IJSHRE Volume 3 Issue 4

 

1. Review on Fuzzy Relational Clustering Algorithm for Clustering Sentence-Level Text Pg. 1-4
Author(s):Priyanka Tayade, Poorva Joshi, Shraddha Golhar, V.N.Dhawas Download

 

2. Review on use of Intelligent Agents in Traffic Control System Pg. 5-8
Author(s):Madhulika Pandey; Smriti Sehgal Download

 

3. A Model to Detect Dynamic Virtual Execution on Untrusted Machine Pg. 9-11
Author(s):Baby Afroz; Dr. K.N Singh; Suraj Prasad keshri Download

 

4. A Model of Analysis Virtualization of Multi cloud Data Exchange privacy and security Pg. 12-15
Author(s):Kaval Jeet Kour Saini; Dr. K.N Singh; Suraj Prasad keshri Download

 

5. A Model of Advance Telecommunications Techniques For 5G Wireless Networks IPS Pg. 16-19
Author(s):Neha Parveen; Dr. K.N Singh; Suraj Prasad keshri Download

 

6. An Efficient Iris Recognition System using DCT Transform based on Feed Forward Neural Networks Pg. 20-24
Author(s):Amrata Gupta, Mr. Sachin Mahajan Download

 

7. A NOVEL ALGORITHM DUFP for MINING ASSOCIATION RULES in DYNAMIC DATABASES Pg. 25-31
Author(s):Shahana Sheikh, Mr. Rupesh Patidar Download

 

8. Performance Analysis of AlGaN/GaN HEMT with Asymmetrical passivation layer Pg. 32-35
Author(s):Smitha G S ; Dr. Kiran Bailey; Narayan. T. Deshpande Download

 

9. PINEAPPLE LEAF FIBER REINFORCED POLYMER COMPOSITE AS A REPLACEMENT FOR ABS PLASTICS IN INDUSTRIAL SAFETY HELMET SHELL – A REVIEW Pg. 36-46
Author(s):N.Saravanan, P.Muthukumar, P.S.Sampath Download

 

10. STUDY OF MAXIMUM POWER POINT TRACKING USING PERTURB AND OBSERVE METHOD FOR BOOST CONVERTER Pg. 47-50
Author(s):Arpit Pandey, Abhijit Mandal Download

 

11. Development of Tracker for Monitoring OCP based system using SV and OVM Pg. 51-54
Author(s):Aneesh Kumar Ravuri, Radha R C Download

 

12. Bi-share visual cryptographic technique an Implementation Pg. 55-59
Author(s):Neha Prajapati, C S Satsangi Download

 

13. Comparative Analysis on Maximum Power Point Tracking using Perturb and Observe Method for Boost and Buck-Boost Converter Pg. 60-63
Author(s):Arpit Pandey, Abhijit Mandal Download

 

14. Introduction to Buffer Overflow Attack Pg. 64-68
Author(s):Nilesh Kunhare; Sanjay Kumar Tehariya Download

 

15. Error-Resilient Video Communication Using AVC Over Wireless Networks Pg. 69-74
Author(s):Priyanka Katti; Dr.K P Lakshmi Download

 

16. An Algorithm For Detecting Brain Abcess In MRI Images Pg. 75-79
Author(s):Krishna MuraliShyam G.N: Dr.A.Meera; Smitha P Ullal; Dr. Savithri Bhat Download

 

17. ACOUSTIC ECHO CANCELLATION AND DENOISING USING ADAPTIVE FILTER AND DWT Pg. 80-84
Author(s):Laxmikant; Shaila V Hegde Download

 

18. Enhanced Algorithm For Tracking number Plate From Vehicle Using Blob Analysis Pg. 85-88
Author(s):Shashikumar Naubadkar; Dr. A Meera Download

 

19. A New Approach for Zone Identification on Printed Gujarati Text: Vertical Bar Method Pg. 89-93
Author(s):Shweta Agravatt; Mukesh Goswami; Hardik Agravatt Download