Volume-1 Issue-8, June 2013

  • Version
  • Download 15
  • File Size 4.00 KB
  • Create Date June 30, 2013
  • .

Volume-1 Issue-8, June 2013, ISSN: 2319–6378 (Online)
Published By: Blue Eyes Intelligence Engineering & Sciences Publication

Design of Low Glitch Dynamic Phase Detector for Delay Locked Loop
Shirish Tripathi


Nonlinear Digital PID Controller for Position Controlled Electric Drive Systems
Srikanth Mandarapu1, Sreedhar Lolla2, M.V.Suresh Kumar3


A Modified Shape Feature Extraction Technique for Image Retrieval
A. Srinagesh1, K. Aravinda2, G. P .Saradhi Varma3, A. Govardhan4, M. Sree Latha5


FPGA Implementation of Hybrid Cryptosystem
M. N. Praphul1, K. R. Nataraj2


Novel Compression Techniques for Time Series Signals
Oinam Suchitra Devi1, Hemanth Kumar P.2, S Basavaraj Patil3


Planned Events Across Social Media Sites Using Association Rule Mining Based on Autocorrelation
Prajakta K. Sarolkar1, Meghna Nagori2


Improved IPTV Services in IPv4 and IPv6 Environments Based on Wireless Networks
Imlitoshi Jamir1, Leo Satminlien Singsit2


Nonlinear Observer Design for Chaotic Systems Synchronization with Known or Unknown Parameters
Sonia Hammami


Alternative Fuels for IC Engines
Y. Y. Nandurkar1, S. S Akant2, S.L.Bankar3, R.G.Bodkhe4


Proportioning of Fly Ash Concrete Mixes A Comprehensive Approach
M. N. Balakrishna1, M. C. Nataraja2


Improving the Joint Attention and Intelligibility in Speech of Autistic Children by an Assistive Robot
Gaurav Aggarwal1, Pooja Sehrawat2, Neha Charaya3


Design and Synthesis of Reversible Fault Tolerant Carry Skip Adder/Subtractor
Prashanth. N. G1, Manojkumar. S. B2, Balaji. B. S3, Naveena Pai G4, Havyas. V. B5


Design of AXI4 Protocol Checker for SoC Integration
Veena Abraham1, Soumen Basak2, Sabi S3


A Secure Image Based Steganography and Cryptography with Watermarking
Sarita Poonia1, Mamtesh Nokhwal2, Ajay Shankar3


Generalized Black Hole Attack and Comparative Solution for MANET
Shanu Singh1, Amit Kumar Pandey2, Minu Rani3


Implementation of Secure Authentication Scheme for Mobile Device
Priti Jadhao1, Lalit Dole2


Hybrid Approach for Transliteration of Odia Named Entity to English
Suprava Das1, Rakesh Ch. Balabantaray2


A Comparative Performance Analysis of AODV, DSR and TORA Routing Protocols in MANETs
Davesh Singh Som1, Parma Nand Astya2, Ankur garg3