DigitalXplore

CONFERENCE DATE:
Chennai, 09-02-2014
 
Proceeding Detail

2ND IRF INTERNATIONAL CONFERENCE


An Evaluation Methodology For English To Hindi Machine Translation
Page(s): 01-07  
Author Sugandha Agarwal, Shruti Jain, Rashmi Dubey  
Quick Abstract  Add To Library PDF  
WRL Cited By- 2
A Survey Of Moving Object Tracking In Video Frame Sequences
Page(s): 08-13  
Author Sindhu.K, Revathi.A.R, Merlin Pauliesther  
Quick Abstract  Add To Library PDF  
WRL Cited By- 2
Privacy Preserving Data Mining: Based On Quantization Approach
Page(s): 14-17  
Author D.Aruna Kumari, K.Rajasekhara Rao, M.Suman, Sravani G, Tejaswani  
Quick Abstract  Add To Library PDF  
WRL Cited By- 4
Web Security: A Solution Based On Image And Security Questions
Page(s): 18-21  
Author D.Aruna Kumari, N.Tejaswani, G.Sravani, Vineela A., M.Dorathi Mounika  
Quick Abstract  Add To Library PDF  
WRL Cited By- 5
Sensor Fault Detection In Wireless Sensor Networks And Avoiding The Path Failure Nodes
Page(s): 22-26  
Author Pinak S. Patel, Mohammed Husain Bohara, Binita D. Chahwala  
Quick Abstract  Add To Library PDF  
WRL Cited By- 2
Simulation Of Speed Control Of Brushless Dc Motor, With Fuzzy Logic Controller
Page(s): 27-32  
Author C. Sheeba Joice, P.Nivedhitha  
Quick Abstract  Add To Library PDF  
WRL Cited By- 2
Sleep Detection System Using Matlab Image Processing
Page(s): 33-36  
Author Digvijay R, Vignesh Sridharan  
Quick Abstract  Add To Library PDF  
WRL Cited By- 2
Study Of Link Availability And Data Rate Analysis In FSO-OFDM System
Page(s): 37-44  
Author M. Selvi1, K. Murugesan  
Quick Abstract  Add To Library PDF  
WRL Cited By- 2
Minimizing Storage Cost In Cloud Computing Environment
Page(s): 45-49  
Author Sarika K B, S Subasree  
Quick Abstract  Add To Library PDF  
WRL Cited By- 2
Identification Of Heterogeneous Malicious Nodes In The Crucial Dynamic Environment For Protecting Local And Remote Systems
Page(s): 50-53  
Author A.Edwinrobert, M.Hemalatha  
Quick Abstract  Add To Library PDF  
WRL Cited By- 2
Study Of Fundamental And Higher Order Soliton Propagation In Optical Light Wave Systems
Page(s): 54-59  
Author Bhupeshwaran Mani, Chitra.K  
Quick Abstract  Add To Library PDF  
WRL Cited By- 2
Minutia Fingerprint Recognition Based Secured Money Extraction Using Advanced Wireless Communication
Page(s): 60-64  
Author S.Nithya, K.Velmurugan  
Quick Abstract  Add To Library PDF  
WRL Cited By- 2
Automatic Segmentation Of Scaling In 2-D Psoriasis Skin Images Using SVM And MRF
Page(s): 65-69  
Author Kodeeswari.C, Sunitha.S, Pavithra.M, Santhia. K.R  
Quick Abstract  Add To Library PDF  
WRL Cited By- 3
In-Wheel Technology With Space Vector Pwm Controlled Bldc Motor As Drive Train Of Electric Vehicles
Page(s): 70-74  
Author Krishna.L, R.Ganesan  
Quick Abstract  Add To Library PDF  
WRL Cited By- 2
A Robust Image Concealing In Videos Using Dynamic Pixel Histogram Shifting
Page(s): 75-80  
Author Swetha Singh, Swathi Singh, V. Sathiya  
Quick Abstract  Add To Library PDF  
WRL Cited By- 2
A Survey On Region Based Image Segmentation
Page(s): 81-83  
Author Reena Esther.S, Priya Darsini.V, S.Justin Samuel  
Quick Abstract  Add To Library PDF  
WRL Cited By- 2
Embedded Systems And Autonomous Car
Page(s): 84-87  
Author D.G.Dhyaneswaran, M.Harish  
Quick Abstract  Add To Library PDF  
WRL Cited By- 2
Multimodal Human Identification System Based Fusion Using Gait Biometrics
Page(s): 88-92  
Author T Indumathi, M.Pushparani  
Quick Abstract  Add To Library PDF  
WRL Cited By- 3
Scheduling Of Indoor Mobile Robot Using Ultrasonic Sensors
Page(s): 93-97  
Author K.Batri, Rakhi S Nair  
Quick Abstract  Add To Library PDF  
