Home
  Call for Papers
  Editorial Board
  Reviewer Board
  Guidelines for Authors
  Paper Submission
  Registration
  Publications
  Indexing
  About Journal
  Contact Us

All Publications
Volume 1, Issue 1 - Feb 2014
Volume 1, Issue 2 - March 2014
Volume 1, Issue 3 - April 2014

 

 

 

 

 

 

 

 


 

IJCAT Paper Publications

     March 2014 Volume 1, Issue 2
   
  Implementing Deletion Recovery on Android
 
Akhil C Joy Arjun V Mithun K Shebix Xavier
 
Full Text Paper | Year: March 2014 | Volume 1 Issue 2 | Pages 01-07
   
   
  Secure Sharing of Data over Cloud Computing using Different Encryption Schemes An Overview
 
Raseena M Harikrishnan G R
 
Full Text Paper | Year: March 2014 | Volume 1 Issue 2 | Pages 08-11
   
   
  Securing Images using Encryption Techniques A Survey
 
Vrinda A Mr. Arun Anoop M
 
Full Text Paper | Year: March 2014 | Volume 1 Issue 2 | Pages 12-16
   
   
  Clustering Methods of Web Pages: A Survey
 
Aliya Edathadathil Syed Farook.K
 
Full Text Paper | Year: March 2014 | Volume 1 Issue 2 | Pages 17-20
   
   
  Location Update Schemes in Mobile Ad Hoc Networks
 
Aqeela S Ummer Sreekanth E S
 
Full Text Paper | Year: March 2014 | Volume 1 Issue 2 | Pages 21-23
   
   
  Relative Study on Malayalam-English Translation using Transfer Based Approach
 
Shahana.I.L Sharafudheen.K.A
 
Full Text Paper | Year: March 2014 | Volume 1 Issue 2 | Pages 24-29
   
   
  Parallel Workload Scheduling in Cloud: A Survey
 
Shahabanath K K Sreekesh Namboodiri T
 
Full Text Paper | Year: March 2014 | Volume 1 Issue 2 | Pages 30-33
   
   
  Study on Security Breaches in Php Applications
 
Santosh Naidu P Amulya Patcha
 
Full Text Paper | Year: March 2014 | Volume 1 Issue 2 | Pages 34-38
   
   
  A Survey on Trust Management in Peer to Peer Systems
 
Manju John Govindaraj.E
 
Full Text Paper | Year: March 2014 | Volume 1 Issue 2 | Pages 39-42
   
   
  DDoS: Attack Analysis and Countermeasures
 
Sujina mol M S Aneesh M Haneef
 
Full Text Paper | Year: March 2014 | Volume 1 Issue 2 | Pages 43-46
   
   
  Cement Mill Feeder Control System
 
Mr.Ratnan P Jithin Jose Mohammed Rafi K.T Yoosaf Nisar K
 
Full Text Paper | Year: March 2014 | Volume 1 Issue 2 | Pages 47-52
   
   
  Self-Improved ODMP Protocol (ODMP-E)
 
Mr.Prashant B Kumbharkar Dr. T R Sontakke
 
Full Text Paper | Year: March 2014 | Volume 1 Issue 2 | Pages 53-58
   
   
  Securing Websites through Multi-CAPTCHA
 
Mr. Shaik Muhammed Manzoor Mrs. Kumari R Soumya
 
Full Text Paper | Year: March 2014 | Volume 1 Issue 2 | Pages 59-62
   
   
  A New Topology for Power Quality Improvement for Hybrid Wind, Solar and Diesel Generator Energy System using D-STATCOM
 
Umamaheswari.S VigayaGowri.G
 
Full Text Paper | Year: March 2014 | Volume 1 Issue 2 | Pages 63-71
   
   
  Modelling and Simulation of Pressure Sensitivity of Bragg Grating Sensor for Structural Health Monitoring Application
 
