Welcome to Reseach & Development Manager ( )


Research and Development Manager is the innitiative taken by our organization to serve the GENXT Researchers in field of

 

 

 

 Networking, Communication and Software Development and provide with the facility to explore more and more..............

 

 

IJAIR- Volume 2 Issue 3 March 2013

 

 

   

Sr/ No Title Pdf
1 Usefulness of Ear ang Gait Biometrics in forensics science
Dr.Kashif Qureshi

Download
2 Cancelable Crypto-Biometrics for more sanctuary augmentation
Dr.Kashif Qureshi

Download
3 Matrix Mapping of Crypto-Biometrics for more security implementation
Dr.Kashif Qureshi

Download
4 SURFNET BASED P2P VOD SYSTEMS
Karthikram.A, Devanathan.P, Mathan Mohan.A, Vijayavel.L
5 Performance Evolution Of Mimo Communication Systems Using Spatial Modulation- A Survey
S.DHILIPKUMAR, C.ARUNACHALAPERUMAL
6 A COMPARATIVE APPROACH ON STEGANOGRAPHY TOOLS
Mr.E.Gurumoorthi, Mr.S.Balamurugan, Mrs.G.Vijayabarathi, Mr.R.Anbarasan
7 Traffic Control System for Multi Topology IGP Based Networks
Ning Wang, Kin Hon Ho
8 Packet-Hiding Methods for Preventing Selective Jamming Attacks
A.Mani, K.Adlinsuji,P.Ganesh
9 USE OF AUTOMATED TOOLS IN REVERSE ENGINEERING
Isha Malik, Harpreet Kaur
10 Speckle Noise Reduction of SAR Images using Hybrid GMAP-Median Filter
K.R.Jayakumar,S.Hanis
11 Microcontroller Based Online Tuning of Fuzzy Gain Scheduling PI Controller for a temperature process
Babi . T, D. Pamela
12 Unconstrained Profiling of Internet Endpoints via Information on the Web
Mr. SENTHIL.M , Mr. VENKATANARASIMHARAO.V
13 TOP-K SPATIAL QUERIES BASED ON QUALITY PREFERENCES
S.Iniyan , S. Thanga Prasath
14 Fabrication of Polymer Nano Particles by Plasma Polymerization Method
Dr. S. Gokulraj. Debmalya Bhattacharya
15 Optical Properties and Microstructural parameters of Nanoparticle by Ellipsometry Method
Dr. S. Gokulraj. Debmalya Bhattacharya
16 A Network Based Vulnerability Scanner for Detecting and Preventing SQLI Attacks in Web Applications
M.Muralidharan, M. Surya
17 Prediction of EDM Responses for TiC 3% Al-6061 using Central Composite Design
Parthasarathy. C 1, Chandrasekaran. K, Samuel. M, Shivapragash. B
18 AN ANALYTICAL ANALYSIS OF ANTENNA SELECTION ALGORITHMS IN MIMO SYSTEMS
Premnath S.P ,Jenifer J.R,Arunachalaperumal.C
19 ARCHITECTURE FOR DECIMATOR IN MULTIRATE SIGNAL PROCESSING CIRCUIT
Ms.Purvi, U. Gandecha, Dr. SA Ladhake
20 SOURCE PREFIX BASED FILTERING TECHNIQUE TO BLOCK UNWANTED TRAFFIC IN THE NETWORK
S.Radhakrishnan, R.Kalaivani
21 Lateral and Medial Rotation of Artificial Arm Using EOG Signal
Rahulsinh B. Chauhan
22 Simulative Investigation of Single Channel DWDM System with and without Dispersion Compensation Fiber at 40 Gbps
Neha Chaudhary , Dr. Ranjit Singh
23 TRACKING USER MOBILE POSITIONS USING NETWORK FLUX MODEL
M.Swapna, K.Tamilselvi, Sima kumari sinha, Mrs.D.Kerana Hanirex
24 VTCMOS Leakage Reduction in various logic circuits
Tarun Sachdeva, Nitin Sachdeva, Dr. S.K Aggarwal, Nisha Kumari
25 INVENTORY MANAGEMENT SYSTEM USING ANDROID
Vaishali Kamble, Kirti Bhgyawant, Yugandhara Parab, Smita Shinde
26 A Hybrid Method for XML Clustering with Dynamic Topic Updation
MS.THANGALATHA
27 THE INFLUENCE OF LAND USE AND LAND-COVER CHANGES ON SURFACE WATER QUALITY VARIATION IN THE JAKARA BASIN NORTH-WESTERN NIGERIA
