Academic Journals Database
Disseminating quality controlled scientific knowledge

International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)

ISSN: 2278--1323
Publisher: Shri Pannalal Research Institute of Technolgy


ADD TO MY LIST
 
Implementing Software as a Service in Cloud using Android Applications PDF available

Author(s): S.Priyadarsini, N.Deepa, Himanshu Kumar
Volume: 1
Issue: 8
Year: 2012
A Study of Green ICT and Cloud Computing Implementation at Higher Technical Education Institution PDF available

Author(s): Kavita Suryawanshi , Sameer Narkehde
Volume: 1
Issue: 8
Year: 2012
A Proficient Apprehension-Based Mining Replica For Ornamental Text Clustering PDF available

Author(s): B. Pavan Kumar,J. Nagamuneiah
Volume: 1
Issue: 8
Year: 2012
Evaluating NIST Metric for English to Hindi Language Using ManTra Machine Translation Engine PDF available

Author(s): Neeraj Tomer , Deepa Sinha
Volume: 1
Issue: 8
Year: 2012
A Survey of Identification of Soybean Crop Diseases PDF available

Author(s): Pratibha Dongre, Mr. Toran Verma,
Volume: 1
Issue: 8
Year: 2012
A Survey on Scheduling of Parallel Programs in Heterogeneous System PDF available

Author(s): Manoj Kumar Singh, Rajesh Tiwari
Volume: 1
Issue: 8
Year: 2012
A Comprehensive Study of Major Techniques of Facial Expression Recognition PDF available

Author(s): Tanvi Sheikh, Shikha Agrawal
Volume: 1
Issue: 8
Year: 2012
A Survey on Security in Palmprint Recognition: A Biometric Trait PDF available

Author(s): Dhaneshwar Prasad Dewangan , Abhishek Pandey
Volume: 1
Issue: 8
Year: 2012
A Review Paper on Face Recognition Techniques PDF available

Author(s): Sujata G. Bhele , V. H. Mankar
Volume: 1
Issue: 8
Year: 2012
A Low-Quiescent Current Two- Input/Output Buffer with Class A-B Output Stage for LCD Driver PDF available

Author(s): Deepchand Jaiswal, Rita Jain, M. Zahid Alam
Volume: 1
Issue: 8
Year: 2012
Capacity Analysis of MIMO OFDM System using Water filling Algorithm PDF available

Author(s): Hemangi Deshmukh , Harsh Goud
Volume: 1
Issue: 8
Year: 2012
A Survey on Multi-Focus ImageFusion Methods PDF available

Author(s): A. Anish ,T. Jemima Jebaseeli
Volume: 1
Issue: 8
Year: 2012
DISTRIBUTED GENERATION- A NEW APPROACH PDF available

Author(s): Kamal Kant Sharma, Dr Balwinder Singh
Volume: 1
Issue: 8
Year: 2012
Data Hiding in Color Images Using Modified Quantization Table PDF available

Author(s): Neha Batra , Pooja Kaushik
Volume: 1
Issue: 8
Year: 2012
A SIP Based Authentication Scheme for RFID Systems PDF available

Author(s): Shruti S.Utpat , Parikshit N.Mahalle.
Volume: 1
Issue: 8
Year: 2012
Implementation of Enhanced CloSpan Algorithm for CP-Miner PDF available

Author(s): Amita Kiran. B , Soujanya.K.L.S, Raju. G
Volume: 1
Issue: 8
Year: 2012
Overview Of Video Condensation In Streaming Video PDF available

Author(s): S.charles Samuel raj, P. Suresh
Volume: 1
Issue: 8
Year: 2012
Study & Analysis of Web Content Mining Tools to Improve Techniques of Web Data Mining PDF available

Author(s): Arvind Kumar Sharma , P.C. Gupta
Volume: 1
Issue: 8
Year: 2012
RULE-BASE DATA MINING SYSTEMS FOR CUSTOMER QUERIES PDF available

Author(s): A.Kaleeswaran, V.Ramasamy
Volume: 1
Issue: 8
Year: 2012
Performance Analysis of Different Parallel CMOS Adders and Effect of Channel Width at 0.18um PDF available

Author(s): Akanksha Mandowara, Mukesh Maheshwari
Volume: 1
Issue: 8
Year: 2012
Comparative Study and Analysis of Soft Computing Techniques Implemented in Secure Data Transmission PDF available

Author(s): Hemant Kumar Garg, P.C.Gupta
Volume: 1
Issue: 8
Year: 2012
General Study on Moving Object Segmentation Methods for Video PDF available

Author(s): S.Arun Inigo, P.Suresh
Volume: 1
Issue: 8
Year: 2012
Healthcare monitoring system for web-enabled smart buildings PDF available

Author(s): Szalontai Levente
Volume: 1
Issue: 8
Year: 2012
MANET PROTOCOLS ANALYSIS WITH VARYING PAUSE TIME SIMULATION TIME AND SPEED PDF available

Author(s): Deepak Shrivastva, Saurabh Singh Rajput, Hemant Kumar
Volume: 1
Issue: 8
Year: 2012
A Novel Approach to Improve Avalanche Effect of AES Algorithm PDF available

Author(s): Chandra Prakash Dewangan,Shashikant Agrawal
Volume: 1
Issue: 8
Year: 2012
Systematic Survey on Object Tracking Methods in Video PDF available

Author(s): J.Joshan Athanesious , P.Suresh
Volume: 1
Issue: 8
Year: 2012
GRID ARCHITECTURES FOR e- LEARNING SYSTEM PDF available

Author(s): Sanjeev Narayan Bal
Volume: 1
Issue: 8
Year: 2012
Small Signal Stability Investigation of SMIB System Using Variable Structure Control PDF available

Author(s): Balwinder Singh, Rashmi Vikal, Ashish Dutta
Volume: 1
Issue: 8
Year: 2012
Smart Human Resource Information System PDF available

Author(s): S.B.Awati, C.S.Kale, J.S.Awati
Volume: 1
Issue: 8
Year: 2012
Integration between 3G Cellular and Wireless LAN Network PDF available

Author(s): SUTANU GHOSH
Volume: 1
Issue: 7
Year: 2012
A New Way to Implement Stegnography by Minimizing Distortion PDF available

Author(s): K.Kiran Kumar, Y.Prabhu Suresh Babu, A.Sudhir, P.Ravi Prakash
Volume: 1
Issue: 7
Year: 2012
Optimization of PID Controller for Quarter-Car Suspension System using Genetic Algorithm PDF available

Author(s): Nitish Katal, Sanjay Kr. Singh
Volume: 1
Issue: 7
Year: 2012
Comparison of Embedded System and FPGA Application for Universal Multi-Resource Bus PDF available

Author(s): Nitin Waghmare, Prof. T.B. Mohite-Patil
Volume: 1
Issue: 7
Year: 2012
Mining on Medicine Data PDF available

Author(s): MANOJEET ROY , AJAY KUSHWAHA
Volume: 1
Issue: 7
Year: 2012
A SECURED SEARCHING IN CLOUD DATA USING CRYPTOGRAPHIC TECHNIQUE PDF available

Author(s): C.BAGYALAKSHMI , DR.R.MANICKA CHEZIAN
Volume: 1
Issue: 7
Year: 2012
Study of ECG Signal Compression using modified discrete cosine and discrete wavelet transforms PDF available

Author(s): Nitin Waghmare, Prof. T.B. Mohite-Patil
Volume: 1
Issue: 7
Year: 2012
FPGA Implementation of an Advanced Traffic Light Controller using Verilog HDL PDF available

Author(s): B. Dilip, Y. Alekhya, P. Divya Bharathi
Volume: 1
Issue: 7
Year: 2012
Vulnerability Discovery with Attack Injection PDF available

