IJRTE Vol. 3, No. 2
IJRTE Vol. 3, No. 2
IJRTE Vol. 3, No. 2
Table of Contents
1. Depicting Purchase Dependency in Retail Management: A Data Mining Approach 1-5
Pradip Kumar Bala
3. Performance comparison of ISO 18000-3 and CDMA based RFID Tag Anti- 9-14
collision protocol
Chetna Dabas and J.P.Gupta
4. Secure Architecture Evaluation for Agent Based Web Service Discovery 15-17
V. Prasath, R.Baskarane and P.Savaridassan
8. Artificial Intelligence Based Mutual Authentication Technique with Four Entities 29-31
In 4-G Mobile Communications
Pijush Kanti Bhattacharjee
9. Comparing Dimensionality Reduction using PCA and Subspace LDA for 32-35
Face Recognition
Mala Saraswat, Vibha Patel, and Deepti Vidyarthi
10. Congestion Control by Load Balancing within the Data Network via Modified 36-38
Depth-Breadth routing Algorithm
G.Raghu Ram, S.Anuradha, V.RaghunathReddy ,M.Sarik ,and A.Thammi Reddy
11. A Time Variant Four Entity Authentication Technique for 3-G Mobile 39-41
Communications
Chandan Koner, Chandan Tilak Bhunia and Ujjwal Maulik
12. A Novel Approach for Detection of Routes with Misbehaving Nodes in MANETs 42-44
Sowmiya Hariharan, Jothi Precia, Suriyakala.C.D, Prayla Shyry
14. High Capacity Robust Medical Image Data Hiding using CDCS with Integrity 51-54
Checking
Sunita V. Dhavale and Suresh N. Mali
15. Feature Selection using Stepwise ANOVA Discriminant Analysis for 55-57
Mammogram Mass Classification
B.Surendiran and A.Vadivel
16. Modulating Friendship Trust into Context Level Trust in Trust Based 58-63
Recommender Systems
Harmeet Kaur and Deepali Jain
17. An 8x8 Subthreshold Braun Array Multiplier in 32nm CMOS Technology for 64-67
Wireless Sensor
S.Savari Rani, S.Ramasamy, C.Christober Asir Rajan, and V.Harini
18. Biometric system for User Authentication using Human thought process 68-70
Gayathri.S , Meenakshi P.U and Joseph John
19. Simulation of Power Electronic Wave forms of Single Phase Full Converter using 71-76
MATLAB/SIMULINK and ANN
Vipul Sharma, S.S.Pattnaik , Agam Kumar Tyagi, S. Devi, Tanuj K. Garg,
and N. K. Agarwal
20. Preemptive Job Scheduling With Priorities And Starvation Avoidance Cum 77-80
Throughput Increasing Tool In Clusters
Balajee Maram
26. An Authentication Protocol for Mobile Devices Using Hyperelliptic Curve 100-102
Cryptography
S. Prasanna Ganesan
28. Design of an Ameliorated Methodology for the Abstraction of Usable Components 106-110
Of Object Oriented Paradigm from the Software Requirement Specification (SRS)
Shivanand M Handigund, R J D’Souza,and Syed Naimatullah Hussain
30. A Survey on Path Loss Models used in Wireless Communication System Design 115-118
Dinesh Sharma, Purnima K Sharma, Vishal Gupta and R.K Singh
31. Test data generation using single population genetic algorithm 119-121
Anupama Surendran and Philip Samuel
32. Mobility and Node Density Based Performance Analysis of AODV Protocol for 122-124
Adhoc Network using ns-2
Parma Nand, S.C. Sharma, Rani Astya and Santosh Kumar
34. A Novel Time Variant Authentication Technique of Remote User Using 128-130
Smart Card
Chandan Koner, Chandan Tilak Bhunia and Ujjwal Maulik
35. Performance Analysis of CI Engine using Rice Bran Oil and their esters 131-135
Ram Prakash, S.P.Pandey, S.Chatterji ,and Manoj Gupta
37. A Robust Routing Protocol for VANETs using Cellular Automata 141-143
R.Manoharan,P. Ajit Jose Sylvester and M.Ramprasath
40. Effective Path Identification Protocol for Wireless Mesh Networks 150-152
Avinash Bashyam, Anam Chenchu Jeevan, Sai Kiran Tripuramalla and
Suresh Babu Sanka
42. Spatial Data Mining Using Novel Neural Networks for Soil Image 156-159
Classification and Processing
A.V.Krishna Prasad, S.Rama Krishna, D.Sravan Kumar, K.Suresh
and I.S.Ravi Varma
45. The Efficient way of Managing network Using Simple Network 167-169
Management Protocol
Srinivasan Nagaraj, K.Koteswara Rao, B.Kishore Kumar
G.Apparao, P.Narayana Rao and GSVP Raju
46. Discovery of Distributed resource and allocation for one-hop -A Topology 170-172
approach
K.Koteswara Rao, Srinivasan Nagaraj, G.Anuradha
G.Apparao, P.Narayana Rao and GSVP Raju
48. Coordinated Multi-Agents Based Patient Scheduling Using Genetic Algorithm 177-179
E.Grace Mary Kanaga, M.L.Valarmathi,and J.Dhiviya Rose