IJSHRE Volume 2 Issue 3
| 1. | Intend and Examination of the Deliberation Inhibited Wheelchair | Pg.1-4 | |
| Authors: Rajesh Babu .G , Akshay Sony, Libin Baby , Vipin.K | View PDF | ||
| 2. | Computer Transcription of Handwritten English Pitman’s Shorthand | Pg.5-9 | |
| Authors: Janmaya Kumar Mishra, Dr. Khursheed Alam | View PDF | ||
| 3. | Smart Fault Location for Smart Grids | Pg.10-13 | |
| Authors: P.Manikandan, J.Saravanan | View PDF | ||
| 4. | Detection of User-Space Keyloggers For Legitimate Users | Pg.14-18 | |
| Authors: : Gauraw B. Chahande, Dixit M. Kolhatkar, Mayur L. Paradkar, Punam S. Budhe, Nilam V. Pawade, Mrs. Chandrayani N. Rokde. | View PDF | ||
| 5. | Digital Implementation of Sinusoidal Pulse Width Modulation Generator | Pg.19-22 | |
| Authors: R.Sriram, R.Anand, P.Muthu Kumaran | View PDF | ||
| 6. | Implementation Of Solar Tracking System For Maximum Power Output | Pg.23-30 | |
| Authors: S. B. Sridevi, A.Sai Suneel, K. Nalini | View PDF | ||
| 7. | Snooze Setting Up For Dangerous Incident MonitoringIn Wireless Sensor Networks | Pg.31-36 | |
| Author: Mr. K. Sathyaseelan , Mr. C.B. Sivaparthiban, Mr. S. P. Santhoshkumar , Dr. S. Karthik | View PDF | ||
| 8. | Multiprecision Razor Based Dynamic Voltage Scaling Multiplier (32×32 Bit) | Pg.37-40 | |
| Authors: R.Anand, R.Sriram, N.Dhivya Priya | View PDF | ||
| 9. | Image Based Authentication Using Persuasive Cued-Click Point Technique | Pg.41-46 | |
| Authors: Snehal Ambade, Shubham Bhivgade, Saurabh Trivedi, S. B. Lanjewar | View PDF | ||
| 10. | A Study on Properties of Hybrid Fiber Reinforced Concrete | Pg.47-51 | |
| Authors: Priyanka Dilip.P, K.Remadevi | View PDF | ||
| 11 | An Evaluation Study of Multipath Routing Protocols in AHWMNs | Pg.52-57 | |
| Authors: C. Maddilety, Vennapusa Prakash Reddy, P. Jammulaiah | View PDF | ||
| 12. | Security challenges and antivirus layer role in cloud | Pg. 58-62 | |
| Authors: Pooja V. Bhokare, Chitra J. Patil | View PDF | ||
| 13. | Liquid resizing:Content aware scaling | Pg. 63-67 | |
| Authors: Rujul Mankad, Krupa Mandaviya | View PDF | ||
| 14. | Images Enhancement Using Cumulative Histogram Equalization Technique | Pg.68-74 | |
| Authors: Avinash shrivastava; Chandrahas sahu | View PDF | ||
| 15. | Different Types of Fault Tolerant Techniques of Softcore Processor | Pg. 75-78 | |
| Authors: Jaimini S. Patel, Deepali H. Shah | View PDF | ||
| 16. | Dynamic Fault-Tolerant Resource Allocation In Self-Organizing Clouds | Pg. 79-83 | |
| Authors: S.Thejeswi, C.Thirumalaiselvan | View PDF | ||
| 17. | Optimization of PDP for Memory Design Using Signal Feed Through Scheme | Pg. 84-88 | |
| Authors: Meenatchi Sundaram S, P.Thilagavathi | View PDF | ||
| 18. | Determination of Optimum Percentage Replacement of Fine Aggregate in Concrete Using GBFS(Granulated Blast Furnace Slag) | Pg. 89-94 | |
| Authors: Ramadevi.K, Sindhubala.S, Johnpaul.V | View PDF | ||
| 19. | Towards the Next Generation of Open Source Software A Survey of the State-of-the-Art and Possible Alternatives | Pg. 95-98 | |
| Authors: C. Raja Kumar, M. Rajinikannan | View PDF | ||
| 20. | Security In Image Compression Using Jpeg –Ls Algorithm | Pg.99-103 | |
| Authors: M. MariSelvi, V.Josephine Sutha | View PDF | ||
| 21. | Advanced Driver Assistance System with Location Identifier | ||
| Authors: Mohamed Naseem.S, Balaji.R, Prabaharan.S, Thirumalai Selvam.N,Chinnamuniyandi.S | View PDF | Pg.104-109 | |
| 22. | Efficient Analysis of Traffic Accident Using Mining Techniques | ||
| Authors: S.Vigneswaran, A.Arun Joseph, E.Rajamanickam | View PDF | Pg.107-118 | |
| 23. | Wireless Black Box Using MEMS Accelerometer and GPS Tracking for Accident Monitoring Of Vehicle | ||
| Authors: K.Arunakumari,S,Gowsalya Devi ,S.Samsiya Fathima,N.Mahalakshmi,R.Arunadevi | View PDF | Pg.119-123 | |
| 24. | Hardware Implementation of a Vibrating Sample Magnetometer Circuitry | ||
| Authors: Ekta Gupta, RR Yadav, Manish Sharma | View PDF | Pg.124-127 | |
| 25. | Sparse MRI Application of Compressed Sensing For Rapid Real Time 3d Image | ||
| Authors: M. Mari Pushpam, B.Sivasankar | View PDF | Pg.128-131 | |
| 26. | Power-Gated Logic in Asynchronous CircuitsUsing split level charge recovery logic (SCRL) | ||
| Authors: P.Gomathi, S.Prabhavathy | View PDF | Pg.132-136 | |
| 27. | Smart Control for Power Grid Operations | ||
| Authors:Mayur Diwate, Nirmal Borkar, Yashashree Patil, Vaidehee Kodgirwar, Ankita Kshirsagar |
View PDF | Pg. 137-140 | |
| 28 | Viterbi Decoder with High Speed ACSU Architecture Using T-Algorithm | ||
| Authors: Ketan Machale, Atish A. Peshattiwar, Shashant Jaykar, Kuldeep Pande, Rohit Himte | View PDF | Pg. 141-147 | |
| 29. | Artificial Bee Colony Algorithm with Watchdog Mechanism for secure Data Transferring in Wireless Networks | Pg. 148-151 | |
| Authors:Sasi Kumar.S, Gayathiri.N, Sivarajan.S |
View PDF | ||
| 30. | Implementation of an Algorithm for Mining Association Rules | ||
| Authors: Mr. Akshay R. Ingle, Mr. Amay A. Ambekar, Mr. Swapnil M .Chawre, Mr. Swapnil N. Kedar, Mr. Lokesh S. Mundafale | View PDF | Pg. 152-155 | |
| 31. | Analysis Of Micro calcification Severity In Mammograms Using Non-Sub Sampled Transform | ||
| Authors:M.Vigneshbabu , S. Janardhanaprabhu | View PDF | Pg. 156-160 | |
| 32. | MSIC Vector Used in BIST for Power Reduction by Selective Trigger scan Architecture | ||
| Authors: R.Hemalatha, S.Prabhavathy | View PDF | Pg. 161-169
|
|