Volume-1 Issue-3, February 2013

  • Version
  • Download 27
  • File Size 4.00 KB
  • Create Date February 28, 2013
  • .

Volume-1 Issue-3, February 2013, ISSN: 2319–6386 (Online)
Published By: Blue Eyes Intelligence Engineering and Sciences Publication

Power Quality Enhancement by Using Distributed Power-Flow Controller in Distribution Systems
Karthik Korvi1, Jisha Bhubesh2, R.Shirisha3


Perspective Study on Recoverable Concealed Data Aggregation in WSNs
John Major J1, Shajin Prince2


Comparison of Micro-Holes Produced By Micro-EDM with Laser Machining
Mohammed Sarvar Rasheed


To Analyze the Performance of Optical Burst Switched Networks for Energy Savings
Suresh Pandian V1, Arjun Kumar C. R2, Karpagarajesh G3


A Survey on K-mean Clustering and Particle Swarm Optimization
Pritesh Vora1, Bhavesh Oza2


Energy Efficient Routing Protocols for Mobile Ad-Hoc Networks
Rupali Mahajan1, Rupali Jagtap2


Buck–Boost-Type Unity Power Factor Rectifier with Extended Voltage Conversion Ratio
G. Ravindra Naik1, D. Bhavani2, T. Harikrishna Prasad3


Reliability Evaluation of Bulk Power Systems Incorporating UPFC
V. S. K. Sandeep1, M. Divya Charitha2 , G. Uday Bhanu3


DWT and PCA Based Image Enhancement with Gaussian Filter
R. Vani1, K. Soundara Rajan2

Green Approach to Corrosion Inhibition of Mild Steel Using Emilia Sonchifolia and Vitex Doniana In 2.5M HCl Medium
Iloamaeke I. M1, Onuegbu T. U2, Umeobika U. C3, Umedum N. L4


The Grapheme-Personification Synaesthesia at Indian Glance
K. Vijayasree1, T. Rajasekhar2


Implementation and Performance Evaluation of an Energy Constraint AODV Routing
Dinesh Kumar Dwivedi1, Akhilesh Kosta2, Akhilesh Yadav3


Survey of Resource and Job Management for Load Balancing In Grid Computing
Sakadasariya Achyut R


Survey on DDoS Attacks and its Detection & Defence Approaches
Nisha H. Bhandari


SLA Negotiation for Web Service Consumption Based on Analytic Hierarchy Process
R. Raju1, D. Dhivya2, R. Saranya3, S. I. Abbinaya4


Parallel Power Flow AC/DC Converter with High Input Power Factor and Tight Output Voltage Regulation for Universal Voltage Application
Dhudem Santhosh1, Jisha Bhubesh2, Khaja Rafiulla3


Attack Graph Generation and Threat Evaluation in Network Situation Awareness (NSA)
Patil Shalaka1, Ahir Minakshi2, Kale Dattatraya3