Author(s): B.sandhya, S.Vasundra
Volume: 1
Issue: 7
Year: 2012
SECURE DATA DELIVERY USING GEOGRAPHIC MULTICAST ROUTING PDF available

Author(s): M.Shobana , R.Saranyadevi , Dr.S.Karthik
Volume: 1
Issue: 7
Year: 2012
Improving Memory Access time by Building an AMBA AHB compliant Memory Controller PDF available

Author(s): Arun G ,Vijaykumar T
Volume: 1
Issue: 7
Year: 2012
Design & implementation of FPGA based digital filters PDF available

Author(s): Ankit Jairath , Sunil Kumar Shah , Amit jain
Volume: 1
Issue: 7
Year: 2012
Extending the UML metamodel to grant prop up for crosscutting concerns PDF available

Author(s): Veluru Gowri
Volume: 1
Issue: 7
Year: 2012
GClustering Algorithm PDF available

Author(s): Mr. Promod Kumar Sahu , G.Ravi teja
Volume: 1
Issue: 7
Year: 2012
PERFORMANCE ANALYSIS OF BALANCED AND DISTANCE POWER ADAPTATION ALGORITHMS FOR WIRELESS IMAGE TRANSMISSION PDF available

Author(s): M. Padmaja, Dr. P. Satyanarayana, K. Prasuna, G.NaveenKumar
Volume: 1
Issue: 7
Year: 2012
EVALUATION OF GABOR FILTER PARAMETERS FOR IMAGE ENHANCEMENT AND SEGMENTATION PDF available

Author(s): D. K. SOMWANSHI , R . PANCHARIYA , ABHAY KRISHAN
Volume: 1
Issue: 7
Year: 2012
Assessing Quality of Software Service at Selection Time Using Evolutionary Algorithm PDF available

Author(s): T. MADHURI, R. RAJA SEKHAR
Volume: 1
Issue: 7
Year: 2012
Morphological Processor for Inflectional Case of Multipurpose Lexico-Conceptual Knowledge Resource PDF available

Author(s): Soe Lai Phyue, Aye Thida
Volume: 1
Issue: 7
Year: 2012
F-Measure Metric for English to Hindi Language Machine Translation PDF available

Author(s): Neeraj Tomer , Deepa Sinha , Piyush Kant Rai
Volume: 1
Issue: 7
Year: 2012
BDI Agents for Information Fusion in Wireless Sensor Networks PDF available

Author(s): Prashant Sangulagi, A. V. Sutagundar, S. S. Manvi, Vidya S Bennur
Volume: 1
Issue: 7
Year: 2012
Design and Implementation of Floating Point Multiplier for Better Timing Performance PDF available

Author(s): B.Sreenivasa Ganesh,J.E.N.Abhilash, G. Rajesh Kumar
Volume: 1
Issue: 7
Year: 2012
A new approach for 8 bit core processor & its IP design for small scale systems PDF available

Author(s): Pulkit Trivedi, Deepak Asati
Volume: 1
Issue: 7
Year: 2012
Data Stream Intrusion Alert Aggregation for Generative Data Stream Modelling PDF available

Author(s): A.Charan Kumar, A.Vivekanand, K.Kavitha, M.Gracevennice,T.Bharath Manohar
Volume: 1
Issue: 7
Year: 2012
Comparison between different Compression and Decompression Techniques on MRI Scan Images PDF available

Author(s): Prateek Verma, Praveen Verma, Amrita Sahu, Sonam Sahu, Neha Sahu
Volume: 1
Issue: 7
Year: 2012
Evaluating QOSMOS Using Markov Decision Process Model PDF available

Author(s): D. MEENAKSHI , R. RAJA SEKHAR
Volume: 1
Issue: 7
Year: 2012
Multistage Implementation of 64x Interpolator PDF available

Author(s): Rahul Sinha, Sonika Arora
Volume: 1
Issue: 7
Year: 2012
Design and Simulation of Throughput based QoS MANET Routing for K-color Multiple Packet Reception Devices PDF available

Author(s): Mrs. Prof. Rekha Patil , Mrs.Sharanamma M. Hugar
Volume: 1
Issue: 7
Year: 2012
Traffic Estimation in Mobile Ad Hoc Network Using Probe Packets PDF available

Author(s): Chetan Kumar Kalaskar,Sujatha P.Terdal
Volume: 1
Issue: 7
Year: 2012
End to End Delay Improvement Using Multipath Routing in MANET PDF available

Author(s): Santosh M.J , Sujatha P.Terdal
Volume: 1
Issue: 7
Year: 2012
Data Integrity and Security in Cloud PDF available

Author(s): Ku.Swati G. Anantwar, Prof. Karuna G. Bagde
Volume: 1
Issue: 7
Year: 2012
Enhancing Route Quality In MANET Using Linear Optimization PDF available

Author(s): Veeranna Gatate & Sujatha P.Terdal
Volume: 1
Issue: 7
Year: 2012
A Novel Watermarking Technique Based on Visual Cryptography PDF available

Author(s): A.Umaamaheshvari, K.Thanushkodi
Volume: 1
Issue: 7
Year: 2012
Increase Security of Images from Attacks Using Digital Watermarking With SVD Technique PDF available

Author(s): Ankita Durge,Alka Jaiswal
Volume: 1
Issue: 7
Year: 2012
A Modified Approach for Image Segmentation in Information Bottleneck Method PDF available

Author(s): S.Dhanalakshmi , Dr.T.Ravichandran
Volume: 1
Issue: 7
Year: 2012
Survey on Network Security, Threats & Firewalls PDF available

Author(s): Mr. Sachin Taluja1, Prof. Rajeshwar Lal Dua
Volume: 1
Issue: 7
Year: 2012
Design and analysis of 16-bit Full Adder using Spartan-3 FPGA PDF available

Author(s): Rongali Aneel Kumar, B.N. Srinivasa Rao, R. Prasad Rao
Volume: 1
Issue: 7
Year: 2012
A Survey on Enhanced Intrusion Detection System in Mobile Ad hoc Network PDF available

Author(s): Shankar Sharan Tripathi, Sonu Agrawal
Volume: 1
Issue: 7
Year: 2012
Comparative Study of Different Feature Selection Algorithm in Small dataset Among KNN, FUZZY & GENETIC Algorithm. PDF available

Author(s): Lal Bahadur pandey, Siddharth Choubey
Volume: 1
Issue: 7
Year: 2012
A Survey on Cyclostationary Feature Spectrum Sensing Technique PDF available

Author(s): Mr. Pradeep Kumar Verma , Prof. Rajeshwar Lal Dua
Volume: 1
Issue: 7
Year: 2012
Design and Implementation of Carry Tree Adders using Low Power FPGAs PDF available

Author(s): Sivannarayana G , Raveendra babu Maddasani , Padmasri Ch
Volume: 1
Issue: 7
Year: 2012
High Density Salt and Pepper Noise Removal in color and grayscale images Through Modified DBUTMF PDF available

Author(s): K.Prasad , B. Jayanth nadh , B.Hymavathi
Volume: 1
Issue: 7
Year: 2012
WEB PAGE CATEGORIZATION USING WEB MINING PDF available

Author(s): S.Gowri Shanthi , Dr. Antony Selvadoss Thanamani
Volume: 1
Issue: 7
Year: 2012
Enhanced Approach on Web Page Classification Using Machine Learning Technique PDF available

Author(s): S.Gowri Shanthi ,Dr. Antony Selvadoss Thanamani,
Volume: 1
Issue: 7
Year: 2012
Energy Aware Architecture Using Spectrum Sensing Technique in Cognitive Radio Network PDF available

Author(s): R Pavankumar, Prof. Santoshkumar Bandak
Volume: 1
Issue: 7
Year: 2012
AN OVERVIEW & ANALYSIS FOR COMPUTER SYSTEM’s REMOTE ANALYSIS (RACS) PDF available

