Volume 9, Issue 19, May 2016

Table of Contents


Effect of 16 Weeks Six a Side Recreational Football on Serum Immunoglobulin and White Blood Cells in Untrained Males  | 
Rakesh Tomar, Varghese C. Antony
DOI: 10.17485/ijst/2016/v9i19/91143 | Total views: 689
Prevention of Train Accidents using Android Supported Embedded Systems  | 
G. Kohila Warnan, R. Balamurugan
DOI: 10.17485/ijst/2016/v9i19/93824 | Total views: 839
A Design and Analysis of EOM for Energy Saving and Effective Routing Protocol: AODV and AOMDV  | 
Reetika Chib, Amandeep Singh Sandhu
DOI: 10.17485/ijst/2016/v9i19/92831 | Total views: 583
Implementation of Polar Codes over AWGN and Binary Symmetric Channel  | 
Navneet Kaur, Arvinder Pal Singh Kalsi
DOI: 10.17485/ijst/2016/v9i19/91383 | Total views: 481
Sentiment Mining from Online Patient Experience using Latent Dirichlet Allocation Method  | 
P. Padmavathy, A. Anny Leema
DOI: 10.17485/ijst/2016/v9i19/93876 | Total views: 429
Heart Disease Prediction with MapReduce by using Weighted Association Classifier and K-Means  | 
K. Rajalakshmi, K. Nirmala
DOI: 10.17485/ijst/2016/v9i19/93827 | Total views: 759
Analysing Soil Data using Data Mining Classification Techniques  | 
V. Rajeswari, K. Arunesh
DOI: 10.17485/ijst/2016/v9i19/93873 | Total views: 763
Design a Resilient Network Infrastructure Security Policy Framework  | 
Akashdeep Bhardwaj, G. V. B. Subrahmanyam, Vinay Avasthi, Hanumat Sastry
DOI: 10.17485/ijst/2016/v9i19/90133 | Total views: 528
Improve High-Performance by using of Blowfish Cryptographic Algorithm on Single-Chip Cloud Computer  | 
Manoj Kumar, M. Sundharajan
DOI: 10.17485/ijst/2016/v9i19/93878 | Total views: 294
Distributed Authentication for Federated Clouds in Secure Cloud Data Storage  | 
V. Krishna Reddy, Yerneni Sushmitha, K. Thirupathi Rao
DOI: 10.17485/ijst/2016/v9i19/90646 | Total views: 385
Relevance and Resonance of Data Science in Performance Prediction and Visualization  | 
A. Princy Christy, N. Rama
DOI: 10.17485/ijst/2016/v9i19/93885 | Total views: 347
Mobile Phone Sensing: A New Application Paradigm  | 
Shaukat Ali, Shah Khusro
DOI: 10.17485/ijst/2016/v9i19/53088 | Total views: 811
Multiple Bends Coated Intensity based Plastic Optical Fiber Sensor to Detect Liquid Level  | 
Kunthi Aristiani, Heru Kuswanto
DOI: 10.17485/ijst/2016/v9i19/88556 | Total views: 734
About Professional Orientation of the Mathematics as a Discipline for Students Majoring in Biotechnology  | 
Nella Fuatovna Abayeva, Viktor Vladimirovich Yegorov, Viktoriya Nikolaevna Golovachyova, Lezzetzhan Muhamedzhanovna Mustafina, Irina Ivanovna Yerakhtina, Bakhytzhan Muhamedzhanovna Mustafina
DOI: 10.17485/ijst/2016/v9i19/93891 | Total views: 297
Energy Generation from Revolving Door  | 
Raju Ahamed, M. M. Rashid, Jahidul Islam, Asief Javed, Hazlina Md. Yusof
DOI: 10.17485/ijst/2016/v9i19/84237 | Total views: 919
Use of Information Technology in Teaching Semiconductors Physics  | 
Saltanat Abdukhairovna Bakhtibaeva, Vadim Valerievich Grinshkun, Kamalbek Meirbekovich Berkimbaev, Torebai Abdrakhmanovich Turmambekov
DOI: 10.17485/ijst/2016/v9i19/93892 | Total views: 390
A Read and Write Enhanced Platform - R2R Ingression for RDF-to-RDB  | 
V. Sitha Ramulu, B. Raveendra Babu
DOI: 10.17485/ijst/2016/v9i19/90024 | Total views: 340
