An ISO 9001:2008 Certified Journal
| 
           S.No.  | 
            
           Title of Paper  | 
            
           Page No.   | 
        
1.   | 
          A Lean Manufacturing Model for Reducing Dead Time on A Labels Production Line Authors: Eduardo Gutierrez Gonzalez, Mario Aguilar Fernandez, Victor Manuel Cordoba Lobo  | 
          1-7   | 
        
2.   | 
          Maintaining Location Privacy and Anonymity for Vehicle’s Drivers in VANET Authors: Eng. Marvy Mansour, Prof. Ahmed Fahmy, Prof. Mohammed Hashem  | 
          8-40  | 
        
3.   | 
          An Innovative System for Home Tele-assistance in Real Time Authors: Dr. R. Marani, Prof. A. G. Perri  | 
          41-44  | 
        
4.   | 
          The Ecological Study on the 3 Plus 1 Foreign Language Interactive Teaching Model in Police Academy Author: WEI Li  | 
          45-50  | 
        
5.   | 
          
               Author: Alayaki F. M.  | 
          51-57  | 
        
6.   | 
          
               Authors: J. Juansah, I W. Budiastra, K. Dahlan, K. B. Seminar  | 
          58-64  | 
        
7.   | 
          Flood Behaviour Analysis Due to Dam Break (Case study in Cengklik Dam, Center Java of Indonesia) Authors: Lily Montarcih Limantara, Pitojo Tri Juwono  | 
          65-69  | 
        
8.   | 
          
               Author : Marianne M. Kamal  | 
          70-80  | 
        
9.   | 
          Authentication in Wireless Sensor Networks Using Virtual Certificate Authorities Authors:Manjula M. Ramannavar, Monica M. Jagtap  | 
          81-85  | 
        
10.   | 
          
               Authors: Indra Prakash Mishra, Sanjiv Kumar  | 
          86-93  | 
        
11.   | 
          Payment Gateway Model- Mobile Cash Wallet Authors: S.T. Bhosale,  V. P. Desai  | 
          94-96  | 
        
12.   | 
          An Innovative Approach for Traffic Management System Using Wireless Sensor Network (Suspended) Authors: S. Bala Basker, N. Venancia Pushpa Rani  | 
          97-102  | 
        
13.   | 
          
               Authors : Selvathi D, N.B.Prakash, Neethi Balagopal  | 
          103-108  | 
        
14.   | 
          Exploring the Serial Capabilities for 16x2 LCD Interface Authors: Pooja Soni, Kapil Suchdeo  | 
          109-112  | 
        
15.   | 
          Glitch Power Minimization Techniques in Low Power VLSI Circuits Authors: J.Sudhakar, K. Tirupathi Rao, B. Suresh  | 
          113-116  | 
        
16.   | 
          Life Cycle of Clustering Questions Based on Tags From Question Bank Authors:Rasendu B Mishra, Prof.(Dr.) Nilesh K Modi  | 
          117-119   | 
        
17.   | 
          Comparision and Implementation of Cryptography Algorithm By Using VHDL Authors: Priya Jain, Dr. Rita Jain, Tarun Verma  | 
          120-124   | 
        
18.   | 
          Design and Analyze the various m-sequences codes in MATLAB Authors: Anshul Khatter, Poonam Goyal  | 
          125-129  | 
        
19.   | 
          Surface Modification of Nanotitania Using High Energy Electron Beam Irradiation Authors: Priyanka K P, Sunny Joseph, Anu Tresa Sunny, Jaseentha O P , Thomas Varghese  | 
          130-134   | 
        
20.   | 
          Design and Analysis of Capacitive MEMS Viscometric Sensor for CGM Authors: P.N.Prabhakaran, M.Renuga  | 
           135-138   | 
        
21.   | 
          Implementation Of Interferential Therapy (IFT) Using Microcontroller Author: Nikita. P. Joshi  | 
          139-141   | 
        
22.   | 
          
               Authors: Kirti Sontakke, S. Ghosh  | 
          142-150  | 
        
23.   | 
          
               Authors: Vimla Singh, Alok Dubey  | 
          151-156  | 
        
24.   | 
          Monitoring of Diabetes with Data Mining via CART Method Authors: Kavitha K , Sarojamma R M  | 
          157-162  | 
        
25.  | 
          Review of Pump as Turbine (PAT) for Micro-Hydropower Authors: Tarang Agarwal  | 
          163-169  | 
        
26.   | 
          Survey on Auto-Calibration of Beacon Nodes in Indoor Location Computing Authors: Priyadharsini.C, Ann Saviour  | 
          170-175  | 
        