Adamu Mustapha, Ado Abdu, Abba Lawali Geidam
28 Hand Gesture Recognition using Neural Networks ¬
Amith Mohan, Rohan Thorat, Santosh Thombare, B.W.Balkhande
29 Concave Surface Evaluation in Specular Object contain Inter-Reflection
A. Anbarasi, A. Venkatesh, D. Premkumar
30 Simulation of Efficient Low Voltage High Current Synchronous Buck Converterfor SMPS
DipendrasinhParmar, MehulsinhJadeja,T. B. Maniar
31 An Efficient Key Generation In RSA Using Pseudo Random Generator
S. Divya, S. Dilipkumar
32 QUICK AMBULANCE RESCUE SYSTEM USING GPS
G.Divya bharathi , M.Nandhini , Mrs.B.Hymavathi
33 Improved Intrusion Detection System for Cloud Environment
Rajesh Shankar Dongare , Ganesh Shivaji Gadhave , Kishor R. Kolhe
34 Thermal Analysis of the Poppet Valves In I.C Engines
K.Gopinath
35 Traffic Control System for Multi Topology Interior Gateway Protocol Based Networks
R.Indumathi, R.Sudha
36 Simulation of Indirect Field Oriented Control of Induction Motor
Mehulsinh Jadeja, Prof. A.D.Joshi, Dipendrasinh Parmar
37 A PWM based DC/DC Boost Converter with MPPT Solar Photovoltaic System
Jaypalsinhchauhan, Ravikumar Patel, A.D.Joshi
38 A Software Engineering techniques for Improving Software Reliability
U.Ankaiah, G.Raviteja,Kandula.Venkata Reddy
39 ORBITAL INDEX OF ADULT IGBOS AND ADULT OGONIS (AGED 17-70 YEARS)
Oladipo, G.S; Yorkum, L.K; David L.K
40 RFID Used for Anti Theft in Shopping Malls: A Research Survey
Ms. Khyati J. Gohil, Ms. Priyanka Trikha
41 Design of Online Security Strategies for Large Social Networks
Kolla.Ashok Chakravartthi, khalim.Amjed merja
42 Design of New Security Protocol for Privacy Preserving Data Aggregation in Wireless Sensor Networks
Sakthivel.B , Dinesh.D
43 A COMPETITIVE STUDY OF CRYPTOGRAPHY TECHNIQUES OVER BLOCK CIPHER
Patil shrirang vitchalrao , Dr.Rajasekhra
44 APPLICATION FOR QUANTUM CRYPTOGRAPHY TECHNIQUES OVER BLOCK CIPHER
G.Uma Sri, R.Kalaivani ,Patil shrirang vitchalrao ,Dr.Rajasekhra
45 MOBILE AD HOC NETWORKS (MANET) ARE NETWORKS PROTOCOLS TO IMPROVE QOS
Mr.R.Rajasekaran, Mr.T.Senthil Murugan
46 PRESERVING PUBLIC AUDITING ACCOUNTABILITY FOR DATA SHARING IN THE CLOUD COMPUTING
Mr. C. Ernest Samuel Philip , Mr. R. SRINIVASAN , Mr.R.Rajasekaran
47 SECURING APPLICATIONS IN PEER-TO-PEER DISTRIBUTED COLLABORATIVE ENVIRONMENTS
Mr. S.GOKULAKRISHNAN , Mrs. A. PADMAJA , MR.R.RAJASEKARAN
48 A TECHNIQUE TO SECURE A DECENTRALIZED ATTRIBUTE-BASED ENCRYPTION
Mrs. M.VIDHYA2Mr. C.BALA MURUGAN
49 A Survey on Image Retrieval by Image
Manisha S. Ballal, Prof. Potdar G.P.
50 Survey on Various Forms of Attacks and Counter Measures in Wireless Mesh Networks
M. Mohan chandra, Dr.V.Srikanth, N. Vijaya gopal
51 RECOGNITION OF SPEAKER USING MEL FREQUENCY CEPSTRUM
A.M.V.N.Maruti , D.Subhashini
52 NOVEL APPROACH FOR HANDLING SELFISHNESS IN MOBILE AD HOC NETWORK
Mrs K.Adlin Suji, Mr. R.Govindasamy
53 HI-Tech Mound
Prof. S.B.Tatale, OmkarGanjewar Anish Pillai
54 Optimal Policy for an Inventory Model without Shortages considering Fuzziness in Demand, Holding Cost and Ordering Cost
D.Dutta, Pavan Kumar
55 A survey on web service composition for security and semantic problems
Mr. K. Purushothaman, Mr. Murugavel
56 DESIGN AND DEVELOPMENT OF SKILL TESTS IN BALL BADMINTON
