CONFERENCE DATE: Bangalore, 23-03-2014 |
PLC Based Home Automation System | |||||||||||
Page(s): | 01-05 | ||||||||||
Author | Sahil Sahni , R.K. Jarial | ||||||||||
|
Automated Axle/Wheel Heat Measurement | |||||||||||
Page(s): | 06-09 | ||||||||||
Author | K.N.Achuthan, R.Keerthana | ||||||||||
|
A Technique to Establish Shortest Route in MANET by Detecting Multiple Cooperative Black Hole Attack | |||||||||||
Page(s): | 10-14 | ||||||||||
Author | Rohini Sharma, Meenakshi Sharma | ||||||||||
|
Advanced Suspicious URLS Detection In Twitter Stream | |||||||||||
Page(s): | 15-21 | ||||||||||
Author | Sulabh S, Siva Shankar. S | ||||||||||
|
Detecting HTTP Attacksaccurately by Protocol Modification | |||||||||||
Page(s): | 22-25 | ||||||||||
Author | Lakshmi B, Silja Varghese | ||||||||||
|
Wireless Sensor Networks to Prevent Unauthorized Entry in Critical Military Borders | |||||||||||
Page(s): | 26-29 | ||||||||||
Author | Velavan R V, Lionel Paul J, Thanigaivel S, Sridhar J | ||||||||||
|
Reflector In Concentrating Solar Power for Energy Storage Devices | |||||||||||
Page(s): | 30-33 | ||||||||||
Author | Dinesh Kumar M, Prakash S, Immanuel Raj M, Tamilarasan E, Dinesh Kumar T R | ||||||||||
|
Modelling of 250Wp Photovoltaic Module and its Performance Analysis using MATLAB /Simulink | |||||||||||
Page(s): | 34-40 | ||||||||||
Author | Savitha P B, Shashikala M S, Puttabuddhi K L | ||||||||||
|
Co-Flow Jet Control As An Alternative for Civil Aircraft High Lift Configuration | |||||||||||
Page(s): | 41-45 | ||||||||||
Author | J.Abdul Khalid Sherief, A.Ajithkumar, G.K.P. Karlmarx, R.Ashish Jayandar, S.Manikandan | ||||||||||
|
Design of Standard and Custom Peripheral Using NIOS II Processor | |||||||||||
Page(s): | 46-50 | ||||||||||
Author | K.J.Varalakshmi, Dr.M.Kamaraju | ||||||||||
|
Intelligent Wireless Video Monitoring System Using Computer | |||||||||||
Page(s): | 51-54 | ||||||||||
Author | Kamal Lamichhane, Kiran .M, Avanee Bhat M V, Ashwin Chapte, Prasanna Paga | ||||||||||
|
Generic Plugins for Identity Management using Security Assertion Markup Language | |||||||||||
Page(s): | 55-57 | ||||||||||
Author | Nishchala Verma , Tanya Soni , Rupali Bagate , Rohit Pandey Nirmoho Banerjee, S. R Dhore | ||||||||||
|
Implementing Cost Cutting Methodology in Secure Cloud Overlay Backup Systems | |||||||||||
Page(s): | 58-60 | ||||||||||
Author | Mansi Joshi, J.W.Bakal | ||||||||||
|
Online Interactive Data Monitering Application | |||||||||||
Page(s): | 61-63 | ||||||||||
Author | Madhura.M.R, M.Nagaraja., M.Z.Kurian | ||||||||||
|
Energy Security Solutions to Rural Problems | |||||||||||
Page(s): | 64-67 | ||||||||||
Author | K. Spandana, K. Roshini, G. L. E. Anusha Rani, J. Rupamathi | ||||||||||
|
Power Quality Improvement In Eight Bus System Using Three Level Inverter Based DVR | |||||||||||
Page(s): | 68-72 | ||||||||||
Author | S.Leela | ||||||||||
|
Digital image authentication (DIA)- A Survey | |||||||||||
Page(s): | 73-78 | ||||||||||
Author | Sudha M S, Thanuja T C | ||||||||||
|
Drowsy Driver Alerter | |||||||||||
Page(s): | 79-83 | ||||||||||
Author | Sindhuja.N, Balamurugan.E | ||||||||||
|
Cloud Computing Security Issues | |||||||||||
Page(s): | 84-89 | ||||||||||
Author | Rohini Ambure, Subodh Karve | ||||||||||
|
Design and Analysis of EM Coupled Modified Ring Antenna for Mobile Applications | |||||||||||
Page(s): | 90-93 | ||||||||||
Author | Carishma S, Dharishna R, Divitha R, Sumani P, Rajitha R, Jayakumar M. | ||||||||||
|
Conversion of LDPE Plastic Waste into Liquid Fuel by Thermal Degradation | |||||||||||
Page(s): | 94-97 | ||||||||||
Author | Gaurav, Madhukar M, Arunkumar K.N., N S Lingegowda | ||||||||||
|
A Survey On Security Issues In Cloud Computing Envi-Ronment | |||||||||||
Page(s): | 98-105 | ||||||||||
Author | Parag Shende, Sulabha Patil | ||||||||||
|