27.   | 
          
               Authors: Dr. K. P. Chellamani, P. Sundaramoorthy, T. Sureshram  | 
          176-184  | 
        
28.  | 
          
               Authors: Dhanisha N. kapadia, Priyesh. P. Gandhi  | 
          185-190  | 
        
29.   | 
          Analysis of Straight and Skewed box Girder Bridge by Finite Strip Method Authors: Dr. S.A.Halkude, Akim C.Y.  | 
          191-198  | 
        
30.   | 
          Detecting and Decoding Algorithm for 2D Barcode Authors: Nachiket A Rathod, Dr. Siddharth A. Ladhake  | 
          199-202  | 
        
31.   | 
          Vibration Isolation of Diesel Electric Generator Used For Cell Tower Authors: A.R.Jadhav, Dr. Gawade S.S.  | 
          203-205  | 
        
32.   | 
          Population based meta-heuristic techniques for solving optimization problems: A selective survey Authors: Kalyani Manda, Suresh Chandra Satapathy, B. Poornasatyanarayana  | 
          206-211  | 
        
33.   | 
          Reactive Power Compensation by Controlling the DSTATCOM Authors: Alpesh Mahyavanshi, M. A. Mulla, R. Chudamani  | 
          212-218  | 
        
34.   | 
          ATD Circuit for Asynchronous RAM Author: Dhaval Patel  | 
          219-222  | 
        
35.   | 
          Face Recognition Using Eigen faces By ANN with Resilient Back propagation Algorithm Authors: Kishore Golla, Sunand G, Rajesh babu N  | 
          223-228  | 
        
36.   | 
          Monitoring and Alerting System Integration in FMS Landing Phase using Image Fusion Techniques Authors: Vinothkumar. J, Subramanian. R, Kalaidhasan. D, Balasubramanian. M  | 
          229-236  | 
        
37.   | 
          Effect of Height and Number Floors to Natural Time Period of a Multi- Storey Building Authors: Nilesh v prajapati, A.N.Desai  | 
          237-239  | 
        
38.   | 
          Projectile parametric studies on bird impact behaviour of aircraft leading edges Authors: Kavitha Mol.S, Stanley C Salem  | 
          240-246  | 
        
39.   | 
          SVD Based Detector for Cognitive Radio Network Using Average of Extreme Values of ICDF Authors: Mohd. Fahad Fahim, Mohd. Sarwar Raeen  | 
          247-252  | 
        
40.   | 
          Review of Attacks on Databases and Database Security Techniques Authors: Saurabh Kulkarni, Dr. Siddhaling Urolagin  | 
          253-263  | 
        
41.   | 
          Optimization of Shell and Tube Heat Exchangers for Sea Water Cooling by COMSOL Multiphysics Authors: S. Swaraj Reddy, Tania Dey, Haribabu K, Harshit Krishnakumar, Garima Vishal  | 
          264-270  | 
        
42.   | 
          Survey on Keyword Searching in Cloud Storages Authors: Tritty Mamachan, Roshni. M. Thanka  | 
          271-275  | 
        
43.   | 
          
               Author: Veerabhadragouda. P. Patil   | 
          276-284  | 
        
44.   | 
          Data Hiding Using EDGE Based Steganography Authors: K. Naveen BrahmaTeja, Dr. G. L. Madhumati, K. Rama Koteswara Rao  | 
          285-290  | 
        
45.   | 
          Consequence Assessment of Vapour cloud Explosion Involving Hydrogen Release Authors: A.R. Soman, G.Sundararaj  | 
          291-297   | 
        
46.   | 
          A Survey: Detection of Duplicate Record Authors: Dewendra Bharambe, Susheel Jain, Anurag Jain  | 
          298-307   | 
        
47.   | 
          
               Authors: Mubeena. M, M.Priyanka, K. John Singh  | 
          308-314   | 
        
48.   | 
          High Performance Steel for Steel-Concrete Composite Girder Bridge Authors: Vikash Khatri, P. K. Singh, P. R. Maiti  | 
          315-323   | 
        
49.   | 
          Shrinkage Effect and Transverse Cracking in Steel-Concrete Composite Bridge Deck Authors: Vikash Khatri, P. K. Singh, P. R. Maiti  | 
           324-333   | 
        
50.   | 
          Simulation of 3rd Order 4-Bit Σ-Δ Modulator for Audio Application Authors: Yogita R.Gajare, Prof. Anuja A. Askhedkar, Dr. G.H. Agrawal  | 
          334-337   | 
        
