
| CONFERENCE DATE: Delhi, 14-07-2013 |
| Zero Voltage Transition-Zero Current Transition (ZVT-ZCT) PWM DC-DC Converter | |||||||||||
| Page(s): | 01-05 | ||||||||||
| Author | Raju Yanamshetti, Shashipriya Diddi | ||||||||||
|
|||||||||||
| Fully Automated Approach To Identify Brain Tumors Using Dynamic Region Merging | |||||||||||
| Page(s): | 06-09 | ||||||||||
| Author | Ashwini Jangde, Navneet Sahu | ||||||||||
|
|||||||||||
| Gait Recognition For Human Identification Using ENN And NN | |||||||||||
| Page(s): | 10-15 | ||||||||||
| Author | Parneet Kaur | ||||||||||
|
|||||||||||
| Online Monitoring of Transformer Health Using Fuzzy Logic Approach | |||||||||||
| Page(s): | 16-20 | ||||||||||
| Author | Shriya Shah | ||||||||||
|
|||||||||||
| Reduced Area Fully Parallel And Fully Serial Fir Filter On Field-Programmable Gate Array | |||||||||||
| Page(s): | 21-24 | ||||||||||
| Author | Nilesh B. Bosmiya, R. C. Patel | ||||||||||
|
|||||||||||
| Implementation of Data Encryption And Decryption Algorithm For Information Security | |||||||||||
| Page(s): | 25-28 | ||||||||||
| Author | Sweta K. Parmar, K.C. Dave | ||||||||||
|
|||||||||||
| Implementation of Viterbi Decoder On Fpga To Improve Design | |||||||||||
| Page(s): | 29-32 | ||||||||||
| Author | Palak K. Gohel, K.C. Dave | ||||||||||
|
|||||||||||
| OPTO-Electronic Based Time Measurement Unit With Enhanced Sensitivity | |||||||||||
| Page(s): | 33-35 | ||||||||||
| Author | Deepa Srivastava, Mamtesh Nokhwal, Bhupendra Pal, Rakesh Kumar & RC Kalonia | ||||||||||
|
|||||||||||
| Cascade Control of Dc Motor With Advance Controller | |||||||||||
| Page(s): | 36-38 | ||||||||||
| Author | Rathod Bhavina, Nitesh Jamliya, Keerti Vashishtha | ||||||||||
|
|||||||||||
| Explicit Model Predictive Control Based Optimization of The Industrial Application | |||||||||||
| Page(s): | 39-42 | ||||||||||
| Author | Nitin R. Prajapati, Vinod P. Patel | ||||||||||
|
|||||||||||
| Compression of ECG Signal Using Discrete Wavelet Transform | |||||||||||
| Page(s): | 43-45 | ||||||||||
| Author | Karishma A. Qureshi, V. P. Patel | ||||||||||
|
|||||||||||
| Privarcy Preserving Access Authentication and Intrusion Detection To Secure Data In Cloud | |||||||||||
| Page(s): | 46-51 | ||||||||||
| Author | Manisha g. Vaidya, A.V.Sakhare | ||||||||||
|
|||||||||||
| Spam Detection System With an Email Abstraction Scheme | |||||||||||
| Page(s): | 52-55 | ||||||||||
| Author | Salu Sudhakar, Swathi V Nair, Sruthi S, Nithya Jayaprakash | ||||||||||
|
|||||||||||
| Morphological Approach For Text Extraction From Document Image | |||||||||||
| Page(s): | 56-60 | ||||||||||
| Author | Satish R. Damade, Ranjana s. Zinjore | ||||||||||
|
|||||||||||