WRL Cited By- 2
Visual Acuity Test In General And Emergency Cases Using Mobile Services
Page(s): 98-103  
Author Uthra K, Harini GB, Suganya S, T.Adiline Macriga  
Quick Abstract  Add To Library PDF  
WRL Cited By- 3
A Novel Technique For Secured Assessment And Evaluation System In Education Stream
Page(s): 104-105  
Author N.V.Ramana Murty, P.Krishna Subbarao  
Quick Abstract  Add To Library PDF  
WRL Cited By- 3
Realisation Of Various Planar Inverted-F Antenna
Page(s): 106-110  
Author B.Sujatha, K.Saranya, N.Yasmin Naseera, B.Bhuvaneswari  
Quick Abstract  Add To Library PDF  
WRL Cited By- 3
Investigation Of Various Multi-Band Microstrip Patch Antennas (MBMPA)
Page(s): 111-117  
Author P.Ajay Sattjay, K.M.Abhinesh, A.Fayazdeen, B.Bhuvaneswari  
Quick Abstract  Add To Library PDF  
WRL Cited By- 2
High Efficiency Hybrid In Telligent Street Lighting Using A Zigbee Network And Sensors
Page(s): 118-121  
Author Hariharan A, Kirubakaran J, Seethapathi M  
Quick Abstract  Add To Library PDF  
WRL Cited By- 3
Secure Multi-Owner Data Sharing For Dynamic Clusters In The Cloud With Variable Atrributes
Page(s): 122-126  
Author C.Suchithra, G.Appasami  
Quick Abstract  Add To Library PDF  
WRL Cited By- 2
Sentiment Analysis Of Restaurant Reviews Using Hybrid Classification Method
Page(s): 127-133  
Author M. Govindarajan  
Quick Abstract  Add To Library PDF  
WRL Cited By- 2
Privacy And Trust-Aware Framework For Secure Routing In Wireless Mesh Networks
Page(s): 134-138  
Author Prashanth Jayakumar, P.S.Khanagoudar, Vinay Kaveri  
Quick Abstract  Add To Library PDF  
WRL Cited By- 2
Kinematic Modeling Of Quadruped Robot With Four Bar Chain Leg Mechanism
Page(s): 139-144  
Author Sachin Sunil Oak, V. S. Narwane  
Quick Abstract  Add To Library PDF  
WRL Cited By- 2
Secure Multi-Owner Data Storage With Enhanced Tpa Auditing Scheme In Cloud Computing
Page(s): 145-152  
Author Nandini. J, Sugapriya.N.P, M.S.Vinmathi  
Quick Abstract  Add To Library PDF  
WRL Cited By- 2
Agent-Mining - A Review
Page(s): 153-155  
Author Litti Tom, Aswathy Wilson  
Quick Abstract  Add To Library PDF  
WRL Cited By- 2
Energy Conservation In Air Conditioning: A Case Study Of Hospital Analysis Of Energy Saving Techniques For Air Conditioners
Page(s): 156-159  
Author Priyanka Sharma, Pallavi Charate, Neha Satone, Abhijeet Singare  
Quick Abstract  Add To Library PDF  
WRL Cited By- 2
FDPM: IP Traceback System Against IP Spoofing
Page(s): 160-163  
Author Sumit Thakur, Neelesh Srivastava, Raghunandan Dodiya, Raghvendra Kulkarni, Sonali Nalamwar  
Quick Abstract  Add To Library PDF  
WRL Cited By- 2
Security Against Spoofing Attack In Wireless Environment
Page(s): 164-168  
Author Shiyamala Ramaraj, Suganya Sundaramoorthy, Sharon Sushantha, Maheshwari  
Quick Abstract  Add To Library PDF  
WRL Cited By- 2
SOM And SVM Based Feature Extraction And Detection Of Objects In Images
Page(s): 169-174  
Author Preeti Ahirwar, Samant Verma, Yogendra Kumar Jain  
Quick Abstract  Add To Library PDF  
WRL Cited By- 2
Study Of Molecular Interactions In Binary Liquid Mixture By Using Excess Thermodynamic Parameters At Different Temperatures
Page(s): 175-177  
Author Sk.Fakruddin, Y.Sreedevi, Ch.Srinivasu, K.Narendra  
Quick Abstract  Add To Library PDF  
WRL Cited By- 2
Utilization Of Waste Heat To Improve Heat Rate Of Combined Cycle Power Plant
Page(s): 178-183  
Author Nilesh Tiwari Wokilprasad, Upasna Sethi Vijay  
Quick Abstract  Add To Library PDF  
WRL Cited By- 2

Be aware that this site uses cookies. Before continuing browsing we advise you to click on Privacy Policy to access and read our cookie policy.Ok.

Accept