Volume 9, Issue 17, May 2016

Table of Contents

Articles

Photocatalytic Removal of Bismarck Brown G and Reactive Yellow 145 over Prepared (Co, Ni)3O4 Spinel Catalyst  | 
Abbas J. Lafta, Salih H. Kathim, Emman J. Mohammad
DOI: 10.17485/ijst/2016/v9i17/88138 | Total views: 295
Thermo-Hydraulic Performance Evaluation Using W-Discrete Rib in Solar Air Heater  | 
Alok Kumar Rohit, Atul lanjewar
DOI: 10.17485/ijst/2016/v9i17/89056 | Total views: 389
Detection of Fingerprints in Advanced Biometric System Design  | 
Prasanna Kumar Lakkoju, T. N. Shankar
DOI: 10.17485/ijst/2016/v9i17/88568 | Total views: 198
An Approach for Optimized Feature Selection in Software Product Lines using Union-Find and Genetic Algorithms  | 
Asad Abbas, Zhiqiang Wu, Isma Farah Siddiqui, Scott Uk-Jin Lee
DOI: 10.17485/ijst/2016/v9i17/92728 | Total views: 400
An Empirical Study over Correctness Properties for Multithreaded Programs  | 
Abdul Rahim Mohamed Ariffin, Isma Farah Siddiqui, Scott Uk-Jin Lee
DOI: 10.17485/ijst/2016/v9i17/92730 | Total views: 222
A Simple Short Detection and Current Regulation Circuit for LED Driving Circuit  | 
Yeon-Bo Kim, Jae-Jung Yun
DOI: 10.17485/ijst/2016/v9i17/92748 | Total views: 232
An RTOS based Architecture for Patient Monitoring System with Sensor Networks  | 
M. Jagadiswara Rao, M. Kameswara Rao
DOI: 10.17485/ijst/2016/v9i17/92960 | Total views: 265
Sencar Scheduling Algorithm based on Packet Lifetime in WSN’s  | 
Sumadeep Juvvalapalem, K. Raghava Rao
DOI: 10.17485/ijst/2016/v9i17/92976 | Total views: 262
Identification of Misplaced Objects  | 
K. S. Ravi, K. Jaya Bhavani, M. Vinayak, G. Soundarya
DOI: 10.17485/ijst/2016/v9i17/92991 | Total views: 166
Detection of Crimes using Unsupervised Learning Techniques  | 
R. Bulli Babu, G. Snehal, P. Aditya Satya Kiran
DOI: 10.17485/ijst/2016/v9i17/92994 | Total views: 215
Improving the Network Life Time of a Wireless Sensor Network using the Integration of Progressive Sleep Scheduling Algorithm with Opportunistic Routing Protocol  | 
Sk. Baji Baba, K. R. R. Mohan Rao
DOI: 10.17485/ijst/2016/v9i17/93011 | Total views: 280
Two Dimensional Medical Images Diagnosis using MapReduce  | 
Jyoti S. Patil, G. Pradeepani
DOI: 10.17485/ijst/2016/v9i17/93014 | Total views: 194
A Framework for Exploring Algorithms for Big Data Mining  | 
D. Radhika, D. Aruna Kumari
DOI: 10.17485/ijst/2016/v9i17/93017 | Total views: 295
Implementation of IoT based Railway Calamity Avoidance System using Cloud Computing Technology  | 
K. V. Daya Sagar, Akella Pavan Kumar, Goli Sai Ankush, Thota Harika, Madireddy Saranya, Dasaraju Hemanth
DOI: 10.17485/ijst/2016/v9i17/93020 | Total views: 237
Kapur’s Entropy and Cuckoo Search Algorithm Assisted Segmentation and Analysis of RGB Images  | 
N. Sri Madhava Raja, R. Vishnupriya
DOI: 10.17485/ijst/2016/v9i17/89936 | Total views: 265
