbiter Based On Dynamic Arbitration Scheme for Ml-Ahb Busmatrix
Manjunath M.1, Sunitha S. L.2, B. N. Shobha3


Implementation of Fault Tolerant Method Using BCH Code on FPGA
Mahadevaswamy V. P.1, Sunitha S. L.2, B. N. Shobha3


Classification Rule Discovery for Diabetes Patients by Using Genetic Programming
Raj Kumar1, Rajesh Verma2


A New Design of Borosilicate Crown Glass Photonic Crystal Fiber to Minimize the Dispersion
Shilpa Tiwari1, Sunil Jalwania2, Ajay Kumar Bairwa3


CPLD Based Speed Controller of a DC Motor Operated Through Cellphone
Manas Kumar Parai1, Debajyoti Misra2, Banasree Das3


Toward a Pattern Language for a Allocation View in SOA
Mohammadreza Shahlaei1, Seyyed Mohsen Hashemi2


Extended Max-Min Scheduling Using Petri Net and Load Balancing
El-Sayed T. El-kenawy1, Ali Ibraheem El-Desoky2, Mohamed F. Al-rahamawy3


Modified Prime Number Factorization Algorithm (MPFA) For RSA Public Key Encryption
Kuldeep Singh1, Rajesh Verma2, Ritika Chehal3


A Comparative Study of MIPv6, HMIPv6 & IMS in terms of Cost
Virender Kumar1, G. C. Lall2


Performance Analysis of Multi User Detectors for Synchronous DS-CDMA Systems
I. Krishna Rao1, K. Santhosh Kumar2


Improving DDM Performance By Combining Distributed Data Mining And Multi-Agent System
Sitanath Biswas1, Subrat S. Pattnaik2, Sweta Acharya3


Prioritizing Test Suites Using Clustering Approach in Software Testing
Arvind Kumar Upadhyay1, A. K. Misra2


Application of ICT in Crop Production
Ugwuishiwu C. H.1, Udanor C.2, Ugwuishiwu B. O.3


Performance Analysis of Singular Value Decomposition (SVD) and Radial basis Function (RBF) Neural Networks for Epilepsy Risk Levels Classifications from EEG Signals
R. Hari Kumar1, B. Vinoth Kumar2, K. Karthik3, Jagdsh L. K. Chand4, C. Navin Kumar5


Web Vulnerability Detection and Security Mechanism
Katkar Anjali S.1, Kulkarni Raj B.2


Investigation of Techniques for Efficient & Accurate Indexing for Scalable Record Linkage & Deduplication
Sunitha Yeddula1, K.Lakshmaiah2


Scalability of Multi Tier Transactions Towards Data Confidentiality For Cloud Applications
Suvanam Sasidhar Babu1, A. Chandra Sekhara Sarma2, Yellepeddi Vijayalakshmi3, N.V.Kalyankar4


Security Approaches in Wireless Home Networks – The Incipient drifts and Surviving Glitches
Dhowmya Bhatt1, Ekata Gupta2


Efficient Techniques for Denoising of Highly Corrupted Impulse Noise Images
Suresh Velaga1, Sridhar Kovvada2


Requirements Volatility in Software Development Process
M. P. Singh1, Rajnish Vyas2


Improved Block Based Feature Level Image Fusion Technique Using Multiwavelet with Neural Network
C. M. Sheela Rani1, V. VijayaKumar2, B. V. Ramana Reddy3


Effect of Communication Frequency on Specific Absorption Rate Of Electromagnetic Radiations In Human Body
Amarjeet Kaur1, Himani Malik2, Asha Lather3, V. K. Lamba4


High Temperature Electrical Characterization of Single Crystal of N-Type CDSE Optimally Annealed in a molten CD
Pankaj Varshney


Scattered Domination In Graphs
Rajesh Kumar Tripathi1, Minakshi Gaur2


Effect of Thickness and Material on Electronic Properties of GAA-MuGFETs
Himani Malik1, Amarjeet Kaur2, Asha Lather3, V.K.Lamba4, Bhupesh Kharb5


Wavelets for the Fast Solution of Ordinary Differential Equations
Pankaj Varshney1, Kapil Kumar Bansal2, Jyotshana Gaur3