P. Raj Kumar, Dr. R. Kalidasan
57 APC & MODIFIED OMS TECHNIQUES FOR OPTIMIZED LUT DESIGN
D.Rajitha, P.Suneetha, K.Suresh
58 An SOA Based Framework for Integrating and Protecting High Sensitive Data
E.Poonguzhali, S.Ramakrishnan, A.Tharagesh, V.SVSSSRP Kumar
59 An END-To-END SYSTEM for IMPROVING QUALITY of DATA with DYNAMIC FORMS
G.Ravi Teja, U.Ankaiah , K.Rajesh
60 Survey on Recommendation System Based on Mahout
Sachin Walunj, Kishor Sadafale
61 A SURVEY OF PALMPRINT IDENTIFICATION TECHNIQUES
Khot Sagar S. , Mane Vikram A , Vishal Kore
62 Mining Frequent Itemsets from Spatial Data Bases by Using Markov Chaining Method (MCM) Approach
CH.M.H.SAI BABA, Dr. Rekha Redamalla
63 An Autonomic Active Queue Management Mechanism to Improve Multimedia Flow Delivery Quality
Mr.Rahul B Digge, Prof. Sanjeev C Mhamane, Prof.D.B.Mantri
64 Efficient Matching Data Collection for Mobile Users in Personal Digital Assistant (PDA) Devices
T.Saravanan , Rajesh
65 Cloud Computing: Concepts, Architecture and Energy Management
Savreet Kaur, Dr. Raman Maini
66 Distributed Resource Discovery and Management in Shared Wide Area Platform
S.Shankar, S.Rajesh
67 A STUDY ON USE OF ZERO KNOWLEDGE AUTHENTICATIONS AT P2P PROTOCOLS
Sharath Yaji
68 PERFORMANCE EVALUATION OF DIFFERENT EDGE DETECTORS WITH SALT AND PEPPER NOISE
Sheenam Bansal, Dr. Raman Maini
69 Enterprise Resource Planning- A Complete Business Solution
Shravan Kumar, Shrikant Nirmalkar, Sudhir Kumar Meesala
70 MEMS based Top-Loaded Monopole Antenna Operating at 77 GHz for Automotive Radar Systems
R.Revathy, K.J.Jegadish Kumar
71 WATER TANK LEVEL MONITORING FOR WIRELESS SENSOR WITH GSM/GPRS MOBILE NETWORK
B.Siva Naga Raju,V.David Sushil, K.Raghava Rao
72 PERFORMANCE ANALYSIS OF RANKING ALGORITHMS USING ONTOLOGY FOR WEB PERSONALIZATION
M.SONIYA , Dr. B.KALPANA
73 Secure Spread Spectrum Technique Using Video Watermarking for Data Hiding
Mr.P.Thiyagarajan, Mr.S.Senthilkumar, Mr.K.Sudhakar,
74 ARTIFICIAL INTELEGENSE BASED ENERGY EFFICIENT WIRELESS SENSOR NETWORK
S.VEDANTHARAJAGOPAL, C.BALAJI
75 Improving Page Rank Using Semantic Relevance
Er. Tanveer Singh, Dr. Raman Maini
76 An Effective and Optimal Mobility Model and its Prediction in MANETs
Shsshiraj Teotia, Dr. S. Garg
77 Providing Time-Based Dependable Service Composition for MANET
P.Iyappan, R.Varalakshmi
78 Grid Resource Monitoring and Prediction System With Resource Classification Based On NMF
J.Vasuki ,M.Kalimuthu
79 ENHANCED ONTOLOGY-BASED ALGORITHM FOR TEXT DOCUMENT CLUSTERING USING DB-SCAN ALGORITHM
R.VIDHYA ROHINI , Dr. B.KALPANA
80 A Survey on Mobile Cloud Computing: Concept, Applications and Challenges
Vikas Kottari, Vishwanath Kamath G, Lloyd Presley Saldanha, Chandan Mohan
81 Practicability and Validation of Roundabout
Amit G. Shah, Prof. Suresh M. Damodariya
82 Mining Educational Data using decision tree to Improve Student’s Performance
K. Arun
83 Data Dynamics in Cloud Storage
G.Chaitanya, Dr.T.V.Rao
84 Parallel Car Parking based on Fuzzy Logic
Hardik J.Parmar, Aditya C.Mhamunkar, Chandraprakash F. Jain, Kanchan K. Doke
85 Control the Speed of PMBLDC motor by using DSP without position sensor
Chetan.P.Patil, Sagar.R.Ghuge, Rajendra. S.Ahire
86 CELL PHONE JAMMERS
Divyashree P. K, Sahaja Nayak , Deepthi Krishna,Pallavi,Akshaya S.
