Volume-2, Issue-3

May-June, 2016

1 Survey of Image Forgery Detection Technique based on Color Illumination using Machine Learning Approach
K.Sharath Chandra Reddy, Tarun Dalal
(Vol: 2, Issue: 3)
2 Study of Noise Reduction in Four-Cylinder Common Rail Direct Injection Diesel Engine at Idle Speed
Jaswinder Singh, Harvinder Lal
(Vol: 2, Issue: 3)
3 Prediction of Heart Disease using Data Mining Techniques
Era Singh Kajal, Ms. Nishika
(Vol: 2, Issue: 3)
4 Heart Disease Prediction System Using PCA and SVM Classification
Kiranjeet Kaur, Lalit Mann Singh
(Vol: 2, Issue: 3)
5 Analysis of Temperature Variation in a Mild Steel Plate using LBM
Neeraj Kumar, Abhishek Dadwal, Ajay Kumar, Gagan Bhatt, Amit
(Vol: 2, Issue: 3)
6 A Review Study of Thermal Spray Coatings for Corrosive Wear
Prajapati Amit Kumar, Vaibhav khurana
(Vol: 2, Issue: 3)
7 Mechanical Characterization of Thermal Spray Coating on Stainless Steel 316 L
Prajapati Amit Kumar, Vaibhav khurana
(Vol: 2, Issue: 3)
8 Manufacturing of Cement from Egg Shell
Samarth Bhardwaj
(Vol: 2, Issue: 3)
9 Micro Structural Characterization of Thermal Spray Coating on Stainless Steel AISI 316 L
Prajapati Amit Kumar, Vaibhav khurana
(Vol: 2, Issue: 3)
10 Enhancement of MANET Routing by Optimize Centrality with Ant Colony Approach
Monika Thakur, Saurabh Sharma
(Vol: 2, Issue: 3)
11 Five Point Key Amalgamation For Secure Authentication (FPKA-SA) In 4G Networks
Divyanshu Malhotra, Dr. Paramjeet Singh, Dr. Shaveta Rani
(Vol: 2, Issue: 3)
12 Blur Detection using Hybrid Classifier
Indu Kharb, Abhishek Sharma
(Vol: 2, Issue: 3)
13 Characterization of Stainless Steel 316l Coated by Thermal Spray Coating
Prajapati Amit Kumar, Sudhanshu Pandey, Ram Mishra, Ramdoot Yadav
(Vol: 2, Issue: 3)
14 Extracting News from the Web Pages by using Concept of Clustering with Neural Genetic Approach
Nishan Singh Saklani, Saurabh Sharma
(Vol: 2, Issue: 3)
15 Smart Routing for WSN for the Energy Balanced Routing over Hierarchical Deployments
Namrata Chopra, Manmeet Kaur
(Vol: 2, Issue: 3)
16 Hybrid Call Security System using Encryption & Steganography
Manmeet Kaur, Samreen Sekhon Brar, Namrata Chopra
(Vol: 2, Issue: 3)
17 Statistical Analysis of Part of Speech (Pos) Tagging Algorithms for English Corpus
Swati Tyagi, Gouri Shankar Mishra
(Vol: 2, Issue: 3)
18 Secure Authentication Based Trust Evaluation In VANETS
Meenu Setia, Mrs. Parul Dua
(Vol: 2, Issue: 3)
19 Enhanced Integrity Preserving Homomorphic scheme for Cloud Storage
Mashkoor Ahmad Kichloo, Mr. Parikshit Singla
(Vol: 2, Issue: 3)
20 Optimal 4G and LTE Cellular Tower Placement Strategy
Rishi Sharma, Er. Anupma Dhamija
(Vol: 2, Issue: 3)
21 An Analytical Study on Forecasting Model with Special Attention to Gold Price
P .M. Dhanalakshmi, P. R. S. Reddy
(Vol: 2, Issue: 3)
22 Palm Print: A Bio-Metric for Human Identification
Kalyani, Sunil Pathania
(Vol: 2, Issue: 3)
23 Human Identification using Iris Recognition
Geetanjali Sharma, Neerav Mehan
(Vol: 2, Issue: 3)
24 Traffic Jam and Accident Detection Techniques
Raveena Shaili, Sunil Pathania
(Vol: 2, Issue: 3)
25 A Deterministic GPSR Routing Protocol for MANET
Kumari Monika, Mr. Ashish Sharma
(Vol: 2, Issue: 3)
26 Adaptive Security Mechanism for Cognitive Radio Communications based on Robust Authentication
Mehakpreet Kaur, Navleen Kaur
(Vol: 2, Issue: 3)