Author(s): Nitin Tiwari ,Rajdeep Singh solanki, Gajaraj Singh pandya
Volume: 1
Issue: 7
Year: 2012
AN OVERVIEW & ANALYSIS COMPARISION OF INTERNET PROTOCAL TCPIP V/S OSI REFRENCE MODAL PDF available

Author(s): Nitin Tiwari ,Rajdeep Singh solanki, Gajaraj Singh pandya
Volume: 1
Issue: 7
Year: 2012
Secret Sharing Image Between End Users by using Cryptography Technique PDF available

Author(s): SRINIVASA RAJESH KUMAR D. , P.MARESWARAMMA
Volume: 1
Issue: 7
Year: 2012
Additional Band width Design with Adaptive Orthogonal Frequency Division multiplexing PDF available

Author(s): Prof Ch.Venkata Ratnam ,S. prabhu
Volume: 1
Issue: 7
Year: 2012
OPTIMAL LOCATION OF UPFC IN POWER SYSTEM USING SYSTEM LOSS SENSITIVITY INDEX PDF available

Author(s): Satakshi Singh
Volume: 1
Issue: 7
Year: 2012
Survey of Various Cost Estimation Techniques PDF available

Author(s): Ms. Shruti Jain
Volume: 1
Issue: 7
Year: 2012
The Weighted Average Method for Predicting the Performance of Systems PDF available

Author(s): P.Divya Jyothi, S.Vasundra
Volume: 1
Issue: 7
Year: 2012
Context Awareness for Effective Software Structure Quality PDF available

Author(s): B.RAGHAVENDRA, Mrs. S.VASUNDRA
Volume: 1
Issue: 7
Year: 2012
AN EXTENSIVE REVIEW OF CURRENT TRENDS IN STEGANALYSIS PDF available

Author(s): Pratap Chandra Mandal
Volume: 1
Issue: 7
Year: 2012
Automatic Assessment Generation Service PDF available

Author(s): Sahithi.P, Lakshmi Padmaja.D,Vishnu Murthy.G
Volume: 1
Issue: 6
Year: 2012
A Novel Protocol for Better Energy-Efficiency, Latency and Fault Tolerance in Wireless Sensor Network PDF available

Author(s): Er.Rakesh Kumar Gupta , Er. Vijay Dhir
Volume: 1
Issue: 6
Year: 2012
Zone based routing protocol in WSNs for varying zone size PDF available

Author(s): Poonam Rautela, Vinod Kumar Mishra, Pankaj kumar
Volume: 1
Issue: 6
Year: 2012
ADVANCED HARDWARE ARCHITECTUREFOR ADABOOSTBASEDREALTIMEOBJECT DETECTION PDF available

Author(s): Polani Devi Vara Prasad, Janakani Devi Vara Prasad, Malijeddi Murali
Volume: 1
Issue: 6
Year: 2012
Optimize Space Search Using FCC_STF Algorithm in Fuzzy Co-Clustering through Search Engine PDF available

Author(s): Monika Rani, Satendra Kumar, Vinod Kumar Yadav
Volume: 1
Issue: 6
Year: 2012
Fruits Sorting and Grading using Fuzzy Logic PDF available

Author(s): Harshavardhan G. Naganur, Sanjeev S. Sannakki, Vijay S Rajpurohit, Arunkumar R
Volume: 1
Issue: 6
Year: 2012
BER Performance of OFDM System over Nakagami-m Fading Channels with Different Modulation Schemes PDF available

Author(s): Gunjita Jain , Rupesh Dubey
Volume: 1
Issue: 6
Year: 2012
Review and Study of Different Methods for Author Identification PDF available

Author(s): Akhil Sanjeev Gokhale ,Rajendra Krishnat Dalbhanjan ,Dr.Rajesh.S.Prasad
Volume: 1
Issue: 6
Year: 2012
Memory Learning Framework for Retrieval of Neural Objects PDF available

Author(s): Sanjeev S. Sannakki , Sanjeev P. Kaulgud
Volume: 1
Issue: 6
Year: 2012
ROBUST AND FLEXIBLE IP ADDRESSING FOR MOBILE AD-HOC NETWORK PDF available

Author(s): Pankaj Kumar, Vinod Kumar Mishra, Poonam Rautela
Volume: 1
Issue: 6
Year: 2012
P300 based Brain Computer Interface for Disabled PDF available

Author(s): Rahul Chaudhari, Rakesh Deore, Bharti Gawali
Volume: 1
Issue: 6
Year: 2012
Agent in Ecommerce Application Based on Cloud Environment PDF available

Author(s): Ms. Divya Jyothi, Prof.D.R.Ingle
Volume: 1
Issue: 6
Year: 2012
Estimation of Solar Cell Model Parameter by Hybrid Genetic Algorithm Using MATLAB PDF available

Author(s): J K Maherchandani, Chitranjan Agarwal, Mukesh Sahi
Volume: 1
Issue: 6
Year: 2012
Role of Software Quality Assurance in Capability Maturity Model Integration PDF available

Author(s): Rekha Chouhan , Dr.Rajeev Mathur
Volume: 1
Issue: 6
Year: 2012
Study of Imaged Based Human Height Measurement & Application PDF available

Author(s): Atul Yadav, Prof. T. B. Mohite-Patil
Volume: 1
Issue: 6
Year: 2012
AN AGENT BASED APPROACH TOWARDS BUILDING A CO-OPERATIVE VEHICULAR NETWORK PDF available

Author(s): T.Karthikeyan , N.Sudha Bhuvaneswari
Volume: 1
Issue: 6
Year: 2012
Optimization of Traffic System using TCL Algorithm through FMSA and IMAC Agents PDF available

Author(s): T.Karthikeyan , S.Sujatha
Volume: 1
Issue: 6
Year: 2012
INTERLEAVED FORWARD ERROR CORRECTING (FEC) CODES BASED ON BINAR SHUFFLE ALGORITHM (B.S.A) PDF available

Author(s): Phani deep challa, P.Aaravind, Vemuri Seshagiri Rao
Volume: 1
Issue: 6
Year: 2012
Security Issues on Wimax Netwok PDF available

Author(s): S. S.Dwivedi ,S. Mishra ,V.K.Mishra
Volume: 1
Issue: 6
Year: 2012
Improving the Performance of a Single Model and Test Prioritization Strategy for Event Driven Software PDF available

Author(s): Polani Sri Gnana Kiran , M.R.Rajaramesh
Volume: 1
Issue: 6
Year: 2012
Experimental And Numerical Analysis Of Temperature Distribution In Submerged Arc Welding Process PDF available

Author(s): Ch.Indira Priyadarsini1, N.Chandra Sekhar2, Dr.N.V.Srinivasulu3
Volume: 1
Issue: 6
Year: 2012
Intuitionistic Fuzzy Rough Relation in Some Medical Applications PDF available

Author(s): Chhaya Gangwal, R.N.Bhaumik
Volume: 1
Issue: 6
Year: 2012
Normalization of Intuitionistic Fuzzy Rough Relational Databases PDF available

Author(s): Chhaya Gangwal, R.N.Bhaumik
Volume: 1
Issue: 6
Year: 2012
Proposed Protocol for Reliability and Security in Peer to Peer Networks PDF available

Author(s): Farzane kabudvand
Volume: 1
Issue: 6
Year: 2012
The Generation of Reusable and Secure E-learning Content PDF available

Author(s): Farzane kabudvand
Volume: 1
Issue: 6
Year: 2012
Improvement of the SARA strategies for MANET model PDF available

Author(s): M. HARATHI , R.RAJA SEKHAR
Volume: 1
Issue: 6
Year: 2012
UNIDIRECTIONAL SEEDED SINGLE CRYSTAL GROWTH FROM SOLUTION OF SULPHAMIC ACID AND ITS CHARACTERIZATION PDF available

