IJRTE Vol. 3, No. 2

Download as pdf or txt
Download as pdf or txt
You are on page 1of 5

IJRTE Vol. 3, No.

Table of Contents
1. Depicting Purchase Dependency in Retail Management: A Data Mining Approach 1-5
Pradip Kumar Bala

2. Performance Enhancement of Binary Randomized Arithmetic Coding for 6-8


Multimedia Encryption
L.M.Varalakshmi,and G. Florence Sudha

3. Performance comparison of ISO 18000-3 and CDMA based RFID Tag Anti- 9-14
collision protocol
Chetna Dabas and J.P.Gupta

4. Secure Architecture Evaluation for Agent Based Web Service Discovery 15-17
V. Prasath, R.Baskarane and P.Savaridassan

5. Gravitational Based Hierarchical Clustering Algorithm 18-20


P. S Bishnu and V Bhattacherjee

6. A Note on Image Segmentation Techniques 21-23


N. Senthilkumaran and R. Rajesh

7. Simulation of Permutation Passibility of Fault-tolerant Multistage Interconnection 24-28


Networks
Rinkle Aggarwal and Lakhwinder Kaur

8. Artificial Intelligence Based Mutual Authentication Technique with Four Entities 29-31
In 4-G Mobile Communications
Pijush Kanti Bhattacharjee

9. Comparing Dimensionality Reduction using PCA and Subspace LDA for 32-35
Face Recognition
Mala Saraswat, Vibha Patel, and Deepti Vidyarthi

10. Congestion Control by Load Balancing within the Data Network via Modified 36-38
Depth-Breadth routing Algorithm
G.Raghu Ram, S.Anuradha, V.RaghunathReddy ,M.Sarik ,and A.Thammi Reddy

11. A Time Variant Four Entity Authentication Technique for 3-G Mobile 39-41
Communications
Chandan Koner, Chandan Tilak Bhunia and Ujjwal Maulik
12. A Novel Approach for Detection of Routes with Misbehaving Nodes in MANETs 42-44
Sowmiya Hariharan, Jothi Precia, Suriyakala.C.D, Prayla Shyry

13. Machine Translation of Natural Language 45-50


Tirthankar Gayen

14. High Capacity Robust Medical Image Data Hiding using CDCS with Integrity 51-54
Checking
Sunita V. Dhavale and Suresh N. Mali

15. Feature Selection using Stepwise ANOVA Discriminant Analysis for 55-57
Mammogram Mass Classification
B.Surendiran and A.Vadivel

16. Modulating Friendship Trust into Context Level Trust in Trust Based 58-63
Recommender Systems
Harmeet Kaur and Deepali Jain

17. An 8x8 Subthreshold Braun Array Multiplier in 32nm CMOS Technology for 64-67
Wireless Sensor
S.Savari Rani, S.Ramasamy, C.Christober Asir Rajan, and V.Harini

18. Biometric system for User Authentication using Human thought process 68-70
Gayathri.S , Meenakshi P.U and Joseph John

19. Simulation of Power Electronic Wave forms of Single Phase Full Converter using 71-76
MATLAB/SIMULINK and ANN
Vipul Sharma, S.S.Pattnaik , Agam Kumar Tyagi, S. Devi, Tanuj K. Garg,
and N. K. Agarwal

20. Preemptive Job Scheduling With Priorities And Starvation Avoidance Cum 77-80
Throughput Increasing Tool In Clusters
Balajee Maram

21. Resource Identification Using Mobile Queries 81-83


S. R. Balasundaram, and A. Saravanan

22. A Review on Retail Inventory Management with Purchase Dependency 84-88


Pradip Kumar Bala

23. Genetic Audio Steganography 89-91


Azizah Bt Abdul Manaf, Mazdak Zamani, Rabiah Bt Ahmad, Farhang Jaryani,
Hamed Taherdoost, Saman Shojae Chaeikar,and Hossein Rouhani Zeidanloo

24. Asian Language Identification Based on N-gram Approach 92-94


A.Suresh Babu and P.N.V.S.Pavan Kumar
25. Distinguishing Facial Expressions: Genuine Vs Fake 95-99
Jagdish Lal Raheja, Jatin Gupta

