The revolutionary decline in price and complexity of computers, laptops and mobile phonehas changed the whole statistics of internet users. Considerable decline in price of internet chargesalso has contributed to the gigantic rise up of the curve of internet users. 3G introduction in India hasact as a catalyst to the phenomena of rising the rectangular boxes in recent two or three year, ...
Paper Information
Authors Vivek Saini,Ashok Kumar Saini
Read Journal Click Here
Read Paper Click Here
Page No. 47 to 51

A robust watermark scheme for copyright protection is proposed in the present paper. The present method selects the pixel locations to insert the watermark by a new technique called fuzzy based wavelet approach. The watermark is embedded in the sorted pixel locations of fuzzy based wavelet approach by using pixel value difference method. The proposed approach overcomes the weak robustnes...
Paper Information
Authors S.Maruthu Perumal, V.Vijayakumar, B.VijayaKumar
Read Journal Click Here
Read Paper Click Here
Page No. 41 to 46

Images are often corrupted by impulse noise, also known as salt and pepper noise. Salt and pepper noise can corrupt the images where the corrupted pixel takes either maximum or minimum gray level. Amongst these standard median filter has been established as reliable - method to remove the salt and pepper noise without harming the edge details. However, the major problem of standard Media...
Paper Information
Authors Mr. N.Naveen Kumar,Dr. S.Ramakrishna
Read Journal Click Here
Read Paper Click Here
Page No. 43 to 47

Full network level privacy has often been categorized into four sub-categories: Identity, Route,Location and Data privacy. Achieving full network level privacy is a challenging problem due to the conditionsimposed by the sensor nodes (e.g., energy, memory and computation power), sensor networks (e.g., mobilityand topology) and QoS issues (e.g., packet reach-ability and timeliness). This ...
Paper Information
Authors Dr. phani praveen , B. Sukumar Babu
Read Journal Click Here
Read Paper Click Here
Page No. 33 to 39

Facebook represents an extremely efficient medium for helping people communicate more efficiently with their friends, family and coworkers. Although the emergence of Facebook appears to have significant potential for SME marketing, it is not clear if mere personal use of Facebook by SEM owners leads to the commercial use of Facebook by these same individuals. The potential use of Faceboo...
Paper Information
Authors Dr. Chi Bo Wong
Read Journal Click Here
Read Paper Click Here
Page No. 53 to 59

The competition between organizations that develop software is increasing with the growth of the market in technology of the information, as consequence the organizations has concerned more and more with the improvement of the quality of itts products of software, with the effective costs and with the fulfillment of terms of its projects. To obtain these characteristics, the software dev...
Paper Information
Authors Dr.EVERTON CASTELu00c3u0192O TETILA, Fu00c3u0081BIO IAIONE , IVANIR COSTA, JULIANA QUEIROZ DA SILVA TETILA, MAURO DE MESQUITA SPu00c3u008dNOLA
Read Journal Click Here
Read Paper Click Here
Page No. 91 to 99

A Mobile Adhoc Network (MANET) is characterizedby mobile nodes, multihop wireless connectivity,infrastructureless environment and dynamic topology. The adhoc environmentis accessible to bothlegitimate networkusers and malicious attackers. Moreover, as the wireless links are highly error prone and can go down frequently due tomobility of nodes, therefore, stable and secure routing over MA...
Paper Information
Authors Dr. Sunil Taneja , Ashwani Kush
Read Journal Click Here
Read Paper Click Here
Page No. 21 to 31

A new service robot designed for cleaning tasks in home environments is introduced. System has three subsystems: electrical, software and mechanical of which microcontroller, sensors (opponent and light) and motor are the electrical and mechanical subsystems respectively and the software subsystem is the brain of the robot. The cleaning robot uses a microcontroller to detect obstacles an...
Paper Information
Authors Ritesh.Durande, Nikita Prashar , Tejashree Thorat,Abhishek Galande
Read Journal Click Here
Read Paper Click Here
Page No. 31 to 33

Wi-Fi technology is a form of telecommunication that allows data and voice transmissions to be sent across awide range of interconnected networks. The success in deploying services and applications based on this concept needsthe development of applications that allows intermediate users the reception and forwarding of information to destinationusers. The user may take the maximum benefit...
Paper Information
Authors Dr. Rane Sandip Ishwar
Read Journal Click Here
Read Paper Click Here
Page No. 17 to 20

Due to the growing use of the internet, more and more critical processes are running over the web such as e-commerce. Internet allows commerce and business between parties who are physically distant and do not know each other doing the transaction. For the effective operation of the web application and e-commerce applications, security is a key issue. Various aspects of security are rele...
Paper Information
Authors Dr. Norjihan Abdul Ghani, Harihodin Selamat, Zailani Mohamed Sidek
Read Journal Click Here
Read Paper Click Here
Page No. 1 to 5