ACCENTS Journals
A Unit of ACCENTS
Home
Journals
IJACR
IJATEE
TIS
TIPCV
ADL
Search By Journal
Search By Content
Contact Us
Back
S.No.
Title
Author
Pages
G. Scholar
1
Cryptography Techniques for Image Security and Authentication using Cellular Automata Algorithms
M.Venugopal, E.G. Rajan, Venkat Raman
1-
2
Improved Performance for “Color to Gray and Back” using DCT-Haar, DST-Haar, Walsh-Haar, Hartley-Haar, Slant-Haar, Kekre-Haar Hybrid Wavelet Transforms
H. B. Kekre, Sudeep D. Thepade, Ratnesh N. Chaturvedi
1-6
3
Combined Economic and Emission Dispatch Using Multiobjective Particle Swarm Optimization with SVC Installation
Sravanthi Velaga, K.Padma
7-12
4
To Develop Prototype Model of FPGA and RF UP Converter
Neeta S. Matti, Saroja V. Siddamal
13-18
5
Data Mining with Meteorological Data
A. R. Chaudhari, D. P. Rana, R. G. Mehta
19-23
6
Optimal Coordination of Directional Overcurrent Relays using Interval Two Phase Simplex Linear Programming
Shimpy Ralhan, Shashwati Ray
24-29
7
Segmentation of Similar Color Objects using Modified GrowCut Method
Sayan Bhowal, Bibhas Chandra Dhara
30-35
8
Image Steganography using DCT-DST, Haar-DST, Walsh-DST, Hartley-DST Hybrid Wavelet Transforms
H. B. Kekre, Sudeep D. Thepade, Ratnesh N. Chaturvedi
36-40
9
Multicast Routing in Scalable Networks using MAODV
Jayalakshmi G Naragund, R M Banakar
41-47
10
Detection of facial features of frontal face color images
Nidhi Tiwari, Mohd.Ahmed
48-52
11
Multi-Document Text Summarization using Mutual Reinforcement and Relevance Propagation Models Added with Query and Features Profile
Poonam P. Bari , Shanta Sondur
53-57
12
Measuring Coverage Percentage for C Programs using Code Slicer and CREST Tool
Sangharatna Godboley, Avijit Das, Kuleshwar Sahu3 , Durga Prasad Mohapatra, Banshidhar Majhi
58-63
13
Power Flow in PMSG Connected Wind Energy Conversion System through Current Source Converter Using Space Vector Modulation Technique
B.D. Srinivasa Rao, Ch. Hemanth Kumar, V. Srikanth Babu
64-69
14
Feature based Opinion mining - towards Performance Measure
Ravikiran Kalava, G.Anil Kumar, Ch.Vasavi
70-73
15
A Comparative Study of Amazon Web Service and Windows Azure
Rajeev BV, Vinod Baliga, Arun kumar
74-81
16
Association Rule Mining Analyzation Using Column Oriented Database
D. P. Rana, N. J. Mistry, M. M. Raghuwanshi
82-87
17
Comparative Analysis of Clustering Techniques for Real Dataset
Kishor T. Mane, Vandana G. Pujari
88-91
18
Complexity analysis of MIMO sphere decoder using radius choice and increasing radius algorithms
Suneeta V. Budihal, Rajeshwari M. Banakar
92-99
19
Development of Wireless Monitoring System for Neonatal Intensive Care Unit
N.S. Joshi, R.K. Kamat , P.K. Gaikwad
100-103
20
Controller Design for Supercapacitor as Energy Storage in Medium Voltage AC System
Pankaj Govind Hiray, B. E. Kushare
104-108
21
A Complete Analysis and Dynamic Simulations of Superconducting Quantum Interference Device (SQUID) Logic gates
Kurapati Srinivas
109-114
22
Design of Structured Regular LDPC Codes without Short Cycles using Gray Code Representations
Vibha Kulkarni, K. Jaya Sankar
115-120
23
Reconfiguration Challenges & Design Techniques in Software Defined Radio
M. S. Karpe, A. M. Lalge, S. U. Bhandari
121-126
24
Software Defined Radio Principles and Platforms
A.M.Lalge , M.S.Karpe , S.U.Bhandari
127-132
25
E-Governance services using Cloud Computing Services
A.Rakesh Phanindra, V. B. Narasimha, M. L. Saikumar
133-138
26
