IJSRSET calls volunteers interested to contribute towards the scientific development in the field of Science, Engineering and Technology

Home > Volume 1, Issue 2                         Complete Issue    XML icon or RSS icon RSS

Volume 1, Issue 2, March-April-2015

Sr. No Title & Authors Name Page(s)
1
Lossless Compression for Raster Maps Based On Mobile
Phyo Phyo Wai, Nyein Aye, Mie Mie Khin
Enhanced Article (HTML) PDF View Download Google Scholar

1-6
2
Processing and Characterization of Thermoplastic Starch / Polypropylene Blends
Obasi, H. C., Igwe, I. O., Ogbobe, O., Aharanwa, B. C., and Egeolu, F. C.
Enhanced Article (HTML) PDF View Download Google Scholar

7-13
3
Child Behaviour Monitoring System Using Android Application
Venkatraman. R, Vikram.V, Surendhar. R, Sathish Saravanan.P
Enhanced Article (HTML) PDF View Download Google Scholar

14-15
4
Preventing Side-Channel leaks in Web Traffic using SVSD
Akshaya A.K, Pavithra P, Anitha Sahaya Mercy P
Enhanced Article (HTML) PDF View Download Google Scholar

16-19
5
Lone Traveler Security
M. Ram Prasad, V. Ramesh Mahadevan, C. Santosh Kumar , Mr. U. Arul
Enhanced Article (HTML) PDF View Download Google Scholar

20-22
6
Ontology Based Recovery of Geographic Information Services
S. Nivedha, B. Sneha, Sonakshi Bhatoa, M. Gayathri
Enhanced Article (HTML) PDF View Download Google Scholar

23-26
7
A Review on Packed Bed Removal of Organic Matter from Wastewater
Sunil Jayant Kulkarni
Enhanced Article (HTML) PDF View Download Google Scholar

27-30
8
Building Virtual Machine Instance, Compatible with User’s Web Application in Openstack Cloud Provider
Ms. Srinija T, Ms.Sangeetha T, Ms. Sanjena K, Ms. Arulmozhi Arasi D S
Enhanced Article (HTML) PDF View Download Google Scholar

31-34
9
Identity Based Encryption for Securing Publish Subscribe System
Harismita. H, Laavanya.R, Meenaa.R, Kalai Selvi
Enhanced Article (HTML) PDF View Download Google Scholar

35-40
10
Tourist Suggestion Pocket by Tangle Process
R.AshwiniSujitra , K.Charumathi , P.AnithaSahaya Mercy
Enhanced Article (HTML) PDF View Download Google Scholar

41-42
11
On Interval Valued Intuitionistic(S,T)-fuzzy Hv-ideals
Arvind Kumar Sinha, Manoj Kumar Dewangan
Enhanced Article (HTML) PDF View Download Google Scholar

43-48
12
Identification and Avoidance of DDoS Attack for Secured Data Communication in Cloud
Divya G., Archana S. , Dhanalakshmi S. , Divya D.
Enhanced Article (HTML) PDF View Download Google Scholar

49-57
13
Secure Storage using TPC-C in Cloud
A. Azarudeen, N. Ganesh, R. Dinesh, Mr. R. Ramakrishnan
Enhanced Article (HTML) PDF View Download Google Scholar

58-61
14
Security Enhancement and Data Integrity Checking In Multi-Cloud Storage
Lakshmi Priya. S, Jyothi Lakshmi C, Abirami G
Enhanced Article (HTML) PDF View Download Google Scholar

62-65
15
Data Hiding in AVI Video Files Using Multivariate Regression and Flexible Macro block Ordering
Siva Kumar L, Singara Srikanth, Nathiya Devi P
Enhanced Article (HTML) PDF View Download Google Scholar

66-70
16
Design and Analysis of ERP-Sales Order Processing for Small and Medium Enterprises (SMEs)
Gayathri singaravel, M. Jeevanantham
Enhanced Article (HTML) PDF View Download Google Scholar