87 Middleware for Service composition and providing fault tolerant in cloud computing
S.Dhasarathapandian
88 Simulation of Shunt Active Filter for Compensating Current Generation using Instantaneous Power Theory
Dhirendrakumar R Rana, Pradipkumar S Patel, Dr.S.N.Pandya
89 A Review on Multi Level DC Link Inverter Topologies
G Durga Prasad, Dr. V. Jegathesan
90 Virtual Reality For Interior Design
Bhagyashree Bhole,Varsha Saindane,Tejashvi Yewale,Prof.D.R.Ingle
91 AN APPROACH FOR OPTIMIZING MACHINING PARAMETERS THROUGH TAGUCHI METHOD AND FUZZY RULE
S.ASHOKKUMAR, Dr.R.SARAVANAN
92 Optimizing machiningparameters using artificial neural network
S.ASHOKKUMAR, Dr.R.SARAVANAN
93 A method to optimize the Cutting Parameters Using Genetic Algorithm
RAJESH KUMAR, Dr.R.SARAVANAN
94 An approach for balancing the assembly line using genetic algorithms
RAJESH KUMAR, Dr.R.SARAVANAN
95 Multipath Routing Protocol for Congestion Control in MANET
Mr. S.A. Jain, Mr. Gaurav Chimote,Mr.Swapnil Sangle,Mr.Akash Bhagat
96 Performance analysis of MAC protocols in underwater communication by using optimum packet size
Godwin Jacob D, Karthika S
97 Social Networks and Security Issues
Annapurna Gummadi, M Sunitha, T Janardhan Rao, M Madhavi Latha
98 Behaviour of High Strength Concrete by using Rice Husk Ash
ILIYAS. U. RASOOLBHAI, SUHASINI. M. KULKARNI
99 Performance Improvement in Underwater Wireless Sensor Networks Using MFBR Technique with Error Control Coding
Kamesh M, Karthika S
100 VHDL Modeling of Fuzzy Control System
Kanai Lal Kar ,Chandra Prakash Giri, Dr. B.B. Mangaraj
101 Program Slicing
Kaustubh Bahdmukhe, Rohan Gandhi,Sumit Bhattacharjee
102 THE PERFORMANCE OF BASALT FIBRE IN HIGH STRENGTH CONCRETE
Gore Ketan R , Prof. Suhasini M.Kulkarni
103 Pricing Model in a Cloud Environment
Madhurendra, MBalakrishnashenoy
104 INTEGRATED LAYERED APPROACH WITH CONDITIONAL RANDOM FIELDS FOR INTRUSION DETECTION USING GRID COMPUTING AND GRID SERVICES
Mrs. Shagupta Mulla, Mr. Mangesh Ghodake, Mr. Bhavesh Tank, Mr. Prasad Darekar Mr. Anup Tawdar, Mr. Vijaykumar Patil
105 A Survey Paper of Detect and Localize Text in Image
Maunil Patel, Aniruddhsinh Dodiya
106 EFFECT OF POLYPROPYLENE FIBRE ON THE HIGH STRENGTH CONCRETE
MR. Mehul J. Patel , MRS. S. M. KULKARNI
107 Modeling Network Communication in VANET Using Bluetooth Technology
M. Milton Joe, R.S. Shaji, R. Thulasi
108 A Healthy Deadlock determination on Interconnection Networks
S.Mohiadeen Abdul Kadhar , Dr. T.Revathi
109 Study of Image Registration for Area Matching By Using Transform Based Methods
Ms. Nayana M. Nichat, Prof. V.K. Shandilya, Ms. Snehali M. Khakse
110 An improved Symmetric key cryptography with DNA based strong cipher
Komal Kumbharkar, Nazma Shaikh , Shraddha Yemale, Prof. Kanchan Doke
111 MATLAB-based Simulation of Photovoltaic Solar Module and Array at Different radiation values
Pradipkumar S. Patel ,Dhirendrakumar R. Rana
112 ARTICLE RETRACTED
113 Privacy-Preserving Updates to Anonymous and Confidential Databases
Sheetal Doiphode, Poonam Deshmukh, Rahul Tarware, R.Ponmalar
114 Automatic Detection of Coal Mine Monitoring System using Wireless Sensor Network
R.Rajadurai, S.Tamilvanan,Geo Joe Mathai
115 A Review of Various Techniques of Face Recognition with Neural Networks