Watchdog Technology to impose Information Authentication in Mobile Cloud over SaaS & PaaS Layers
Vineet Guha, Rajeev Kumar Shrivastava, Manish Shrivastava
139-144
27
Multitenant Software as a Service: Application Development Approach
Suhas Gajakosh, Mukta Takalikar
145-149
28
Object recognition with ORB and its Implementation on FPGA
A.V.Kulkarni, J.S.Jagtap, V.K.Harpale
150-156
29
A Variable Length Distributed Source Coding Algorithm for WSNs
K S Shivaprakasha, Muralidhar Kulkarni
157-162
30
Multi Way Feedback Encryption Standard (MWFES): Ver-I
Purnendu Mukherjee, Prabal Banerjee, Asoke Nath
163-169
31
Defect Detection Efficiency: A Combined approach
Rashmi N, Suma V
170-175
32
Emotion Recognition with Speech for Call Centres using LPC and Spectral Analysis
Rashmirekha Ram, Hemanta Kumar Palo, Mihir Narayan Mohanty
176-181
33
Improving Tiled Bitmap Algorithm for Detection and Analysis of Tampered Database
G. N. Dhanokar, S. P. Patil
182-187
34
Implementation of RC4 Stream Cipher Using FPGA
S. C. Wagaj, Chetan Bagul, Ramkrushna Chaudhari
188-191
35
Task Cost Based Approach for Grid Service Reliability Modeling on Fault Recovery
Nana Kacharu Zalte
192-197
36
An Application of Fuzzy Logic for Expert Selection
Prajakta C. Dhote, Pradeep K. Butey
198-202
37
Modern Encryption Standard version IV: (MES-IV)
Asoke Nath, Payel Pal
203-210
38
Face Recognition using Depth Map Generation for Smart phones
Anshu Sisodhiya, Ankita Jain, R M Banakar
211-216
39
Executable UML plug-in for Eclipse
A. M. Magar, N. J. Uke
217-220
40
A review of Opportunistic Routing for Wireless Ad-hoc Networks
Nusrat Anjum, Sanjay Thakur
221-225
41
Interactive 3D Remote Visualization of Medical Volume Data in Distributed Environment
Alok Pratap Singh, Piyush Kumar, Anupam Agrawal
226-232
42
Media Access Protocol in Vehicular Ad-Hoc Networks: A Survey
Deepma Jain, Gaurav Shrivastava
233-237
43
Stability of n- Homomorphisms, n- Derivations of A n-Dimensional Additive Functional Equation in C*- Ternary Algebras
M. Arunkumar, T. Namachivayam
238-243
44
Modern Encryption Standard version V: (MES-V)
Asoke Nath, Bidhusundar Samanta
244-251
45
Field Programmable Gate Array based Simultaneous Temperature-Visualization on Video Graphics Array Monitor for Multi-Sensor Data Acquisition System
P.K. Gaikwad
252-257
46
Perturbation of n-Dimensional Quadratic Functional Equation: A Fixed Point Approach
S. Murthy, M. Arunkumar and G. Ganapathy
258-263
47
The improves energetic yield of high temperature fuel cell (MCFC) using advance techniques in modeling and optimization analysis
S. K. Dhakad, S.C.Soni, Pankaj Agarwal
264-266
48
Result Analysis of Image Denoising Method based on Fourth-Order Partial Differential Equations
Anand Swaroop Khare, Ravi Mohan, Sumit Sharma
267-271
49
Diabetic Retinopathy using Image Processing Detection, Classification and Analysis
Snehal P. Savarkar , Namrata Kalkar , S.L.Tade
272-275
50
Concrete Structure Analysis and Classification using Image Processing
Rashmi R.A, A.D Mane, S.L Tade
276-281
51
Green Computing and Green Technology based teaching learning and administration in Higher Education Institutions
Shalabh Agarwal, KaustuviBasu , Asoke Nath
282-290
52
3-D Drawing Digital Pen
V. S. Kayastha, V. N. Supe, S. U. Bhandari
291-295
53
New Median Based Adaptive and Robust Digital Image Secured System
Shivani Maheshwari, Pushpendra Singh Tomar, Manish Shrivastava
296-301
54
Importance of Network Security in Internet of Things
Bhagyashri H. Katole, Suresh V.