Author(s): Dr. Rita A.Gharde , Divakar T. , Chunarkar
Volume: 1
Issue: 6
Year: 2012
STUDY OF NONLINEAR POLEMETRIC MIXTURE BY S.R. METHOD PDF available

Author(s): Divakar T. Chunarkar ,Rita A. Gharde
Volume: 1
Issue: 6
Year: 2012
Design of High Speed Binary to Gray Code Converter Using A Novel Two Transistor XOR Gate PDF available

Author(s): Pakkiraiah chakali ,T.Krishnamurthy , Adilakshmi Siliveru
Volume: 1
Issue: 6
Year: 2012
A Novel Low Power Gray To Binary Code Converter Using Gate Diffusion Input(GDI) PDF available

Author(s): Pakkiraiah chakali ,Adilakshmi Siliveru ,Jagadeesh Y
Volume: 1
Issue: 6
Year: 2012
THERMAL ANALYSIS OF PRINTED CIRCUIT BOARD (PCB) OF AVIONICS EQUIPMENT PDF available

Author(s): Dr.N.V.Srinivasulu
Volume: 1
Issue: 6
Year: 2012
Radial Basis Function Neural Networks (RBFNN) For Fire Image Segmentation PDF available

Author(s): Dr. V.Seenivasagam ,S.Arumugadevi
Volume: 1
Issue: 6
Year: 2012
Decisive Load-Acquainted Routing Strategy For Wireless Mesh Networks PDF available

Author(s): U. Uma, B. Purushotham,
Volume: 1
Issue: 6
Year: 2012
Improving the efficiency of Monitoring & detecting Intruders in MANET PDF available

Author(s): V. Pratima, J. Ravikumar,
Volume: 1
Issue: 6
Year: 2012
Egoistic superimpose Network Formation and Preservation PDF available

Author(s): D. J. Anusha, B.Purushotham, D.J.Prathyusha
Volume: 1
Issue: 6
Year: 2012
Charismatic of Malware diffusion in distributed peer-to-peer networks PDF available

Author(s): R. SaivenkataRamana, T. Kesava Rao, K. Manikyamma, P. Nirupama
Volume: 1
Issue: 6
Year: 2012
A Tailored Ontology Sculpt For Web Information Congregation PDF available

Author(s): P. Gopinath, A. Dhasaradhi, P. Nirupuma
Volume: 1
Issue: 6
Year: 2012
Clustering Among Multi-Posture Based Correspondence Compute PDF available

Author(s): M. SoumyaHarika, G. Prasadbabu, P. Nirupama
Volume: 1
Issue: 6
Year: 2012
Mining web Graphs for Endorsement PDF available

Author(s): P. Babitha, B. Raveendra Naick, P. Nirupuma
Volume: 1
Issue: 6
Year: 2012
Scalable Multicasting and Sustaining Proficient Over Mobile Ad Hoc Networks: MANET PDF available

Author(s): R. venkatesh, R. Hendra Kumar, P. Balaji, R.Swathi
Volume: 1
Issue: 6
Year: 2012
Cloud Computing Data Storage and Security Enhancement PDF available

Author(s): Rupali Sachin Vairagade, Nitin Ashokrao Vairagade
Volume: 1
Issue: 6
Year: 2012
Analysis of Data Grid in Grid Computing Based On Random Search Using Gridsim PDF available

Author(s): R.Saranya
Volume: 1
Issue: 6
Year: 2012
An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks PDF available

Author(s): A.Sandeep Kumar ,Second Author
Volume: 1
Issue: 6
Year: 2012
Analysis of Control of Inverted Pendulum using Adaptive Neuro Fuzzy system PDF available

Author(s): D. K. Somwanshi , Mohit Srivastava, R.Panchariya
Volume: 1
Issue: 6
Year: 2012
Interference Mitigation by CDMA RAKE Receiver With Walsh-Hadamard Sequence PDF available

Author(s): Braj Bhooshan Pandey , Prof. Abhishek Choubey
Volume: 1
Issue: 5
Year: 2012
ONLINE BUSINESS MANAGEMENT USING HYBRID CLOUD PDF available

Author(s): Vanaja Gokul, Venkatesh.G, Vignesh.B and GowriShankar.M
Volume: 1
Issue: 5
Year: 2012
Selective on-demand protocol for finding reliable nodes to form stable paths in ADHOC networks PDF available

Author(s): T. Rajamohan Reddy, N. Sobharani
Volume: 1
Issue: 5
Year: 2012
Design and Verification Eight Port Router for Network on Chip PDF available

Author(s): Sana.Ranjitha ,B.Vijay Bhaskar,R.SuryaPrakash
Volume: 1
Issue: 5
Year: 2012
OFDM: BER performance by Cyclic Prefix Length PDF available

Author(s): Inderjeet Kaur , Dr.Y.K.Mathur
Volume: 1
Issue: 5
Year: 2012
Heterogeneous Interface Mobile Node in NS2 PDF available

Author(s): Sachin Dattatraya Patil, Varshapriya Jyotinagar
Volume: 1
Issue: 5
Year: 2012
SALT & PEPPER NOISE REMOVAL USING FUZZY BASED ADAPTIVE FILTER PDF available

Author(s): Jaspreet Kaur
Volume: 1
Issue: 5
Year: 2012
Design and Implementation of Optimal Pulse Shaping Filters for Digital Radio Systems PDF available

Author(s): V.SRIDHAR , T.NAGALAXMI , M.V BRAMHANANDA REDDY , M.SUNITHA RANI
Volume: 1
Issue: 5
Year: 2012
Implementation of Matched Filter Based DSSS Digital GPS Receiver PDF available

Author(s): V.SRIDHAR , T.NAGALAXMI , M.V BRAMHANANDA REDDY , M.SUNITHA RANI, M.RENUKA
Volume: 1
Issue: 5
Year: 2012
2ACK-Scheme: Routing Misbehavior Detection in MANETs Using OLSR PDF available

Author(s): Prof. Shalini V. Wankhade
Volume: 1
Issue: 5
Year: 2012
Study of Maximum Power Point Tracking Using Perturb and Observe Method PDF available

Author(s): Sonali Surawdhaniwar , Mr. Ritesh Diwan
Volume: 1
Issue: 5
Year: 2012
“Cloud Service Utilization” Journey to cloud... PDF available

Author(s): Pranay Chauhan
Volume: 1
Issue: 5
Year: 2012
Dynamically Adjusting Network Topology for MANETS By using DBET PDF available

Author(s): T.Damodar Yadav , K.M.Hemambaran
Volume: 1
Issue: 5
Year: 2012
New techniques to enhance FPGA based system security PDF available

Author(s): Mr. Binu K Mathew, Dr. K.P Zachariah
Volume: 1
Issue: 5
Year: 2012
Rapid Disclosure of Client’s Spot With the help of Location Based Services PDF available

Author(s): Mr. Shaik Masood Ahemad M.Tech, K.V.Nagendra, Asst Prof, CSE
Volume: 1
Issue: 5
Year: 2012
STUDY AND PERFORMANCE ANALYSIS OF CRYPTOGRAPHY ALGORITHMS PDF available

Author(s): S. Pavithra ,Mrs. E. Ramadevi
Volume: 1
Issue: 5
Year: 2012
PIC CONTROLLER BASED PROCESS CONTROL SYSTEM USING GSM PDF available

Author(s): Ritesh Gupta , Mukti Awad
Volume: 1
Issue: 5
Year: 2012
Determination of Noise Levels in Using AMS Features of Noisy Speech Signal and Their Comparison PDF available

Author(s): Mrs. Anusha Krishna Prakash
Volume: 1
Issue: 5
Year: 2012
An Initial Approach to Provide Security in Cloud Network PDF available

