| Ber Performance Analysis of Non-Linear Companding Schemes for the Reduction of Peak-To-Average Power Ratio In OFDM Systems T. Deepa, R. Kumar and F. Augustine Diraviam |
| Statistical Methods for Reducing Uncertainty and Eliminating Distortion in Type2 Fuzzy Sets Reshma Kar, Mandakranta Chakraborty and Diptendu Bhattacharya |
| Optimised Value Retrival in Type-2 Fuzzy Face-Space for Emotion Recognition Reshma Kar, Mandakranta Chakraborty and Diptendu Bhattacharya |
| Cluster Optimization for Enhanced Web Usage Mining Using Fuzzy Logic Nayana Mariya Varghese and Jomina John |
| Encrypted Tracer and Checker Model V. Arun and K. Shunmuganathan |
| Single Parameter Display for IBP (Invasive Blood Pressure) Module Shilpa Sajjan and N. Shankaraiah |
| Algorithm for Shortest Path Between Two Nodes in a Network Joshin J. Mathew and Sabu M. Thampi |
| Gateway Node-Based Greedy Routing for Minimizing Packet Delay in Vehicular Ad Hoc Networks A. Mohamed Abbas, P. Sheik Abdul Khader and M. Munir Ahamed Rabbani |
| Clouding E-Governance Ranjith Ramesh, Prasanna Ravichandran and T. Subha |
| Study of Transmission Characteristics of Higher 4X4 MIMO Systems Using STBC Multiplexing and 16-QAM Modulation R. Bhagya and A. G. Ananth |
| Enhancing Security in Cloud Through Datamation G. R. Gokila |
| Descriptive Answer Evaluator Misha D. Chandan, Amit V. Patel, Sanjay K. Vij and Rupam Gupta |
| Vehicle Automation Based on Driver Fatigue Dharon Joseph Edison and Pradeep Kumar Somasundaram |
| Effect of Temperature and Modelling For NIR Spectroscopic Analysis of Milk Mahavirsinh S. Gohil and Chetan B. Bhatt |
| Software Consistency and Time Sharing Architecture Testing Using DAG Approach D. Praveen and R. Raja Sekhar |
| Route Maintainance by Swapping Edges for Link Failures B. Neeraja |
| Risk Dependency Metrics with Project Objectives Based Prediction Ch. Tejo Nagaveer and R. Raja Sekhar |
| Concept Frequency: A Feature Set based Text Compression Model P. Naveen Kumar and A. P. Siva Kumar |
| An Efficient Approach for Web Document Summarization by Sentence Ranking Y. Surendranadha Reddy and A.P. Siva Kumar |
| Efficient Streaming Processing of SOAP Messages with Attachments Lakshmi M. Neelima |
| Derivation of Error Detectors with High Detection Coverage K. Katyayani |
| OWL Search: An Integrated Search Component In OWL Path P. Suman Rao and B. Lalitha |
| Detection of Replaceable Collective MPI Operation Patterns Swapnil B. Kumbhar and Dinesh B. Kulkarni |
| Dynamic Discovery of Web Services Using WSDL Clustering G. Vadivelou, E. Ilavarasan and S.Brinda |
| Self Diagnosis in NIR Milk Analyzer Khushboo Kachhava and Chetan B.Bhatt |
| Collaborative Filtering based Recommender for Web Services using Implicit Feedback G. Vadivelou, E. Ilavarasan and S. Punitha |
| EDDL Implementation for Smart Milk Analyser Ketki Devpura and Chetan Bhatt |
| State-of-the-Practice Survey and Comparison in Requirements Engineering in Healthcare IT Projects S. Neetu Kumari and Anitha S. Pillai |
| Detecting and Visualizing Inconsistencies in Software Design Models T. Janaki |
| Framework for Cloud Based Education G. Vadivelou and S. Santhiya |
| Secure Data Exchange Protocol for Trajectory Based Data Forwarding in VANETs Vanam Ramesh |
| Optimal State Assignmenet Method for Minimizing Leakage Power in Spare Cells B. V. P. Vasantha Kumar , N. S. Murthy Sharma, K. Lal Kishore and Nitika Goel |
| Exploring Vulnerabilities in SOA-Based Distributed Business Processes K. Sivaraj |
| Simulation of Multi Carrier Spread Spectrum System Using LabVIEW P. Sreelatha and Sakunthala S. Pillai |
| A Case Study of Performance Analysis on Student and Teacher Using Soft Computing: A Fuzzy Logic Approach A. Martin, M.Ramya Devi, M. B. Radhika, M.Malavika and V.Prasanna Venkatesan |