302-306
55
Error Code Correction Using Reed Solomon Codes: A Review
Anshul Sarawagi, Manish Shrivastava
307-311
56
Minimal Routing Cooperation using Route Weight for MANET
Neha Tripathi, Vivek Kumar, K.S. Raghuwanshi
312-318
57
Simulation of Airbag Impact on the Eye Using Finite Element Analysis
Ravi Varma N., Darshana M. Jibhakate, Ankita Pravin Khawas
319-323
58
Best Path Finding using Location aware AODV for MANET
Anagha Raich, Amarsinh Vidhate
324-328
59
Review on High Performance Energy Efficient Multicore Embedded Computing
Archana S. Shinde, Swapnali B. Bhosale, Ashok R. Suryawanshi
329-335
60
Regression Analysis and Statistical Approach on Socio-Economic Data
Syeda Farha Shazmeen, Mirza Mustafa Ali Baig, M. Reena Pawar
336-340
61
Identification & Detection System for Animals from their Vocalization
A. D. Mane, Rashmi R. A., S. L. Tade
341-346
62
Secured Cloud Data with IA
Prasad N H, Lakshmi Narayan B N, Pradeep Kumar S
347-350
63
E-Mine: A Web Mining Technique for Relevant Data Regions
Vaishnavi J. Deshmukh, Anuja K. Pande, Sapna.Kaushik, Pallavi B. Rathod, Payal.Pawade
351-356
64
Thermoelectric Power Generation as an Alternative Green Technology of Energy Harvesting
Ravi R.Nimbalkar, Sanket S. Kshirsagar
357-362
65
Comparative Analysis of Multipath Routing Techniques and Design of Secure Energy Aware Routing Algorithm for Wireless Sensor Network
Simran R. Khiani,C. G. Dethe,V. M. Thakare
363-369
66
Speaker Verification Using I-Vectors
N.S.Kalkar, S.P.Savarkar, RajaniP.K
370-378
67
Survey on Security aspect of WSN
Gaurish Edake, Ganesh Pathak
379-383
68
A3 (Authenticate Auditor & Avail) for Preserving Integrity of Data in Cloud Computing
Sagar Shivaji Sawant, Suhit Sukhadeo Kalubarme
384-389
69
Comparative Study on Image Segmentation Algorithms
G. Evelin Suji , Y.V.S. Lakshmi , G. Wiselin Jiji
390-395
70
Hybrid Meta-heuristic Pattern Classification
Rashmi G. Dukhi, Pratibha Mishra
396-400
71
Result Analysis of Bit-Error Rate (BER) of the MC DS-CDMA System
Rishi Choubey, Ravi Mohan, Sumit Sharma
401-405
72
Implementation of wavelet family on biomedical images compression
Monika shukla, Sonika arrora, Mangal singh
406-411
73
Result discussion with in MIMO-OFDM Systems with Multiple Antennas
Jitendra Kumar Daksh, Ravi Mohan, Sumit Sharma
412-416
74
Design of Fuzzy Inference System for Contrast Enhancement of Color Images
Nutan Y. Suple , Sudhir M. Kharad
417-421
75
Implementation of Fast Deblurring Process on Segments of Image by Blind Deconvolution Algorithm
Neetin Kumar, Manish Shrivastava
422-425
76
An Assessment of the Impact of Dimensionality Reduction on the Speed and Accuracy of Hyperspectral Image Classification
Abhineet Singh, Savita Verma, Mangal Raj, Anupam Agrawal
426-431
77
Optimization of Variable Speed Wind Turbine Using Pi Controller
J.S.Sathiyanarayanan, A. Senthil kumar
432-436
Citation
×
Vancuvar
MLA
APA
IEEE
Harvard
Information
×