Volume 1, Issue 1, March 2014

S.No

 Title /Author Name

 Paper ID

1.

OFDM: Modulation Technique for Wireless Communication
Authors : Rashmi.R , Sarala.S.M

 

MEC10073

 2.

Static Analysis and Experimentation of Jute Fiber Reinforced with E-Glass
Author: B.SudhaBindu

 

 MME10090

 

 3.

Bat Classification based on Perceptual, Spectrum and Cepstral Features in Kalakad Mundanthurai Tiger Reserve
Authors : Gladrene Sheena Basil* , Juliet Vanitharani, Jayapriya K

 

 MBE10080

 4.

Image Steganography Using Wavelet Transform And Genetic Algorithm
Authors : Sabyasachi Pramanik, Samir K. Bandyopadhyay

 

 MCS10080

 5.

A Study on Data Mining Based Intrusion Detection System

Author : Antony Raj.A

 

 MCS10083

 6.

Numeral Structure Base Cryptography Design to Secure Distribution of Internet Assets
Author : U.Vijay sankar

 

 MCS10087

 7.

Survey: Elliptic Curve Cryptography using Scalar Multiplication Algorithms  

Authors: kaalidoss Rajamani, Dr.A.Arul L.S

 

 MCS10082

8.

Implementation Secure Authentication Using Elliptic CurveCryptography                 

Author: N.Thangarasu

 

 MCS10088

 9.

Access Control Based on Pixel Value Extraction

Author : N.K.PREMA

 

 MCS10084

 10.

Design of an Effective Method for Image Retrieval
Authors : S.Selvam , Dr.S.Thabasu Kannan

 

 MCS10090

 11.

Optimal Contrast Enhancement for Remote Sensing Images
Authors : Prathibha.S,Pavithra.C.S,Mettildha Mary.I

 

 MEC10074

 12.

Generation of Potential High Utility Itemsets from Transactional Databases
Authors: Rajmohan.C,Priya.G ,Niveditha.C ,Pragathi.R

 

 MCS10097

 13.

Comparitive Study On Watermarking Algorithms In Data Compression
Authors: R.Ganesh,Dr.S.Thabasukannan

 

 MCS10098

 14.

Comparison of the Discretization Approach for CST and Discretization Approach for VDM
Author : Omar A. A. Shiba

 

 MCS10085

 15.

A Tool For Visualisation Of Parsers:JFLAP

Authors :  S.Devakumar , D.S.Bhupal Naik, S.V.Ramakrishna

 

 MCS10100

 16.

A Survey on Wireless Intrusion Detection using Data Mining Techniques

Author: R.Venkatesan

 

 MCS10102

 17.

Design of ARM Based Interactive Data Acquisition and Control System for Embedded System
Author: Bhushan  Khangare , Mrs.A.P.Rathakanthiwar

 

 MEC10077

 18.

Silent Sound Technology for Mandari
Authors: Pradeep B.S*      Zhang Jingang

 

 MEC10078

 19.

Contending Against Energy Debilitating Attacks in Wireless Ad Hoc Sensor Networks

Authors : Vidya.M , Reshmi.S

 

 MEC10080

 20.

Energy Saving Using Bifurcation of Distribution Transformer
Authors:  Tamizharasi.P, Asha. N , Deepalakshmi.U

 

 MEE10080

 21.

Analysis Of Distribution Transformer Losses In Feeder Circuit
Authors: Tamizharasi.P. Anuradha.R, Ayshwarya.A.R

 

 MEE10081

 22.

Location Recognition Algorithm for Automatic Check-In Smartphone Applications Based On Enhanced Wi-Fi Fingerprint Technology
Authors: S.Bhaggiaraj,V.Gurumoorthy,K.P.Jaghanathan,K.J.KarthickBalaji

 

 MCS10092

 23.

Enhanced Alert Protocol For Manet
Authors: Padmapriya.B, Madhuvandhi.B.R ,Manikandan.K, Chandruvignesh.C.

 

 MCS10095

 24.

The Robust system for antivenin DDOS by Rioter Puddle Expertise
Author: AmarjitKaur

 

 MCS10096

 25.

Digital Restoration of Torn FilmsUsingFilteringTechniques

Authors: Dr.V.Karpagam, Sanjushri.R , Sujitha.S , Sumithra.M

 

 MCS10105

 26.

Privacy Preserving of Data Mining Based on Enumeration and Concatenation of Attributes using K-Anonymity
Author: Rajesh.N

 

 MCS10106

 27.

Wireless Device Positioning and Finding Intruder Using RSS
Authors: Franklin Alex Joseph, Sharmila

 

 MEE10083

 28.

Delay Sensitive Packet Scheduling Algorithm for MANETs by Cross Layer
Authors: E.Vaidhegi , C.Padmavathy ,T.Priyanga ,A.Priyadharshini

 

 MCS10107

 29.

Groundwater Quality Modelling using Coupled Galerkin Finite Element and Modified Method of Characteristics Models
Author: N.H.Kulkarni, A.K.Rastogi

 

 MCE10080

 30.

Extended Fuzzy C-Means with Random Sampling Techniques for Clustering Large Data
Author: Dhanesh Kothari,S.Thavasi Narayanan,K. Kiruthika Devi

 

 MCS1010

31

Track the Location by unproblematic way in Android Devices

Authors : R. Lalithkumar, Dr.C.Suresh Gnana Dhas

 

MCS10105

32

Perfect Malicious Node Avoiding Mechanism for Mobile Ad-Hoc Networks

Author : Dr. S.K. Mahendran

 

MCS10108

33

Unified Fractional Diffusion Equation

Authors : Manoj Sharm ,Mohd. Farman Ali, Renu Jain

 

MBS10080

34

Finite Element Analysis of an Exterior Rotor Permanent Magnet Brushless DC Motor for Torque Improvement by a Novel Peak Torque Excitation Technique

Authors :  K.Uma devi , R.Satish kumar

 

MEC10078

35

PERFORMANCE ANALYSIS OF USING EXTERIOR ROTOR PERMANENT MAGNET BRUSHLESS DC (ERPMBLDC) MOTOR

Authors :K.Uma devi , R.Satish kumar ,M.Y.Sanavullah
 

MREC10090

36

A Study on the Design Aspects of Interleaved Boost Converter for Telecommunication Systems

Authors: Chitravalavan , R.Seyezhai
 

MCS10110