IJSHRE Volume 2 Issue 3
1. | Intend and Examination of the Deliberation Inhibited Wheelchair | Pg.1-4 | |
Authors: Rajesh Babu .G , Akshay Sony, Libin Baby , Vipin.K | View PDF | ||
2. | Computer Transcription of Handwritten English Pitman’s Shorthand | Pg.5-9 | |
Authors: Janmaya Kumar Mishra, Dr. Khursheed Alam | View PDF | ||
3. | Smart Fault Location for Smart Grids | Pg.10-13 | |
Authors: P.Manikandan, J.Saravanan | View PDF | ||
4. | Detection of User-Space Keyloggers For Legitimate Users | Pg.14-18 | |
Authors: : Gauraw B. Chahande, Dixit M. Kolhatkar, Mayur L. Paradkar, Punam S. Budhe, Nilam V. Pawade, Mrs. Chandrayani N. Rokde. | View PDF | ||
5. | Digital Implementation of Sinusoidal Pulse Width Modulation Generator | Pg.19-22 | |
Authors: R.Sriram, R.Anand, P.Muthu Kumaran | View PDF | ||
6. | Implementation Of Solar Tracking System For Maximum Power Output | Pg.23-30 | |
Authors: S. B. Sridevi, A.Sai Suneel, K. Nalini | View PDF | ||
7. | Snooze Setting Up For Dangerous Incident MonitoringIn Wireless Sensor Networks | Pg.31-36 | |
Author: Mr. K. Sathyaseelan , Mr. C.B. Sivaparthiban, Mr. S. P. Santhoshkumar , Dr. S. Karthik | View PDF | ||
8. | Multiprecision Razor Based Dynamic Voltage Scaling Multiplier (32×32 Bit) | Pg.37-40 | |
Authors: R.Anand, R.Sriram, N.Dhivya Priya | View PDF | ||
9. | Image Based Authentication Using Persuasive Cued-Click Point Technique | Pg.41-46 | |
Authors: Snehal Ambade, Shubham Bhivgade, Saurabh Trivedi, S. B. Lanjewar | View PDF | ||
10. | A Study on Properties of Hybrid Fiber Reinforced Concrete | Pg.47-51 | |
Authors: Priyanka Dilip.P, K.Remadevi | View PDF | ||
11 | An Evaluation Study of Multipath Routing Protocols in AHWMNs | Pg.52-57 | |
Authors: C. Maddilety, Vennapusa Prakash Reddy, P. Jammulaiah | View PDF | ||
12. | Security challenges and antivirus layer role in cloud | Pg. 58-62 | |
Authors: Pooja V. Bhokare, Chitra J. Patil | View PDF | ||
13. | Liquid resizing:Content aware scaling | Pg. 63-67 | |
Authors: Rujul Mankad, Krupa Mandaviya | View PDF | ||
14. | Images Enhancement Using Cumulative Histogram Equalization Technique | Pg.68-74 | |
Authors: Avinash shrivastava; Chandrahas sahu | View PDF | ||
15. | Different Types of Fault Tolerant Techniques of Softcore Processor | Pg. 75-78 | |
Authors: Jaimini S. Patel, Deepali H. Shah | View PDF | ||
16. | Dynamic Fault-Tolerant Resource Allocation In Self-Organizing Clouds | Pg. 79-83 | |
Authors: S.Thejeswi, C.Thirumalaiselvan | View PDF | ||
17. | Optimization of PDP for Memory Design Using Signal Feed Through Scheme | Pg. 84-88 | |
Authors: Meenatchi Sundaram S, P.Thilagavathi | View PDF | ||
18. | Determination of Optimum Percentage Replacement of Fine Aggregate in Concrete Using GBFS(Granulated Blast Furnace Slag) | Pg. 89-94 | |
Authors: Ramadevi.K, Sindhubala.S, Johnpaul.V | View PDF | ||
19. | Towards the Next Generation of Open Source Software A Survey of the State-of-the-Art and Possible Alternatives | Pg. 95-98 | |
Authors: C. Raja Kumar, M. Rajinikannan | View PDF | ||
20. | Security In Image Compression Using Jpeg –Ls Algorithm | Pg.99-103 | |
Authors: M. MariSelvi, V.Josephine Sutha | View PDF | ||
21. | Advanced Driver Assistance System with Location Identifier | ||
Authors: Mohamed Naseem.S, Balaji.R, Prabaharan.S, Thirumalai Selvam.N,Chinnamuniyandi.S | View PDF | Pg.104-109 | |
22. | Efficient Analysis of Traffic Accident Using Mining Techniques | ||
Authors: S.Vigneswaran, A.Arun Joseph, E.Rajamanickam | View PDF | Pg.107-118 | |
23. | Wireless Black Box Using MEMS Accelerometer and GPS Tracking for Accident Monitoring Of Vehicle | ||
Authors: K.Arunakumari,S,Gowsalya Devi ,S.Samsiya Fathima,N.Mahalakshmi,R.Arunadevi | View PDF | Pg.119-123 | |
24. | Hardware Implementation of a Vibrating Sample Magnetometer Circuitry | ||
Authors: Ekta Gupta, RR Yadav, Manish Sharma | View PDF | Pg.124-127 | |
25. | Sparse MRI Application of Compressed Sensing For Rapid Real Time 3d Image | ||
Authors: M. Mari Pushpam, B.Sivasankar | View PDF | Pg.128-131 | |
26. | Power-Gated Logic in Asynchronous CircuitsUsing split level charge recovery logic (SCRL) | ||
Authors: P.Gomathi, S.Prabhavathy | View PDF | Pg.132-136 | |
27. | Smart Control for Power Grid Operations | ||
Authors:Mayur Diwate, Nirmal Borkar, Yashashree Patil, Vaidehee Kodgirwar, Ankita Kshirsagar |
View PDF | Pg. 137-140 | |
28 | Viterbi Decoder with High Speed ACSU Architecture Using T-Algorithm | ||
Authors: Ketan Machale, Atish A. Peshattiwar, Shashant Jaykar, Kuldeep Pande, Rohit Himte | View PDF | Pg. 141-147 | |
29. | Artificial Bee Colony Algorithm with Watchdog Mechanism for secure Data Transferring in Wireless Networks | Pg. 148-151 | |
Authors:Sasi Kumar.S, Gayathiri.N, Sivarajan.S |
View PDF | ||
30. | Implementation of an Algorithm for Mining Association Rules | ||
Authors: Mr. Akshay R. Ingle, Mr. Amay A. Ambekar, Mr. Swapnil M .Chawre, Mr. Swapnil N. Kedar, Mr. Lokesh S. Mundafale | View PDF | Pg. 152-155 | |
31. | Analysis Of Micro calcification Severity In Mammograms Using Non-Sub Sampled Transform | ||
Authors:M.Vigneshbabu , S. Janardhanaprabhu | View PDF | Pg. 156-160 | |
32. | MSIC Vector Used in BIST for Power Reduction by Selective Trigger scan Architecture | ||
Authors: R.Hemalatha, S.Prabhavathy | View PDF | Pg. 161-169
|