51.   | 
          FPGA Implementation of Low Power Recursive DFT for DTMF Application Authors: Arshad Khan, E.Mahendar reddy  | 
          338-343  | 
        
52.   | 
          Design of DACS (Data Acquisition and Control System) using Linux Authors: P. Stephen Nischay, S. Latha  | 
          344-346  | 
        
53.   | 
          Comparison of Fibroid Syndrome Using Data Mining Techniques Authors: Girija D.K, Dr. M.S. Shashidhara  | 
          347-352  | 
        
54.   | 
          
               Authors: Atif Ali Khan, Adnan I. Elberjaoui Yakzan, Oumair Naseer, Bilal S. Chehab  | 
          353-359  | 
        
55.   | 
          Extraction Of Retinal Blood Vessels Using Curvelet Transform And Kirsch’s Templates Authors: M. Kalaivani, M. S. Jeyalakshmi, Aparna.V  | 
          360-363  | 
        
56.   | 
          Study of Corrosion Behavior of Mufflers for High Heat Resistance Coatings Authors: A. B. Jadhav, S. T. Vagge  | 
          364-369  | 
        
57.   | 
          News Video Indexing and Retrieval Using Combination of S.A.D and E.C.R Scoring Techniques Authors: Sanjoy Ghatak, Abhishek Pradhan, Dhiraj Khandelwal, Pema Lhamu Tamang  | 
          370-373  | 
        
58.   | 
          Performance of Cementitious Soil Authors: Ninija Merina R, Sribanu Vallimaan M  | 
          374-381  | 
        
59.   | 
          A Survey of Recommender Systems Techniques, Challenges and Evaluation Metrics Authors : Tranos Zuva, Sunday O. Ojo, Seleman M. Ngwira, Keneilwe Zuva  | 
          382-386  | 
        
60.   | 
          Application of Taguchi Method in Indian Industry Authors: Shyam Kumar Karna, Dr. Ran Vijay Singh, Dr. Rajeshwar Sahai  | 
          387-391  | 
        
61.   | 
          Accurate Object Detection using Static Camera and Security Alert to Mobile Authors: D.Beulah David, Dr.M.A.DoraiRangaswamy  | 
          392-396  | 
        
62.   | 
          Agile Product Development in Submersible Pump through CAD Modelling (CFD) Authors: P. Vijaya Rajan, A. Saravanapandi Solairajan, C. Godwin Jose  | 
          397-400  | 
        
63.   | 
          Analysis of Routing Protocols for Wireless Sensor Networks Authors: P. Krishnaveni, Dr. J. Sutha  | 
          401-407  | 
        
64.   | 
          
               Authors: A. Fouathia, A. Mekroud, A. Benmeddour, K.Bellagh  | 
          408-414  | 
        
65.   | 
          
               Authors:John Leju Celestino Ladu; Xiwu Lu; Martin K. Loboka  | 
          415-420  | 
        
66.   | 
          Target parametric studies on bird impact behaviour of aircraft leading edges Authors: Kavitha Mol.S, Stanley C Salem  | 
          421-428  | 
        
67.   | 
          Cyber forensics-The art of decoding the binary digits Authors: Prof. (Dr.) Yashpal Singh Bist, Dr. Charu Agarwal, Uttara Bansal  | 
          429-435  | 
        
68.   | 
          Learning Based Obstacle Detection For Textural path Authors: Pradeep Kumar, Vikas Gupta  | 
          436-440  | 
        
69.   | 
          Combating Automated Teller Machine Frauds through Biometrics Authors: Oludele Awodele, Adeniyi Akanni  | 
          441-444  | 
        
70.   | 
          
               Authors: K.Srinivas, S.Karunakar Reddy, M.Madan Gopal  | 
          445-447  | 
        
71.   | 
          FPGA based Scaled down Model for Heterogeneous Spectrometers in Radio Astronomy Applications Authors: T.Siva, S.Latha, Y. Naga Supraja  | 
          448-453  | 
        
72.   | 
          Native-IP and Technical Cornerstone of Fifth Generation Network Authors: Dr. Oludele Awodele, Enem Theophilus Aniemeka  | 
          454-459  | 
        
73.   | 
          Variational Background Modeling Using Grid Point Sampling for Document Image Binarization Authors: J. Bharathi, Dr. P. Chandrasekar Reddy  | 
          460-468  | 
        
74.   | 
          Experimental Evaluation of Effectiveness of E-Government Websites Authors: A. Basit Darem, Dr. Suresha  | 
          470-473  | 
        
75.   | 
          Pavement Condition Forecasting Through Artificial Neural Network Modelling Authors: S.K. Suman, S. Sinha  | 
          474-478  | 
        