27 Bandwidth-Aware Stochastic Uplink Scheduling in WIMAX
Komaljot Kaur, Amitabh Sharma
(Vol: 2, Issue: 3)
28 Optimized Healthcare Data Management and Critical Handling using Smart Data Categorization Method
Divisha Poonia, Satvir Bajwa
(Vol: 2, Issue: 3)
29 Implementation of Value Stream Mapping Methodology in Bearing Industry
Mehul Mayatra, Mr. N.D. Chauhan, Mr. Parthiv Trivedi, Mr. M.N. Qureshi
(Vol: 2, Issue: 3)
30 Document Image Binarization Technique for Degraded Document Images by using Morphological Operators
Divya Jyoti, Bodh Raj, Kapil Kapoor, Arun Sharma
(Vol: 2, Issue: 3)
31 A Novel Hybrid Classification Technique for Blur Detection
Indu Kharb, Abhishek Sharma
(Vol: 2, Issue: 3)
32 Study Of Various Vehicle Detection Techniques –A Review
Geetika Garg, Amardeep Kaur
(Vol: 2, Issue: 3)
33 Review of Diabetes Detection by Machine Learning and Data Mining
Preeti Verma, Inderpreet Kaur, Jaspreet Kaur
(Vol: 2, Issue: 3)
34 Software Defect Prediction using Ensemble Learning Survey
Ramandeep Kaur, Er. Harpreet Kaur, Er. Jaspreet Kaur
(Vol: 2, Issue: 3)
35 Intrusion Detection System by Machine Learning Review
Aanchal Kumar, Er. Jaspreet Kaur, Er. Inderpreet Kaur
(Vol: 2, Issue: 3)
36 Multi-level Authentication for Internet of Things to Establish Secure Healthcare Network
Shilpa Kansal, Navpreet Kaur
(Vol: 2, Issue: 3)
37 Hybrid Exemplar-Based Image in Painting Algorithm using Non Local Total Variation Model
Preeti Gupta, Kuldip Pahwa
(Vol: 2, Issue: 3)
38 A Review on IEEE-754 Standard Floating Point Arithmetic Unit
Monika Maan, Abhay Bindal
(Vol: 2, Issue: 3)
39 Noise Reduction: A Review
Bodh Raj, Arun Sharma, Kapil Kapoor, Divya Jyoti
(Vol: 2, Issue: 3)
40 A Novel Approach for the Reduction of Noise
Bodh Raj, Arun Sharma, Kapil Kapoor, Divya Jyoti
(Vol: 2, Issue: 3)
41 Automated LED Text Recognition with Neural Network and PCA –A Review
Sonu Rani, Navpreet Kaur
(Vol: 2, Issue: 3)
42 Complex Key Amalgamation Method for Secure Authentication (CKAM-SA) for 4G/LTE Networks
Zinnia
(Vol: 2, Issue: 3)
43 Implementation of GRP Routing Protocol in MANET
Vipin Verma, Saurabh Sharma
(Vol: 2, Issue: 3)
44 On the Selection of Optimum Topology for QoS Aware ZigBee-WiMAX based Healthcare Monitoring System
Karanvir Singh, Jyoteesh Malhotra
(Vol: 2, Issue: 3)
45 A Region based Offloading Mechanism in Mobile Cloud Computing Environment
Arshdeep Singh, Neena Madan
(Vol: 2, Issue: 3)
46 Efficient Scheduling by Genetic Algorithm and Simulated Annealing
Pooja Nehra, Mr. Sunil Ahuja
(Vol: 2, Issue: 3)
47 Trusted Key Management with RSA based Security Policy for MANETS
Vandana Arora, Sunil Ahuja
(Vol: 2, Issue: 3)
48 A Novel Pre-Shared Information Defense Mechanism for Spoofed IP Attack in SDN - A Review
Manisha Lalotra, Meenakashi Sharma, Gurjeet Kaur
(Vol: 2, Issue: 3)
49 Optimise the Gain of Optical Signal by SOA with Saturated ASE and Unsaturated ASE
Shilpa Thakur, Er. Vivek Gupta
(Vol: 2, Issue: 3)
50 A Novel Self Organizing Clustering Scheme for Clusters Setup
Sashi, Pooja Dhankar
(Vol: 2, Issue: 3)
51 Wireless Sensor Network: A Review
Sashi, Pooja Dhankar
(Vol: 2, Issue: 3)
52 Breast Cancer: Classification of Breast Masses Mammograms using Artificial Neural Network and Support Vector Machine
Kamaldeep Kaur, Er. Pooja
(Vol: 2, Issue: 3)


Is there a mistake in your details. Please let us know via this form.