International Journal of Technology and Engineering System Vol 8. No. 1. 2016


Regular Issue
S.No. Research Topic Pages
1 Transformer Less H6-Bridge Cascaded STATCOM With Star Configuration For Real And Reactive Power Compensation
A.Elakkiya and E.Shyamaladevi
1-5
2 International Data Encryption Algorithm (Idea) For Data Security In Cloud
S. Artheeswari and Dr.RM. Chandrasekaran
6-11
3 A Technical Overview Of Various Homomorphic Encryption Techniques For A Secure Cloud Data Storage System
S.Kalaivany and Dr.T.Nalini
12-16
4 Mechanical And Corrosion Properties of A Reinforcing Steel For Self Compacting Concrete (SCC)
R.Dharmaraj and Dr.R.Malathy
17-25
5 Impact of Insulated Electrodes In ECM – A Review
J. Prasanna and Vijay Pranav. S
26-28
6 Comparative Study on The Effect Of Different Insulation Materials on The Performance Characteristics of ECM
J. Prasanna and Vijay Pranav. S
29-34
7 A Study on The Impact of Magnetic Field on EDM Process
Dr. J. Prasanna and Irfan Husain
35-38
8 Analysis Using Response Surface Methodology (RSM) Based Experimental Design on Magnetic Field Assisted EDM Process
Dr. J. Prasanna and Irfan Husain
39-43
9 Enhancing Personalized Web Search Using Greedy Algorithm
A.Smilien Rophie and Dr. A. Anitha
44-49
10 Analysis of Aging Detection on The Effectiveness of RO Based Sensor Using VLSI
G.Prathiba and K.Vasantha
50-56
11 An Efficient and Integrated Preprocessing Approach For The Diagnosis of Diabetic Retinopathy in Colour Fundus Images
V. Anu, M. Caroline Viola Stella Mary and J. Monica Esther
57-64
12 Sentiment Analysis For Two Sides of Review Using Dual Prediction
V.S.Swarnalekha and V.M.Suresh
65-69
13 Detection of Human Embryonic Stem Cells Using A Biodriven Method
John Princy. J and Dr. R. Ravi
70-74
14 Detecting Sinkhole Attack In MANET Using Adhoc On Demand Distance Vector
R.Rachel and Dr.R.Ravi
75-83
15 Detection of Vulnerability For Authentication In Networks
G.Ramya and S. Agnes Joshy
84-89
16 Anonymization Technique For Privacy Protection Sharing of Sensitive Data Stream
G.Nivedha and M.Chinnadurai
90-94
17 Secure Internet Services For Continuous And Obvious User Identity Authentication
M.K.Tamilazhagi and V.M.Suresh
95-100
18 Realtime Analysis of Social Network Twitter For Rating And Blocking User Comments Using NLP
Jayamoorthy, S.Divya, M.Shanmathy and R.Nalini Karpagam
101-114
19 Performance Analysis of Underlay Secondary Networks Using Binary Scheduling Algorithm
P.Caroline Priyanka Evelyne and V.Babu
115-121
20 Manufacturing of Bricks In The Past, In The Present And In The Future: A State of The Art Review
V.Anandabaskaran
122-137
21 Swarm Intelligence For Detecting Interesting Events In Crowded Environments
R.Sudhandira and Dr.Smitha Elsa Peter
138-142
22 Automatic Estimations of Oil Seep Locations Using Synthetic Aperture Radar Images(SAR)
P.Keerthana and A.Rijiuvana Begum
143-148
23 FPGA Implementation of BIST Transmitter Using Adaptive Self Mixing Envelope Detector
V.Niveatha Saro and V.Jayanthi
149-157
24 The Scenario of Software Industries In India
C.SenthilMurugan and Dr. S. Prakasam
158-163