ACCENTS Journals
A Unit of ACCENTS
Home
Journals
IJACR
IJATEE
TIS
TIPCV
EIS
ADL
Contact Us
S.No.
Title
Author
Pages
G. Scholar
1
Cryptography Techniques for Image Security and Authentication using Cellular Automata Algorithms
M.Venugopal, E.G. Rajan, Venkat Raman
1-6
2
Improved Performance for “Color to Gray and Back” using DCT-Haar, DST-Haar, Walsh-Haar, Hartley-Haar, Slant-Haar, Kekre-Haar Hybrid Wavelet Transforms
H. B. Kekre, Sudeep D. Thepade, Ratnesh N. Chaturvedi
7-12
3
Combined Economic and Emission Dispatch Using Multiobjective Particle Swarm Optimization with SVC Installation
Sravanthi Velaga, K.Padma
13-18
4
To Develop Prototype Model of FPGA and RF UP Converter
Neeta S. Matti, Saroja V. Siddamal
19-24
5
Data Mining with Meteorological Data
A. R. Chaudhari, D. P. Rana, R. G. Mehta
25-29
6
Optimal Coordination of Directional Overcurrent Relays using Interval Two Phase Simplex Linear Programming
Shimpy Ralhan, Shashwati Ray
30-35
7
Segmentation of Similar Color Objects using Modified GrowCut Method
Sayan Bhowal, Bibhas Chandra Dhara
36-41
8
Image Steganography using DCT-DST, Haar-DST, Walsh-DST, Hartley-DST Hybrid Wavelet Transforms
H. B. Kekre, Sudeep D. Thepade, Ratnesh N. Chaturvedi
42-46
9
Multicast Routing in Scalable Networks using MAODV
Jayalakshmi G Naragund, R M Banakar
47-53
10
Detection of facial features of frontal face color images
Nidhi Tiwari, Mohd.Ahmed
54-58
11
Multi-Document Text Summarization using Mutual Reinforcement and Relevance Propagation Models Added with Query and Features Profile
Poonam P. Bari , Shanta Sondur
59-63
12
Measuring Coverage Percentage for C Programs using Code Slicer and CREST Tool
Sangharatna Godboley, Avijit Das, Kuleshwar Sahu3 , Durga Prasad Mohapatra, Banshidhar Majhi
64-69
13
Power Flow in PMSG Connected Wind Energy Conversion System through Current Source Converter Using Space Vector Modulation Technique
B.D. Srinivasa Rao, Ch. Hemanth Kumar, V. Srikanth Babu
70-75
14
Feature based Opinion mining - towards Performance Measure
Ravikiran Kalava, G.Anil Kumar, Ch.Vasavi
76-79
15
A Comparative Study of Amazon Web Service and Windows Azure
Rajeev BV, Vinod Baliga, Arun kumar
80-87
16
Association Rule Mining Analyzation Using Column Oriented Database
D. P. Rana, N. J. Mistry, M. M. Raghuwanshi
88-93
17
Comparative Analysis of Clustering Techniques for Real Dataset
Kishor T. Mane, Vandana G. Pujari
94-97
18
Complexity analysis of MIMO sphere decoder using radius choice and increasing radius algorithms
Suneeta V. Budihal, Rajeshwari M. Banakar
98-105
19
Development of Wireless Monitoring System for Neonatal Intensive Care Unit
N.S. Joshi, R.K. Kamat , P.K. Gaikwad
106-109
20
Controller Design for Supercapacitor as Energy Storage in Medium Voltage AC System
Pankaj Govind Hiray, B. E. Kushare
110-114
21
A Complete Analysis and Dynamic Simulations of Superconducting Quantum Interference Device (SQUID) Logic gates
Kurapati Srinivas
115-120
22
Design of Structured Regular LDPC Codes without Short Cycles using Gray Code Representations
Vibha Kulkarni, K. Jaya Sankar
121-126
23
Reconfiguration Challenges & Design Techniques in Software Defined Radio
M. S. Karpe, A. M. Lalge, S. U. Bhandari
127-132
24
Software Defined Radio Principles and Platforms
A.M.Lalge , M.S.Karpe , S.U.Bhandari
133-138
25
E-Governance services using Cloud Computing Services
A.Rakesh Phanindra, V. B. Narasimha, M. L. Saikumar
139-144
26
