Software Quality Analysis by Object Oriented Approach in Design Phase Using UML
Author(s): Anand Handa
Volume: 1
Issue: 3
Year: 2011




Hybrid Approach for Intrusion Detection Using Conditional Random Fields

Author(s): Sandip Ashok Shivarkar | Mininath Raosaheb Bendr
Volume: 1
Issue: 3
Year: 2011





Analysis of Concept Drift Detection – A Framework for Categorical Time Evolving Data

Author(s): Authors: Chinapaga Ravi,
Volume: 1
Issue: 3
Year: 2011





Voltage Tracking of a DC-DC Buck-Boost Converter Using Neural Network Control

Author(s): W.M.Utomo, | Z.A. Haron, A. A. Bakar, M. Z. Ahmad, Y.M.Y Buswig and S.F. Mansour
Volume: 1
Issue: 3
Year: 2011





An Improved Approach for IRIS Authentication System by Using Daugman’s Rubber Sheet Model, Segmentation, Normalization and RSA Security Algorithm

Author(s): Mininath Raosaheb Bendre | , Sandip Ashok Shivarkar
Volume: 1
Issue: 3
Year: 2011





Fingerprint-Based Identification System:– A Survey

Author(s): Jyoti Rajharia, | Dr. PC Gupta, Arvind Sharma
Volume: 1
Issue: 3
Year: 2011





Sharing of Encrypted Information Using Block Cipher Cryptography in Secured Peer-to-Peer Network

Author(s): Megha Ojha, | Basant Verma
Volume: 1
Issue: 3
Year: 2011





Improved MCDS for Ad hoc network

Author(s): Nirmala Chouhan | , Deepali Kelkar, Manoj Chouhan
Volume: 1
Issue: 3
Year: 2011





QDPSK Study of Modulation and Demodulation Based On Xilinx

Author(s): Ashish Baranwal, | Mayank Nema, Prof. Lalita Gupta
Volume: 1
Issue: 3
Year: 2011





Knowledge Management and its Efficiency and Effectiveness by Using Semantic Web Technology

Author(s): Tauqeer Ahmad Usmani, Durgesh Pant
Volume: 1
Issue: 3
Year: 2011





Flooding Attacks Prevention in MANET

Author(s): Ms. Neetu Singh Chouhan, | Ms. Shweta Yadav
Volume: 1
Issue: 3
Year: 2011





Performance Evaluation of V-Blast MIMO System using BPSK

Author(s): Pravin Kumar Barmashe,
Volume: 1
Issue: 3
Year: 2011





Fallback Authentication Manager-A step forward towards Optimization and Optimum Efficiency

Author(s): Akhil Khare, | Archana Burujwale
Volume: 1
Issue: 3
Year: 2011





Review Papers for Circular Microstrip Patch Antenna

Author(s): Sonali Jain, | Rajesh Nema
Volume: 1
Issue: 3
Year: 2011





Implementation of AXI Design core with DDR3 memory controller for SoC

Author(s): Darshana Dongre, | Prof.Anil Kumar Sahu
Volume: 1
Issue: 3
Year: 2011





A brief overview on Data mining

Author(s): Hemlata Sahu, | Shalini Sharma, Seema Gondhalakar
Volume: 1
Issue: 3
Year: 2011





The Pruning of Combined Neighborhood Differences Texture Descriptor for Multispectral Image Segmentation

Author(s): Khairul Muzzammil Saipullah, | Nurul Atiqah Ismail, Deok-Hwan Kim
Volume: 1
Issue: 3
Year: 2011





Enhancement of OFDM System Performance with MIMO technique
Author(s): Pallavi Bhatnagar, | Prof. Mukesh Tiwari, Prof. Jaikaran Singh, Prof. Sanjay Rathore
Volume: 1
Issue: 3
Year: 2011




Energy Efficient Approach for Segmentation of Brain tumor Using Ant Colony Optimization

Author(s): Anjum Sheikh, | R.K. Krishna, Subroto Dutt
Volume: 1
Issue: 3
Year: 2011





Collborative Augmented Reality Based People Counting System

Author(s): Akhil Khare, | Kanchan Warke, Dr. Akhilesh Upadhayay
Volume: 1
Issue: 3
Year: 2011