Secure Intrusion-Detection System in Mobile Adhoc Networks  | 
G. Suseendran, A. Sasikumar
DOI: 10.17485/ijst/2016/v9i19/93829 | Total views: 310
Microstructure Informed Modelling of Adulteration Evaluation in Food New Approaches in Modelling to Characterized Food Microstructures  | 
S. Lakshmi Piriya, S. K. Mahendran
DOI: 10.17485/ijst/2016/v9i19/93847 | Total views: 328
Email Phishing Attack Mitigation using Server Side Email Addon  | 
J. Dileep Kumar, V. Srikanth, L. Tejeswini
DOI: 10.17485/ijst/2016/v9i19/91161 | Total views: 466
Historical and Legal Study of the National Equality Protection in the Russian Legislation  | 
Vladimir Yurievich Golubovskii, Bagytgul Saparzhanovna Kazhkeeva, Elena Vladimirovna Kunts, Akmaral Bisengalievna Rasbaeva
DOI: 10.17485/ijst/2016/v9i19/93900 | Total views: 267
An Ant Colony Algorithm to Prioritize the Regression Test Cases of Object-Oriented Programs  | 
Mohapatra Sudhir Kumar, Prasad Srinivas
DOI: 10.17485/ijst/2016/v9i19/89458 | Total views: 318
Development and Validation by RP-HPLC Method for the Simultaneous Quantification of Diclofenac and Rabeprazole, in Capsule Formulation  | 
Mohammed Al Bratty, Gunasekar Manoharan
DOI: 10.17485/ijst/2016/v9i19/89023 | Total views: 364
Feature Extraction and Feature Set Selection for Cervical Cancer Diagnosis  | 
G. Karthigai Lakshmi, K. Krishnaveni
DOI: 10.17485/ijst/2016/v9i19/93881 | Total views: 307
Fabrication of Arsenic Sulfide using Thermal Treatment  | 
Dong Won Lee, Jung-Yeul Yun, Da-Hee Park, Jei-Pil Wang
DOI: 10.17485/ijst/2016/v9i19/92317 | Total views: 250
An Analysis of Adaboost Algorithm for Face Detection  | 
G. Radha Priyadharsini, K. Krishnaveni
DOI: 10.17485/ijst/2016/v9i19/93855 | Total views: 277
State Mechanisms for the Protection of Children from the Worst Forms of Labor in the Republic of Kazakhstan  | 
Dinara Raziyeva, Flura Ibragimova, Assel Kaishatayeva, Togzan Kireyeva, Valentina Lebed, Aiypkan Mukhamadiyev, Assem Rakhimova
DOI: 10.17485/ijst/2016/v9i19/93902 | Total views: 295
Modulation and Analysis of Quasi Z-Source Inverter for Solar Photovoltaic System  | 
G. Prakash, C. Subramani
DOI: 10.17485/ijst/2016/v9i19/89513 | Total views: 413
Studying Issues of Compressed Gas Energy Recovery  | 
Iuri Appolonievich Sazonov, Mikhail Albertovich Mokhov, Mikhail Aleksandrovich Frankov, Dilyara Ramazanovna Biktimirova
DOI: 10.17485/ijst/2016/v9i19/93904 | Total views: 347
Design and Implementation of Enhanced Model of Fountain Codes for Unicast Transmission  | 
Anmol Singh Brar, Amandeep Singh Sandhu
DOI: 10.17485/ijst/2016/v9i19/92876 | Total views: 293
Dimensionality Reduction based on Hubness Property using Feature Weighting Method for Clustering  | 
A. Jenneth, K. Thangavel
DOI: 10.17485/ijst/2016/v9i19/92034 | Total views: 586
Upper-Formers’ Stochastic Culture: Essential Features, Formation Technology  | 
Sergey Viktorovich Shcherbatykh, Anna Yuryevna Rogacheva
DOI: 10.17485/ijst/2016/v9i19/93905 | Total views: 312
Diagnosis and Evaluation of ADHD using MLP and SVM Classifiers  | 
E. Radhamani, K. Krishnaveni
DOI: 10.17485/ijst/2016/v9i19/93853 | Total views: 401
A Systematic Approach to Deal with Noisy Neighbour in Cloud Infrastructure  | 
Ansuyia Makroo, Deepak Dahiya
DOI: 10.17485/ijst/2016/v9i19/89211 | Total views: 350