Watchdog Technology to impose Information Authentication in Mobile Cloud over SaaS & PaaS Layers
Vineet Guha, Rajeev Kumar Shrivastava, Manish Shrivastava
145-150
27
Multitenant Software as a Service: Application Development Approach
Suhas Gajakosh, Mukta Takalikar
151-155
28
Object recognition with ORB and its Implementation on FPGA
A.V.Kulkarni, J.S.Jagtap, V.K.Harpale
156-162
29
A Variable Length Distributed Source Coding Algorithm for WSNs
K S Shivaprakasha, Muralidhar Kulkarni
163-168
30
Multi Way Feedback Encryption Standard (MWFES): Ver-I
Purnendu Mukherjee, Prabal Banerjee, Asoke Nath
169-175
31
Defect Detection Efficiency: A Combined approach
Rashmi N, Suma V
176-181
32
Emotion Recognition with Speech for Call Centres using LPC and Spectral Analysis
Rashmirekha Ram, Hemanta Kumar Palo, Mihir Narayan Mohanty
182-187
33
Improving Tiled Bitmap Algorithm for Detection and Analysis of Tampered Database
G. N. Dhanokar, S. P. Patil
188-193
34
Implementation of RC4 Stream Cipher Using FPGA
S. C. Wagaj, Chetan Bagul, Ramkrushna Chaudhari
194-197
35
Task Cost Based Approach for Grid Service Reliability Modeling on Fault Recovery
Nana Kacharu Zalte
198-203
36
An Application of Fuzzy Logic for Expert Selection
Prajakta C. Dhote, Pradeep K. Butey
204-208
37
Modern Encryption Standard version IV: (MES-IV)
Asoke Nath, Payel Pal
209-216
38
Face Recognition using Depth Map Generation for Smart phones
Anshu Sisodhiya, Ankita Jain, R M Banakar
217-222
39
Executable UML plug-in for Eclipse
A. M. Magar, N. J. Uke
223-226
40
A review of Opportunistic Routing for Wireless Ad-hoc Networks
Nusrat Anjum, Sanjay Thakur
227-231
41
Interactive 3D Remote Visualization of Medical Volume Data in Distributed Environment
Alok Pratap Singh, Piyush Kumar, Anupam Agrawal
232-238
42
Media Access Protocol in Vehicular Ad-Hoc Networks: A Survey
Deepma Jain, Gaurav Shrivastava
239-243
43
Stability of n- Homomorphisms, n- Derivations of A n-Dimensional Additive Functional Equation in C*- Ternary Algebras
M. Arunkumar, T. Namachivayam
244-249
44
Modern Encryption Standard version V: (MES-V)
Asoke Nath, Bidhusundar Samanta
250-257
45
Field Programmable Gate Array based Simultaneous Temperature-Visualization on Video Graphics Array Monitor for Multi-Sensor Data Acquisition System
P.K. Gaikwad
258-263
46
Perturbation of n-Dimensional Quadratic Functional Equation: A Fixed Point Approach
S. Murthy, M. Arunkumar and G. Ganapathy
264-269
47
The improves energetic yield of high temperature fuel cell (MCFC) using advance techniques in modeling and optimization analysis
S. K. Dhakad, S.C.Soni, Pankaj Agarwal
270-272
48
Result Analysis of Image Denoising Method based on Fourth-Order Partial Differential Equations
Anand Swaroop Khare, Ravi Mohan, Sumit Sharma
273-277
49
Diabetic Retinopathy using Image Processing Detection, Classification and Analysis
Snehal P. Savarkar , Namrata Kalkar , S.L.Tade
278-281
50
Concrete Structure Analysis and Classification using Image Processing
Rashmi R.A, A.D Mane, S.L Tade
282-287
51
Green Computing and Green Technology based teaching learning and administration in Higher Education Institutions
Shalabh Agarwal, KaustuviBasu , Asoke Nath
288-296
52
3-D Drawing Digital Pen
V. S. Kayastha, V. N. Supe, S. U. Bhandari
297-301
53
New Median Based Adaptive and Robust Digital Image Secured System
Shivani Maheshwari, Pushpendra Singh Tomar, Manish Shrivastava
302-307
54
Importance of Network Security in Internet of Things
Bhagyashri H. Katole, Suresh V.
