Volume-2 Issue-5, November 2012

  • Version
  • Download 35
  • File Size 4.00 KB
  • Create Date November 30, 2012
  • Download

Volume-2 Issue-5, November 2012, ISSN: 2231-2307 (Online)
Published By: Blue Eyes Intelligence Engineering & Sciences Publication

A Model of NAFDAC Real-Time Crime Information System
Ugwuishiwu C.H.1, Inyiama H.C.2, Ezema M.E.3


RFID for Cargo and Passenger Automation and Control in Airline Industry
Abolfazl Rajabi1, Mostafa Tavassoli2, Sasan Mohammadi3, Mehrdad Javadi4


On Minimizing Software Defects during New Product Development Using Enhanced Preventive Approach
Khaleel Ahmad1, Nitasha Varshney2


Forecasting Risk and Risk Consequences on ERP Maintenance
Khaleel Ahmad1, Amit Kumar2


Analysis and Comparative Study of Different Parameters of Operational Amplifier Using Bipolar Junction Transistor and Complementary Metal Oxide Semiconductor Using Tanner Tools
Ankit Kapil1, Arpan Shah2, Rekha Agarwal3, Sandhya Sharma4


Duplicity Detection System for Digital Documents
Ranjeet Singh1, Chiranjit Dutta2


Quantum Inspired Evolutionary Algorithm for Optimization of Hot Extrusion Process
Rajat Setia1, K. Hans Raj2


Coal Burn Detection Using Wireless Sensor Network with Evidence Combination
M.Syed Mohamed1, M.Mohamed Sathik2, K.Senthamarai Kannan3


A smart Dictionary for the Arabic Full-Form Words
Ali EL-Desoky1, Marwa Fayz2, Doaa Samir3


Design of Power System Stabilizer for Power System Damping Improvement with Multiple Design Requirements
G.Y.Rajaa Vikhram1, S.Latha2


SaaS Multi-Tenancy Isolation Testing- Challenges and Issues
Avneesh Vashistha1, Pervez Ahmed2


An Innovative Approach towards the Video Compression Methodology of the H.264 Codec: Using SPIHT Algorithms
Charu Pandey1, Satish Kumar2, Rajinder Tiwari3


Simulation of Non-Equilibrium Transport of Suspended Sediment in Open Channels
R Gopakumar1, Robert Jesuraj K2


A New Scheme for Minimizing Software Piracy Using Combination of Smart Card and Physical Attribute with applied Crypto System
J. Swapna Priya1, Sk. Abdul Kareem2, M. Gargi3


Application of WSN in Rural Development, Agriculture Water Management
Rashid Hussain1, J L Sahgal2, Purvi Mishra3, Babita Sharma4


A Novel Compact Monopole Antenna for C band/Wi-Fi/IEEE 802.16 Systems
Rashmi Sharma1, Kirti Vyas2


Role of Sorption Characteristics of Geomaterials on Long Term Performance of Landfill Barrier
K. M. Nithya1, D. N. Arnepalli2, S. R. Gandhi3


Fuzzy Controller Design using Soft Switching Boost Converter for MPPT in Hybrid System
T.Balamurugan1, S.Manoharan2


An Implementation of a Forward Error Correction Technique using Convolution Encoding with Viterbi Decoding
Himmat Lal Kumawat1, Sandhya Sharma2


Background Modeling and Subtraction Based People Counting for Real Time Video Surveillance
Rakesh Kumar1, Tapesh Parashar2, Gopal Verma3


Evaluation of the Quality of Synthesized Calls of Alexandrine Parakeet (Psittacula Eupatria)
Kamaljit Singh Arora1, Randhir Singh2, Parveen Lehana3


Baggage Traffic Control in Airports making use of RFID Technology
Mostafa Tavassoli1, Abolfazl Rajabi2, Mehrdad Javadi3, Sasan Mohammadi4


Transient And DC Analysis Microcontroller 8051 at 0.5 micro Technology for High Speed Applications
Haneef Khan1, Amit2


Implementation of Data Aggregation and Authentication in Wireless Sensor Networks
S. Chaitanya Rami Reddy1, P. Ravinder Kumar2


Performance Analysis of BFO for PAPR Reduction in OFDM
Neha Gupta1, Garima Saini2


Access Control Protocol for Cloud Systems Based On the Model TOrBAC
Mustapha Ben Saidi1, Abderrahim Marzouk2


Tree Routed Contingency Retrieval Mechanism for Virtual Private Networks
Mahalakshmi C1, Ramaswamy M2


An Expert Anti-Malware Detection System
Richa Bhatnagar1, Mariya Khurshid Ansari2, Sakshi Bhatnagar3, Harshbardhan Barik4


Comprehensive Analysis of Hierarchical Aggregation Functions Decision Trees and Minimum Relative Entropy as Post Classifiers in the Classification of Fuzzy Based Epilepsy Risk Levels
R. HariKumar1, T.Vijayakumar2, M.G.Sreejith3