Rakesh Kumar, Sailendra Kumar, B.S.Puarkayastha
116 An Efficient Approach For Finding All Best Swap Edges of a Minimum Diameter Spanning Tree By Distributed Algorithm
Rakesh Kumar Yadav , Kumar Abhishek , Kerana Hanerix
117 AN UNUSED TRANSMISSION CAPACITY IN WIRELESS BROADBAND NETWORKS
M. Ram Rajesh, G. Rama Krishna, N. Vijaya Gopal
118 An Entropic EOQ with imperfect quality inventory control using dynamic programming
K. KALAIARASI
119 Visual Role Mining for Banking Sector
Poonguzhali. E, Sasikala.P, Suganya.S, Vishnupriya.S
120 URL TRACKER
Miss. Shalaka Chavan, Mr. Rahul Mirajkar, Miss. Sahej Redekar, Miss. Priyanka Jadhav
121 Digital signature concepts and its implementation by using RSA, DSA and ElGamal
Shikha Jindal, Dr Raman Maini
122 Employee Promotion System Using SAP
Ajjarapu Krishna Pavan Kumar, Mrs. Syed Shaheen , Dr. B.PoornaSatyanarayana
123 SECURE MULTI PARTY PROTOCOLS FOR PRIVACY PRESERVING DATAMINING USING DATASETS
S.SUBASHINI, K.KALAIVANI
124 Fast and Scalable Method to Resolve Anomalies in Firewall Policies
Sudhir S. Jadhav, Sunil M. Jadhav, R.R.Agrawal
125 Reduction of Download Time in Client-Server Network
Vinaya Bhat, Supriya Mallya, Bharath Jogi, Vishal Nayak
126 RECOVERY SCHEME FOR MULTICAST COMMUNICATION
K.Suresh
127 RECOGNITION OF MARK AUTHENTICATION USING NEURAL NETWORKS
Dr.P.Suresh, S.Muthukumaran, J.Stalin Jose
128 A SURVEY ON WEB ANAYTICS –AN ONLINE EDUCATION SYSTEM FOR STUDENTS PERFORMANCE
R.Sylviya
129 CLOUD COMPUTING : IAAS
T.Gopikiran,S.Satyanarayana,A.Srinivasa Rao
130 Energy Aware Air pollution Monitoring System Using WSN
Prof.S.A.Mishra, Prof A.S.Kale, Prof.R.R.Agrawal, Prof P.U.Gandecha
131 Literature survey for Measurement of Delay in Undersaturated condition using Modified Saturation Flow Method at Pre-timed Signalized Intersection
Amitkumar Arvindbhai Patel, Suresh M Damodariya, N B Parmar
132 Performance Analysis of Channel Allocation Strategy In WiMAX based System
Bhavin I. Patel, Bhaumik S. Khakhi, Dr. K.H. Wandra
133 Routing Security against Flooding Attack in Wireless Ad hoc Networks
A.Dhana Lakshmi , Dr.V.Srikanth , Mr.T.pavan kumar
134 USING THE CONCEPTUAL COHESION OF CLASSES FOR FAULT PREDICTION IN OBJECT-ORIENTED SYSTEMS
K.G.S.VENKATESAN, M.ELAMURUGASELVAM
135 Virtual Machine Provisioning on Cloud
Prerana Jarande, Rajeshree Shelke, Monika Kharade, Goresh Musalay
136 Energy Efficient Clustering in Sensor Networks Using Cluster Manager
Sivakumar P, Ganesh Kumar P, Saravanan S
137 An Ultrafast And Efficient Method Optic Disc Localization And Optic Disc Boundary Segmentation For Diagnosis Of Diabetics Retinopathy
S.K.Somasundaram
138 REDUCE THE FALSE POSITIVE AND FALSE NEGATIVE FROM REAL TRAFFIC WITH INTRUSION DETECTION
Balaji.S
139 ENHANCING THE SECURITY IN TOR
G.Priyadharshini, K.R.Nivethitha, S.Mohammed Arsath, Mr.S.Vinothkumar, Dr.S.Karthik
140 Stateful Threat Aware Removal System (STARS)
Jayesh Patil, Pranay Gawand, Shweta Barshe
141 SECURE PACKET SCHEME FOR PREVENTING JAMMING ATTACKS IN WIRELESS NETWORKS
R.Venisha, K.Gobinathan
142 Textual and Visual Content-Based Anti-Phishing:A Bayesian Approach
Priyanka Pandey,Sujit Sharma,Maulin Shah,Nidhi Sharma
143 SURVEY OF EVOLUTION OF MOBILE TECHNOLOGY
Khot Sagar S. , Kore Vishal S. , Chaugule Balaji A