76.   | 
          Comparative Analysis of De-Noising on ECG Signal Authors: Md.Tarek Uz Zaman, Delower Hossain, Md.Taslim Arefin, Md.Azizur Rahman, Syed Nahidul Islam, Dr. A.K.M .............Fazlul Haque  | 
          479-486  | 
        
77.   | 
          Simplified HEDI Method For Progressive Transmission of 3-D Medical Image Author: Archana J.N  | 
          487-492  | 
        
78.   | 
          Design And Construction of Automated Barrier For Car Park Gates Authors: Amusa K. A., Nuga O. O., Adetomi A. A.  | 
          493-497  | 
        
79.   | 
          Positioning And Motion Control For Mobile Robot Authors:S. I. Amer , M. N. Eskander, Aziza M. Zaki  | 
          498-504  | 
        
80.   | 
          Data Retrieval from Distributed Data by using Mobile Agents Authors: Lipte Vishal D., Gunjal Baisa L., Gore Santosh I.  | 
          505-509  | 
        
81.   | 
          Mobile-Agent System for Homogeneous Data Retrieval Using NLP & PQR Authors: Shipra Kesharwani, Santosh Gore  | 
          510-516  | 
        
82.   | 
          Seismic Hazard And Its Mitigation: A Review Authors: Dr. Th. Kiranbala Devi  | 
          517-522  | 
        
83.   | 
          Operating Three Phase Induction Motor Connected to Single Phase Supply Authors: Shivanagouda.B.Patil, M. S. Aspalli  | 
          523-528  | 
        
84.   | 
          Design and Implementation of a Guided Object Launcher Authors: M. Manjusha, M. Veda Chary  | 
          529-533  | 
        
85.   | 
          
               Authors: Ali Tighnavard Balasbaneh, Abdul Kadir Bin Marsono  | 
          534-540  | 
        
86.   | 
          Extended Group Key Transfer Protocol for Authentication Using DES based on Secret Sharing in Authors: Yamini Indla, M. Sampath Kumar  | 
          541-551  | 
        
87.   | 
          A Novel Approach for Super Resolution in Medical Imaging Authors: G. S. Sable , Dr. A.N. Gaikwad  | 
          552-559  | 
        
88.   | 
          Enhancing Data Delivery with Path Predictable Mobile Observer in Wireless Sensor Networks Authors: Queen.R, Renganayagi.G, Anne Persial.P  | 
          560-564  | 
        
89.   | 
          Developing of Eembedded Gadget Used to Interact with IP-PBX Authors:Idrish Shaik, P V L N Phani, I Aditya Abhilash  | 
          565-568  | 
        
90.   | 
          Reliability based Analysis of Steel Truss Member Authors:Dr. K. Manjunath, Santhosh Kumar.C.N  | 
          569-572  | 
        
91.   | 
          
               Authors:Cherrylyn Buenaflor, Hee-Cheol Kim  | 
          573-580  | 
        
92.   | 
          Analysis For Operating Cost Of Split Case Pump For Its Life Cycle Authors: P. S. Bolade , S. J. Madki  | 
          581-585  | 
        
93.   | 
          
               Authors: N.NR.Sharavanan, N.Balu  | 
          586-598  | 
        
94.   | 
          Extraction of Silver From Photographic Waste Authors: Ashish Modi, Kishan Shukla, Jaimin Pandya, Kalpesh Parmar  | 
          599-606  | 
        
95.   | 
          OBEF (Odd Backward Even Forward) Page Replacement Technique Authors: Kavit Maral Mehta, Prerak Garg, Ravikant Kumar  | 
          607-611  | 
        
96.   | 
          
               Authors: Sakaros Bogning Dongue, Donatien Njomo, Jean Gaston Tamba, Lessly Ebengai  | 
          612-619  | 
        
97.   | 
          
               Authors: Kalley Harinarayana, N.Nagabhushana Ramesh, Dr. B. Balu Naik  | 
          620-626  | 
        
98.   | 
          Evolutionary Multiobjective Optimization Algorithms For Induction Motor Design – A Study Authors: S.Yasodha, K.Ramesh, P.Ponmurugan  | 
          627-633  | 
        
99.   | 
          Solving Asymmetric Travelling Salesman Problem using Memetic Algorithm Authors: Misba Shaikh, Prof. Mahesh Panchal  | 
          634-639  | 
        
100.   | 
          Fatigue Analysis of High Performance Cement Concrete for Pavements using the Probabilistic Approach Authors: Suresh Kumar K.S., Kamalakara G.K., Sagar Kamble, Amarnath M.S.  | 
          640-644  | 
        
