Volume 2 :: Issue 3 :: IJACTE

Table Of Content                                                               editorialEditorial
Sl. No. Title and Authors Page No.
1. Wireless Electronic Notice Board
Ajinkya Gaikwad, Tej Kapadia, Manan Lakhani & Deepak Karia
1-4
2. DCT and DWT in Medical Image Compression
Anuja P Parameswaran, Manisha Gaonkar
5-10
3. Secured Information Hiding Using Variable Pixel Block Size of PVD Steganographic Techniques
Dinesh D. Patil & S. M. Bansode
11-14
4. A Multi-Scale Circular Weber Local Descriptor Approach For Matching Sketches With The Digital Face Images
Kushal J Masarkar, S. S. Chamlate & Rita S Dhage
15-20
5. Mobile Phone Programming: Remote Access to Customer Database using Android Phone
Sudhanshu Jiteshkumar Vora, Showme Joselin, Sai Kishore Gorege, STS Subhash Krishna
21-24
6. Secured Modified Bloom's based Q-composite Key Distribution for Wireless Sensor Networks
Shruthi. P & M. B. Nirmala
25-32
7. Implementation of Automatic Invertible Matrix Mechanism in NTRU Matrix Formulation Algorithm
Mohan Rao Mamdikar, Vinay Kumar & D. Ghosh
33-37
8. Intelligent Heart Disease Prediction System Using Probabilistic Neural Network
Indira S. Fal Dessai
38-44
9. Comparative Study of Techniques to Discover Frequent Patterns of Web Usage Mining
Mona S. Kamat, J. W. Bakal & Madhu Nashipudi
45-51
10. Digital Watermarking on Micro Image using Reversible Optical Reproduction
Shraddha Raut, Antra Bhattacharya & S. P. Khandait
52-56
11. Balancing Network Traffic Load in Geographic Hash Table (GHT)
R. Asha, V.Manju, Meka Sindhu & T. Subha
57-61
12. Recent Development and Computational Solution for Fuzzy Filtering
Sukhvir Singh, Yogesh Mohan & Kishori Lal Bansal
62-76
13. Linux Porting on an ARM and Application Development
Saurabh Kabra ECE, VIT University, Vellore
77-79
14. Permutation of Image Edge Detection and Protection Algorithms
K. Rajesh Kumar, T. Thirumaran, Ashok. V. G & P. Venkatesan
80-86
15. Adaptive Distance Handover Scheme in Mobile WiMax
Shreedatta S. Sawant & Nagaraj K. Vernekar
87-91
16. Data Mining in Telecommunication
Mohsin Nadaf & Vidya Kadam
92-96
17. Highly Porous Sol-gel Based Urea Biosensor
Tanu Bhardwaj, Prabhash Mishra, S. S. Islam & Vinita Kumari
97-100
18. Prediction of Software Anomalies using Time Series Analysis – A recent study
Ashima Gupta, Biju R. Mohan, Shanil Sharma, Ritesh Agarwal & Kavya K.
101-108
19. A New Approach for Face Recognition using CBIR with LDA
Jay Prakash Maurya, Akhilesh A. Waoo, P. S Patheja & Sanjay Sharma
109-112
20. Enhancing Performance of a Standalone System from Event Logs using K–medoid Algorithm
Mario Pinto & Vineet Pukhraj Jain
113-117
21. Traffic Reduction Using Android Application
Diksha Suvarna, Shailendra Khandewale & Tanavi Ghosalkar
118-122
22. A Decision Based Algorithm for the Removal of High Density Salt and Pepper Noise
Sushant S. Haware, Diwakar S. Singh, Tushar R. Tandel, Abhijeet Valande & N. S. Jadhav
123-127
23. Speech Denoising Using Variant of Minimum Controlled Recursive Average Algorithm and PCA
Sangita Bavkar & Shashikant Sahare
128-132
24. Session Passwords for Android Mobiles
S. Archana, T. Meena, A. S. Vaishnavi & A. Bazila Banu
133-137
25. Mobile Robot Temperature Monitoring System Controlled by Android Application via Bluetooth
T. Maria Jenifer, T. S. Vasumathi Priyadharshini, Raja Lavanya & S. Raj Pandian
138-142
26. Extraction of Retinal Blood Vessels from Diabetic Retinopathy Imagery Using Contrast Limited Adaptive Histogram Equalization
S P Meshram & M S Pawar
143-147
27. A Qualitative Approach for Medial Computation
Jacklin Michael, M. Ramanathan & S. Vinothkumar
148-152