Volume-4 Issue-2, July 2014

  • Version
  • Download 48
  • File Size 4.00 KB
  • Create Date July 30, 2014
  • .

Volume-4 Issue-2, July 2014, ISSN: 2278-3075 (Online)
Published By: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP)

Preparation of Activated Carbon from the Stem of the Natural Plant Vitex Negundo and Evaluation of Their Physical and Chemical Properties
A. Arun Kumar1, T. Chandra Sekaran2, K. Riaz Ahamed3

Secure Search Engine for Mobile Users for Countering the Attacks over Internet
Mohan Gowda G S1, Janardhan Singh2

Evaluation and Analysis of Active RFID Protocol in Wireless Sensor Networks
Kiranpal Kaur1, Naveen Kumari2

Performance Optimized DCT Domain Watermarking Technique with JPEG
Jyoti Rani1, Tazeem Ahmad Khan2

A Novel Approach to Trustable Data Storage in Cloud Computing
Vegi Srinivas1, V. Valli KumariS2

Arm 7 Based Theft Control, Accident Detection & Vehicle Positioning System
M.S. Joshi1, Deepali V. Mahajan2

Improvement of Network Efficiency by Preventing Black Hole Attack in Manet
Gurnam Singh1, Gursewak Singh2

Design of Op-amp, Comparator and D Flip-Flop for Fifth Order Continuous-Time Sigma-Delta Modulator
Sunita Arvind Rathod1, Siva Yellampalli2

Big Data: Challenges and Opportunities
Anuranjan Misra1, Anshul Sharma2, Preeti Gulia3, Akanksha Bana4

Optimizing Big Data
Anuranjan Misra1, Anshul Sharma2, Preeti Gulia3, Akanksha Bana4

Optimization of Stereolithography Process Parameters for Part Strength using Taguchi Technique
Raju B. S1, Chandra Sekhar U2, Drakshayani D. N3

Impact Toughness of Concrete Reinforcement Bars Produced by the THERMEX Process and Ordinary Rolling Process
Mohammad Sharear Kabir1, Md Moinul Islam2, Md Mohar Ali Bepari3

Use of Overhead Water Tank to Reduce Peak Response of the Structure
Bhosale Dattatray1, G. R. Patil2, Sachin Maskar3

Linear-Quadratic Regulator Control for Human Following Robot in Straight Path
Chetan Naik J1, S. L. Pinjare2, Jharna Majumdar3

Level-Based Data Security Model in Cloud Computing
Kanupriya1, Meenakshi Sharma2

Enhanced Information Security using DNA Cryptographic Approach
Abhishek Majumdar1, Meenakshi Sharma2

A New Approach of Intrusion Detection System with a Combination of Multilevel and Multiagent
Arpita Biswas1, Meenakshi Sharma2

Evaluation of an Energy Efficient Cluster Based Routing in MANET
Jaspinder Singh1, Meenakshi Sharma2

Code Quality Evaluation for Open Source Software System
Ravinder Kaur1, Meenakshi Sharma2, Hardeep Singh3

Frequent Pattern Mining for XML Query-Answering Support
Alfiya Iqbal Ahmed Shaikh1, Sanchika Bajpai2

Performance of Concrete Walls with Waste and Recycling Materials for Industrial Building Systems
Seyed Yaser Mousavi Siamakani1, Abdul Kadir Bin Marsono2, Neelam Memon3, Shariwati Binti Mansor4, Hares Nikookar5