Special Issue |
S.No. |
Research Topic |
Pages |
1 |
Efficient Detection of VoIP Calls Hidden in Web Traffic P.S. Abi |
1-4 |
2 |
A LAN protocol for efficient file transfer on Linux based system Ajit Ambekar, Pravin Dilpak, Pravinkumar Malviya and Sameer Mahant |
5-7 |
3 |
A Novel Approach for Secure Mobile-Voting using Biometrics in Conjunction with
Elliptic Curve Crypto-Stegano Scheme
Alok Kumar Vishwakarma and Atul Kumar |
8-11 |
4 |
VLSI Implementation of Oqpsk for Biomedical Devices Applications V. Anitha and R.Kanchana |
12-15 |
5 |
Role of Nanotechnology for Development of Sustainable Concrete Ashish Sharma, Misbahul Islam and Nadeem A Khan |
16-21 |
6 |
Access Transistor Underlap Optimization in 30 nm FinFET-Based 6T SRAM Using TCAD Simulation M Ashok Kumar, V N Ramakrishnan and Dr R Srinivasan |
22-26 |
7 |
A Novel Design for High Speed Multiplier for Digital Signal Processing Applications
(Ancient Indian Vedic mathematics approach)
Asmita Haveliya |
27-31 |
8 |
Enhance the Reliability of Simplified Multicast Forwarding Approaches in MANETs Bapuji Valaboju, Prof S.S.V.N Sarma and K.Venu Gopal Reddy |
32-38 |
9 |
A Performance Enhancement of an Optimized Power Reactive Routing based on
AODV Protocol for Mobile AD-HOC Network
V. Bharathi and T. Poongkuzhali |
39-44 |
10 |
Singular Axis Self Balancing System V Bharathi, R Sarankumar and K Venkatesh |
45-48 |
11 |
Design and Performance Analysis of a Slotted Rotary Disk Feeder Bhuvan Arora, Dharmendra Tarkar, Pradeep Khanna |
49-53 |
12 |
Simulation study on DOA estimation using MUSIC algorithm Chetan R.Dongarsane and A.N.Jadhav |
54-57 |
13 |
Comparative Study of RISC Architectures Chhayadevi M Bhamare, Meghanand A. Bhamare |
58-62 |
14 |
Routing with AODV Protocol for Mobile ADHOC Network A.M.Devi and B.Dr.V.Rhymend Uthariaraj
|
63-66 |
15 |
Offline signature using Cross validation and Graph matching approach
Dipali K. Bhole, A. V.Vidhate and Shrikant Velankar |
67-70 |
16 |
An Overview of Multi Point Relay AODV in Mobile Ad hoc Network M.Geetha and Dr. R.Umarani
|
71-76 |
17 |
Energy Efficient Packet scheduling with Timing Constraints in
Wireless Networks
S. Hari Raman and A. Senthamarai Selvan |
77-80 |
18 |
Experimental Investigation of Using Methanol-Diesel Blended Fuels in Diesel engine P.B.Ingle, M.D.Bawankure and N.R.Kannake |
81-84 |
19 |
Maximising Throughput and Lifetime through Effective Sensor Deployment Schemes N.Jothy, Mrs.A.Sivagami and K.Agila |
85-88 |
20 |
A Neuro-Genetic Approach for Multi-Objective Optimization of Process Variables in Drilling Jyotiprakash Bhol, Satindra N. Bhattacharya and Nirmal K. Mandal |
89-94 |
21 |
Biometrics for Mobile Banking B. Kiran Bala |
95-97 |
22 |
Numerical Analysis and Investigation of Aluminum Alloys in
Electromagnetic Metal Forming Process Kiran S.Bhole, B.S.Kale, P.D.Deshmukh and O.G.Sonare |
98-102 |
23 |
A Multi-Agent System for the Solution of Fuzzy Incidents in Telecommunications Lilyam Paolino, Horacio Paggi, Genoveva López, Fernando Alonso Amo |
103-107 |
24 |
Speech Recognition Using Neural Networks Manvendra Singh and Kamal Verma |
108-110 |
25 |
Performance of Speckle Noise Reduction Filters on Active Radar and SAR Images
A.V. Meenakshi and V. Punitham |
111-114 |
| International Journal of Technology And Engineering System(IJTES) Vol2. No.2 - Special Issue
|
1 |
Meta Search Engines for Information Retrieval on Multiple Domains D. Minnie and S. Srinivasan |
115-118 |
2 |
Study and Analysis of cutting forces in Granite Machining B.Nageswara Rao, Dr.J.E.B.Nelson and Dr.B.Balunaik |
119-122 |
3 |