Design Features and Studies of Ammonia Electrothermal Microthrusters with Tubular Heating Elements for Small Space Vehicles  | 
Viktor Nikolaevich Blinov, Viktor Vladimirovich Shalay, Valeriy Vladimirovich Kositsin, Igor Sergeevich Vavilov, Anton Igorevich Lukyanchik, Viktor Ivanovich Ruban
DOI: 10.17485/ijst/2016/v9i19/93893 | Total views: 269
An Efficient Segmentation Approach for Brain Tumor Detection in MRI  | 
V. Viswa Priya, Shobarani
DOI: 10.17485/ijst/2016/v9i19/90440 | Total views: 622
Design of Low Voltage CMOS OTA Using Bulk-Driven Technique  | 
Siddharth Bhat, Shubham Choudhary, J. Selvakumar
DOI: 10.17485/ijst/2016/v9i19/89072 | Total views: 636
Detection of Dengue Fever with Platelets Count using Image Processing Techniques  | 
J. Poornima, K. Krishnaveni
DOI: 10.17485/ijst/2016/v9i19/93852 | Total views: 824
Improving Multipath Routing Protocols Performance in Mobile Ad Hoc Networks based on QoS Cross-Layer Routing  | 
Do Dinh Cuong, Nguyen Van Tam, Nguyen Gia Hieu
DOI: 10.17485/ijst/2016/v9i19/92304 | Total views: 436
Institutionalization of Conflict and Compromise Solutions and Social and Labor Relations in Higher Educational Institutions  | 
Pavel Vladimirovich Simonin, Tatyana Vyacheslavovna Bogacheva, Vladimir Borisovich Alexeenko, Ekaterina Aleksandrovna Vetrova, Antonina Pavlovna Sokolova
DOI: 10.17485/ijst/2016/v9i19/93906 | Total views: 281
Priorities for Improving Taxation in Oil Industry in Russia  | 
Natalya Vladimirovna Smirnova, Genadiy Viktorovich Rudenko
DOI: 10.17485/ijst/2016/v9i19/93907 | Total views: 335
Analysis of Reverse Logistics Implementation Barriers in Online Retail Industry  | 
G. Thiyagarajan, Saifil Ali
DOI: 10.17485/ijst/2016/v9i19/94193 | Total views: 482
The Impact of Elnino on Soft and Hard Commodities, Reference to Commodity Markets and Commodity Derivatives in India – A Study  | 
P. Periasamy, R. Satish
DOI: 10.17485/ijst/2016/v9i19/94195 | Total views: 273
SC-TPDP Protocol to secure Multi-Cloud Storage from XSS Attacks  | 
K. Vijayalakshmi, K. S. Fathimathus Zohra, A. Anny Leema
DOI: 10.17485/ijst/2016/v9i19/93865 | Total views: 357
The Relevance of Communication Skills to the Technical Students in the Colleges of Engineering and Technology- A Study  | 
M. Rajendran, T. Rajesh Kannan, V. Sathish, M. Durgadevi
DOI: 10.17485/ijst/2016/v9i19/94196 | Total views: 810
Revealing Hidden Profile Information and Ranking Job Seekers on Big Data  | 
U. Sathyapriya
DOI: 10.17485/ijst/2016/v9i19/93866 | Total views: 299
Counter Measures for Indirect Attack for Iris based Biometric Authentication  | 
R. Sujitha, N. Lalithamani
DOI: 10.17485/ijst/2016/v9i19/93868 | Total views: 323
A Roadmap to Develop Multi Cloud Computing Systems  | 
B. J. D. Kalyani, Kolasani Ramchand H. Rao
DOI: 10.17485/ijst/2016/v9i19/93116 | Total views: 448
An Efficient Unsupervised Clustered Adaptive Antihub Technique for Outlier Detection in High Dimensional Data  | 
R. Lakshmi Devi, R. Amalraj
DOI: 10.17485/ijst/2016/v9i19/93884 | Total views: 370
Denoising and Detecting Discontinuities using Wavelets  | 
V. Suresh, S. Koteswarao Rao, G. Thiagarajan, Rudra Pratap Das
DOI: 10.17485/ijst/2016/v9i19/85440 | Total views: 297
Unreliable Node Detection by Elliptical Curve Diffe-Hellman Algorithm in MANET  | 