Ultrasound Assisted Synthesis and Characterization of Polyurethane for Coating Applications  | 
Tarek Salem, M. Salama, A. Atef El-Sayed
DOI: 10.17485/ijst/2016/v9i17/87215 | Total views: 342
Cost Effective Road Traffic Prediction Model using Apache Spark  | 
M. Prathilothamai, A. M. Sree Lakshmi, Dilna Viswanthan
DOI: 10.17485/ijst/2016/v9i17/87334 | Total views: 348
Attendance Management and User Security System’s based on Eigen Faces Algorithm using Raspberry pi 2 and Ethernet  | 
Sarath Chandu Gaddam, N. V. K. Ramesh
DOI: 10.17485/ijst/2016/v9i17/92978 | Total views: 339
A New Low Complexity DHT based Weighted OFDM Transmission for Peak Power Reduction  | 
N. Bharathi Raja, N. Gangatharan
DOI: 10.17485/ijst/2016/v9i17/86328 | Total views: 232
Synergistic Combination of Reduction and Polymerization Reactions to Prepare Silver/Waterborne Polyurethane Nanocomposite for Coating Applications  | 
A. Atef El-Sayed, M. Salama, T. Salem, M. Rehan
DOI: 10.17485/ijst/2016/v9i17/87216 | Total views: 250
Analyzing and Performing Privacy Preserving Data Mining on Medical Databases  | 
D. Aruna Kumari, Y. Vineela, T. Mohan Krishna, B. Sai Kumar
DOI: 10.17485/ijst/2016/v9i17/93024 | Total views: 284
Survey Big Data Analytics, Applications and Privacy Concerns  | 
Ganesh D. Puri, D. Haritha
DOI: 10.17485/ijst/2016/v9i17/93028 | Total views: 485
Magnified Cipher Block Chaining Mode using DES to Ensure Data Security in Cloud Computing  | 
D. Aruna kumari, M. Chandrika, B. Surekha Ratnam Bharadwaj
DOI: 10.17485/ijst/2016/v9i17/93029 | Total views: 202
FPGA Implementation by using XBEE Transceiver  | 
B. Murali Krishna, M. Siva Kumar, J. Rajesh, Syed Inthiyaz, J. Mounica, M. Bhavani, Choti Nikitha Adidela
DOI: 10.17485/ijst/2016/v9i17/93032 | Total views: 309
Automation of Irrigation System based on Wi-Fi Technology and IOT  | 
M. Kranthi Kumar, K. Srenivasa Ravi
DOI: 10.17485/ijst/2016/v9i17/93048 | Total views: 319
Fire Accident Detection and Prevention monitoring System using Wireless Sensor Network enabled Android Application  | 
M. Samarasimha Reddy, K. Raghava Rao
DOI: 10.17485/ijst/2016/v9i17/93097 | Total views: 317
Hashing Technique Data Optimization for Low Power Consumption in Wireless Sensor Network  | 
Vankayalapati Sahiti, K. Raghava Rao, K. R. R. Mohan Rao
DOI: 10.17485/ijst/2016/v9i17/93101 | Total views: 201
Mining Popular Patterns from Multidimensional Database  | 
G. Vijay Kumar, T. Krishna Chaitanya, M. Pratap
DOI: 10.17485/ijst/2016/v9i17/93106 | Total views: 312
An Efficient Identification of Dynamic Faults using CAN and ARM7 in a Wind Turbine  | 
M. Dornika Devi, K. S. Ravi, K. S. Ravi, P. Gopi Krishna, P. Gopi Krishna
DOI: 10.17485/ijst/2016/v9i17/93112 | Total views: 172
An Effective on-Chip Network Topology for Network on Chip (Noc) Trade-Offs  | 
M. Venkateswara Rao, T. V. Rama Krishna, S. Raaga Sai Sruthi, S. Akhila, Y. Gopi, L. Bhavani Krishna
