Volume 1 Issues - (April 13 Issue4)

1. Build Applications on Linux RTOS (Embbedded system)  

Authors: Rakesh Trivedi, Darshil Modi, Nehal Parmar

Page No.: 207-211

 

2. Wavelet Based Color Image Denoising through a Bivariate Pearson Distribution  

Authors: Mrs. Ritu Chouhan, Prof. Vikas Gupta, Arpita Rani Vaishnava

Page No.: 212-216

 

4. DATA ACCOUNTABILITY IN CLOUD USING RELIABLE LOG FILES FORWARDING  

Authors: R.N.Heames, Dr.P.SUDHAKAR

Page No.: 229-233

 

5. Design of Reconfigurable Crossbar Switch for BiNoC Router  

Authors: Mr. Ashish Khodwe, Mrs. V. K. Rajput, Prof.C.N.Bhoyar, Prof. Priya M. Nerkar

Page No.: 234-240

 

6. DEVELOPMENT OF ADVANCED SMART AND SECURED SYSTEM  

Authors: Shrutee, Mridula Das, Pratima Singh, T.K. Sethuramalingam*

Page No.: 241-244

 

7. ARDUINO BASED WIFI ENABLED WIRELESS SPEAKER  

Authors: A.Anbuselvan, D.Antony Shajan, M.Deepak, T.K.Sethuramalingam*

Page No.: 245-250

 

8. MOTION CAPTURE PROCESS, TECHNIQUES AND APPLICATIONS  

Authors: Ashish Sharma, Mukesh Agarwal, Anima Sharma, Pankhuri Dhuria

Page No.: 251-257

 

9. Study of Artificial Neural Networks and Neural Implants  

Authors: Yashika Birdi, Tanjyot Aurora, Parul Arora

Page No.: 258-262

 

10. Implementation of serial communication using UART with configurable baud rate  

Authors: Ms.Neha R. Laddha*, Prof.A.P.Thakare

Page No.: 263-268

 

11. SEARCH ENGINE OPTIMIZATION  

Authors: Manan Goyal, Prof. Mukesh Agarwal

Page No.: 269-276

 

12. UMA (Unlicensed Mobile Access): A New Approach towards Mobility  

Authors: Nitish Mehta, Manish Kumar

Page No.: 283-286

 

13. A STUDY OF ZIGBEE TECHNOLOGY  

Authors: Anshul agarwal, Mukesh Agarwal, Manju Vyas, Richa Sharma

Page No.: 287-292

 

14. SQL INJECTION ATTACKS AND PREVENTION TECHNIQUES  

Authors: Sampada Gadgil, Sanoop Pillai, Sushant Poojary

Page No.: 293-296

 

15. RED TACTON  

Authors: Ajay Rathore, Mukesh Agarwal, Gajendrav Sharma, Monika Sharma

Page No.: 297-304

 

16. A State of Art Concept in Contriving of Underwater Networks  

Authors: Divyanshu Gaur, Deependra Sharma, Kunal Bhardwaj, Nidhish Tiwari

Page No.: 305-310

 

17. An Inventive Framework of Micro-Electromechanical System (MEMS)  

Authors: Divyanshu Gaur, Navin Kumar, Himani Sharma, Ankita Bhatia

Page No.: 311-316

 

18. Comparative Analysis of MANET Reactive Protocols  

Authors: Nisha Kumari, Ritu Saluja

Page No.: 317-320

 

19. ANALYSIS THE IMPACT OF SYMMETRIC CRYPTOGRAPHIC ALGORITHMS ON POWER CONSUMPTION FOR VARIOUS DATA TYPES  

Authors: Er. Rajender Singh, Er.Rahul Misra, Er.Vikas Kumar

Page No.: 321-326

 

20. Comparative study between the generations of mobile communication 2G, 3G & 4G  

Authors: Rajasweta Datta, Niharika

Page No.: 327-331

 

21. Highway Entrance Ramp Monitoring and Control using Soft Computing Techniques  

Authors: Rahul Misra, Avani Patel, Rajender Singh

Page No.: 332-334

 

22. Smart Homes-Based On Mobile IP  

Authors: Arti Shukla, Priyanka Yadav

Page No.: 335-338

 

23. SPRING TECHNOLOGY AND USE IN BUSINESS APPLICATION  

Authors: Ashish pandey

Page No.: 339-342

 

24. Analysis of AODV for Mobile Ad Hoc Network  

Authors: SurenderChouhan, Harish Sharma, AshishPanday, Abhishekchoudhary (Asst. Prof.)

Page No.: 343-345

 

25. Review on NEXT Generation Technologies of Wireless Communication  

Authors: Mr. Arunabha Debnath, Mr. Abhinandan

Page No.: 346 - 350

 

26. Forensic Face Sketch Recognition Using Computer Vision  

Authors: Vineet Srivastava

Page No.: 351-354

 

27. SOM: A Computer Vision Technique for Face Sketch Featured Database  

Authors: Vineet Srivastava

Page No.: 355-358

 

28. NECESSITY TO SECURE WIRELESS SENSOR NETWORK  

Authors: Ms. Sonjuhi Mrinalee, Mr. Navin Kumar, Mr. Ashutosh Mishra

Page No.: 359-363

 

29. Wireless Electricity Theft Detection System Using Zigbee Technology  

Authors: Virendra Pandey, Simrat Singh Gill, Amit Sharma

Page No.: 364-367

 

30. BATTLE AGAINST PHISHING  

Authors: Bharat Gautam, Mukesh Agrawal, Anishma Talwar, Rajan Jha

Page No.: 373-379

 

31. Viral Marketing in Social Network Using Data Mining  

Authors: Shalini Sharma, Vishal Shrivastava

Page No.: 380-384

 

32. The convergence of budding reckoning Soft computing technologies  

Authors: Mrs Ashu Soni, Ms. Shilpa Mehta, Gaurav, Ankur Raghav

Page No.: 385-387

 

33. DIGITAL IMAGE PROCESSING IN ULTRASOUND IMAGES  

Authors: Kamaljeet Kaur

Page No.: 388-393

 

34. SECURE AND EFFICIENT DECENTRALIZED GROUP KEY ESTABLISHMENT REVISED ELGAMAL PROTOCOL FOR GROUP COMMUNICATION  

Authors: Shailendra Singh Tanwar, Dr. Suneet Chaudhary

Page No.: 409-413