Satellite Image Classification by Hybridization of FPAB Algorithm and Bacterial Chemotaxis

Author(s): Parminder Singh | , Navdeep Kaur, Loveleen Kaur
Volume: 1
Issue: 3
Year: 2011





Network Intrusion Detection by Using Supervised and Unsupervised Machine Learning Techniques : A Survey

Author(s): Abhinav Jain, | Sanjay Sharma, Mahendra Singh Sisodi
Volume: 1
Issue: 3
Year: 2011





Design and Implementation of Image Encryption Algorithm by using Block Based Symmetric Transformation Algorithm (Hyper Image Encryption Algorithm)

Author(s): Hiral Rathod, | Mahendra Singh Sisodia, Sanjay Kumar Sharma
Volume: 1
Issue: 3
Year: 2011





Record-Level Information Extraction from a Web Page based on Visual Features

Author(s): A Suresh Babu | 1, Dr. P. Premchand2 and Dr. A. Govardhan
Volume: 2
Issue: 2
Year: 2012





Word Sense Disambiguation Using Association Rules: A Survey

Author(s): Samit Kumar, | Neetu Sharma, Dr. S. Niranjan
Volume: 2
Issue: 2
Year: 2012





Implementation of Module Based Partial Reconfigurable Multiplier

Author(s): Sameer Ashtekar; Pravin Kshirsagar; Roshan Bhaiswar
Volume: 2
Issue: 2
Year: 2012





Using Machine Learning Algorithms for Word Sense Disambiguation: A Brief Survey

Author(s): Neetu Sharma, | Samit Kumar, Dr. S. Niranjan
Volume: 2
Issue: 2
Year: 2012





Parity Based Fault Detection Approach for the Low Power S-Box and Inverse S-Box

Author(s): P.Jemima Anlet | , M.Jagadeeswari
Volume: 2
Issue: 2
Year: 2012





Modeling and Simulation of Non-ideal Buck Converter in DCM
Author(s): Sheng-yu Gong, | Lin Chen, Chang-hu Yu, Guang-jun Xie*
Volume: 2
Issue: 2
Year: 2012




Enhanced Multicategory Classification Using Fast SVM Learning (FSVML) for Microarray Gene Expression Cancer Diagnosis

Author(s): A.Bharathi | , Dr.A.M.Natarajan
Volume: 2
Issue: 2
Year: 2012





Few Reasons to Adopt the SOA in Heterogeneous Environment: A Survey Report

Author(s): Mr. Rakesh Rathi, | Sandhya Lohiya
Volume: 2
Issue: 2
Year: 2012





A Novel Technique for Identification of Transients by using Wavelet

Author(s): Ravindra K. | Mankar, Mangesh A. Parjane, Dr. Vijay N. Gohokar
Volume: 2
Issue: 2
Year: 2012





Simultaneous Compression and Encryption using Arithmetic Coding with Randomized Bits

Author(s): Archana. | V.Nair.S, G.Kharmega Sundararaj, T. Sudarson Rama Perumal
Volume: 2
Issue: 2
Year: 2012





Influence of Process Parameters on Cutting Force and Torque of Drilling of Glass Fiber Reinforced Epoxy Composites

Author(s): Elias George K, | Varadarajan A.S, Rani Joseph
Volume: 2
Issue: 2
Year: 2012





Hardware Implementation of Discrete Fourier Transform and its Inverse Using Floating Point Numbers

Author(s): Kota Solomon Raju, | Mridula Gangal, Pramod Tanwar and P. Bhanu Prasad | Vijeta Sengar,
Volume: 2
Issue: 2
Year: 2012





An Efficient Diagnosis of Kidney Images Using Association Rules

Author(s): Jicksy Susan Jose, R.Sivakami, N. Uma Maheswari, R.Venkatesh
Volume: 2
Issue: 2
Year: 2012





Low Cost Milk Analyzing and Billing System Using Electronic Card

Author(s): S.V. Arote, | S.B. Lavhate, V.S. .Phatangare, Taware Sachin S., Kadu Rahul N., Anap Sachin D.
Volume: 2
Issue: 2
Year: 2012





An Efficient Algorithm For Removal Of Impulse Noise Using Adaptive Fuzzy Switching Weighted Median Filter