Glass Fibre Reinforced Concrete Use in Construction Eng. Pshtiwan N. Shakor and Prof. S. S. Pimplikar |
123-128 |
4 |
Real time Diagnostics for Depth of Penetration in Laser Beam Welding Process : Review Rajesh V. Patil, Ashok P. Tadamalle and Dr. Pradeep J. Awasare |
129-132 |
5 |
Steganography using Hexa Sudoku Puzzle in Color Images
B.Premamayudu, Dr. Koduganti VenkataRao, M. Krishna Teja, M. Haneesh Krishna, K. Mukesh |
133-137 |
6 |
Four Leg Voltage Source Converter Based Dynamic Voltage Restorer
B.A.Priyanka and K.Vijayakumar |
138-142 |
7 |
Characterization of Impact Fracture Surfaces under Different Processing Conditions of
7075 Al Alloy using Image Texture Analysis
Prosenjit Das, Samik Dutta, H. Roy and R. Jayaganthan |
143-147 |
8 |
Forensic analysis of tampering database using RGBY algorithm
Rajni Kori, Vinod Kumar Sripuram, Saurabh Suman and Dr.B.B.Meshram |
148-151 |
9 |
An Itinerant GPRS-GPS and Sensors Integration for Atmospheric Effluence Screening Rakesh Kumar Giri |
152-157 |
10 |
Improving the Efficiency of Face Recognition System for Images with Different Illumination Conditions
S. Ravi and M. Rethinakumari |
158-162 |
11 |
Implementation of encoder and decoder for Turbo codes
Rutuja D. Deshmukh and Prof. D.M.Meshram |
163-166 |
12 |
Texture Image Classification using Multi Resolution Combined Statistical and
Spatial Frequency Method Dr.R.S.Sabeenian and Dr.V.Palanisamy |
167-171 |
13 |
Detection and Location of Defects in Handloom Cottage Silk Fabrics using MRMRFM & MRCSF Dr.R.S.Sabeenian, M.E.Paramasivam and P.M.Dinesh |
172-176 |
14 |
Metadata Generation for the Web Documents using WordNet Ontology
K.Saruladha, G.Aghila, P.Giridhar Reddy, M.Abinesh, N.Dhanigai Arasan and S.Sujesh |
177-182 |
15 |
3-Dimensional Thermal Mapping of Workpiece during Dry Milling using Finite Element Methods
Satindra N. Bhattacharya, Gourab Chakraborty and Dipankar Bose |
183-187 |
16 |
Analysis of Storage Devices
Saurabh Suman, Mahesh Kokate, Rajni Kori and Pravin Malviya |
188-192 |
17 |
The Design and Implementation of Passwords Management System using Blowfish Algorithm Savita Devidas Patil and Ashish T.Bhole
|
193-196 |
18 |
A Comparison of Peak to Average Power Reduction Schemes for OFDM
Shazia Shireen, Jyoti Asnani, Prof. Ravi Shankar Mishra and Prof.Rajesh Nema |
197-199 |
19 |
Multimodal Biometrics for authentication using DRM Technique
Sherin Edward, S.Sumathi and R.RaniHema Malini |
200-204 |
20 |
An efficient handover and channel management approach in integrated network
A.Sivagami, I.Marie Flora and A.C.Aarhtinivasini |
205-209 |
21 |
An Efficient Design and Implementation of Software Radio System
A.Sivagami, B.Shoba and P.Raja |
210-216 |
22 |
Design of Web based Remote Embedded Monitoring system B. Srinivas Raja and G. Srinivas Babu |
217-220 |
23 |
Most Efficient Multicast structure for Wireless Mesh Networks Suganya D, Dr.A.Sivabalan |
221-225 |
23 |
High Performance VLSI Design Using Body Biasing in Domino Logic Circuits Suman Nehra, K.G.Sharma, Tripti Sharma and Prof.B.P.Singh |
226-230 |
24 |
Providing Robust and Scalable Packet Transmission in Dynamic Environment Sundhar.U and S.Bharathiraja |
231-237 |
25 |
Efficient Voltage Regulation for Standalone Photovoltaic system using PI and
Fuzzy Controller for AC Voltage Application A.Y. Thiagarajan and B.S. Kavitha Thirupathi M and Ganesan S |
238-244 |
| International Journal of Technology And Engineering System(IJTES) Vol2. No.3 - Special Issue
|
1 |
Tenable Mutual Authentication and Key Exchange Using Cryptography
Thirupurasundari D R and Dr.A.Sivabalan |
245-251 |
2 |
Heavy Metal Bioaccumulation by Eisenia fetida, Cynodon dactylon and