Author(s): Dr. S. Srinivasu, K.P.R KrishnaChaitanya, K.Naresh Kumar
Volume: 1
Issue: 5
Year: 2012
Speech based Emotion Recognition with Gaussian Mixture Model PDF available

Author(s): Nitin Thapliyal , Gargi Amoli
Volume: 1
Issue: 5
Year: 2012
TO IMPROVE BIT ERROR RATE OF OFDM TRANSMISSION USING TURBO CODES PDF available

Author(s): Ms Neetu Sharma , Prof. Rajeshwar Lal Dua
Volume: 1
Issue: 4
Year: 2012
Text Extraction From Images PDF available

Author(s): Satish Kumar , Sunil Kumar , Dr. S. Gopinath
Volume: 1
Issue: 4
Year: 2012
Calculation of Transients at Different Distances in a Single Phase 220KV Gas insulated Substation PDF available

Author(s): M. Kondalu , Dr. P.S. Subramanyam
Volume: 1
Issue: 4
Year: 2012
Estimation of Re-striking Transient Overvoltages in a 3-Phase 132KV Gas insulated Substation PDF available

Author(s): M. Kondalu , Dr. P.S. Subramanyam
Volume: 1
Issue: 4
Year: 2012
A STUDY ON OVERVIEW OF STEGANOGRAPHY WITH SPECIFIC TOOLS PDF available

Author(s): A.Sankara Narayanan
Volume: 1
Issue: 4
Year: 2012
Modular Design of Adders with Domino Logic 1 PDF available

Author(s): M.B.DAMLE , DR S.S.LIMAYE
Volume: 1
Issue: 4
Year: 2012
Low-power Full Adder array-based Multiplier with Domino Logic PDF available

Author(s): M.B. Damle , Dr. S. S. Limaye
Volume: 1
Issue: 4
Year: 2012
64 Bit Domino Logic Adder with 180nm CMOS Technology PDF available

Author(s): M.B. Damle , Dr. S. S. Limaye
Volume: 1
Issue: 4
Year: 2012
Caching and SOAP compression techniques in Service Oriented Architecture PDF available

Author(s): B. Chandra Mouli, Prof. C. Rajendra
Volume: 1
Issue: 3
Year: 2012
Cubic Approach to Mobile Cloud Computing PDF available

Author(s): Ms. Rinku Rajankar, Prof R. W. Jasutkar
Volume: 1
Issue: 3
Year: 2012
A Trade Model for Cloud Computing Based on Isolating Cipher text and Decoding Services and Storage PDF available

Author(s): P. Murali Krishna, Prof C.Rajendra
Volume: 1
Issue: 3
Year: 2012
Association Rule Mining by Block Scattered Transposition PDF available

Author(s): Gurudatta Verma,Vinti Nanda
Volume: 1
Issue: 3
Year: 2012
EFFICIENT KEYWORD SEARCH IN RELATIONAL DATABASES PDF available

Author(s): Navneet Kaur, Rajdeep Kaur , Navjot kaur
Volume: 1
Issue: 3
Year: 2012
EFFICIENT K-MEANS CLUSTERING ALGORITHM USING RANKING METHOD IN DATA MINING PDF available

Author(s): Navjot Kaur, Jaspreet Kaur Sahiwal, Navneet Kaur
Volume: 1
Issue: 3
Year: 2012
A QoS-based Measurement of DSR and TORA Reactive Routing Protocols in MANET PDF available

Author(s): Rajesh Kumar Chakrawarti, Madhulika
Volume: 1
Issue: 3
Year: 2012
Developing an approach for hyperlink analysis with noise reduction using Web Structure Mining PDF available

Author(s): Mamta M. Hegde, Prof. M.V. Phatak
Volume: 1
Issue: 3
Year: 2012
Statistical Inference and α-Stable Modeling for Anomaly Detection in Network Traffic PDF available

Author(s): Ravindra Kumar ,Gupta Gajendra Singh Chandel, Vijay D. Rughwani
Volume: 1
Issue: 3
Year: 2012
An Overview of Software Risk Management Principles PDF available

Author(s): Vasundhara Rathod, Monali Chim, Pramila Chawan
Volume: 1
Issue: 3
Year: 2012
Review of CBVIR in WWW PDF available

Author(s): Amit Pawar
Volume: 1
Issue: 3
Year: 2012
AN EFFICIENT SECURE ID-BASED FOR SECURING MULTIPLE PATIENTS‟ USING ECIES PRIVACY IN WIRELESS BODY SENSOR NETWORK PDF available

Author(s): Bhagirath bhalawi, Ramratan Ahirwal , Yogendra Kumar Jain
Volume: 1
Issue: 3
Year: 2012
User Search Personalization in Semantic Web Mining PDF available

Author(s): T.Venkata Ramana , Dr.K.Venugopala Rao
Volume: 1
Issue: 3
Year: 2012
CELLULAR NETWORK OPTIMIZATION USING MULTI HOP DYNAMIC CHANNEL ASSIGNMENT WITH DYNAMIC CHANNEL ASSIGNMENT SCHEME PDF available

Author(s): Arasada Jagadeesh ,D. Ajay kumar
Volume: 1
Issue: 3
Year: 2012
WIRELESS CAN BUS FOR INDUSTRIAL APPLICATION PDF available

Author(s): N.Prakash , N.Magadevi
Volume: 1
Issue: 3
Year: 2012
WEB SERVICES FOR MOBILE COMPUTING PDF available

Author(s): Piyush M.Patil , Kushal Gohil, Rohit Madhavi
Volume: 1
Issue: 3
Year: 2012
Parametric Optimization of Wire Electrical Discharge Machining of Composite Material PDF available

Author(s): Sateesh Kumar Reddy K
Volume: 1
Issue: 3
Year: 2012
Standardized Parameterization of Intrusion Detection Systems PDF available

Author(s): Björn-C. Bösch
Volume: 1
Issue: 3
Year: 2012
E-Governance - A challenge for India PDF available

Author(s): Dr. Pardeep Mittal, Amandeep Kaur
Volume: 2
Issue: 3
Year: 2013
Radix-4 Encoder & PPG Block for Multiplier Architecture using GDI Technique PDF available

Author(s): Ankita Dhankar, Satyajit Anand
Volume: 2
Issue: 3
Year: 2013
ADAPTIVE SHARING METHOD FOR MULTIPLE CONTINUOUS QUERY PDF available

Author(s): Mariat Thomas,Mr. G. Naveen Sundar
Volume: 2
Issue: 3
Year: 2013
Efficient Road Traffic Policing With Coordinators and Routers Using Radio Frequency PDF available

Author(s): Sathish Nagarajan, P Kavitha
Volume: 2
Issue: 3
Year: 2013
An Efficient Authentication and Access Control Scheme to Protect Integrity of Anonymous Networks PDF available

Author(s): Santhosh S, Asst. Prof. Alok Ranjan
Volume: 2
Issue: 3
Year: 2013
Investigation of SAR inside Different Enclosures and Reduction Techniques PDF available

Author(s): J.JANISH BLESSY, T.ANITA JONES MARY, Dr.C.S.RAVICHANDRAN
Volume: 2
Issue: 3
Year: 2013
Price Adjustment for Double Auction Based Scheduling in Grid Environment PDF available

Author(s): Santhiya H, Karthikeyan P
Volume: 2
Issue: 3
Year: 2013
ARCHITECTURE OF 4-BIT PIPELINE ADC IN CMOS TECHNOLOGY PDF available

Author(s): Ms. R. M. Shende ,Prof. P. R. Gumble
Volume: 2
Issue: 3
Year: 2013
Efficient Timeslot Assignment and Route Discovery Mechanism for Mobile Clients PDF available

Author(s): Gayathri. R , T. Prabakaran
Volume: 2
Issue: 3
Year: 2013
A modified Clustering algorithm based on Optimization method. PDF available

