Volume 2 :: Issue 2 :: IJACTE

Table Of Content                                                               editorialEditorial
Sl. No. Title and Authors Page No.
1. Low Power ROM less FFT Processor
Deepa Susan George & V.Sarada
1-4
2. Predicting the Analysis of Heart Disease Symptoms Using Medicinal Data Mining Methods
V. Manikantan & S. Latha
5-10
3. AutoEpsDBSCAN : DBSCAN with Eps Automatic for Large Dataset
Manisha Naik Gaonkar & Kedar Sawant
11-16
4. Geo Location Based RSA Encryption Technique
Ayesha Khan
17-20
5. A Survey on Domain Specific Search Engine
Shweta Redkar, Norman Dias & J. A. Laxminarayana
21-26
6. Mother Infant Nurturing Application
Roshini. B, Y.C. Kiran & K.N. Narasinga Rao
27-30
7. A Single Model for Event-Driven Software
Om Kumar C.U., P. Bhargavi & Vinod Kumar. K
31-36
8. Resource Monitoring and Provisioning in SaaS in Public Cloud
Syed Manzoor Ali & Sandeeep Sahu
37-42
9. Sandhi Splitting of Marathi Compound Words
Joshi Shripad S.
43-46
10. A Systematic Literature Review on Software Fault Prediction based on Qualitative and Quantitative Factors
Gurvinder Singh, Baljit Singh Saini & Neeraj Mohan
47-50
11. 3 Dimensional Security in Cloud Computing
D. A. Kulkarni, Sayali Dadas & Aniket Kakade
51-54
12. Hash-Based String Matching Algorithm For Network Intrusion Prevention systems (NIPS)
VINOD. O & B. M. SAGAR
55-59
13. Gesture Based Interactive Multi Touch Surface With RFID Technology For Hotels
Rajat Verma
60-66
14. Information Hiding Scheme on Image Using Contourlet Wavelet Transform
A. Saravanan, A. Sivabalan & Ramkumar Prabhu
67-70
15. CTP Algorithm : An Implementation In the Real World
Priyaswarupa Rani Pati & E. Poovammal
71-73
16. Hand Gesture Recognition Using PCA and Histogram Projection
Krishnakant C. Mule & Anilkumar N. Holambe
74-78
17. To Implement SaaS Multitenant Framework Security in Cloud Computing
S. P. Patil & V. N. Nirgude
79-85
18. Development of Use Case Model from Software Requirement using in-between SBVR format at Analysis Phase
Devendrasingh Thakore & Akhilesh R. Upadhyay
86-92
19. Two Phase Dynamic Channel Assignment Protocol on Multi-Channel Multi-Interface Wireless Ad Hoc Networks
Abdul Goni, Goutam Gorai & Santanu Rakshit
93-97
20. Wi-Fi Infrastructure Security System from Vulnerable Attacks
Geethanjali. N, Thangaraj. P, Kathiresan. K & Mathumathi. R
98-104
21. An Efficient Query Processing Search Using Textual and Spatial Relevances
Santhanakrishnan. C, Sivaprakasam. V, Rajasekar. R, Sudhakar. D & Lourdu Michael Antony. K
105-109
22. Identification of Opinionated Text and Classifying its Sentiments of Online Product Reviews Using Corpus-Based Approach: Opinion Mining
Regina. J
110-114
23. LCS based Secure Authentication Scheme for Health Care Information Exchange
B. Anne Vinitha Vardhini, T. S. Sivapriya & S. Poonkuntran
115-120
24. A Review of Data Clustering Techniques and Enhancement of Data Clustering using Hybrid Clustering Model of K‐Means and PSO Clustering
Vinod Sharma, Nitish Salwan, Sandeep Singh, Navneet Singh Babra & Prabhsimran Singh
121-124
25. Impact of Compression Algorithms on Data Transmission
Vandana Jindal, A. K. Verma & Seema Bawa
125-132
26. Transient Stability Analysis Using MATLAB Simulink and Neural Network
Devender Kumar & Balwinder Singh Surjan
133-138
27. Sorting Data with One Swap Operation
Rama Sushil, Sushil Kumar & Anuj Kumar
139-143