Author(s): J.Soruba Marcel | A.Jayachandran, G.Kharmega Sundararaj
Volume: 2
Issue: 2
Year: 2012





Mitigating Performance Degradation in Congested Sensor Networks

Author(s): Sandip B. Chavan, H K Sawant
Volume: 2
Issue: 2
Year: 2012





Genetic Algorithm based Steady State Analysis of Single-phase Self-excited Induction Generators

Author(s): Generators S | .Sasikumar, S.Singaravelu
Volume: 2
Issue: 2
Year: 2011





A Theoretical Survey For Edge Detection Techniques and Watershed Transformation

Author(s): Shameem Akhtar | , Dr. D Rajayalakshmi, Dr. Syed Abdul Sattar
Volume: 2
Issue: 2
Year: 2012





Modified S2 and Pattern Search Methods to Find Optimal Cluster Centroid for Multi-Variable Functions

Author(s): K. Reddy Madhavi, | Dr. A.Vinaya Babu, Dr. T. Raghunathan, Dr. S. Viswanadha Raju
Volume: 2
Issue: 2
Year: 2012





Decentralized and Role-Based Authentication

Author(s): A.V. Prasad Kambala | , N.Ashok
Volume: 2
Issue: 2
Year: 2012





Power Quality Behavior Improvement in Induction Motor Drives

Author(s): T.Manokaran | V.Rajasekaran S.Mohamed Yousuf
Volume: 2
Issue: 2
Year: 2012





Comparison of K-means and Backpropagation Data Mining Algorithms

Author(s): Nitu Mathuriya, | Dr. Ashish Bansal
Volume: 2
Issue: 2
Year: 2012





Agent Oriented Schemes for Trustworthy Semantic Web Services

Author(s): Prachi Girdhar; Suresh Kumar; Dr. Manjeet Singh
Volume: 2
Issue: 2
Year: 2012





Handling of Incident, Challenges, Risks, Vulnerability and Implementing Detection approaches inside the Cloud

Author(s): Deepak Kumar | ; Amit Kumar Tyagi ; Sadique Nayeem
Volume: 2
Issue: 2
Year: 2012





A Tour Towards Knowledge Representation Techniques

Author(s): Tilotma Sharma, | Deepali Kelkar
Volume: 2
Issue: 2
Year: 2012





Web Based BPCS Steganography

Author(s): Sheetal Mehta | , Kaveri Dighe , Meera Jagtap, Anju Ekre
Volume: 2
Issue: 2
Year: 2012





Wireless Design for Power Theft Monitoring

Author(s): Parul Ranjan, | Namita Mehra, Prof. T.A. More, Shripad Bokand
Volume: 2
Issue: 2
Year: 2012





Node Distribution in Wireless Sensor Networks Using Component Based Localization Algorithm

Author(s): M.X.Aquien, | T. Sudarson Rama Perumal, G.Kharmega Sundararaj
Volume: 2
Issue: 2
Year: 2012





Analysis of Catalytic Converter by using CFD for Reducing Particulate Matter and Back Pressure

Author(s): Nilesh R Suryawanshi, | Prof N K Patil, Kedar Chimote, Ashtashil Bhambulkar
Volume: 2
Issue: 2
Year: 2012





Accidental Car Impact Analysis And CFD Analysis Of Automotive

Author(s): Mahesh Agnihotri | , Prof. Prashant Tulhe, Amruta Chopade, Ashtashil Bhambulkar
Volume: 2
Issue: 2
Year: 2012





Design and Implementation Of Centrifugal Casting Locking Plate

Author(s): Nagesh Jamulwar, | Kedar Chimote, Ashtashil Bhambulkar
Volume: 2
Issue: 2
Year: 2012





Image Segmentation and Region Growing Algorithm

Author(s): Shilpa Kamdi | , R.K.Krishna
Volume: 1
Issue: 2
Year: 2012





Collaborative Augmented Reality System Based On Real Time Hand Gesture Recognition System

Author(s): uthors: Akhil Khare, | Vinaya Kulkarni , Dr. Akhilesh Upadhayay
Volume: 1
Issue: 2
Year: 2011





A Single Stage Source Coupled VCO in 0.18µm CMOS Technologies with Low Power Consumption

