• No results found

[PDF] Top 20 Research Paper IJERSS Volume 2 | Issue 4 APRIL 2015

Has 10000 "Research Paper IJERSS Volume 2 | Issue 4 APRIL 2015" found on our website. Below are the top 20 most common "Research Paper IJERSS Volume 2 | Issue 4 APRIL 2015".

Research Paper IJERSS Volume 2 | Issue 4 APRIL 2015

Research Paper IJERSS Volume 2 | Issue 4 APRIL 2015

... Chronic wounds are common problems in medical and nursing practice (a,b). Although chronic wound incidence and prevalence are largely unknown, chronic wounds, particularly relati[r] ... See full document

5

Research Paper IJERSS Volume 2 | Issue 4 APRIL 2015

Research Paper IJERSS Volume 2 | Issue 4 APRIL 2015

... Even if using our approach the first time to perform this type of job does not follow computing capabilities to allocate data blocks, it may result in a slight delay at the[r] ... See full document

7

Research Paper IJERSS Volume 2 | Issue 4 APRIL 2015

Research Paper IJERSS Volume 2 | Issue 4 APRIL 2015

... The results of this study illustrates that the field style (own body) combined strength and power training program increases 50 mts speed, explosive power both vertical and hori[r] ... See full document

5

An Authorized Duplicate Check Scheme for Removing Duplicate Copies of Repeating Data in The Cloud Environment to Reduce Amount of Storage Space
Jannu Prasanna Krishna & Macha Ganesh Kumar

An Authorized Duplicate Check Scheme for Removing Duplicate Copies of Repeating Data in The Cloud Environment to Reduce Amount of Storage Space Jannu Prasanna Krishna & Macha Ganesh Kumar

... In computing, data deduplication is a specialized data compression technique for eliminating duplicate cop- ies of repeating data. This technique is used to improve storage utilization and can also be applied to network ... See full document

5

Power Quality Improvement Using Artificial Neural Networks (ANN) With Renewable Energy Sources
Metta Satish, Ranadheer Inteti & P Sandeep

Power Quality Improvement Using Artificial Neural Networks (ANN) With Renewable Energy Sources Metta Satish, Ranadheer Inteti & P Sandeep

... Renewable Energy Sources are increasingly integrated at the distribution level due to increase in load demand which utilize power electronic converters. There is a disturbance in the electrical network due to the exten- ... See full document

7

An Improved DELAY POWER Efficient Modified Carry Select Adder Design & Implementation Using VHDL
Ravi Kiran Kurella, J E N Abilash & N Srikanth

An Improved DELAY POWER Efficient Modified Carry Select Adder Design & Implementation Using VHDL Ravi Kiran Kurella, J E N Abilash & N Srikanth

... A conventional carry select adder (CSLA) is an RCA– RCA configuration that generates a pair of sum words and output carry bits corresponding the anticipated input-carry (cin = 0 and 1) and selects one out of each pair ... See full document

6

Data Embedding Using Adaptive Pixel Pair Matching
A Pratap Reddy, G  Sumathi, D Anusha, P Sainath Reddy & P Kishor

Data Embedding Using Adaptive Pixel Pair Matching A Pratap Reddy, G Sumathi, D Anusha, P Sainath Reddy & P Kishor

... This paper proposes a new data-hiding method based on pixel pair matching (PPM). The basic idea of PPM is to use the values of pixel pair as a reference coor- dinate, and search a coordinate in the neighborhood ... See full document

6

An Innovative Method for 3rd Party Auditing With Improved User Data Privacy Protection in the Cloud
K Ravi Kiran, B Sushanthi Reddy & V Archana Reddy

An Innovative Method for 3rd Party Auditing With Improved User Data Privacy Protection in the Cloud K Ravi Kiran, B Sushanthi Reddy & V Archana Reddy

... this issue here, we are giving public auditing process for cloud storage that users can make use of a third- party auditor (TPA) to check the integrity of ... See full document

6

Multipass Welding
Dr  Suresh Akella & Mr  Ramesh Kumar Buddu

Multipass Welding Dr Suresh Akella & Mr Ramesh Kumar Buddu

... Along the weld the x axis, front ellipse length is af and rare length is ar, could be uneven axis lengths in the fore and rare. b is axis length in the lateral or trans- verse direction along y and for the 3D ellipsoid ... See full document