Author(s): J.Mercy Geraldine, P.Kiruthiga
Volume: 2
Issue: 3
Year: 2013
Technologies of Cloud Computing - Architecture Concepts based on Security and its Challenges PDF available

Author(s): Nandini Mishra,Kanchan khushwha,Ritu chasta
Volume: 2
Issue: 3
Year: 2013
A Framework renders Data integrity issue and Bandwidth allocation over in Cloud PDF available

Author(s): Mrs. V. Kavitha Chandrakanth, Mrs. P. Jamuna
Volume: 2
Issue: 3
Year: 2013
An Unobservable Secure Routing Protocol against Wormhole and Black hole Attacks in MANET. PDF available

Author(s): Annie Jesus Suganthi Rani.A and R.Mathan
Volume: 2
Issue: 3
Year: 2013
Cloud Computing: Migration from Traditional Systems to the Cloud PDF available

Author(s): Ganesh Olekar,Vikram Sreekumar
Volume: 2
Issue: 3
Year: 2013
PERFORMANCE ANALYSIS OF MULTICAST ROUTING PROTOCOLS IMAODV, MAODV, ODMRP AND ADMR FOR MANET PDF available

Author(s): J.Gold Beulah Patturose, P.Immanuel Vinoth
Volume: 2
Issue: 3
Year: 2013
Improved Performance of Multiuser System Using Combined Diversity with Nagakami Fading Channel PDF available

Author(s): Gowthami.S, Jayanthi.K , Dr.V.P.Arunachalam
Volume: 2
Issue: 3
Year: 2013
Use of Open Source Software in Engineering PDF available

Author(s): Dr. Pardeep Mittal, Jatinderpal Singh
Volume: 2
Issue: 3
Year: 2013
AUTOMATED AUDITING AND LOGGING MECHANISM FOR SECURE DATA STORAGE IN CLOUD USING PROXY RE-ENCRYPTION PDF available

Author(s): J.Shyamala, D.Femila, B.Vinisha Cathrine Antonus
Volume: 2
Issue: 3
Year: 2013
Hippocratic Database- Persisting privacy in e- banking PDF available

Author(s): Minakshi Memoria, Neha Malik
Volume: 2
Issue: 3
Year: 2013
A Secured Data Transmission using Genetic based Encryption Techniques over Wireless Networks PDF available

Author(s): Mrs. K. Rajasri, S. Sathiyadevi, Mrs. S. Tamilarasi
Volume: 2
Issue: 3
Year: 2013
Hybrid Movement Control Algorithm For Restoring Connectivity In WSAN PDF available

Author(s): Tesmy George,Priyadharshini.C
Volume: 2
Issue: 3
Year: 2013
Segmentation of Handwritten Text Document- A Review PDF available

Author(s): Er.Naunita
Volume: 2
Issue: 3
Year: 2013
Real Time Static Hand Gesture Recognition System in Complex Background that uses Number system of Indian Sign Language PDF available

Author(s): Jayshree R.Pansare, Hrushikesh Dhumal, Sanket Babar,Kiran Sonawale, Ajit Sarode
Volume: 2
Issue: 3
Year: 2013
Position based Routing Protocols for Wireless Ad hoc Networks: A Critical Survey PDF available

Author(s): Saba Khalid,Shish Ahmad,Prof. Dr. Mohd Rizwan Beg
Volume: 2
Issue: 3
Year: 2013
CONTENT BASED IMAGE RETRIVAL USING FRACTAL SIGNATURE ANALYSIS PDF available

Author(s): K.KArunRaja, T.Sabhanayagam
Volume: 2
Issue: 3
Year: 2013
Multiple Event-Driven Node Localization in Wireless Sensor Networks PDF available

Author(s): Martin Victor K, Mrs. K. Ramalakshmi
Volume: 2
Issue: 3
Year: 2013
Biometrics using Electronic Voting System with Embedded Security PDF available

Author(s): Alaguvel.R , Gnanavel.G ,Jagadhambal.K
Volume: 2
Issue: 3
Year: 2013
Security and QOS centric protocols for P2P networks: current state of the art PDF available

Author(s): B.LALITHA
Volume: 2
Issue: 3
Year: 2013
A Review of Web Page Ranking Algorithm PDF available

Author(s): Parveen Rani
Volume: 2
Issue: 3
Year: 2013
OVERVIEW OF NIGHTTIME SOLAR CELL PDF available

Author(s): H.N.Kamalaskar , Prof.P.H.Zope , Prof.S.R.Suralkar
Volume: 2
Issue: 3
Year: 2013
Chunk Scheduling Strategies In Peer to Peer System-A Review PDF available

Author(s): Sanu C , Deepa S S
Volume: 2
Issue: 3
Year: 2013
A New Multiplier - Accumulator Architecture based on High Accuracy Modified Booth Algorithm PDF available

Author(s): J. Y. Yaswanth babu, P. Dinesh Kumar
Volume: 2
Issue: 3
Year: 2013
Respiratory Cancerous Cells Detection Using TRISS Model and Association Rule Mining PDF available

Author(s): Ayyadurai.P1, Kiruthiga.P, Valarmathi.S, Amritha.S
Volume: 2
Issue: 3
Year: 2013
Problems of character segmentation in Handwritten Text Documents written in Devnagari Script PDF available

Author(s): Vneeta Rani, Pankaj Kumar
Volume: 2
Issue: 3
Year: 2013
Optimization of Throughput Using Multicast Routing in Wireless Mesh Networks PDF available

Author(s): Akuluri Rakesh, S.R.Jino Ramson, John Major.J
Volume: 2
Issue: 3
Year: 2013
CAN BASED REAL TIME IMPLEMENTATION IN AUTOMOBILE USING ARM. PDF available

Author(s): Mr. VIJAY BHAMARE , Mr. CHIRINJEEVI.
Volume: 2
Issue: 3
Year: 2013
Secured Cost Effective Group Handover Authentication Scheme For WiMAX Networks PDF available

Author(s): Mohanaprasanth.P, B.Sridevi, Dr.S.Rajaram
Volume: 2
Issue: 3
Year: 2013
Fuzzy Inference System for Image Processing PDF available

Author(s): Abhradita Deepak Borkar, Mithilesh Atulkar
Volume: 2
Issue: 3
Year: 2013
Performance Analysis on Learning Algorithms with various Facial Expressions in Spiking Neural Networks PDF available

Author(s): J.Lincy Kiruba , A.Diana Andrushia
Volume: 2
Issue: 3
Year: 2013
Review of authentication and digital signature methods in Mobile ad hoc network PDF available

Author(s): Amol Bhosle, Yogadhar Pandey
Volume: 2
Issue: 3
Year: 2013
Review of authentication and digital signature methods in Mobile ad hoc network PDF available

Author(s): Amol Bhosle, Yogadhar Pandey
Volume: 2
Issue: 3
Year: 2103
Study of User Experience (UX) and UX Evaluation methods. PDF available

Author(s): Vignesh Balasubramoniam, Niranjan Tungatkar
Volume: 2
Issue: 3
Year: 2013
THROUGHPUT OPTIMIZATION IN MOBILE NETWORKS USING MILP ON EB BILLING APPLICATIONS PDF available

Author(s): D.KOWSALYA DEVI, G.PRABU , P.TAMILSELVAM
Volume: 2
Issue: 3
Year: 2013
A Novel BIST based Diagnosis Technique to Detect Faults in FPGA PDF available

Author(s): Ms.N.Ramya, Ms. N. Kirthika
Volume: 2
Issue: 3
Year: 2013
Green Computing – Need and Implementation PDF available

Author(s): Dr. Pardeep Mittal, Navdeep Kaur
Volume: 2
Issue: 3
Year: 2013
PSO optimized reduced order PID Controller design PDF available