DOI: 10.17485/ijst/2016/v9i17/93120 | Total views: 296
The uses of Social Media on Student’s Communication and Self Concepts among TATIUC Students  | 
Wan Roslina Wan Othman, Ziti Fariha Mohd Apandi, Nurul Haslinda Ngah
DOI: 10.17485/ijst/2016/v9i17/88730 | Total views: 721
Geographical Location based Hierarchical Routing Strategy for WSN using Movable Routers  | 
Ch. Lakshmi Manoja, D. Aruna Kumari
DOI: 10.17485/ijst/2016/v9i17/93094 | Total views: 200
Emission Characteristics of Turbocharged Single Cylinder Diesel Engine  | 
R. Vishnu Varthan, D. Senthil Kumar
DOI: 10.17485/ijst/2016/v9i17/93158 | Total views: 250
A New Approach for Small Satellite Gyroscope and Star Tracker Fusion  | 
Ngo Duy Tan, Thai Quang Vinh, Bui Trong Tuyen
DOI: 10.17485/ijst/2016/v9i17/93163 | Total views: 311
Effective Architecture for Greenhouse Controlling and Monitoring using Wi-Fi Peer to Peer Direct Protocol  | 
G. Sarat Chandra, K. Srinivas Ravi
DOI: 10.17485/ijst/2016/v9i17/92975 | Total views: 268
An Energy Efficient Power Usage Controlling and Monitoring using Wireless Sensor Network  | 
V. V. Murali Krishna, T. Anuradha
DOI: 10.17485/ijst/2016/v9i17/93007 | Total views: 291
Automobile SOS System using MEM Sensor  | 
A. S. R. Murty, K. Pavani, T. Devi Kalyani
DOI: 10.17485/ijst/2016/v9i17/93027 | Total views: 211
Establishing Efficient Security Scheme in Home IOT Devices through Biometric Finger Print Technique  | 
Narayanam Sri Prakash, N. Venkatram
DOI: 10.17485/ijst/2016/v9i17/93039 | Total views: 284
A Reconstruction Algorithm using Binary Transform for Privacy-Preserving Data Mining  | 
D. Aruna Kumari, T. Gunasekhar
DOI: 10.17485/ijst/2016/v9i17/93122 | Total views: 205
Efficient usage of Resources through RFID Cards  | 
K. Ravi Kumar, K. Raghu Sree Praneeth, G. Sreeja
DOI: 10.17485/ijst/2016/v9i17/92989 | Total views: 146
Comparison on Cell Balancing Methods for Energy Storage Applications  | 
Youngchul Lee, Seonwoo Jeon, Sungwoo Bae
DOI: 10.17485/ijst/2016/v9i17/92316 | Total views: 238
ESSAO: Enhanced Security Service Algorithm using Data Obfuscation Technique to Protect Data in Public Cloud Storage  | 
S. Balamurugan, S. Sathyanarayana, S. S. Manikandasaran
DOI: 10.17485/ijst/2016/v9i17/90229 | Total views: 211
A Prototype for IoT based Car Parking Management system for Smart cities  | 
Baratam. M Kumar Gandhi, M. Kameswara Rao
DOI: 10.17485/ijst/2016/v9i17/92973 | Total views: 2502
State of Art Report on Variables Affecting Housing Value  | 
Sayali S. Sandbhor, N. B. Chaphalkar
DOI: 10.17485/ijst/2016/v9i17/82861 | Total views: 211
Optimized Cluster with Genetic Swarm Technique for Wireless Sensor Networks  | 
M. V. Ramana Rao, T. Adilakshmi
DOI: 10.17485/ijst/2016/v9i17/92985 | Total views: 669
Comparative Studies on Wave Guide Open Slot Radiator, H-Plane T-Junction Radiator  | 
S. Aruna, G. S. N. Raju, P. V. Sridevi
DOI: 10.17485/ijst/2016/v9i17/89249 | Total views: 177