Author(s): Harvinder Singh Saluja, | Abhishek Choubey; Abhishek Jain
Volume: 1
Issue: 2
Year: 2011





IT-BPO : An Emergning Trend

Author(s): Dharmendra Chourishi, | hanchal Kumar Buttan, Abhishek Chaurasia
Volume: 1
Issue: 2
Year: 2011





An Integrated Encryption Scheme Used in Bluetooth Communication Mechanism

Author(s): Bhoopendra Singh Rajput, | Prashanna Gupta, Shweta Yadav
Volume: 1
Issue: 2
Year: 2011





An Efficient Neural Network based Algorithm of Steganography for image

Author(s): Imran khan
Volume: 1
Issue: 2
Year: 2011





Implementation of Automotive Radar Based On Correlation Radar

Author(s): Shruti Bhargava, | Snehprabha Lad
Volume: 1
Issue: 2
Year: 2011





An Evaluation of Techniques for Adaptive Search Web Mining Framework

Author(s): H K Sawant, | Shah Ashwini V.
Volume: 1
Issue: 2
Year: 2011





Object-Oriented Metrics and Models in Software Quality Engineering

Author(s): Akhil Khare | Kendre Pallavi H
Volume: 1
Issue: 2
Year: 2011





A Comprehensive Review of Image Enhancement Techniques

Author(s): Sawant; | Mahentra Deore
Volume: 1
Issue: 2
Year: 2011





CFA (color filter array) based Motion Blur detection using lowest directional High-frequency energy

Author(s): Geetanjali Dave, Vibha Gupta
Volume: 1
Issue: 2
Year: 2011





The Role of Data Mining in Design and Implementation of Intrusion Detection Systems

Author(s): Shweta Modi, | Neha Sthapak
Volume: 1
Issue: 2
Year: 2011





Implementation of Intelligent Polling System Using GSM Mobile

Author(s): Monali R.Dave | , Jai Karan Singh , Mukesh Tiwari , Dr. Anubhuti Khare
Volume: 1
Issue: 2
Year: 2011





Effect of Guard Period Insertion in MIMO OFDM System

Author(s): Mitalee Agrawal, | Yudhishthir Raut
Volume: 1
Issue: 2
Year: 2011





An improved version of binomial heap to upgrade network optimization

Author(s): Anshul ChaturvediI, | Nidhi Mishra, Rajeev Kumar Singh
Volume: 1
Issue: 2
Year: 2011





An Approach to Enhance Web Service Resource Framework using the Improved PLWAP Algorithm for Large Scale Hybrid Data in Distributed Environment

Author(s): Authors | : Ashish Sharma, Niket Bhargava
Volume: 1
Issue: 2
Year: 2011





Design and Implementation of DPLL with Phase Frequency Detector Using 45nm CMOS Technology

Author(s): Delvadiya Harikrushna | Mukesh Tiwari, Jay Karan Singh, Anubhuti Khare
Volume: 1
Issue: 2
Year: 2011





Balance Key Algorithm for Uniform Coverage in Heterogeneous Wireless Sensor Network

Author(s): Harikesh Pandey | Shrikant lade, Vijay Bhandari
Volume: 1
Issue: 2
Year: 2011





Hyper Secure Cryptographic Algorithm to Improve Avalanche Effect for Data Security

Author(s): Parvez khan Pathan | , Basant Verma
Volume: 1
Issue: 2
Year: 2011





Secure Pervasive Computing Environment for Health Monitoring

Author(s): Shilpa Lakhina , | Zeenat Mahmood , Sarwesh Site
Volume: 1
Issue: 2
Year: 2011





Performance Optimization in Ad-hoc Networks

Author(s): Swati Jaiswal | , Satya Prakash, Neeraj Gupta, Devendra Rewadikar
Volume: 1
Issue: 2
Year: 2011





Dynamic memory scheduling using FPGA

Author(s): Anubhuti Khare | Manish Saxena, Shweta Tiwari
Volume: 1
Issue: 2
Year: 2011





Data Mining Algorithms for personalizing user’s profiles on Web

Author(s): Robin Singh Bhadoria, | Deepak Sain, Rahul Moriwal
Volume: 1
Issue: 2
Year: 2011





A Layered Approach for Intrusion Detection Using Meta-modeling with Classification Techniques

