INTERNATIONAL JOURNAL OF INNOVATIONS IN APPLIED SCIENCES & ENGINEERING

International Peer Reviewed (Refereed), Open Access Research Journal

E-ISSN:2454-9258 | P-ISSN:2454-809X | Estd Year: 2016

PAST ISSUE


Vol. 2, Jan-Dec 2016

Research Article

 Page no: 001-010

IMPLEMENTATION OF OFDM SYSTEM

Ch Sumanlatha, P N L Malllia, J Mounika, U Prathyusha, M Lavanya, N Vijayalakshmi

Orthogonal Frequency Division Multiplexing (OFDM) is mainly designed to overcome the effects of multipath reception, by dividing the wideband channel into many narrowband sub-chann...

Research Article

 Page no: 011-017

WIRELESS SENSOR NETWORK: A REVIEW ON DATA AGGREGATION

Anuj

Data aggregation is very crucial techniques in wireless sensor network. Because with the help of data aggregation we reduce the energy consumption by eliminating redundancy. When w...

Research Article

 Page no: 018-024

UREAPONICS: A STUDY TO GROW PLANTS IN SPACE

Raghav Mittal

                     Download PDF

Research Article

 Page no: 025-030

TO CHECK THE BIO-EFFICACY OF RAZE (COC 80%) AGAINST LATE BLIGHT DISEASE OF POTATO

Anubhav Tewari

                     Download PDF

Research Article

 Page no: 031-035

TO CHECK THE BIO-EFFICIENCY OF DEUCE 2.8 (DELTAMETHRIN) AGAINST HELOPELTIS THEIVORA OR MORE COMMONLY KNOWN AS THE TEA MOSQUITO

Anubhav Tewari

                     Download PDF

Research Article

 Page no: 036-041

SOLAR POWER SYSTEM & ELECTRICAL SYSTEM- AN ANALYSIS

Apurv Goel

Today about four-fifth of India's need for electricity are met by fossil fuels which may supply the necessities of power for another 100 -150 years. 1. In India, the solar energy ...

Research Article

 Page no: 042-045

ACCESS CONTROL LIST: LINKAGES WITH SECURITY ON ROUTERS

Apurv Goel

In Existing systems, a user can access any website without any network blocking that creates the problem of network congestion. To reduce the problem of network congestion, a netwo...

Research Article

 Page no: 046-066

HYBRID CARS: CONCEPT OF V2G AND LOAD EQUALIZATION

Apurv Goel

                     Download PDF

Research Article

 Page no: 067-098

DIVERSITY ANALYSIS OF ANKALESHWAR POULTRY BREED

Vanshika Goel, Sainyam Goel

                     Download PDF

Research Article

 Page no: 099-133

MICROSATELLITE ANALYSIS OF MEHSANA AND PANDHARPURI BUFFALOES (BUBALUS BUBALIS)

Vanshika Goel, Sainyam Goel

                     Download PDF

Research Article

 Page no: 134-161

HETEROLOGOUS MARKERS IN FAMILY EQUIDAE

Vanshika Goel, Sainyam Goel

                     Download PDF

Research Article

 Page no: 162-196

MICROSATELLITE ANALYSIS OF BUFFALOES OF GUJARAT STATE

Vanshika Goel, Sainyam Goel

                     Download PDF

Research Article

 Page no: 197-208

MICROSATELLITE BASED GENETIC CHARACTERISATION OF INDIAN MUSCOVY DUCK (CAIRINA MOSCHATA)

Vanshika Goel, Sainyam Goel

No information is available on genetic characteristics of Indian Muscovy duck. Blood samples were collected from 52 Muscovy ducks from Manipur, Assam and West Bengal. DNA was isola...

Research Article

 Page no: 209-303

MULTILOCUS GENOTYPING FOR DIVERSITY ANALYSIS IN MARATHWADA AND SURTI BUFFALOES (BUBALUS BUBALIS)

Vanshika Goel, Sainyam Goel

                     Download PDF

Research Article

 Page no: 304-313

SEGREGATION AND RECOGNITION OF MICRO-ORGANISMS

Vanshika Goel, Sainyam Goel

Every organism has its own habitat, which may or may not different from other micro organisms. For isolation of micro organism from different places or things can explain the flora...