S. John Justin Thangaraj, A. Rengarajan
DOI: 10.17485/ijst/2016/v9i19/86081 | Total views: 274
An Improved Brown's Method Applying Fractal Dimension to Forecast the Load in a Computing Cluster for Short Time Series  | 
Vladimir Vyacheslalovich Kopytov, Viacheslav Ivanovich Petrenko, Fariza Bilyalovna Tebueva, Natalia Vasilievna Streblianskaia
DOI: 10.17485/ijst/2016/v9i19/93909 | Total views: 315
Unscented Kalman Filter with Application to Bearings-only Passive Target Tracking  | 
B. Omkar Lakshmi Jagan, S. Koteswara Rao, A. Jawahar, SK. B. Karishma
DOI: 10.17485/ijst/2016/v9i19/90451 | Total views: 389
Comparative Analysis of Indoor Mobility Scenarios Creation (IMSC) in Mobile Ad Hoc Networks  | 
T. Sudhakar, H. Hannah Inbarani
DOI: 10.17485/ijst/2016/v9i19/93830 | Total views: 488
Evaluation of Internet Addiction Disorder among Students  | 
C. Nandhini, K. Krishnaveni
DOI: 10.17485/ijst/2016/v9i19/93864 | Total views: 871
Key Aspects of Adaptation Syndrome Development and Anti-Stress Effect of Mesodiencephalic Modulation  | 
Alexei Valerievich Yumashev, Tatyana Nikolaevna Gorobets, Oleg Ivanovich Admakin, Gleb Gennadievich Kuzminov, Irina Valerievna Nefedova
DOI: 10.17485/ijst/2016/v9i19/93911 | Total views: 1458
Experimental Testing of Electrothermal Microthrusters with Autonomous Heating Elements for Orbital Maneuvering of Small Space Vehicles  | 
Viktor Nikolaevich Blinov, Viktor Vladimirovich Shalay, Valeriy Vladimirovich Kositsin, Igor Sergeevich Vavilov, Anton Igorevich Lukyanchik, Viktor Ivanovich Ruban
DOI: 10.17485/ijst/2016/v9i19/93912 | Total views: 286
A Design of Road Database for Self-Driving Vehicles  | 
Jae Moon Lee
DOI: 10.17485/ijst/2016/v9i19/93948 | Total views: 565
Speaker Identification System using Gaussian Mixture Model and Support Vector Machines (GMM-SVM) under Noisy Conditions  | 
R. Dhineshkumar, A. Balaji Ganesh, S. Sasikala
DOI: 10.17485/ijst/2016/v9i19/93870 | Total views: 587
A Survey on Parallelization of Neural Network using MPI and Open MP  | 
P. Chanthini, K. Shyamala
DOI: 10.17485/ijst/2016/v9i19/93835 | Total views: 385
Analysis of Document Summarization and Word Classification in a Smart Environment  | 
Sree Dharinya
DOI: 10.17485/ijst/2016/v9i19/86717 | Total views: 376
Study of Heavy Resins Hydrocarbon Composition for the Pyrolisis of Impulse Nuclea-Magnetic Spectroscopy  | 
Alim Feyzrahmanovich Kemalov, Ruslan Alimovich Kemalov, Irek Izailovich Mukhamatdinov
DOI: 10.17485/ijst/2016/v9i19/93773 | Total views: 258
An Experimental Study of Porous Medium Flow in Converging Boundary  | 
M. Thiruvengadam, G. N. Pradeep Kumar, D. Sivakumar, C. Mohan
DOI: 10.17485/ijst/2016/v9i19/94192 | Total views: 369
The use of Information Technologies (IT) in the Formation, Development and Improvement of the Competence of Higher Education Teachers  | 
Rymshash Kameshovna Toleubekova, Galiya Bayzhumaevna Sarzhanova, Sokolova Margaryta Georgyevna, Sarzhanov Dauren Kazhabergenovich, Balabaev Oyum Temirgalievich
DOI: 10.17485/ijst/2016/v9i19/90073 | Total views: 353
Testing Program for Security using Symbolic Execution and Exception Injection  | 
Faisal Anwer, Mohd Nazir, Khurram Mustafa
DOI: 10.17485/ijst/2016/v9i19/91025 | Total views: 294

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.