Incorporating Implied Volatility in Pricing Options using Binomial Tree  | 
J. K. R. Sastry, K. V. N. M. Ramesh
DOI: 10.17485/ijst/2016/v9i17/93042 | Total views: 164
Analysis of Low Power Conditional Sum Adder  | 
M. Siva Kumar, Syed Inthiyaz, V. Narsimha Nayak, M. Bhavani, K. Charan Teja, S. J. S. Rajesh, K. Eswar Reddy, G. Sruthi Keerthana
DOI: 10.17485/ijst/2016/v9i17/93033 | Total views: 183
A Comparative Study of SWAT, RFNN and RFNN-GA for Predicting River Runoff  | 
Hieu N. Duong, Hien T. Nguyen, Snasel Vaclav, Lee Sanghyuk
DOI: 10.17485/ijst/2016/v9i17/92308 | Total views: 443
LLC DC/DC Converter with Input Voltage Balancing Capacitor for Electric Vehicles  | 
Kang Hyun Yi
DOI: 10.17485/ijst/2016/v9i17/92313 | Total views: 209
GPS and GSM Enabled Embedded Vehicle Speed Limiting Device  | 
Vennela Priyadarshni, P. Gopi Krishna, K. Sreenivasa Ravi
DOI: 10.17485/ijst/2016/v9i17/93045 | Total views: 211
Watermarking using Lifting Wavelet Transform (LWT) and Artificial Neural Networks (ANN)  | 
P. Mamatha, N. Venkatram
DOI: 10.17485/ijst/2016/v9i17/93088 | Total views: 190
Application of Modified Periodogram Algorithm on GPS TEC for Earthquakes  | 
A. V. V. Pavani, D. Tejasri, R. Revathi, K. S. Ramesh, S. Koteswara Rao, S. Lakshminarayana
DOI: 10.17485/ijst/2016/v9i17/93117 | Total views: 170
An Automatic Motion Detection System for a Camera Surveillance Video  | 
V. V. S. Murthy, CH. Aravind, K. Jayasri, K. Mounika, T. V. V. R. Akhil
DOI: 10.17485/ijst/2016/v9i17/93119 | Total views: 208
Application of Cubature Kalman Filter for Bearingsonly Target Tracking  | 
K. Lakshmi Prasanna, S. Koteswara Rao, SK. B. Karishma, A. Jawahar
DOI: 10.17485/ijst/2016/v9i17/90250 | Total views: 235
Study and Analysis of CMOS Carry Look Ahead Adder with Leakage Power Reduction Approaches  | 
Damarla Paradhasaradhi, K. Satya Priya, K. Sabarish, P. Harish, G. V. Narasimharao
DOI: 10.17485/ijst/2016/v9i17/93111 | Total views: 169
CPW-Fed Compact Ultra Wideband MIMO Antenna for Portable Devices  | 
J. Chandrasekhar Rao, N. Venkateswara Rao
DOI: 10.17485/ijst/2016/v9i17/93046 | Total views: 280
A Mobile Product Image Searching System Integrating Speeded Up Robust Features and Local Binary Pattern  | 
Trinh Thi Phan, Thai-Nguyen Do Nguyen, Thai Hoang Le
DOI: 10.17485/ijst/2016/v9i17/92297 | Total views: 260
Implementation of Xenomai Framework in GNU/Linux Environment to run applications in a Real Time Environment  | 
K. Sripath Roy, K. Gowthami
DOI: 10.17485/ijst/2016/v9i17/93109 | Total views: 251
Pricing Options Considering Bankruptcy of Underlying Issuer  | 
J. K. R. Sastry, K. V. N. M. Ramesh, J. V. R. Murthy
DOI: 10.17485/ijst/2016/v9i17/93044 | Total views: 196
GSM and Web Application based Real- Time Automatic Irrigation System using Raspberry pi 2 and 8051  | 
Hema Dhanekula, K. Kiran Kumar
DOI: 10.17485/ijst/2016/v9i17/93031 | Total views: 289