Bilkish Mondal Dr. Preeta Sharan Zakir Hussain
 
Full Text Paper | Year: March 2014 | Volume 1 Issue 2 | Pages 73-77
   
   
  Proposed Model of Encryption Technique using Block Cipher Concept to Enhance Avalanche Effect
 
Aumreesh Saxena Sourabh Singh
 
Full Text Paper | Year: March 2014 | Volume 1 Issue 2 | Pages 78-82
   
   
  User Deadline Based Job Scheduling in Grid Computing
 
S.Gokul Dev R.Lalith Kumar
 
Full Text Paper | Year: March 2014 | Volume 1 Issue 2 | Pages 83-90
   
   
  Two Ways Security on Cloud Computing using Cryptography and Intrusion Detection: A Review
 
Tony Durgadas Jagyasi Tony Durgadas Jagyasi
 
Full Text Paper | Year: March 2014 | Volume 1 Issue 2 | Pages 91-93
   
   
  Modeling of Sigma-Delta Modulator Non- Idealities with Two Step Quantization in MATLAB/SIMULINK
 
Shashant Jaykar Kuldeep Pande Atish Peshattiwar Abhinav Parkhi
 
Full Text Paper | Year: March 2014 | Volume 1 Issue 2 | Pages 94-99
   
   
  A Distributed Method to Protect Disruption Tolerant Networks from the Effects of Packet Overflow
 
Shwetha T J Resmi S
 
Full Text Paper | Year: March 2014 | Volume 1 Issue 2 | Pages 100-105
   
   
  Electronic Toll Collection System for Efficient Traffic Control System using ANPR
 
Dr.M.Gomathi V.Megala
 
Full Text Paper | Year: March 2014 | Volume 1 Issue 2 | Pages 106-113
   
   
  Energy Economization using Multimedia Cloud Computing
 
Swati Tiwari Praveen Sen
 
Full Text Paper | Year: March 2014 | Volume 1 Issue 2 | Pages 114-116
   
   
  Fuzzy Logic Based Control of Wind Turbine Driven Squirrel Cage Induction Generator Connected to Grid
 
Vinayak Gaikwad Harshit Dalvi
 
Full Text Paper | Year: March 2014 | Volume 1 Issue 2 | Pages 117-120
   
   
  Towards A Statistical Context for Source Obscurity in Sensor Network
 
Lilavati Samant Shrikanth N. G.
 
Full Text Paper | Year: March 2014 | Volume 1 Issue 2 | Pages 121-124
   
   
  Design of 512 bitKeccak Hash Function Encryption for High Throughput Core
 
Ms. Sheetal C. Deshmukh Ms.ApekshaV. Sakhare
 
Full Text Paper | Year: March 2014 | Volume 1 Issue 2 | Pages 125-128
   
   
  Performance Analysis of Tree Classifiers using on Engineering Students Recruitment Dataset
 
Samrat Singh Dr. Vikesh Kumar
 
Full Text Paper | Year: March 2014 | Volume 1 Issue 2 | Pages 129-137
   
   
  Implementation of Least-Latency Routing over Time-Dependent Wireless Sensor Networks
 
Manju Priya G
 
Full Text Paper | Year: March 2014 | Volume 1 Issue 2 | Pages 138-144
   
   
  Recognizing Character using Bayesian Network in Data Mining
 
Anver Muhammed.K.M Radhakrishnan B Shine Raj G Jayakrishnan R
 
Full Text Paper | Year: March 2014 | Volume 1 Issue 2 | Pages 145-149
   
   
  Rejection of Harmonics in LNA for Broadband Application
 
Saurabh Nimkar Bhushan Vidhale
 
Full Text Paper | Year: March 2014 | Volume 1 Issue 2 | Pages 150-512
   
   
  Emergency App using Voice Recognition
 
Tejas Panchbhai Sonali Warhade Vaishali Choudhary
 
Full Text Paper | Year: March 2014 | Volume 1 Issue 2 | Pages 153-157
   
   
  Identification of Diabetic Retinopathy in Retinal Images using Support Vector Machine
 