Author(s): Ankita Gaur, Vineet Richariya
Volume: 1
Issue: 2
Year: 2011





Analysis of Different Pseudo Noise Sequences

Author(s): Alka Sawlikar, | Manisha Sharma
Volume: 1
Issue: 2
Year: 2011





M-Commerce with Process of Knowledge Discovery

Author(s): Sanjivani Mahor, | Sourabh Jain
Volume: 1
Issue: 2
Year: 2011





Adaptive Optimised Approach for Image Denoising for SDR Implementation in Cognitive Radio

Author(s): Rajeshree Raut , | , Kishore D. Kulat, Vipul Lande
Volume: 1
Issue: 2
Year: 2011





Analysis of Contrast Enhancement Techniques For Underwater Image

Author(s): Balvant Singh , | Ravi Shankar Mishra , Puran Gour
Volume: 1
Issue: 2
Year: 2011





Video Water Marking Using Abrupt Scene Change Detection

Author(s): Kintu Patel, | Mukesh Tiwari, Jaikaran Singh
Volume: 1
Issue: 2
Year: 2011





VHDL Modeling of Wi-Fi MAC Layer for Receiver

Author(s): Vibhanshu Srivastava, | Sandeep Nimade
Volume: 1
Issue: 2
Year: 2011





An Effective Image-Text Association algorithm to retrieve data from Multimedia Web Documents

Author(s): H K Sawant | ,Dipali Kadam
Volume: 1
Issue: 2
Year: 2011





Low Area FSM based Programmable BIST

Author(s): Neha Namdev, | Rita Jain, Ashutosh kumar Singh
Volume: 1
Issue: 2
Year: 2011





Performance Analysis of Ad-Hoc Network under Node Failure

Author(s): Alankar Shastri, | Pallavi Khatri, Shilpi Jain
Volume: 1
Issue: 2
Year: 2011





CFA (color filter array) based Motion Blur detection using lowest directional High-frequency energy

Author(s): Geetanjali Dave | Vibha Gupta
Volume: 1
Issue: 2
Year: 2011





Effective Reducing Memory Latency Using Data Prefetch Mechanisms

Author(s): Akhil Khare | Ahmed khodair
Volume: 1
Issue: 2
Year: 2011





A Review and Comparative Study of Block based Symmetric Transformation Algorithm for Image Encryption

Author(s): Hiral Rathod | Mahendra Singh Sisodia, Sanjay Kumar Sharma
Volume: 1
Issue: 2
Year: 2011





Performance Issues of Various K-anonymity Strategies

Author(s): Nidhi Maheshwarkar | Kshitij Pathak, Vivekanand Chourey
Volume: 1
Issue: 2
Year: 2011





Performance Evaluation of the PHY & MAC for WLAN Systems and Efficiency Improvement by Application of Convolution Codes

Author(s): Sheetal N Patil | Gajendra Singh Chandel, Prashant G Patil
Volume: 1
Issue: 2
Year: 2011





Implementation of Image Denoising using Thresholding Techniques

Author(s): Rajesh Kumar rai | Trimbak R. Sontakke
Volume: 1
Issue: 2
Year: 2011





Digital Finite Impulse Response Filter based on Residue Number System

Author(s): Pallab Maji | Girija Sankar Rath
Volume: 1
Issue: 2
Year: 2011





Explore the Performance Of The ARM Processor Using Protocol Trainer

Author(s): Jadhav S.K., | Gaikwad A.B., Mukti Awad
Volume: 2
Issue: 1
Year: 2012





Effective Content Based Data Retrieval Algorithm for Data Mining

Author(s): Aws Saad Shawkat, | H K Sawant
Volume: 2
Issue: 1
Year: 2012





A New Congestion Control Algorithm for High Speed Networks

Author(s): Renu Dangi, | Neeraj Shukla
Volume: 2
Issue: 1
Year: 2012





Analysis of Query Dependent Summarization Using Clustering Techniques
Author(s): Deshmukh Yogesh Sureshrao, | Shirole Bajirao Subhash, Prof. Pankaj Dashore
Volume: 2
Issue: 1
Year: 2012