71-75
17
A Secure I-Trust Scheme Towards Periodic Trust Establishment in Delay-Tolerant Networks
K. Punitha, A. Pushpalatha, R. Sridurga, J. Seetha
Enhanced Article (HTML) PDF View Download Google Scholar

76-80
18
Fast Searching of Nearest Neighbor Using Key Values in Data Mining
Sri Vidhya. A, Prof. Ashwin. M
Enhanced Article (HTML) PDF View Download Google Scholar

81-85
19
Anti-Phishing Image Captcha Validation Scheme using Visual Cryptography
R Abinaya, S Janani, P Nathiya Devi
Enhanced Article (HTML) PDF View Download Google Scholar

86-90
20
Voice Based E Mail (V Mail) for blind
Hari Priya S L, Karthigasree S, Revathi K
Enhanced Article (HTML) PDF View Download Google Scholar

91-94
21
Packet Prediction Circuitry to Reduce Latency and Power Using OpenFlow Switches
Adhirai B, Akshaya K, P Prema
Enhanced Article (HTML) PDF View Download Google Scholar

95-103
22
Modeling of Biological Wastewater Treatment Facilities: A Review
Sunil J Kulkarni, Sonali R Dhokpande, Dr Jayant P Kaware
Enhanced Article (HTML) PDF View Download Google Scholar

104-106
23
Proactive Integrated Detection of Eye Blinking & Yawning to identify Sleepy Driver and Alert based Auto-Braking System for Speed Control
Durgaa Chandrakala E, Fathima Nazlunsithara R, Saraswathi M
Enhanced Article (HTML) PDF View Download Google Scholar

107-110
24
Parallel Multitasking In Real Time Applications
Ramya A, Ramya B, Suryaa K
Enhanced Article (HTML) PDF View Download Google Scholar

111-113
25
Privacy Enhancing Identity Based Publisher Subscriber System
K.J.Sinduja , C.Kayalvizhi
Enhanced Article (HTML) PDF View Download Google Scholar

114-118
26
Security Enhancement Using Image Inpainting
A.Rahul, M. Shankar Ganesh, T.R.B Shaman Raj, M. Veluchamy
Enhanced Article (HTML) PDF View Download Google Scholar

119-121
27
An Integrative Self-Organization Mechanism in a Distributed Agent Network
K. Pandikumar, R. Anjugam, V. Bhavani
Enhanced Article (HTML) PDF View Download Google Scholar

122-125
28
A Cloud Based HR Software - Synergita
Shobana. K , Sathish Saravanan. P
Enhanced Article (HTML) PDF View Download Google Scholar

126-128
29
XML Enabling Homogeneous and Platform Independent Data Exchange in Agricultural Information Systems
Bhavesh Kataria
Enhanced Article (HTML) PDF View Download Google Scholar

129-133
30
Privacy Preserving Web Search by Client Side Generalization of User Profile
Sivaraman. V, Swaminathan. N, Vijayaragavan. P
Enhanced Article (HTML) PDF View Download Google Scholar

134-137
31
Preparation and SPE applications of silica-based monoliths
Eman Alzahrani
Enhanced Article (HTML) PDF View Download Google Scholar

138-143
32
Developing Appropriate Labour Constants for Building Construction Processes in Nigeria
Ngwu Chukwuemeka, Okolie, K. C., Ogunoh P. E.
Enhanced Article (HTML) PDF View Download Google Scholar

144-150
33
A Genetic Programming Approach for Optimal Trading Strategies
R.Divya, M.Divya, K.Surya
Enhanced Article (HTML) PDF View Download Google Scholar

151-155
34
Reconciliation Management System
Monica Preethi K K, Kavitha M, Revathi K
Enhanced Article (HTML) PDF View Download Google Scholar