Author(s): Yogendra Kumar Soni | Rajesh Bhatt
Volume: 2
Issue: 3
Year: 2013
A Framework for Building Applications Based on Hidden Topics with Short and Sparse Web Documents PDF available

Author(s): Kanimozhiveena E | D. Ramya Dorai
Volume: 2
Issue: 3
Year: 2013
Real Time Data Acquisition and Home Parameters Monitoring using LabVIEW PDF available

Author(s): Mr.Rajesh R. Karhe | Mr.C.S. Patil | Mr. Mahesh S. Patil
Volume: 2
Issue: 3
Year: 2013
TOSCA ENABLING CLOUD PORTABILITY PDF available

Author(s): Sahithi Tummalapalli | RaviKanth. P | Yuvaraj. K | Sreenivas Velagapudi
Volume: 2
Issue: 3
Year: 2013
A Countermeasure for Black Hole Attack in Mobile WiMAX Networks PDF available

Author(s): M. Deva Priya | Dr. M.L. Valarmathi | S. Aishwarya | K. Jaya Bharathi
Volume: 2
Issue: 3
Year: 2013
Enhancing Data Storage Integrity in Cloud Environment by mitigating Repudiation using CS-MPNR PDF available

Author(s): Meena S | Esther Daniel | Dr. N.A. Vasanthi
Volume: 2
Issue: 3
Year: 2013
A Scalable Privacy-Preserving Verification Correctness Protocol to Identify Corrupted Data in Cloud Storage PDF available

Author(s): Neethu Mariam Joseph | Esther Daniel | Vasanthi N A
Volume: 2
Issue: 3
Year: 2013
FGEST: FINGER TRACKING AND GESTURE RECOGNITION IN SMARTPHONES PDF available

Author(s): Pratham Parikh | Shubham Gupta | Swatil Patel | Varun Nimbalkar
Volume: 2
Issue: 3
Year: 2013
A Novel Role Based Cross Domain Access Control Scheme for Cloud Storage PDF available

Author(s): Punithasurya K | Esther Daniel | Dr. N.A. Vasanthi
Volume: 2
Issue: 3
Year: 2013
Real Time Static Hand Gesture Recognition System in Simple Background for Devanagari Number System PDF available

Author(s): Jayshree R. Pansare | Sandip Kadam | Onkar Dhawade | Pradeep Chauhan
Volume: 2
Issue: 3
Year: 2013
A survey on AODV routing protocol for AD-HOC Network PDF available

Author(s): Praveen Kumar | Jatin Sharma | Kriti saini
Volume: 2
Issue: 3
Year: 2013
An Efficient Sharing of Personal Health Records Using DABE in Secure Cloud Environment PDF available

Author(s): T . Parameswaran | S. Vanitha | K.S. Arvind
Volume: 2
Issue: 3
Year: 2013
An Efficient Iris Feature Encoding and Pattern Matching for Personal Identification PDF available

Author(s): T. Karthikeyan | B. Sabarigiri
Volume: 2
Issue: 3
Year: 2013
Prediction Based Data Collection in Wireless Sensor Network PDF available

Author(s): V. Mathibala | Mrs. Seiya Susan Thomas
Volume: 2
Issue: 3
Year: 2013
A Novel Approach to Scheduling in Grid Environment: Enhanced Ant Colony Optimizer PDF available

Author(s): D. Maruthanayagam | Dr.R. Uma Rani
Volume: 2
Issue: 3
Year: 2013
A Survey on Data Aggregation Techniques for Wireless Sensor Networks PDF available

Author(s): Kriti Saini | Parveen Kumar | Jatin Sharma
Volume: 2
Issue: 3
Year: 2013
Preamplification of Signal between Satellites PDF available

Author(s): Babisha.S. Sumi | K. Shanthalakshmi
Volume: 2
Issue: 3
Year: 2013
Design and VLSI Implementation of DIP Based Rod Quality Inspection PDF available

Author(s): G. Rajakumar | Dr.D. Manimegalai
Volume: 2
Issue: 3
Year: 2013
Cloud Computing: An Architecture, its Security Issues & Attacks PDF available

Author(s): Kalpana N. Meher | Prof. P. S. Lokhande
Volume: 2
Issue: 3
Year: 2013
Improving the Efficiency of Ranked keyword Search over Cloud Data PDF available

Author(s): Kiruthigapriya Sengoden | Swaraj Paul
Volume: 2
Issue: 3
Year: 2013
Investigation on Performance of Trust Based Model and Trust Evaluation of Reactive Routing Protocols in MANET PDF available

Author(s): Dharam Vir | Dr. S.K. Agarwal | Dr.S.A. Imam
Volume: 2
Issue: 3
Year: 2013
E- Commerce impact on Indian Markt: a Survey on social impact PDF available

Author(s): Tryambak Hiwarkar
Volume: 2
Issue: 3
Year: 2013
Network security protocol with cryptography and RFID system PDF available

Author(s): P. SWETHA | R. SUKANYA
Volume: 2
Issue: 3
Year: 2013
Attacks & Preventions of Cognitive Radio Network-A Survey PDF available

Author(s): Dr. Anubhuti Khare | Manish Saxena | Roshan Singh Thakur | Khyati Chourasia
Volume: 2
Issue: 3
Year: 2013
An Effective S-Box Comparison by Parity Based Fault Detection Scheme Using Composite Fields PDF available

Author(s): M. Hemalatha | S. Sridevi Sathya Priya | P. Karthigaikumar
Volume: 2
Issue: 3
Year: 2013
HIGH SPEED ROUTERS RELY ON WELL DESIGNED PACKET BUFFERS PDF available

Author(s): A. RAJYALAKSHMI | P. SRINIVASULU | G. PRAVALIKA | M. RAJYALAKSHMI
Volume: 2
Issue: 3
Year: 2013
GENETIC OPERATORS IN SOLVING TRAVELLING SALESMAN PROBLM PDF available

Author(s): Nisha Ahuja , Manisha Dawra
Volume: 1
Issue: 2
Year: 2012
A WIDE-DYNAMIC-RANGE CMOS SENSOR WITH GATING FOR MULTIPLE APPLICATIONS PDF available

Author(s): G. Benedict Maxwell , M.Ramya
Volume: 1
Issue: 2
Year: 2012
Vulnerabilities of Wireless Security protocols (WEP and WPA2) PDF available

Author(s): Vishal Kumkar, Akhil Tiwari, Pawan Tiwari, Ashish Gupta, Seema Shrawne
Volume: 1
Issue: 2
Year: 2012
SOFTWARE USABILITY EVALUATION METHOD PDF available

Author(s): Piyush Jain , Sanjay Kumar Dubey , Prof.(Dr.)Ajay Rana
Volume: 1
Issue: 2
Year: 2012
Evaluating the Capability of Biometric Technology PDF available

Author(s): Sanjay Tiwari, Guangmei Zhai , Sue A. Carter, Shikha Tiwari
Volume: 1
Issue: 2
Year: 2012
The dynamics of disease transmission in a Prey Predator System with harvesting of prey PDF available

Author(s): Kul Bhushan Agnihotri ,Sunita Gakkhar
Volume: 1
Issue: 2
Year: 2012
AUTOMATIC IMAGE ANNOTATION USING WEAKLY SUPERVISED GRAPH PROPAGATION PDF available

Author(s): 1Kalaivani.R, Thamaraiselvi.K
Volume: 2
Issue: 2
Year: 2013
TaaS: An Evolution of Testing Services using Cloud Computing PDF available

Author(s): Abhinava Kumar Srivastava (Student) , Divya Kant Yadav , Sandeep Kumar Pandey
Volume: 1
Issue: 10
Year: 2012
EFFORT ESTIMATION OF SOFTWARE PROJECT PDF available

