Table Of
Content
Editorial |
| Sl. No. |
Title and Authors |
Page No. |
| 1. |
Wireless Electronic Notice Board
Ajinkya Gaikwad, Tej Kapadia, Manan Lakhani & Deepak Karia
|
1-4 |
| 2. |
DCT and DWT in Medical Image Compression
Anuja P Parameswaran, Manisha Gaonkar
|
5-10 |
| 3. |
Secured Information Hiding Using Variable Pixel Block Size of PVD Steganographic Techniques
Dinesh D. Patil & S. M. Bansode
|
11-14 |
| 4. |
A Multi-Scale Circular Weber Local Descriptor Approach For Matching Sketches With The Digital Face Images
Kushal J Masarkar, S. S. Chamlate & Rita S Dhage
|
15-20 |
| 5. |
Mobile Phone Programming: Remote Access to Customer Database using Android Phone
Sudhanshu Jiteshkumar Vora, Showme Joselin, Sai Kishore Gorege, STS Subhash Krishna
|
21-24 |
| 6. |
Secured Modified Bloom's based Q-composite Key Distribution for Wireless Sensor Networks
Shruthi. P & M. B. Nirmala
|
25-32 |
| 7. |
Implementation of Automatic Invertible Matrix Mechanism in NTRU Matrix Formulation Algorithm
Mohan Rao Mamdikar, Vinay Kumar & D. Ghosh
|
33-37 |
| 8. |
Intelligent Heart Disease Prediction System Using Probabilistic Neural Network
Indira S. Fal Dessai
|
38-44 |
| 9. |
Comparative Study of Techniques to Discover Frequent Patterns of Web Usage Mining
Mona S. Kamat, J. W. Bakal & Madhu Nashipudi
|
45-51 |
| 10. |
Digital Watermarking on Micro Image using Reversible Optical Reproduction
Shraddha Raut, Antra Bhattacharya & S. P. Khandait
|
52-56 |
| 11. |
Balancing Network Traffic Load in Geographic Hash Table (GHT)
R. Asha, V.Manju, Meka Sindhu & T. Subha
|
57-61 |
| 12. |
Recent Development and Computational Solution for Fuzzy Filtering
Sukhvir Singh, Yogesh Mohan & Kishori Lal Bansal
|
62-76 |
| 13. |
Linux Porting on an ARM and Application Development
Saurabh Kabra ECE, VIT University, Vellore
|
77-79 |
| 14. |
Permutation of Image Edge Detection and Protection Algorithms
K. Rajesh Kumar, T. Thirumaran, Ashok. V. G & P. Venkatesan
|
80-86 |
| 15. |
Adaptive Distance Handover Scheme in Mobile WiMax
Shreedatta S. Sawant & Nagaraj K. Vernekar
|
87-91 |
| 16. |
Data Mining in Telecommunication
Mohsin Nadaf & Vidya Kadam
|
92-96 |
| 17. |
Highly Porous Sol-gel Based Urea Biosensor
Tanu Bhardwaj, Prabhash Mishra, S. S. Islam & Vinita Kumari
|
97-100 |
| 18. |
Prediction of Software Anomalies using Time Series Analysis – A recent study
Ashima Gupta, Biju R. Mohan, Shanil Sharma, Ritesh Agarwal & Kavya K.
|
101-108 |
| 19. |
A New Approach for Face Recognition using CBIR with LDA
Jay Prakash Maurya, Akhilesh A. Waoo, P. S Patheja & Sanjay Sharma
|
109-112 |
| 20. |
Enhancing Performance of a Standalone System from Event Logs using K–medoid Algorithm
Mario Pinto & Vineet Pukhraj Jain
|
113-117 |
| 21. |
Traffic Reduction Using Android Application
Diksha Suvarna, Shailendra Khandewale & Tanavi Ghosalkar
|
118-122 |
| 22. |
A Decision Based Algorithm for the Removal of High Density Salt and Pepper Noise
Sushant S. Haware, Diwakar S. Singh, Tushar R. Tandel, Abhijeet Valande & N. S. Jadhav
|
123-127 |
| 23. |
Speech Denoising Using Variant of Minimum Controlled Recursive Average Algorithm and PCA
Sangita Bavkar & Shashikant Sahare
|
128-132 |
| 24. |
Session Passwords for Android Mobiles
S. Archana, T. Meena, A. S. Vaishnavi & A. Bazila Banu
|
133-137 |
| 25. |
Mobile Robot Temperature Monitoring System Controlled by Android Application via Bluetooth
T. Maria Jenifer, T. S. Vasumathi Priyadharshini, Raja Lavanya & S. Raj Pandian
|
138-142 |
| 26. |
Extraction of Retinal Blood Vessels from Diabetic Retinopathy Imagery Using Contrast Limited Adaptive Histogram Equalization
S P Meshram & M S Pawar
|
143-147 |
| 27. |
A Qualitative Approach for Medial Computation
Jacklin Michael, M. Ramanathan & S. Vinothkumar
|
148-152 |