May S.NO TITLE & AUTHORSPAGE NO 1Inflation and Economic Growth: Inflation Threshold Level Analysis for Ethiopia Authors: Dr.P. Nandeeswara Rao, Abate Yesigat1-7 2Low Cost Briquetting of Metallurgical Dust Fines Author: Praveen Mallampati 8-12 3Design of A Multiband Flexible Divider Using A Low Power Single Phase Clock Distribution Network Authors: Sadaf Rukhsar, Mahesh R.K13-16 4Design and Implementation High Speed with Compensation Circuit Using KOGGE Stone Adder Tree Authors: Rubina Firdous, Mahesh R.K 17-20 5STATISTICAL TRAFFIC ANALYAIS MODEL FOR ANONYMOUS MANETs Authors: Shashikanth Nayak, Dr. Amutha.S21-27 6Majority Logic Fault Detection with Difference Set Cyclic Code and LDPC Codes for Memory Applications Authors: Kubra Begum, Mahesh R.K28-31 7User Recognition Based on Face using Local Binary Pattern (LBP) with Artificial Neural Network (ANN) Authors: Abhilasha A Patil, Lakshmi Maka 32-35 8A Survey on Context Driven Activity Recognition and Analysis in Wide Area Surveillance Authors: Anjana B H, Rashmi S R, Dr. R Krishnan36-42 9An application, challenges and routing protocol in Mobile Ad-Hoc Network Authors: Avinash patil, G.B.Hangargi43-48 10VLSI Implementation of Fast Addition Using Quaternary Signed Digit Number System Authors: Jyoti R Hallikhed, Mahesh R.K49-53 11Comparative Analysis of PCA, DWT & Hybrid (PCA_DWT) Based Image Fusion Techniques Authors: Jyothi, Dr. Lalitha Y. S54-57 12Automated Lung Nodule Detection and Classification using Morphological Segmentation and Texture features Authors: Veena Puranikmath, Dr. Lalita Y S, Shivaganga Patil58-61 13Efficient Data Transmission Clustering Method Using Compressive Sensing for Wireless Sensor Networks Authors: Nagraj, Dr. A R Aswatha62-65 14Design of High Speed 64-Bit MIPS Soft-Core Processor Authors: Suman B. Pujari, Devi Meenakshi 66-68 15Brain Image Severance Using Fuzzy Logic and Neural Networks for Tumor Exposure Authors: Priyanka Koralli, Shivaganga Patil69-72 16Microblaze implementation of hb-2 crypto system with its cryptosystem with its authentication protocol Authors: Sapna S, Chandana B R73-77 17Optimized hardware implementation of RC6 Algorithm on FPGA for Cloud Security Authors: Smitha Rose Varghese, Nafeesath T P, Dr.Jose Alex Mathew 78-80 18Preserving Source Privacy And Massage Authentication In WSN Authors: Sandeep Awale, Dr. A Sreenivasan81-84 19Wavelet Based Image Fusion for Detection of Brain Tumor Authors: Ambika, Shivaganga Patil85-87 20Authenticated Secure Communication for Cognitive Radio Networks Authors: Vamshi U R, Prof. Divya Shetty, Dr. Jose Alex Mathew88-89 Paper uploading is in progress. Author(S) are requested to complete their paper formalities.