Research Article

 Page no: 314-366

SEQUENCE CHARACTERISATION AND IDENTIFICATION OF SNP MARKERS IN CHICKEN MYOSTATIN GENE

Vanshika Goel, Sainyam Goel

                     Download PDF

Research Article

 Page no: 367-382

CONCEPTUALIZATION AND DESIGNING OF A MICRO HYDRO PLANT EMPLOYING PETLON WHEEL TO GENERATE CLEAN ENERGY

Vasu Gupta

                     Download PDF

Research Article

 Page no: 383-389

DESIGN AND IMPLEMENTATION FOR REAL TIME BIG DATA ANALYSIS IN REMOTE SENSING APPLICATION

Vasu Gupta

We display the inspiration, outline, execution, looks into and uses of Big Data for remote detecting. Enormous Data and its capability to enhance value and in addition drifting new...

Research Article

 Page no: 390-395

EMPLOYABILITY OF MULTILEVEL WAVELET DECOMPOSITION IN WATERMARKING FOR CONFLICT RESOLUTION BY RATIONAL ANALYSIS

Vasu Gupta

We display the inspiration, outline, execution, looks into and uses of Big Data for remote detecting. Enormous Data and its capability to enhance value and in addition drifting new...

Research Article

 Page no: 396-429

GRAPHICAL AND STATISTICAL ANALYSIS TO DETERMINE THE DEGREE OF US FINANCIAL CONTAGION ON THE BRICS ECONOMY

Avnish Grover

Financial contagion is the harmful effect caused by one economy on the other. In today’s global market there is bound to exist some level of dependence of markets, but is that du...

Research Article

 Page no: 430-444

EMPLOYABILITY OF ABSTRACT SYNTAX TREES IN THE EFFICACIOUS REPLICATION OF PAID OR PREMIUM SOFTWARE AND ITS EXTENSION TO MULTIPLE FUNCTIONALITIES – ST...

Lavaneesh Sharma

Code clone is the technique in which developer produces an exact replica of an original product or software. Extending upon the previous statement, it is a technique which requires...

Research Article

 Page no: 445-451

APPLICABILITY OF MACHINE LEARNING TECHNIQUE IN DEVELOPING A STUDENT ASSESMENT AND PERFORMANCE FRAMEWORK

Gautam Anand

Data mining is an emerging technology that is used in each and every system. Education data mining is a beneficial discipline because the amount of data in education system is incr...

Research Article

 Page no: 452-459

ANALYZING THE MACHINE LEARNING ALGORITHMS- NAÏVE BAYES, RANDOM TREE, AND SUPPORT VECTOR MACHINES SVM USING THE KDD99 DATA SET TO PREDICT AND CLASSIFY...

Saumya Gupta

Objectives/Methods: The growing prevalence of network attacks is an issue that can affect the availability, confidentiality, and integrity of critical information for companies. T...

Research Article

 Page no: 460-472

LEVERAGING FRONT LAYER SECURITY MECHANISM IN CLOUD ENVIRONMENT WITH THE APPLICATION OF REA IN MITIGATING DATA SECURITY & RISKS FOR EFFECTIVE SECURITY ...

Saumya Gupta

The centralized computing defines cloud computing as a centralized model that is responsible for providing the network access on-request basis to a shared pool of interconnected co...

Research Article

 Page no: 473-475

AN ANALYSIS OF THE SIMILAR KNOWLEDGE PEDAGOGICAL APPROACH TO THE ‘MULTIPLE INTELLIGENCE’ IN CONTEMPORARY EDUCATION MODELS

Nitin Chhikara

                     Download PDF

Research Article

 Page no: 476-480

AN IN-DEPTH ANALYSIS OF PICPASS ALGORITHM IN PROVIDING AN EFFECTIVE SOLUTION FOR ‘KEY EXCHANGE PROBLEM’

Muskaan Juneja

This paper proposes a PicPass calculation to take care of the Key Exchange issue utilizing Symmetric and Asymmetric key cryptography. Diffie and Hellman proposed a calculation for ...

Research Article

 Page no: 481-485

EMPLOYABILITY OF DATA MINING TOOLS AND TECHNIQUES IN THE COMPREHENSIVE ANALYSIS AND PREDICTION OF CRIME

Namrata Deswal

The aim is to give a survey of examination regarding crime analysis in the society. It executes different information examination calculations that interface wrongdoing and its exa...