308-312
55
Error Code Correction Using Reed Solomon Codes: A Review
Anshul Sarawagi, Manish Shrivastava
313-317
56
Minimal Routing Cooperation using Route Weight for MANET
Neha Tripathi, Vivek Kumar, K.S. Raghuwanshi
318-324
57
Simulation of Airbag Impact on the Eye Using Finite Element Analysis
Ravi Varma N., Darshana M. Jibhakate, Ankita Pravin Khawas
325-329
58
Best Path Finding using Location aware AODV for MANET
Anagha Raich, Amarsinh Vidhate
330-334
59
Review on High Performance Energy Efficient Multicore Embedded Computing
Archana S. Shinde, Swapnali B. Bhosale, Ashok R. Suryawanshi
335-341
60
Regression Analysis and Statistical Approach on Socio-Economic Data
Syeda Farha Shazmeen, Mirza Mustafa Ali Baig, M. Reena Pawar
342-346
61
Identification & Detection System for Animals from their Vocalization
A. D. Mane, Rashmi R. A., S. L. Tade
347-352
62
Secured Cloud Data with IA
Prasad N H, Lakshmi Narayan B N, Pradeep Kumar S
353-356
63
E-Mine: A Web Mining Technique for Relevant Data Regions
Vaishnavi J. Deshmukh, Anuja K. Pande, Sapna.Kaushik, Pallavi B. Rathod, Payal.Pawade
357-362
64
Thermoelectric Power Generation as an Alternative Green Technology of Energy Harvesting
Ravi R.Nimbalkar, Sanket S. Kshirsagar
363-368
65
Comparative Analysis of Multipath Routing Techniques and Design of Secure Energy Aware Routing Algorithm for Wireless Sensor Network
Simran R. Khiani,C. G. Dethe,V. M. Thakare
369-375
66
Speaker Verification Using I-Vectors
N.S.Kalkar, S.P.Savarkar, RajaniP.K
376-384
67
Survey on Security aspect of WSN
Gaurish Edake, Ganesh Pathak
385-389
68
A3 (Authenticate Auditor & Avail) for Preserving Integrity of Data in Cloud Computing
Sagar Shivaji Sawant, Suhit Sukhadeo Kalubarme
390-395
69
Comparative Study on Image Segmentation Algorithms
G. Evelin Suji , Y.V.S. Lakshmi , G. Wiselin Jiji
396-401
70
Hybrid Meta-heuristic Pattern Classification
Rashmi G. Dukhi, Pratibha Mishra
402-406
71
Result Analysis of Bit-Error Rate (BER) of the MC DS-CDMA System
Rishi Choubey, Ravi Mohan, Sumit Sharma
407-411
72
Implementation of wavelet family on biomedical images compression
Monika shukla, Sonika arrora, Mangal singh
412-417
73
Result discussion with in MIMO-OFDM Systems with Multiple Antennas
Jitendra Kumar Daksh, Ravi Mohan, Sumit Sharma
418-422
74
Design of Fuzzy Inference System for Contrast Enhancement of Color Images
Nutan Y. Suple , Sudhir M. Kharad
423-427
75
Implementation of Fast Deblurring Process on Segments of Image by Blind Deconvolution Algorithm
Neetin Kumar, Manish Shrivastava
428-431
76
An Assessment of the Impact of Dimensionality Reduction on the Speed and Accuracy of Hyperspectral Image Classification
Abhineet Singh, Savita Verma, Mangal Raj, Anupam Agrawal
432-437
77
Optimization of Variable Speed Wind Turbine Using Pi Controller
J.S.Sathiyanarayanan, A. Senthil kumar
438-442
Vancuvar
MLA
APA
IEEE
Harvard
Information
×
TamuBet
MPOATM
Kebahagiaan Lewat Kejutan Menguntungkan
Ahli Kode Mahjong Wins 3 Beri Bocoran Eksklusif
Rahasia Pancingan 7 Spin