156-158
35
In-Dependable Data hiding in an Encrypted Image using FCM-DH Algorithm
Vinodhkumar L, Vinoth B S, SivaGanesh S
Enhanced Article (HTML) PDF View Download Google Scholar

159-161
36
Improved Multi-String Inverter –Based STATCOM for High-Power Applications
S. Sabarisan, Dr. R. Subramanian, C. Ramakrishnan
Enhanced Article (HTML) PDF View Download Google Scholar

162-167
37
Secure Message Authentication Process in Mobile Computing
Rojasri G, Roopakalaiyarasi V, Arulmozhi Arasi D S
Enhanced Article (HTML) PDF View Download Google Scholar

168-171
38
Watermark Detection In Compressive Sensing Domain To Preserve Privacy
Saranya S, Sangeetha B, Gayathri M
Enhanced Article (HTML) PDF View Download Google Scholar

172-177
39
A Succession Multi-Modal Biometric Identification Hypothesis
SSP Gopal CH, Suresh Lawrence D, Siva R, Pandikumar K
Enhanced Article (HTML) PDF View Download Google Scholar

178-182
40
Malware Avoidance Using Two Epidemic Layers
R. Siddarth, T. M. Sounderarajan Mothilal, P. Sathish Saravanan
Enhanced Article (HTML) PDF View Download Google Scholar

183-185
41
Personalizing Search Based on user Search Histories
Thenmozhi. M, Swathishri. J, Nivedha. A, Kalaiselvi. A
Enhanced Article (HTML) PDF View Download Google Scholar

186-188
42
Secure Multi-owner Data Sharing For Dynamic Group In Cloud
C. Kayalvizhi, S. Arun Prasath, S. ArunKumar, C. Broons Gandhi
Enhanced Article (HTML) PDF View Download Google Scholar

189-194
43
Vehicle Management System using Cloud Services in the IoT Environment
Venkatesh M, Vignesh E,Venkatesh Babu A, Devi
Enhanced Article (HTML) PDF View Download Google Scholar

195-199
44
Database Traversal to Support Search Enhance Technique using SQL
Sivakumar K, Sriram U, Yasar Arafath S, Bhanu Priya
Enhanced Article (HTML) PDF View Download Google Scholar

200-204
45
Exploratory Search for Web Results
Ayer Prakash R., Sherine Mary R.
Enhanced Article (HTML) PDF View Download Google Scholar

205-209
46
A New Distributed Application and Network Layer Protocol for VoIP in Mobile Ad Hoc Networks
Karthikeyan S, Manikandan G, Nishanth T, Abraar S
Enhanced Article (HTML) PDF View Download Google Scholar

210-212
47
Automatic Extraction of Social Interface System using Big-Data Analysis with Emergency Alert
Jagadeeswaran J, Haashim L, Abraar S
Enhanced Article (HTML) PDF View Download Google Scholar

213-216
48
Theoretical Strategies to devise Structural Semantics of Ontology Inferencing Graph Techniques
Saravanan V, Tamizhmaran M, Vivekanandan V, Vijayaragavan P
Enhanced Article (HTML) PDF View Download Google Scholar

217-220
49
Overload Avoidance for Dynamic Virtual Machine Resource Allocation Environment
Pillapakam Sridharan Srivatsan, M Manimaran, V Manikandan, M. Murugesan
Enhanced Article (HTML) PDF View Download Google Scholar

221-229
50
Reversible Watermarking Technique based on Time Stamping in a Relational Data
Aishwarya C, Aishwarya S, Sathish Saravanan P
Enhanced Article (HTML) PDF View Download Google Scholar

230-232
52
Tag Suppression and Classification Resources in Collaborative Tagging Systems
Charulatha M, Ashwini M, Arul U
Enhanced Article (HTML) PDF View Download Google Scholar

239-241
53
A Secrete Key Extraction Using Received Signal Strength (RSS) of Wireless Networks
Solai Rajan T, Udaya Kumar D J, Anima Mahato
Enhanced Article (HTML) PDF View Download Google Scholar