5

Protection of Energy Storage System in a Distribution System Using Fault Current Limiter
T Venkata Satya Manoj & S Khadarvali

Protection of Energy Storage System in a Distribution System Using Fault Current Limiter T Venkata Satya Manoj & S Khadarvali

... to protect energy storage systems to maintain stable operation of the distribution system , because of its fast fault current limiting action and its automatic recovery characteristics[2]. The consequence of a ... See full document

5

Preserving Data and Identity Privacy in an Un trusted Cloud Environment Where Membership of the Group Is Changing and Dynamic in Nature
Marripally Sathish & P A Hima Kiran

Preserving Data and Identity Privacy in an Un trusted Cloud Environment Where Membership of the Group Is Changing and Dynamic in Nature Marripally Sathish & P A Hima Kiran

... In files stored on the untrusted server include two parts: file metadata and file data. The file metadata im- plies the access control information including a series of encrypted key blocks, each of which is Encrypted ... See full document

5

Privacy Preserving in Two Authenticated Servers by Key Exchange
Mr P Anji Babu, G Tabitha, J bhaskar & J Soumya

Privacy Preserving in Two Authenticated Servers by Key Exchange Mr P Anji Babu, G Tabitha, J bhaskar & J Soumya

... In 1976, Whitfield Diffie and Martin Hellman published a cryptographic protocol called the Diffie–Hellman key exchange (D–H) based on concepts developed by Hell- man’s PhD student Ralph Merkle. The protocol enables users ... See full document

6

A Study on Quality Infrastructure Support in 4G Networks
B  Bindusha Reddy, Sravani Kanala & T  Sai Amrutha Varshini

A Study on Quality Infrastructure Support in 4G Networks B Bindusha Reddy, Sravani Kanala & T Sai Amrutha Varshini

... 4G-great interest especially for the wireless telecom industry. It can “connect anytime, anywhere, anyhow” providing ubiquitous network access at an high speed to the end users. For the growing user requirements of ... See full document

7

A Survey on Human Computer Interfaces
V  Sri Mathruka, S  Syamala & N V K Ramesh

A Survey on Human Computer Interfaces V Sri Mathruka, S Syamala & N V K Ramesh

... This paper presents a handy framework that points to catch a client’s purpose to address a machine, by con- sidering both sound and visual ...this paper, we consider visual measures of discourse action and ... See full document

5

Captcha in Graphical Password Scheme Using Hardoi Authentication
Bhukya Dharma & P Satish Reddy

Captcha in Graphical Password Scheme Using Hardoi Authentication Bhukya Dharma & P Satish Reddy

... Figure 2. In Figure 2(b), the three circled images are pass-images, the strings with them are ‘qarwrxex’, ‘heeqseio’, and ‘mvgqqebh’ respectively, and the corresponding pass- positions are (1, 2, ... See full document

8

Research Paper IJERSS Volume 2 | Issue 2 FEB 2015

Research Paper IJERSS Volume 2 | Issue 2 FEB 2015

... As per Table 8 comparing the means of simple audio reaction time for experimental group and control group of pre-test, obtained t-value is significant; it means both the groups[r] ... See full document

5

Research Paper IJERSS Volume 2 | Issue 5 MAY 2015

Research Paper IJERSS Volume 2 | Issue 5 MAY 2015

... Table – 9: Table showing adjusted means, CD and adjusted mean difference of standing broad jump test performance of Plyometric Training Group, Yogasana Training Group and Control Group[r] ... See full document

6

IJERSS Volume 2 | Issue 5 MAY 2015 Research Paper

IJERSS Volume 2 | Issue 5 MAY 2015 Research Paper

... In First step, uniformly crop overlapping image patches with constant patch size from the input blurred image to estimate local blur kernels. The patch size can be deter[r] ... See full document

7

Research Paper IJERSS Volume 2 | Issue 1 JAN 2015

Research Paper IJERSS Volume 2 | Issue 1 JAN 2015

... Provision of employment opportunities has became a constant pre-occupation with policy makers in our country addressing social exclusion and provision of employment opportunities was co[r] ... See full document

5

Research Paper IJERSS Volume 2 | Issue 1 JAN 2015

Research Paper IJERSS Volume 2 | Issue 1 JAN 2015

... The following day another 20 employees were suspended according to Nokia India Employees Progressive Union (NIEPU) (IANS website).. This strike too was part of a series st[r] ... See full document

5

Show all 10000 documents...