Optimization of Paper Making System using Genetic Algorithm  | 
Aggarwal Vikrant, Goyal Atul
DOI: 10.17485/ijst/2016/v9i17/88401 | Total views: 196
A New Dual Boost DC/DC Converter With a High Voltage Gain  | 
Jae-Jung Yun
DOI: 10.17485/ijst/2016/v9i17/92303 | Total views: 350
ON APPROACHING HEURISTIC WEIGHT MASK TO ENHANCE LBP-BASED PROFILE FACE RECOGNITION SYSTEM  | 
ThaiHoang_ Le
DOI: 10.17485/ijst/2016/v9i17/92314 | Total views: 231
An Effective Algorithm for Association Rules Mining from Temporal Quantitative Databases  | 
Truong Duc Phuong, Do Van Thanh, Nguyen Duc Dung
DOI: 10.17485/ijst/2016/v9i17/92726 | Total views: 345
Challenges of Digital Forensics in Cloud Computing Environment  | 
Deevi Radha Rani, Sk. Nazma Sultana, Pasala Lourdu Sravani
DOI: 10.17485/ijst/2016/v9i17/93051 | Total views: 411
Password Verification in Military Networks by using Secure Hash Algorithm  | 
Sai Ram Kiran Konduri, T. Anuradha, K. Vishnu, Gireesh Kota
DOI: 10.17485/ijst/2016/v9i17/93053 | Total views: 145
Secured Data Transfer using ZigBee  | 
A. S. R. Murty, K. Phani Mounika, K. Anusha Reddy, K. Bhanu Karthik
DOI: 10.17485/ijst/2016/v9i17/93110 | Total views: 168
Regression Analysis on Factors Influencing Students’ Satisfaction towards Program Courses  | 
Nurulhaida Zakaria, Rozila Umar, Wan Husna Aini Wan Deraman, Sharifah Sakinah Syed Abd Mutalib
DOI: 10.17485/ijst/2016/v9i17/88720 | Total views: 184
Enhancement of Power System Oscillation Damping using Fuzzy Inference System based Coordinated Design of SSSC Controllers  | 
Reza Sharifi, Reza Khamooshi, Hamid Radmanesh, G. B. Gharehpetian, Seyyed Hamid Fathi, Javad S. H. Moghani
DOI: 10.17485/ijst/2016/v9i17/54002 | Total views: 240
Design and Effect of Equivalence Ratio on Performance Characteristics of Lab Scale FBC Gasifier  | 
S. Balamurugan, P. K. Srividhya, C. Mohanraj
DOI: 10.17485/ijst/2016/v9i17/93155 | Total views: 68
Improving Question Classification by Feature Extraction and Selection  | 
Nguyen Van-Tu, Le Anh-Cuong
DOI: 10.17485/ijst/2016/v9i17/93160 | Total views: 359
Cloud Technology on Agriculture using Sensors  | 
A. S. R. Murthy, Y. Sudheer, K. Mounika, K. Sravya Rao, P. Durga Prasad
DOI: 10.17485/ijst/2016/v9i17/93103 | Total views: 267
Content based Image Retrieval using Color, Texture, Shape and Active Re-Ranking Method  | 
R. Bulli Babu, V. Vanitha, K. Sai Anish
DOI: 10.17485/ijst/2016/v9i17/93107 | Total views: 284
Application of Multiple Signal Classification Algorithm on GPS TEC for Earthquakes  | 
S. K. Baji, K. S. Ramesh, R. Revathi, S. Koteswara Rao
DOI: 10.17485/ijst/2016/v9i17/92969 | Total views: 196
A Data Driven Approach to Calculate Optimum Collateral Amount for Vulnerable Option  | 
Sastry K. R. Jammalamadaka, K. V. N. M. Ramesh, J. V. R. Murthy
DOI: 10.17485/ijst/2016/v9i17/93040 | Total views: 226


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.