242-245
54
Digital Image Sharing by Diverse Image Media
Leena Slochana V, Malavika G, P. Vijayaraghavan
Enhanced Article (HTML) PDF View Download Google Scholar

246-249
55
Enhancing Security of Multi-cloud Architecture using combination of approaches
A. Linda Alice, P.M.C Nisha, S.Sivagami
Enhanced Article (HTML) PDF View Download Google Scholar

250-253
56
Profile based Concurrent Data Download, Cloud- Data Sharing and Load Balancing
M. Gayathri, K. Jayanth, S. Gubendhirapandian, P. Ashokkumar
Enhanced Article (HTML) PDF View Download Google Scholar

254-258
57
Protecting Privacy Against Location-Based Personal Identification
Ram Prakash. R, Prabhu. K, Samson Sunny. S, Devi. S
Enhanced Article (HTML) PDF View Download Google Scholar

259-264
58
Data Sharing in Cloud Computing by Using Steganography
Dhanush Shri Vardhan. R, Immanuel Xavier.N, Illavarasan. S, Aravindan. B
Enhanced Article (HTML) PDF View Download Google Scholar

265-268
59
Fine Grained Updates in Cloud Using Third Party Auditing
M Paventhan, C Murugavel, S Rajadurai
Enhanced Article (HTML) PDF View Download Google Scholar

269-273
60
Cryptographic Cloud Storage with Anonymous Authentication
S. Meera, G. NasreenHameedaBanu, V. Vaishnavi, S. Geetha Rani
Enhanced Article (HTML) PDF View Download Google Scholar

274-277
61
Investigation on the Performance of a Series Voltage Compensator for Mitigating Voltage Sag and Swell in Power Distribution Networks
Bhaskar Lodh
Enhanced Article (HTML) PDF View Download Google Scholar

278-283
62
Building a Scalable System for Stealthy P2P-Botnet Detection
B. Anitha, Avinash Sivan, V. Hari Prasath, S. Selvaraj
Enhanced Article (HTML) PDF View Download Google Scholar

284-288
63
Product Score Based on Preferential Treatment of Aspects and Sentiment Classification
K. N. Karthikheyan, D. Kamesh, S. Pradeep Kumar, Dr. N. Pughazendi
Enhanced Article (HTML) PDF View Download Google Scholar

289-294
64
An Efficient and Trustworthy Resource Sharing Platform for Collaborative Cloud Computing
Malvika K, Nikita T K, Aravindhan B
Enhanced Article (HTML) PDF View Download Google Scholar

295-300
65
Encryption scheme with Ordered Bucketization
Raghunathan M, Ramakrishna V, Rathana kumar M, Murugesan M
Enhanced Article (HTML) PDF View Download Google Scholar

301-303
66
Growth and Haematological Response of Broiler Starter Chickens Fed Diets Containing Shea Butter Cake
Orogun Ademola Julius, Oniye S.J., Olugbemi T.S.
Enhanced Article (HTML) PDF View Download Google Scholar

304-310
67
Security Challenges for Public Cloud
Raghavendran R, Parthasarathi L, Deepa N
Enhanced Article (HTML) PDF View Download Google Scholar

311-319
68
Data De-Duplication Correction And Secure Key Authentication in Cloud
C. Pradeesh Kumar, G. Arunnath , K. Jegadesan , S. Harish
Enhanced Article (HTML) PDF View Download Google Scholar

320-322
69
Cloud Aided Shred Data with Digital Signature User Revocation
P. Deivendran, S. Abdul Rahman, P. R. Kishore, K. S. Rajeshwar Katoch
Enhanced Article (HTML) PDF View Download Google Scholar

323-325
70
Sixth Sense Technology
P. Vijayaragavan, Kishore. P, Nandakumar. N. P, Mukesh Sheoran
Enhanced Article (HTML) PDF View Download Google Scholar