Sneha Purusharthi Bhakti Kurhade
 
Full Text Paper | Year: March 2014 | Volume 1 Issue 2 | Pages 158-167
   
   
  Improvement of Transient Stability using Fuzzy Logic Controller for Permanent Magnet Wind Generator Connected to the Grid
 
H.S.Dalvi Bushra Khan
 
Full Text Paper | Year: March 2014 | Volume 1 Issue 2 | Pages 168-172
   
   
  Real-Time Eye Tracking System for People with Several Disabilities using Single Web Cam
 
Payal Ghude Anushree Tembe Shubhangi Patil
 
Full Text Paper | Year: March 2014 | Volume 1 Issue 2 | Pages 173-176
   
   
  Design of Human Emotion Recognition System from Speech using Particle Swarm Optimization
 
Anjali Shelke Sonali Joshi
 
Full Text Paper | Year: March 2014 | Volume 1 Issue 2 | Pages 177-182
   
   
  Graphical Password Authentication
 
Ishwar Padade Manoj Parate Sanket Gharde Mithil Wasnik
 
Full Text Paper | Year: March 2014 | Volume 1 Issue 2 | Pages 183-185
   
   
  Analysis of Noise Exposure from Different Machines by Graph-Based Clustering Method
 
Amitava Kar Pintu Pal
 
Full Text Paper | Year: March 2014 | Volume 1 Issue 2 | Pages 186-191
   
   
  Preserving Source Location Privacy in Wireless Sensor Network
 
Lilavati Samant Shrikanth N.G
 
Full Text Paper | Year: March 2014 | Volume 1 Issue 2 | Pages 192-195
   
   
  Concealing Information using Image Steganography
 
Akanksha Pawar Kunali Kharbikar Gaurav Chaudhari Amruta Belkhede
 
Full Text Paper | Year: March 2014 | Volume 1 Issue 2 | Pages 196-199
   
   
  Private NUBE (Private Cloud for Particular Organization)
 
Sagar Bhandari Arif Sheikh Sunny Yadav Ganesh Padole
 
Full Text Paper | Year: March 2014 | Volume 1 Issue 2 | Pages 200-204
   
   
  Implementation of Modified RSA Cryptosystem Based on Offline Storage and Prime Number
 
Ms. Ritu Patidar Mrs. Rupali Bhartiya
 
Full Text Paper | Year: March 2014 | Volume 1 Issue 2 | Pages 205-209
   
   
  A Technique for Offline Handwritten Character Recognition
 
Shilpy Bansal Mamta Garg Munish Kumar
 
Full Text Paper | Year: March 2014 | Volume 1 Issue 2 | Pages 210-215
   
   
  Android Help Alert System using Speech Recognition
 
Mohit Thulkar Snehal Kardale Rahul Sathawane
 
Full Text Paper | Year: March 2014 | Volume 1 Issue 2 | Pages 216-220
   
   
  Power Quality Monitoring of Induction Motor using Lab VIEW
 
B. Ravi Teja
 
Full Text Paper | Year: March 2014 | Volume 1 Issue 2 | Pages 221-228
   
   
  Implement a Mining Web Document through New Data Clustering Algorithm
 
Najim Sheikh Kasim Ali Saiyed Ajeet Malviya Swapnil Sharma Dikshit
 
Full Text Paper | Year: March 2014 | Volume 1 Issue 2 | Pages 229-235
   
   
  Selection of Accurate & Robust Model for Binary Classification Problems
 
Manu Banga
 
Full Text Paper | Year: March 2014 | Volume 1 Issue 2 | Pages 236-239
   
   
  Feature Subset Selection Algorithm for High Dimensional Data using Fast Clustering Method
 
A.GowriDurga A.Gowri Priya
 
Full Text Paper | Year: March 2014 | Volume 1 Issue 2 | Pages 240-242
   

 

  Contact  | Terms of Use | Site Map | Nondiscrimination Policy | Help  
IJCAT
   
  Copyright © 2013 IJCAT - All rights reserved. Use of this website signifies your agreement to the terms and conditions