26. An Authentication Protocol for Mobile Devices Using Hyperelliptic Curve 100-102
Cryptography
S. Prasanna Ganesan

27. A Hybrid Approach to Classify Gurmukhi Script Characters 103-105


Antarpreet Kaur, Rajiv K. Sharma, and Amardeep Singh

28. Design of an Ameliorated Methodology for the Abstraction of Usable Components 106-110
Of Object Oriented Paradigm from the Software Requirement Specification (SRS)
Shivanand M Handigund, R J D’Souza,and Syed Naimatullah Hussain

29. Advanced ECG Signal Processing Using Virtual Instrument 111-114


Himanshu Shekhar, J.Sam Jeba Kumar, V.Ashok,and A.Vimala Juliet

30. A Survey on Path Loss Models used in Wireless Communication System Design 115-118
Dinesh Sharma, Purnima K Sharma, Vishal Gupta and R.K Singh

31. Test data generation using single population genetic algorithm 119-121
Anupama Surendran and Philip Samuel

32. Mobility and Node Density Based Performance Analysis of AODV Protocol for 122-124
Adhoc Network using ns-2
Parma Nand, S.C. Sharma, Rani Astya and Santosh Kumar

33. Reliable Termination detection algorithm in Dynamic Distributed System 125-127


Archana Nair S and Philip Samuel

34. A Novel Time Variant Authentication Technique of Remote User Using 128-130
Smart Card
Chandan Koner, Chandan Tilak Bhunia and Ujjwal Maulik

35. Performance Analysis of CI Engine using Rice Bran Oil and their esters 131-135
Ram Prakash, S.P.Pandey, S.Chatterji ,and Manoj Gupta

36. Security Patterns for Agile Layered Security Architectures 136-140


M.Upendra Kumar, D.Sravan Kumar, P.Hari Krishna, M.V.R.Jyothi Sree,
and A.Madhuri

37. A Robust Routing Protocol for VANETs using Cellular Automata 141-143
R.Manoharan,P. Ajit Jose Sylvester and M.Ramprasath

38. Implementation of Dimension Reduction Technique for Face Recognition 144-146


Rashmi Gupta, Sunil Kumar and Rajiv Kapoor
39. Wordpair Index: A Nextword Index Structure for Phrase Retrieval 147-149
B. Janet,and A. V. Reddy

40. Effective Path Identification Protocol for Wireless Mesh Networks 150-152
Avinash Bashyam, Anam Chenchu Jeevan, Sai Kiran Tripuramalla and
Suresh Babu Sanka

41. A Prototype to Improve Ever Faster Execution of Multimedia Program 153-155


Bala Dhandayuthapani Veerasamy

42. Spatial Data Mining Using Novel Neural Networks for Soil Image 156-159
Classification and Processing
A.V.Krishna Prasad, S.Rama Krishna, D.Sravan Kumar, K.Suresh
and I.S.Ravi Varma

43. Survey on Scheduling with Learning Techniques 160-162


E. Grace Mary Kanaga, M. L. Valarmathi and Juliet A Murali

44. Printed and Handwritten Character &Number Recognition of Devanagari 163-166


Script using SVM and KNN
Anilkumar N. Holambe, and Ravinder.C.Thool

45. The Efficient way of Managing network Using Simple Network 167-169
Management Protocol
Srinivasan Nagaraj, K.Koteswara Rao, B.Kishore Kumar
G.Apparao, P.Narayana Rao and GSVP Raju

46. Discovery of Distributed resource and allocation for one-hop -A Topology 170-172
approach
K.Koteswara Rao, Srinivasan Nagaraj, G.Anuradha
G.Apparao, P.Narayana Rao and GSVP Raju

47. A Heuristic Approach to Image Database Search 173-176


M.P.S Bhatia, Akshi Kumar, Saurav Kumar, and Gaurav Singh

48. Coordinated Multi-Agents Based Patient Scheduling Using Genetic Algorithm 177-179
E.Grace Mary Kanaga, M.L.Valarmathi,and J.Dhiviya Rose

49. Intrusion DetectionusingAddress Monitoring 180-182


K. Rahimunnisa,S. Suresh Kumar, Kavya T. S, and Anoop Suraj A

50. Impact of Blackhole Attack in MANET 183-186


Gaurav Sandhu,, and Moitreyee Dasgupta
51. Study of Unicast Manet Routing Protocols Under Variable Bit Rate Scenario 187-189
N.Bhalaji, P.Gurunathan and A.Shanmugam

You might also like