Author(s): R Raja Ramesh Merugu, and Venkat Ravi Kumar Dammu
Volume: 1
Issue: 10
Year: 2012
Authentication for Online Voting Using Steganography and Biometrics PDF available

Author(s): Linu Paul, Anilkumar M.N.
Volume: 1
Issue: 10
Year: 2012
Simulation Of Echo Cancellation Of Speech Signal In Noisy Environment PDF available

Author(s): R.Jegan , R.Manikandan , W.S.Nimi , W.S Kiran
Volume: 1
Issue: 10
Year: 2012
IDENTIFICATION OF HUMAN THROUGH PALMPRINT: A REVIEW PDF available

Author(s): Shalini Agarwal , Dr. P.C Gupta
Volume: 1
Issue: 10
Year: 2012
Bio-Medical Image Retrieval Using SVM PDF available

Author(s): S.Nithya, G.ShineLet
Volume: 1
Issue: 10
Year: 2012
An efficient unobservable routing scheme resistant against DoS attacks PDF available

Author(s): Chithra K,Dr.S.Karthik
Volume: 1
Issue: 10
Year: 2012
A Survey on Coverage Problems in Wireless Sensor Networks PDF available

Author(s): SANGEETHA S ,RAMA LAKSHMI K
Volume: 1
Issue: 10
Year: 2012
A cryptosystem based on Vigenère cipher with varying key PDF available

Author(s): Quist-Aphetsi Kester
Volume: 1
Issue: 10
Year: 2012
Enhanced Approach of Making Mobile Base Station in LEACH PDF available

Author(s): Gunjan Jain, S.R Biradar
Volume: 1
Issue: 10
Year: 2012
FUNDAMENTAL ISSUES FOR DEVELOPING INFORMATION SECURITY POLICIES PDF available

Author(s): Mr. Hardeep Singh Sidhu
Volume: 1
Issue: 10
Year: 2012
Survey on Kannada Digits Recognition Using OCR Technique PDF available

Author(s): Vishweshwarayya C. Hallur, Avinash A. Malawade, Seema G. Itagi
Volume: 1
Issue: 10
Year: 2012
SURVEY ON DYNAMIC ANALYSIS TO DETECT VULNERABILITIES AND UNSAFE COMPONENT LOADINGS PDF available

Author(s): Geethanjali.N , Maragatham.T , Dr. Karthik.S
Volume: 1
Issue: 10
Year: 2012
SOFTWARE MODULE CLUSTERING USING SINGLE AND MULTI-OBJECTIVE APPROACHES PDF available

Author(s): CHANDRAKANTH P , ANUSHA G , KISHORE C
Volume: 1
Issue: 10
Year: 2012
A BRIEF SURVEY ON THE CONCEPTS OF AGENT AND ARTIFICIAL IMMUNE SYSTEMS PDF available

Author(s): PRIYADARSHINI.S, Dr. S KARTHIK
Volume: 1
Issue: 10
Year: 2012
MULTI AGENT-BASED DISTRIBUTED DATA MINING PDF available

Author(s): REECHA B. PRAJAPATI , SUMITRA MENARIA
Volume: 1
Issue: 10
Year: 2012
NEED OF FUTURE WEB TECHNOLOGY THE SEMANTIC WEB A BRIEF SURVEY PDF available

Author(s): S.Raja Ranganathan, Dr.M.Marrikkannan ,Dr.S.Karthik
Volume: 1
Issue: 10
Year: 2012
A Review on Ensemble of Diverse Artificial Neural Networks PDF available

Author(s): Mittal C. Patel , Prof. Mahesh Panchal
Volume: 1
Issue: 10
Year: 2012
Design of Robotics Technology for Application in the Electrical field with narrow and hazardous space PDF available

Author(s): Suparna Pal , Chayan Chakraborty
Volume: 1
Issue: 10
Year: 2012
A New Approach to Improve Power Quality and Energy Saving Scheme by Dimming of Light Intensity PDF available

Author(s): Suparna Pal, Chayan Chakraborty
Volume: 1
Issue: 10
Year: 2012
Review of methods for secret sharing in cloud computing PDF available

Author(s): Dnyaneshwar Supe , Amit Srivastav , Dr. Rajesh S. Prasad
Volume: 2
Issue: 1
Year: 2013
An effective Golden Section Search Approach based Distribution Load Flow PDF available

Author(s): Naveen Jain and Jai Kumar Maherchandani
Volume: 2
Issue: 1
Year: 2013
Automated Intelligent Wireless Drip Irrigation Using Linear Programming PDF available

Author(s): Manish Giri, Dnyaneshwar Natha Wavhal.
Volume: 2
Issue: 1
Year: 2013
Reducing Routing Overhead For Multimedia Traffic in Manet Using Rebroadcast Probability PDF available

Author(s): Sivakumar.P, Sivaranjani.R, Srilakshmi.G, Subashini.R
Volume: 2
Issue: 1
Year: 2013
On Fault Tolerance of Resources in Grid Environment PDF available

Author(s): Minakshi Memoria, Mukesh Yadav
Volume: 2
Issue: 1
Year: 2013
Optimized Surveillance Solution for Unattended Baggage Recognition PDF available

Author(s): R.Karthikeyan, P.Mahalakshmi, N.GowriShankar
Volume: 2
Issue: 1
Year: 2013
Fault identification and diagnosis using greedy Back Tracking approach in large-scale network PDF available

Author(s): U.Sridhar, Dr.G.Gunasekaran
Volume: 2
Issue: 1
Year: 2013
A Survey of Metastability Errors in CMOS Digital Circuits PDF available

Author(s): Manisha Thakur, Puran Gaur, Braj Bihari soni
Volume: 2
Issue: 1
Year: 2013
Performance Comparison of ACO Algorithms for MANETs PDF available

Author(s): Jubin Sebastian E
Volume: 2
Issue: 1
Year: 2013
Some New Steganographic Techniques using Spatial Resolution Reduction PDF available

Author(s): H. Faheem Ahmed and U. Rizwan
Volume: 2
Issue: 1
Year: 2013
DIFFERENTIATION OF TERM AND PRETERM DELIVERY GROUPS BY EHG SIGNAL ANALYSIS PDF available

Author(s): Dhananjay Kumar, Kumar Gaurav Shankar, Praveen Kumar.
Volume: 2
Issue: 1
Year: 2013
A REVIEW ON HAND GETSURE RECOGNITION SYSTEMS PDF available

Author(s): Mr. Prashant Chaudhari,Prof. G. R. Phulay,Mr. Ravindra Patil
Volume: 2
Issue: 1
Year: 2013
A REVIEW ON OPTIMIZATION OF ENERGY BY USING PWM INVERTER PDF available

Author(s): Mr. Ravindra Patil. ,Prof. M.H. Nerkar,Mr. Prashant Chaudhari
Volume: 2
Issue: 1
Year: 2013
Green Software: Recent Trends and Techniques for Software Design and Development PDF available

Author(s): Abdullah Al Hasib, Sanjeeda Sharmin
Volume: 2
Issue: 1
Year: 2013
Electronic Mail Security PDF available

Author(s): Dr. Ajit Singh, Meenakshi Gahlawat
Volume: 2
Issue: 1
Year: 2013
Performance Study of Different Medical Images Based on Morphology in Noisy Environment PDF available

Author(s): V. Kalpana ,V. Vijaya kishore
Volume: 2
Issue: 1
Year: 2013
Survey on Live VM Migration Techniques PDF available

Author(s): Anju Mohan, Shine S
Volume: 2
Issue: 1
Year: 2013
A SURVEY ON ENHANCED APPROACH FOR CATEGORICAL LINK BASED CLUSTERING PDF available

Author(s): C.M.Geetha, K.Sangeetha ,Dr S.Karthik
Volume: 2
Issue: 1
Year: 2013
Why do you need a reservation system?      Save time & money - Smart Internet Solutions