Prediction of Warranty Cost and Warranty Period using Neuro-Fuzzy Approach: Case Study of Automobile Warranty Data
Nur Izzati Jamahir1, Hairudin Abd Majid2, Azurah A.Samah3


Fully Fuzzy System of Linear Equations
Purnima Pandit


Parameter Estimation of Warranty Cost Model Using Genetic Algorithm
Nur Hayati Kasim1, Hairudin Abdul Majid2, Azurah A. Samah3


Modified Variable Step Size Normalized Least Means Square Algorithm In The Context Of Acoustic Echo Cancellation
Deman Kosale1, Anita Khanna2


Performance, Monitoring and Analysis of OWC Link at Different Atmospheric Conditions
Deman Kosale1, Anita Khanna2


Low Power 128-Point Pipeline FFT Processor using Mixed Radix 4/2 for MIMO OFDM Systems
K. Umapathy1, D. Rajaveerappa2


JigCAPTCHA: An Advanced Image-Based CAPTCHA Integrated with Jigsaw Piece Puzzle using AJAX
Nitisha Payal1, Nidhi Chaudhary2, Parma Nand Astya3


Security Enhancement in WEP by Implementing Elliptic Curve Cryptography Technique
Jaspreet Singh1, Er. Sandeep Singh Kang2


Real Time Application of Face Recognition Concept
Kandla Arora


A Novel Approach for Secure Keying Protocol for Sensor Networks
B.Srinivas1, P.Satheesh2, G.Gowthami3


An Evolution Strategy Approach toward Rule-Set Generation for Network Intrusion Detection Systems (IDS)
Herve Kabamba Mbikayi


Secure Transmission Of Grayscale Images Using Discrete Fourier Transform
Pankesh Bamotra1, Prashant Dwivedi2


A Mobile Target Tracking and Data-Centric Sensor Using Wireless Network
V.Vijayadeepa1, P. Anitha2


Implementation of Fuzzy K-Means In Multi-Type Feature Coselection For Clustering
K. Parimala1, V. Palanisamy2


Single to Multiband Frequency Technique for Wireless and Telecomm Microstrip Antenna Design
Shelly Chawla1, Jagtar Singh2, Paras Chawla3


Exploring the Need for Specialized Testing Technique for an Agent-Based Software
N.Sivakumar1, K.Vivekanandan2


Innovative Segmentation Approach Based on LRTM
S.Kezia1, I.Shanti Prabha2, V.VijayaKumar3


To Investigate the Electrical Impedance of the Aloe Barbadensis Miller Leaves
Sanjeev Kumar Sharma1, Randhir Singh2, Parveen Lehana3


Process Speech Recognition System using Artificial Intelligence Technique
Anupam Choudhary1, Ravi Kshirsagar2


Analysis and Comparative Study of Effect of Feedback on BJT and CMOS Amplifier using Tanner Tools
Arpan Shah1, Ankit Kapil2, Rekha Agarwal3, Sandhya Sharma4


Robust Stability Analysis with Time Delay Using PI Controller
Gursewak Singh


Quality of Service (QoS) in Wireless Network and NS-3, VOIP Simulation Environment
Ashish Dubey


Metrics Identification for Measuring Object Oriented Software Quality
Aman Kumar Sharma1, Arvind Kalia2, Hardeep Singh3


Power-Efficient Reliable Routing Protocol to Increase Throughput in Ad hoc Networks
Shayesteh Tabatabaei1, Mohamad Teshnehlab2


Component Based Approach for Technically Feasible and Economically Viable E-Content Design and Development
J.Senthil Kumar1, S.K.Srivatsa2


Tumors Classification using PNN Methods
M. Vinay Kumar1, Sharad Kulkarini2


Artificial Intelligence in Games
Raju1, Nitin Sikka2, Sanjeev Kumar3, Rahul Gupta4


Satellite Image Resolution Enhancement using DWT Technique
O. Harikrishna1, A. Maheshwari2


Design of a Rectangular Fractal Patch Geometry for Modern Communication Systems
Ruchika Jain1, Deepak Bhatnagar2, Kirti Vyas3


Design of Improved Built-In-Self-Test Algorithm (8n) for Single Port Memory
Manoj Vishnoi1, Arun Kumar2, Minakshi Sanadhya3


Design of High Breakdown Voltage and Power Dissipation of 6H-SIC DIMOSFET Using Uniformly Doped Profile of Drift Region.
Sanjay Sharma1, Amarjeet Kaur2, Shaweta Narula3, Meenu Jangir4, Ashish Sharma5, Hemchand Vashist6


Analysis of Sliding Window Protocol for Connected Node
Kapil Kumar Bansal1, Rakesh Kumar Yadav2


A Comparative Study Review of Soft Computing Approach in Weather Forecasting
Govind Kumar Rahul1, Madhu Khurana2


Vehicle Collision Avoidance System Using Wireless Sensor Networks
S.Ramesh1, Ravi Ranjan2, Ranjeet Mukherjee3, Swarnali Chaudhuri4