Vigna radiata in Single, Bi and Tri-Metal Soil Systems Vaibhav Rathi, Swati .S. Sambyal, Himani Kulshreshtha and Pranveer S Satvat |
252-257 |
3 |
A Cuk-Sepic based Modular Design Methodology for Smart Grid Inverters P.Varun and M. Nirmala |
258-263 |
4 |
Widrow Hoff Learning Algorithm Based Minimization of
BER Multi-User Detection in SDMA
Venkata Reddy M, Krishan Kumar and K. Anil Naik |
264-268 |
5 |
Design and Development of Wireless Intravenous Multidrug Delivery System K.E.Ch. Vidyasagar, T Phani and Dr S Sudesh |
269-271 |
6 |
Real Time Vehicle Locking and Tracking System using GSM and
GPS Technology-An Anti-theft System
Pravada P. Wankhade and Prof. S.O. Dahad |
272-275 |
7 |
Blind Watermarking Scheme for Digital Images K.Yogalakshmi and R.Kanchana |
276-281 |
8 |
Different Antenna array Patterns and their effect on Wireless MIMO Communication System
Abinash Gaya
|
282-284 |
9 |
Counter Measures Against Multicast Attacks on Enhanced-On Demand Multicast Routing Protocol In
Mobile AD-HOC Networks
Aishwarya .K, Kannaiah Raju .N and Senthamarai Selvan .A
|
285-289 |
10 |
Removal of Heavy Metal by Screening Followed by Soil Washing from
Contaminated Soil Bibhabasu Mohanty and Amit.B.Mahindrakar |
290-293 |
11 |
Knowledge Acquisition under Uncertainty through Rough Set Brojo Kishore Mishra,Swarupananda Bissoyi and Susanta Kumar Das |
294-300 |
12 |
Design and Analysis of an Automotive Vacuum Suspended Power Brake Using Pro/MECHANICA V. Y Gajjar and Jaiveshkumar.D.Gandhi |
301-305 |
13 |
Power Effective cascaded Flash-SAR Subranging ADC Withdraw |
--- |
14 |
Distributed Opportunistic Scheduling in Cellular Data Networks-To Prevent The Malicious Attack N.Kandavel and M.Lavanya |
309-314 |
15 |
Performance Analysis of Joint Adaptive Modulation and Diversity Combining in TDD-CDMA Systems A.V.Meenakshi , V.Punitham and T.Gowri |
315-318 |
16 |
Vulnerability Evaluation of Network Traffic Using Set Theoretic Analysis for
Joint Security and Routing
R.Naresh and P. Selvakumar |
319-322 |
17 |
Role of Kinematic Analysis in tuning the Dynamic Behavior of a Formula Car K. J. Prashanth, Ashish Baidyanathan and Dr. T. Jagdish |
323-327 |
18 |
Distributional Convergence of Intermeeting Times Using Cluster Based
Hybrid Random Walk Mobility Model
A.Sairam and M.Lavanya |
328-333 |
19 |
Design of Web based Remote Embedded Monitoring system B. Srinivas Raja and G. Srinivas Babu |
334-337 |
20 |
Ability of Cicer arietinum (L.) for Bioremoval of Lead and Chromium from Soil Sunayna Dasgupta, Pranveer.S.Satvat and Amit.B.Mahindrakar |
338-341 |
21 |
Change Detection of Land Use/ Landcover Pattern in an Around Mandideep and
Obedullaganj Area, Using Remote Sensing and GIS
Manish K Tiwari and Aruna Saxena |
342-350 |
22 |
Effect of Stitching on Sandwhich Structures P. Vijayakumar and G. Suresh |
351-354 |
23 |
Numerical simulation of two dimensional unsteady flow past two square cylinders Vikram C. K., Dr. Y. T. Krishne Gowda, Dr. H. V. Ravindra, Dr.C.J.Gangadara Gowdaand Manu |
355-360 |
24 |
Mobile Integrated Power Supply System for Military Applications
Incorporating Dual Frequency Alternator VV Parlikar,PM Kurulkar,KP Rathod,Poonam Kumari |
361-364 |
25 |
Image Scan line Conversion For Portable Ultrasound Machine Lakshmi Prabha P,NimaJudithVinmathi and Manjunath Ramachandran |
365-368 |
26 |
A Converter Efficiency, Optimization Method Under Light-Load P.Vijayan and R.Sridevi |
369-376 |
27 |
Development of an Axial-Flux Permanent
Magnet (AFPM) Technology based Power
Source for Military Engineering Applications VV Parlikar,PM Kurulkar,MK Roy,KP Rathod,Poonam Kumari |
377-381 |