Volume 3 March 2015

Article# Article Title & Authors ( Volume 3 March 2015 ) Pages
1 Analysis of low PDP using ETA in bilateral filter
S.Anitha, V.Muneeswaran, J.Jayaseeli Pratheepa , B.Hema
1-5
2 Implementation of the Extended Gaussian Mixture Model Algorithm for High Definition Video
Ariff A. Kasthuri Bha J.K.
6-9
3 A Secure Approach against Flood Attacks in Disruption Tolerant Networks using Claim Verification
K.Krishna Priya , R.Anantha Kumar
10-17
4 Tristate and Gate Using Photonic Crystal
T.Arjun, P.Nandhakumar, M.Rajendran
18-20
5 Implementation of Fixed-Point LMS Adaptive Filter Using Computation Blocks
P.Jayachithra, R.Kanagarathinam, R.Ramakala, S.Sri Kanchana Devi
21-23
6 Identification of Microaneurysms in Computerized Fundus Image
R.Rajalakshmi, M.Malathi
24-28
7 Design for Testability in Mixed-At-Speed Testing for Power Minimization by Using Block Logic Method
A.Mathavi, M.Sankaramoorthi, A.Ramprakash , B.Hema
29-32
8 Secure and Privacy Preserving Oppurtunistic Computing Framework for Mobile Health Care Emergency
R.N.Simka,T.Rajathi,J.Shanthini
33-36
9 A CRC-Aided Hybrid Decoding Algorithm for Rate-Compatible Insertion Convolution Turbo Codes
V.Muneeswaran, A.Ramprakash, M.Sankaramoorthi,S.Anitha
37-40
10 Adaptive Tree Based Energy Efficient Routing In Mobile Sink on WSN
P.N.N.Priya Dharshini, S.Suvitha and G.Rekha
41-44
11 Design of Digital Audio Broadcasting (DAB) and DAB+ Adaptive Channel Decoder with Clock Gating Technique
Sheik ibrahims , Kasthuri Bha J.K.
45-49
12 Half wave Dipole antenna for satellite communication Application
Mrs.S.Parameswari, N.Pon aravinth Kumar,M.Priyanka,M.Priyanga
50-52
13 Secure Data Retrival in Disruption Tolerant Military Networks using Attribute Encryption Standard
K.Siva Sankari ,V.Ramesh
53-60
14 Triple Band Notched UWB Monopole Antenna using Split Ring Resonators
S.Vigna Visalatchi Sundari, K.Vineethaa Shri and G.Krishnaveni
61-63