326-328
71
Design of Delay Lock Loop with Dual Control Using LT-Spice
K. Ragupathi, J. Imran Khan, M. Karthik, S. Rajan, D.Vignesh kumar
Enhanced Article (HTML) PDF View Download Google Scholar

329-333
72
Human Interaction in Shoulder Surfing Security
S. Geethanjali, J. Mary Monika, V. Nandhini
Enhanced Article (HTML) PDF View Download Google Scholar

334-338
73
Efficient technique to Detect Blackhole Attack in Mobile Ad Hoc Networks
R. Deenadhayalan, S.Anandamurugan
Enhanced Article (HTML) PDF View Download Google Scholar

339-346
74
De-superheating for controlling accurate steam temperature in high pressure and temperature boiler
Sathyavel Gurumurthy
Enhanced Article (HTML) PDF View Download Google Scholar

347-352
75
Radiotherapy Conformal Wedge Computational Simulations,Optimization Algorithms, and Exact Limit Angle Approach
F Casesnoves
Enhanced Article (HTML) PDF View Download Google Scholar

353-362
76
Effect of Nanoparticles Coating on Properties of Al-12Si Alloy
Dr. Rana A. M. Anaee, Marwah Ayad Abbas
Enhanced Article (HTML) PDF View Download Google Scholar

363-367
77
Application of Generalized Reduced Gradient Method for Optimization of Plunge Centerless Grinding Process
Do Duc Trung, Ngo Cuong, Phan Bui Khoi, Tran Quoc Hung
Enhanced Article (HTML) PDF View Download Google Scholar

368-372
78
A Survey on Reliable Communication in LTE Network
Ashish Saraf, Nitin Tiwari
Enhanced Article (HTML) PDF View Download Google Scholar

373-377
79
Face Recognition using Edge Detection of Layer
G Akhila Goud, B Hemanth
Enhanced Article (HTML) PDF View Download Google Scholar

378-380
80
Secured Vertical Handoff between 802.16a and 802.16m for Fourth Generation (4G) Wireless Networks
Prajwalsingh C. Parihar, Meghna R. Patil, Sachin Marke, Parul Sahare
Enhanced Article (HTML) PDF View Download Google Scholar

381-385
81
Mobile Search Engine Personalization Enhanced with Recommendation System with an Impact of Affect Analysis
Raja Arulmozhi Keerthana. R, Sruthi. R, Yamini. R
Enhanced Article (HTML) PDF View Download Google Scholar

386-390
82
Literature Survey on Web Personalization
Sachin Pardeshi
Enhanced Article (HTML) PDF View Download Google Scholar

391-402
83
A Study on Combine use of Steganoghaphy and Cryptography for Data Hiding
Shailendra M. Pardeshi
Enhanced Article (HTML) PDF View Download Google Scholar

403-406
84
A Survey of Optimized Link State Routing(OLSR) Networks using NS-3
Sapana Choudhary, Ankita Bhatt
Enhanced Article (HTML) PDF View Download Google Scholar

407-415
85
A Survey of Energy-Efficient, Fair Routing in MANET
Sapna Choudhary, Sonal Jain
Enhanced Article (HTML) PDF View Download Google Scholar

416-421
86
Pre-treatment Methods for Seawater Desalination and Industrial Wastewater Treatment: A Brief review
Ali Hashlamon, Akil Ahmad, Lau Choon hong
Enhanced Article (HTML) PDF View Download Google Scholar

422-428
87
An Innovative Method for Concluding User Search Intention Using Feedback Session
Vipul D. Punjabi
Enhanced Article (HTML) PDF View Download Google Scholar

429-432
88
Honne Oil Biodiesel - Alternative Fuel For CI Engine
Rahul Krishnaji Bawane, Nilima Baliram Gadge, Dinesh Krishnaji Bawane
Enhanced Article (HTML) PDF View Download Google Scholar

