APRIL ISSUE 2015

IDTITLEAUTHORSDOWNLOAD
1.LIQUID – Reliable File De-Duplication And Storage Encryption Technique For Modern CloudsE. Bakkiyalakshmi, C. Shantha Meena
2.Quality Estimation Of Image Using RBPDT (Region Based Bit Partition Distortion Technique)S. Nandhinidevi, P. Suresh Kumar
3.Multiprotocol Label Switching Using Virtual Private NetworksSundara Moorothy.G, Sathiyan.B, Sathish Kumar.V, Saravanan.V, Prof S. Prem Kumar
4.Non-Intruisive Alert For Drivers In FatigueAmrutha.K, Shreekumar.T
5.Effect Of Machining Parameters On Surface Roughness And Material Removal Rate In CNC End MillingS. Sakthivelu, M. Ravichandran, M. Meignanamoorthy, M. Kumar
6.Human Disease Research By Ontology-Based AssistanceSambu Basaweshwar Rao, Sankalp Sharma, Anu Prabha.S.S, Preeti Nallan Chakravarthula, Shreekesh Pillai
7.Solutions To Differential Equation Using B-Spline Based Collocation MethodY. Rajashekhar Reddy
8.An Automatic Face Recognition System Based On Adaptive Wavelet TransformsProf. Khaladkar, Nilam Chavan, Apurva Kadam
9.Comparative Study Of Ozone And Carbon Monoxide During Pre And Post New Year CelebrationShampa Sarkar
10.Design And Analysis Of Fiber Reinforced Polymer (FRP) Leaf SpringTushar S. Karhale, Ajay N. Ingale, Bhushan B. Deshmukh
11.Impact Of Shunt Compensation Devices On Generator Loss Of Field ProtectionR.Subramani, Ananta Adhikari
12.Growth And Characterization Of L-Alanine Doped Triglycine Sulphate (TGS) Single CrystalSuresh. M, Suresh. K, Sudha. S
13.Comparative Study On Embedding Methods In Reversible Data Hiding Using Reserving Room Before EncryptionAshwini Tugashetti, S. V. Viraktamath
14.Comparative Analysis Of Aluminium Metal Matrix Composites Reinforced With TiC And TiB2 Using Stir Casting ProcessS. Venkatesan, M. Anthony Xavior
15.A Novel Design Of MAC Unit Using Bit-Serial MultiplierT. Krishna Murthy, T. Venkata Ramana
16.Comparison Of Spectral Parameters Of Raga Malkauns For Music TherapySanyogita M. Ghatage, P. A. Kulkarni
17.Failure Analysis Of Excavator Bucket ToothMr. Kalpak. S. Dagwar, Prof. R.G. Telrandhe
18.“Analogy And Analysis Of Randomised Approach And Advanced ACO Algorithm”Hamsa G, Mrs. Rekha S
19.Reversible Encrypted Data Hiding For Secured Data CommunicationE. Shobhika, S. Caroline Kirupa Shiny