IJSHRE Volume 2 Issue 3

1. Intend and Examination of the Deliberation Inhibited Wheelchair Pg.1-4
Authors: Rajesh Babu .G , Akshay Sony, Libin Baby , Vipin.K  View PDF  
2. Computer Transcription of Handwritten English Pitman’s Shorthand Pg.5-9
Authors: Janmaya Kumar Mishra,  Dr. Khursheed Alam   View PDF  
3. Smart Fault Location   for Smart Grids Pg.10-13
Authors: P.Manikandan, J.Saravanan  View PDF  
4. Detection of User-Space Keyloggers For Legitimate Users Pg.14-18
Authors: : Gauraw B. Chahande, Dixit M. Kolhatkar, Mayur L. Paradkar, Punam S. Budhe, Nilam V. Pawade, Mrs. Chandrayani N. Rokde.  View PDF  
5. Digital Implementation of Sinusoidal Pulse Width Modulation Generator Pg.19-22
Authors: R.Sriram,  R.Anand,  P.Muthu Kumaran  View PDF  
6. Implementation Of Solar Tracking System For Maximum Power Output Pg.23-30
Authors: S. B. Sridevi, A.Sai Suneel, K. Nalini  View PDF  
7. Snooze Setting Up For Dangerous Incident MonitoringIn Wireless Sensor Networks Pg.31-36
Author: Mr. K. Sathyaseelan , Mr. C.B. Sivaparthiban, Mr. S. P. Santhoshkumar , Dr. S. Karthik   View PDF  
8. Multiprecision Razor Based Dynamic Voltage Scaling Multiplier (32×32 Bit) Pg.37-40
Authors: R.Anand,  R.Sriram,  N.Dhivya Priya  View PDF  
9. Image Based Authentication Using Persuasive Cued-Click Point Technique Pg.41-46
Authors: Snehal Ambade, Shubham Bhivgade,  Saurabh Trivedi,  S. B. Lanjewar   View PDF  
10. A Study on Properties of Hybrid Fiber Reinforced Concrete Pg.47-51
Authors: Priyanka Dilip.P,  K.Remadevi View PDF  
11 An Evaluation Study of Multipath Routing Protocols in AHWMNs                                  Pg.52-57
Authors: C. Maddilety, Vennapusa Prakash Reddy, P. Jammulaiah  View PDF  
12. Security challenges and antivirus layer role in cloud Pg. 58-62
Authors: Pooja V. Bhokare,  Chitra J. Patil   View PDF  
13. Liquid resizing:Content aware scaling Pg. 63-67
Authors: Rujul Mankad, Krupa Mandaviya  View PDF  
14. Images Enhancement Using Cumulative Histogram Equalization Technique Pg.68-74
Authors: Avinash shrivastava; Chandrahas sahu View PDF  
15. Different Types of Fault Tolerant Techniques of Softcore Processor   Pg. 75-78
Authors: Jaimini S. Patel, Deepali H. Shah View PDF  
16. Dynamic Fault-Tolerant Resource Allocation In Self-Organizing Clouds   Pg. 79-83
Authors: S.Thejeswi, C.Thirumalaiselvan   View PDF  
17. Optimization of PDP for Memory Design Using Signal Feed Through Scheme   Pg. 84-88
Authors: Meenatchi Sundaram S, P.Thilagavathi  View PDF  
18. Determination of Optimum Percentage Replacement of Fine Aggregate in Concrete Using GBFS(Granulated Blast Furnace Slag)   Pg. 89-94
Authors: Ramadevi.K, Sindhubala.S, Johnpaul.V  View PDF  
19. Towards the Next Generation of Open Source Software A Survey of the State-of-the-Art and Possible Alternatives   Pg. 95-98
Authors: C. Raja Kumar,  M. Rajinikannan  View PDF  
20. Security In Image Compression Using Jpeg –Ls Algorithm   Pg.99-103
Authors: M. MariSelvi,  V.Josephine Sutha  View PDF  
21. Advanced Driver Assistance System with Location Identifier    
Authors: Mohamed Naseem.S, Balaji.R, Prabaharan.S, Thirumalai Selvam.N,Chinnamuniyandi.S  View PDF Pg.104-109
22. Efficient Analysis of Traffic Accident Using Mining Techniques    
Authors: S.Vigneswaran, A.Arun Joseph, E.Rajamanickam View PDF Pg.107-118
23. Wireless Black Box Using MEMS Accelerometer and GPS Tracking for Accident Monitoring Of Vehicle    
Authors: K.Arunakumari,S,Gowsalya Devi ,S.Samsiya Fathima,N.Mahalakshmi,R.Arunadevi  View PDF Pg.119-123
24. Hardware Implementation of a Vibrating Sample Magnetometer Circuitry    
Authors: Ekta Gupta, RR Yadav, Manish Sharma  View PDF Pg.124-127
25. Sparse MRI Application of Compressed Sensing For Rapid Real Time 3d Image    
Authors: M. Mari Pushpam, B.Sivasankar View PDF Pg.128-131
26. Power-Gated Logic in Asynchronous CircuitsUsing split level charge recovery logic (SCRL)    
Authors: P.Gomathi, S.Prabhavathy View PDF Pg.132-136
 27.  Smart Control for Power Grid Operations     
 Authors:Mayur Diwate,  Nirmal Borkar, Yashashree Patil, Vaidehee Kodgirwar,  Ankita Kshirsagar
View PDF  Pg. 137-140
 28  Viterbi Decoder with High Speed ACSU Architecture Using T-Algorithm    
 Authors: Ketan Machale, Atish A. Peshattiwar, Shashant Jaykar, Kuldeep Pande, Rohit Himte View PDF  Pg. 141-147
 29.  Artificial Bee Colony Algorithm with Watchdog Mechanism for secure Data Transferring in Wireless Networks    Pg. 148-151
 Authors:Sasi Kumar.S,  Gayathiri.N,  Sivarajan.S
 View PDF  
 30.  Implementation of an Algorithm for Mining Association Rules    
 Authors: Mr. Akshay R.  Ingle, Mr. Amay A.  Ambekar, Mr. Swapnil M .Chawre, Mr. Swapnil N. Kedar, Mr. Lokesh S. Mundafale  View PDF  Pg. 152-155
 31.  Analysis Of Micro calcification Severity In Mammograms Using Non-Sub Sampled Transform    
 Authors:M.Vigneshbabu , S. Janardhanaprabhu   View PDF  Pg. 156-160
 32. MSIC Vector Used in BIST for Power Reduction by Selective Trigger scan Architecture   
Authors: R.Hemalatha, S.Prabhavathy  View PDF  Pg. 161-169