433-435
89
Network Coding in Wireless sensor Network- An overview
Pavalarajan. S, Aanandhadurgadevi. T
Enhanced Article (HTML) PDF View Download Google Scholar

436-440
90
Recent developments in T-Trefftz and F-Trefftz Finite Element Methods
Yi Xiao
Enhanced Article (HTML) PDF View Download Google Scholar

441-459
91
A Ranking Based Combined Approach for Recommending Travel Packages
N. R. Rejin Paul, G. Karpagam, R. Sindhuja, S. Yamini
Enhanced Article (HTML) PDF View Download Google Scholar

460-466
92
An Efficient Energy Optimization in Routing Protocol Wireless Adhoc Network
Amit Kumar Gupta, Shahid Sagar, Prerna Trivedi
Enhanced Article (HTML) PDF View Download Google Scholar

467-470
93
Development and Implementation of a Solar-Powered Automated Irrigation Control System for Maize Crop Grown in Loamy Soil
Ibrahim A. G., Mosadomi, T. J., Odekunle, M. O.
Enhanced Article (HTML) PDF View Download Google Scholar

471-478
94
Design of Sequential Circuits Using MV Gates in Nanotechnology
Bahram Dehghan, Ahad Salimi
Enhanced Article (HTML) PDF View Download Google Scholar

479-485
95
Knowledge Management System development by deploying ART Artificial Neural Networks Algorithm
Chris M. Jayachandran, Dr. Shyamala Kannan
Enhanced Article (HTML) PDF View Download Google Scholar

486-492
96
Model for the Dynamical Study of a Three-Species Food-Chain System under Toxicant Stress
Raveendra Babu. A , O. P. Misra, Chhatrapal Singh, Preety Kalra
Enhanced Article (HTML) PDF View Download Google Scholar

493-513
97
Opportunistic Search in Disconnected Mobile Adhoc Network
A. V. Kalpana, R. Prakash , G. Sundar
Enhanced Article (HTML) PDF View Download Google Scholar

514-518
98
Survey on Sheltered Top-K Query to Intermittently Encrypted Signature in Tiered Sensor Networks
P. Ramya, Dr. C. Nalini
Enhanced Article (HTML) PDF View Download Google Scholar

519-524
99
A Procurement Mechanism for Dynamic Resource Pricing In Cloud Computing
Priya D, Revathy G, Yogalakshmi A, Jasmin Suji V
Enhanced Article (HTML) PDF View Download Google Scholar

525-530
100
Privacy Preserving, Distributed and Secured Patient-controlled Mobile Health Record System
Sahana Andal R., Megana L. P., K.Tamilarasi
Enhanced Article (HTML) PDF View Download Google Scholar

531-334
101
A survey on Improving Classification Accuracy in Data Mining
Bhavesh Patankar, Dr. Vijay Chavda
Enhanced Article (HTML) PDF View Download Google Scholar

535-538
102
Experimental Investigation of Effect of Water Emulsion on Load Carrying Capacity of Hydrodynamic Journal Bearing
Tushar P. Gundarneeya
Enhanced Article (HTML) PDF View Download Google Scholar

539-545
103
Control Strategy of Solar Photovoltaic Generators with MPPT and Battery Storage in Micro Grid
Mr. G. Joga Rao, Dr. S.K Shrivastava
Enhanced Article (HTML) PDF View Download Google Scholar

546-554
104
2-Hydroxy-4-Isobutoxy Acetophenone Oxime as an Analytical reagent for Nickel
Dr. J. R. Shukla
Enhanced Article (HTML) PDF View Download Google Scholar

555-558
105
Investigation on the Performance of Single Cylinder Diesel Engine using Tobacco-Diesel Blends
Dr. R. Ramachandra
Enhanced Article (HTML) PDF View Download Google Scholar

699-705