101.   | 
          Dynamic Analysis of Railway track Authors: Sunita Kumari, Pragyan P Sahoo, Dr. V A Swant  | 
          645-650  | 
        
102.   | 
          Fluidization Behaviour of Binary Mixtures Using Sand and Biomass Authors: M K Karmakar, S Haldar, P K Chatterjee  | 
          651-657  | 
        
103.   | 
          Validation Study Illustrates the Accuracy of Operational Modal Analysis Identification Authors: Gomaa, F., Tayel, M., Kandil, K., Hekal, G.  | 
          658-667  | 
        
104.   | 
          
               Authors: D.Pradeepkannan, Dr.S.Sathiyamoorthy  | 
          668-672  | 
        
105.   | 
          A Review of Performance Evaluation of AODV Protocol in Manet With and Without Black Hole Attack Authors: Arunima Patel, Sharda Patel, Ashok Verma  | 
          673-677  | 
        
106.   | 
          Maximal Ratio Combining SC-FDMA Performance over Land Mobile Satellite Rice fading Channel Authors: Jyoti Gangane, Mari Carmen Aguayo-Torres, Juan J.Sanchez, Sharad Wagh  | 
          678-683  | 
        
107.   | 
          
               Authors: Amit Tripathi, Dr. Rajesh Nema  | 
          684-687  | 
        
108.   | 
          A Survey on Selfishness Handling In Mobile Ad Hoc Network Authors: Jim Solomon Raja.D, Immanuel John Raja.J  | 
          688-692  | 
        
109.   | 
          Effect of Thermal Properties on Delaminated Fibre Metal Laminate Authors: Sundaravalli. S, Majumder, M.C., Vijayaraghavan G.K  | 
          693-702  | 
        
110.   | 
          
               Authors: Aprajita Salgotra, Sumit Verma  | 
          703-713  | 
        
111.   | 
          Hybrid Recommendation Techniques for Improving Wireless Information Delivery Authors: Govind Jhanwar, Prof. Kshitij Pathak  | 
          714-720  | 
        
112.   | 
          Survey on Credit Card Fraud Detection Methods Authors: Krishna Kumar Tripathi, Mahesh A. Pavaskar  | 
          721-726  | 
        
113.   | 
          
               Author: Dr. Reshma Chengappa  | 
          727-733  | 
        
114.   | 
          Analysis of Intrusion Detection System Using Trusted Clients Authors: Gargi Agrawal, Megha Kamble  | 
          734-740  | 
        
115.   | 
          Design Optimization and Installation of the Evaporative Cooler in the Perspective of Bangladesh Authors: Md. Almostasim Mahmud, Dr. Md. Alamgir Hossain, M. A. Muktadir  | 
          741-749  | 
        
116.   | 
          Implementation of a New Approach to Mine Web Log Data Using Mater Web Log Analyzer Authors: Mahadev Yadav, Arvind Upadhyay  | 
          750-756  | 
        
117.   | 
          Top-K Spatial Objects Ranking by Quality Features Authors: Narne Srikanth, A.Ramana Lakshmi  | 
          757-761  | 
        
118.   | 
          
               Authors: Selvathi D, N.B.Prakash, Neethi Balagopal  | 
          762-767  | 
        
119.   | 
          
               Authors: Atkar Geeta B., Gore Sonal  | 
          768-771  | 
        
120.   | 
          Clustering of News Articles to Extract Hidden Knowledge Authors: A.D. Thakare, Nikita Muthiyan, Deepali Nangde, Dipti Patil, Minal Patil  | 
          772-775  | 
        
121.   | 
          Genetic Algorithm-Based Physicians Non-Cyclic Rostering Authors: Ismaila Wasiu O., Adeosun Olajide O., Adigun Abimbola A., Agunbiade Adebayo D.  | 
          776-781  | 
        
122.   | 
          A Novel Approach For Enhance Security On Database Using Proposed Algorithms Authors: Anjana Nigam, Prof. Roopali Soni  | 
          782-787  | 
        
123.   | 
          Customer Ordered Software Projects And Aristotle Value Theory Authors: Hasan Asil, Amir Asil, Haniyeh Asil  | 
          788-790  | 
        
124.   | 
          The Salient Points of Adam Smith, David Ricardo, and Stuart Mill's Theories and Software Engineering Authors: Hasan Asil, Amir Asil, Atefeh Asil  | 
          791-795  | 
        
125.   | 
          The Effect of Programmers on Software Project Management Based Upon Personality Five Traits Theory Authors: Amir Asil, Hasan Asil, Mohsen Asil  | 
          796-798  |