Multipoint Wireless Data Acquisition System for Smart Vehicle

Author(s): Vishal A. Aher, | Satish M. Turkane, Sandip STurakne; Rahul N; Kadu, Sachin S; Taware
Volume: 2
Issue: 1
Year: 2012





Application of fuzzy ID3 to forecast Seasonal Runoff

Author(s): Chandar Sahu | , Dr. B.S.Patel
Volume: 2
Issue: 1
Year: 2012





Optimization Of Energy For Industrial Heater Using PLC and SCADA

Author(s): Roshan Bhaiswar | ,Pravin Kshirasagar
Volume: 2
Issue: 1
Year: 2012





Efficient Prevention Algorithm in MANET

Author(s): Atul Kumar Agrawal | , Ravindra Gupta, Gajendra Singh
Volume: 2
Issue: 1
Year: 2012





Wind Energy Conversions Systems Performance Is Improved Using Integrated Matrix Converter Topology

Author(s): N.Prakash, | Dr.Ranithottungal, B.Vaikundaselvan,G.Jegan
Volume: 2
Issue: 1
Year: 2012





Performance Evaluation of Equalizers and Different Diversity Techniques using OFDM
Author(s): Satyendra Chadokar, | Pravin Barmashe
Volume: 2
Issue: 1
Year: 2012




Performance Evaluation of Equalizers and Different Diversity Techniques using OFDM

Author(s): Satyendra Chadokar, | Pravin Barmashe
Volume: 2
Issue: 1
Year: 2012





A Theoretical Survey for Edge Detection Techniques and Watershed Transformation

Author(s): Shameem Akhtar | ; Dr. D Rajayalakshmi; Dr. Syed Abdul Sattar
Volume: 2
Issue: 1
Year: 2012





New Framework for Web Access Prediction

Author(s): Sawan Bhawsar | , Kshitij Pathak, Vibhor Patidar
Volume: 2
Issue: 1
Year: 2012





Digital Image Watermarking Using DWT and SLR Technique Against Geometric Attack

Author(s): Sarvesh Kumar Yadav, | Shital Gupta, Vineet Richariya
Volume: 2
Issue: 1
Year: 2012





Design and Analysis of LINAC Control System in FPGA

Author(s): Sangita Shit, | Anil Kumar Sahu
Volume: 2
Issue: 1
Year: 2012





Wireless Control & Monitoring of Robotic Arm (SWORDS)

Author(s): R.A. Kadu, | V.A. More, P.P. Chitte, J.G. Rana, M.R. Bendre
Volume: 2
Issue: 1
Year: 2012





Intelligence of PLC for Energy Saving

Author(s): Prof. Aruna Tete, | Pravin Kshirasagar
Volume: 2
Issue: 1
Year: 2012





IRIS Recognition System Using ICA, PCA, Daugman’s Rubber Sheet Model Together

Author(s): Mr. P.P.Chitte | Prof. R.R.Bhambare, Prof. V.A.More, Mr. R.A.Kadu, M.R.Bendre,, Prof. J.G.Rana,
Volume: 2
Issue: 1
Year: 2012





Novel Probabilistic Approach for Detecting Attack on Routing Protocols in Wireless Sensor Network

Author(s): Ravindra Gupta, | Hema Dhadhal
Volume: 2
Issue: 1
Year: 2012





Fuzzy Decision Tree based Effective IMine Indexing
Author(s): Peer Fatima, | Parveen, Dr. Mohamed Sathik
Volume: 2
Issue: 1
Year: 2012




Efficient Remote Storage for Mobile Device

Author(s): R G Pawar, | H K Sawant
Volume: 2
Issue: 1
Year: 2012





Analysis of Pavement for National Highway-N.H.1

Author(s): Arvind Dewangan | , Dr.D.P. Gupta, Dr. R.K.Bakshi
Volume: 2
Issue: 1
Year: 2012





Dynamic Tag Positioning Using Cohesion Based Hierarchical Clustering

Author(s): Mahajan Bhushan Pandurang, Neeraj kumar P; Dwivedi; Yogesh Shreeram Chaudhari; Amit Kumar Mohod
Volume: 2
Issue: 1
Year: 2012





Performance Improvement of Wireless Mobile by DSR

Author(s): Mohit Singh Tomar, | Dr. Maneesh Shreevastava
Volume: 2
Issue: 1
Year: 2012





