Volume-1 Issue-8, June 2013

  • Version
  • Download 15
  • File Size 4.00 KB
  • Create Date June 30, 2013
  • .

Volume-1 Issue-8, June 2013, ISSN: 2319–6378 (Online)
Published By: Blue Eyes Intelligence Engineering & Sciences Publication

Design of Low Glitch Dynamic Phase Detector for Delay Locked Loop
Shirish Tripathi

Nonlinear Digital PID Controller for Position Controlled Electric Drive Systems
Srikanth Mandarapu1, Sreedhar Lolla2, M.V.Suresh Kumar3

A Modified Shape Feature Extraction Technique for Image Retrieval
A. Srinagesh1, K. Aravinda2, G. P .Saradhi Varma3, A. Govardhan4, M. Sree Latha5

FPGA Implementation of Hybrid Cryptosystem
M. N. Praphul1, K. R. Nataraj2

Novel Compression Techniques for Time Series Signals
Oinam Suchitra Devi1, Hemanth Kumar P.2, S Basavaraj Patil3

Planned Events Across Social Media Sites Using Association Rule Mining Based on Autocorrelation
Prajakta K. Sarolkar1, Meghna Nagori2

Improved IPTV Services in IPv4 and IPv6 Environments Based on Wireless Networks
Imlitoshi Jamir1, Leo Satminlien Singsit2

Nonlinear Observer Design for Chaotic Systems Synchronization with Known or Unknown Parameters
Sonia Hammami

Alternative Fuels for IC Engines
Y. Y. Nandurkar1, S. S Akant2, S.L.Bankar3, R.G.Bodkhe4

Proportioning of Fly Ash Concrete Mixes A Comprehensive Approach
M. N. Balakrishna1, M. C. Nataraja2

Improving the Joint Attention and Intelligibility in Speech of Autistic Children by an Assistive Robot
Gaurav Aggarwal1, Pooja Sehrawat2, Neha Charaya3

Design and Synthesis of Reversible Fault Tolerant Carry Skip Adder/Subtractor
Prashanth. N. G1, Manojkumar. S. B2, Balaji. B. S3, Naveena Pai G4, Havyas. V. B5

Design of AXI4 Protocol Checker for SoC Integration
Veena Abraham1, Soumen Basak2, Sabi S3

A Secure Image Based Steganography and Cryptography with Watermarking
Sarita Poonia1, Mamtesh Nokhwal2, Ajay Shankar3

Generalized Black Hole Attack and Comparative Solution for MANET
Shanu Singh1, Amit Kumar Pandey2, Minu Rani3

Implementation of Secure Authentication Scheme for Mobile Device
Priti Jadhao1, Lalit Dole2

Hybrid Approach for Transliteration of Odia Named Entity to English
Suprava Das1, Rakesh Ch. Balabantaray2

A Comparative Performance Analysis of AODV, DSR and TORA Routing Protocols in MANETs
Davesh Singh Som1, Parma Nand Astya2, Ankur garg3