Volume 3 Issue 3

 

1. Joint encryption/watermarking based on Arnold cat map and DCT Pg. 1-5
Author(s):Hema S Meharwade, Veena S, Arathi R Shankar Download

 

2. A LOW POWER FUSED ADD-MUTIPLY DESIGN BASED ON BOOTH RECODER Pg. 6-11
Author(s):Vidya Baby; S.Prabhavathy Download

 

3. A Wearable Cuff-less system for Continuous Monitoring of Blood Pressure Pg. 12-15
Author(s):V.Ramesh Kumar; N.Salmaan; A.E.J.Sangeeth Raj Download

 

4. Mechanical Properties of African mahogany (Khaya Senegalensis) Seeds Pg. 16-21
Author(s):Usman, D. D; Ibrahim, M. E ; Yakubu, I. T; & Kabri, U. H Download

 

5. Defending Network Identification for Browsers against web spoofing Attack Technique Pg. 22-26
Author(s):Anil Tamrakar;Dr.K.N Singh;Suraj Prasad keshri Download

 

6. Interference Mitigated Wireless Body Area Network System Using Windows Platform Pg. 27-28
Author(s):C.Sathish Kumar; Chinju Das; Christo Baby; Kripa Maria Jose; Rehana P Ponnal Download

 

7. Cloud Based Instant File Sharing System in Wireless College Campus Environment Pg. 29-32
Author(s):Alfaz Memon ; Supriya Brahme ; Saurabh Khairnar ; Kunal Ahire Download

 

8. A SURVEY ON DIFFERENT IMAGE SEGMENTATION TECHNIQUES AND K-MEANS ALGORITHM Pg. 33-36
Author(s):A.Indhuja; V.Arunraj; L.R.Angeeth; S.Dhanalakshmi Download

 

9. Energy Efficient Scheduling For Wimax Network Pg. 37-43
Author(s):Anu Paul ; Anagha P ; Dr. M.Umaparvathi Download

 

10. ENTERPRISE RESOURCE PLANNING FOR AUTOMOBILES Pg. 44-47
Author(s):Ms. RuchitaMandal ;Ms.Monika Bagade ;Ms.Saylee Kamble  ; Ms. Sayali Khapekar Download

 

11. Comparison of Emotion Recognition Models in Spoken Dialogs Pg. 48-54
Author(s):Preedhi Garg; Smriti Sehgal Download

 

12. Case Study of Glue Code using .Net Platform Pg. 55-59
Author(s):Manbir Kaur ;Gurpreet kaur Download

 

13. Efficient Algorithm to Detect Email Date/Time Spoofing Technique using phishing attacks Pg. 60-63
Author(s):Deepak Kumar Patel; Dr.K.N Singh; Suraj Prasad keshri Download

 

14. Model to Create Virtualization of cloud Server using Hypervisor based Technology Pg. 64-67
Author(s):Mohammad Istekhar; Dr.K.N Singh; Suraj Prasad keshri Download

 

15. Improving Data Privacy through User Behavior Key Policy with Attribute-Based Cryptosystem Pg. 68-71
Author(s):Mrs. Indira Shailendra Chadar ; Mr. Mohsin Sheikh Download

 

16. STUDY OF WEIGHT OPTIMIZATION ON SPAR BEAM FOR THE WING OF AN AIRCRAFT Pg. 72-79
Author(s):N.Maheswaran ; S.P.Venkatesan ; M.S.Sampath Kumar ; G.Velmurugan ; N.Sathishkumar ; M.Priya Download

 

17. Multi-View Facial Expression Recognition Based on Group Sparse Reduced-Rank Regression Pg. 80-84
Author(s):G.RAJA GOPAL Download

 

18. 2D IMAGE CONTRAST ENHANCEMENT BASED ON LAYERED DIFFERENCE REPRESENTATION Pg. 85-89
Author(s):M.Palpandian ;G.Muthulakshmi Download