MEMS Cantilever Based Immunosensors for Biomolecular Recognition

Author(s): P.Sangeetha, | Dr. A.Vimala Juliet
Volume: 2
Issue: 1
Year: 2012





http://www.doaj.org/openurl?genre=journal&issn=22496343

Author(s): Dhiraj G. Agrawal | , Roma K. Paliwal, Priti Subramanium
Volume: 2
Issue: 1
Year: 2012





Implementation of Optimized DES Encryption Algorithm upto 4 Round on Spartan 3

Author(s): Nimmi Gupta
Volume: 2
Issue: 1
Year: 2012





Study of Different IRIS Recognition Methods

Author(s): Upasana Tiwari, | Deepali Kelkar, Abhishek Tiwari
Volume: 2
Issue: 1
Year: 2012





Mobile Agent for Distributed Intrusion detection System in Distributed System

Author(s): Suryawanshi G.R; S.D. Jondhale; Korde S. K.; Ghorpade P.P.; Bendre M.R.
Volume: 2
Issue: 1
Year: 2012





A Novel Information Security Scheme by Creptic Video Stegnography

Author(s): Siddharth Tiwari1, Prashant Kumar Koshta2
Volume: 2
Issue: 1
Year: 2012





Review Study of Routing Protocols and Versatile Challenges of MANET

Author(s): Nishant Chaurasia, | Sanjay Sharma, Dheresh Soni
Volume: 2
Issue: 1
Year: 2012





Performance Analysis of Cascaded Z-Source Multilevel Inverter using Third Harmonic Injection PWM

Author(s): Shanmuga priyaa | , Dr. R. Seyezhai, Dr. B. L. Mathur
Volume: 2
Issue: 1
Year: 2012





SNORT: An Open Source Network Security Tool for Intrusion Detection in Campus Network Environment

Author(s): Suman Rani, | Vikram Singh
Volume: 2
Issue: 1
Year: 2012





Embedded Security System using RFID & GSM

Author(s): Kulkarni Amruta M. | , Taware Sachin S.
Volume: 2
Issue: 1
Year: 2012





ARM9 Based Embedded E-Documentation

Author(s): Sachin S. | , Sachin D. Anap, Amruta M. Kulkarni, Mahesh D. Nirmal, T.A.More,Taware, Sanjay G. Galande
Volume: 2
Issue: 1
Year: 2012





Design and Implementation of Five level back to back Diode Clamped PWM Converter for AC Drives

Author(s): S. Ramarajan, | P. S. Anish, Y.Charanjeevi
Volume: 2
Issue: 1
Year: 2012





Design of Neural Network Controller for Automotive Application

Author(s): Ashish Wankhede | , K.K.Jajulwar, Dr. A.Y. Deshmukh
Volume: 2
Issue: 1
Year: 2012





Increase Bandwidth for Circular Microstrip Patch Antenna

Author(s): Sonali Jain, | Rajesh Nema
Volume: 2
Issue: 1
Year: 2012





Characteristics Study of Impedance Source Inverter for PMSG Based Variable-Speed Wind Energy Systems

Author(s): G.Gnanasammandam, | Dr.M.Sasikumar
Volume: 2
Issue: 1
Year: 2012





Vehicle number plate recognition using multiple layer back propagation neural networks

Author(s): tuti Asthana | Niresh Sharma, Rajdeep Singh
Volume: 1
Issue: 1
Year: 2011





Co-occurence of frequent itemsets in Association Rule Mining

Author(s): Shubha Chaturvedi | Asha Khatri | Swati Kabra
Volume: 1
Issue: 1
Year: 2011





Path Breaking Case Studies in E-commerce using Data Mining

Author(s): Rupesh Sanchati | P.C. Patidar, Gaurav Kulkarni
Volume: 1
Issue: 1
Year: 2011





Simulation of High Performance Pipelined ADC Based on Optical Component Using VHDL

Author(s): Kavita chourasia | Abhishek Choubey, Sudhir kumar
Volume: 1
Issue: 1
Year: 2011





Implementation of Hybrid Image Fusion Technique Using Wavelet Based Fusion Rules

Author(s): Paresh Rawat | Sapna Gangrade
Volume: 1
Issue: 1
Year: 2011




