Academic Journals Database
Disseminating quality controlled scientific knowledge

International Journal of Computer & Electronics Research

ISSN: 2320--9348


ADD TO MY LIST
 
SEQUENTIAL MINING: PATTERNS AND ALGORITHMS ANALYSIS

Author(s): Thabet Slimani | Amor Lazzez
Volume: 2
Issue: 5
Year: 2013
Comparison Between the Performance of Modified Multi-Diagonal Codes (MMD) and OOC Codes using Matlab

Author(s): Abdelkader Bouarfa | Malika Kandouci
Volume: 2
Issue: 5
Year: 2013
Processing Of Incomplete Data Set

Author(s): Mahesh Babanrao Shelke | K.B. Badade
Volume: 2
Issue: 5
Year: 2013
SURVEY OF MUTUAL EXCLUSION ALGORITHMS

Author(s): Hossein Nick Khah | Faroukh Koroupi | Arash Azizi Mazrae
Volume: 2
Issue: 5
Year: 2013
Design of UART-SPI converter for SOC

Author(s): K. Vinodalakshmi | Divya . | G. Sumalatha
Volume: 2
Issue: 5
Year: 2013
Sorting algorithms and difference of this algorithms

Author(s): Shirin Abbasloo | Faroukh Koroupi
Volume: 2
Issue: 5
Year: 2013
Similarities of Slant in Handwriting of Close Genotypic Family Members

Author(s): Vaibhav Saran | Suneet Kumar | Syeed Ahmed | A K Gupta
Volume: 2
Issue: 5
Year: 2013
CLOUD BASED SECURITY FOR ENHANCED DATA

Author(s): Naga Babu Garigipati | B. Sudhakar
Volume: 2
Issue: 4
Year: 2013
INTERNET ROUTING BASED MULTIPATH MEASUREMENT ANALYSIS ORIENTATION

Author(s): M. Sateesh | B. Sudhakar
Volume: 2
Issue: 4
Year: 2013
DISTRIBUTION OF THE LOAD BASED NETWORK ORIENTED MULTI PATH

Author(s): V.Ramana Babu | G.Chinni Krishna
Volume: 2
Issue: 4
Year: 2013
AN EFFICIENT STRATEGY OF ASSURED DELETION OF THE DATA ORIENTED CLOUD

Author(s): L.Swetha Yadav | K.C Ravi Kumar
Volume: 2
Issue: 4
Year: 2013
AN EFFECTIVE STRATEGY OF WELL EFFICIENT UTILIZATION OF INFRA STRUCTURE ORIENTED CLOUD

Author(s): S.V. Sree Lakshmi | Sk. Habeeb
Volume: 2
Issue: 4
Year: 2013
EFFICIENT RETRIEVAL OF THE DATA BY TEMPLATE ORIENTED STRATEGY

Author(s): P. Saikumari | Sk. Abdulla
Volume: 2
Issue: 4
Year: 2013
CLOUD BASED STORAGE ORIENTED SECURE SERVICES

Author(s): P. Raghu | M. Sreenu
Volume: 2
Issue: 4
Year: 2013
AN EFFECTIVE STRATEGY OF THE PAST LESSON ORIENTED CLOUD

Author(s): M.Suchith Chandra | J. Thirupathi
Volume: 2
Issue: 4
Year: 2013
SERVICES OF THE CLOUD BASED QUALITY PREDICTION STRATEGY

Author(s): Dandu Jagadeeswar Reddy | Shaik. Abdul
Volume: 2
Issue: 4
Year: 2013
AN EFFECTIVE FRAMEWORK FOR DYNAMIC STRATEGY

Author(s): G. Santhosha | B. Deepthi
Volume: 2
Issue: 4
Year: 2013
AN EFFECTIVE STRATEGY OF THE DATA PUBLISHING

Author(s): A. Yamuna | Ch. Srinivas
Volume: 2
Issue: 4
Year: 2013
CONCAVE OPTIMIZATION APPROACH FOR MINIMIZATION OF ENERGY FUNCTION USING RPM

Author(s): Yamala Jagadeesh | B.Jayanth Nadh
Volume: 2
Issue: 4
Year: 2013
AN EFFICIENT STRATEGY BASED DATA HIDING AGAINST JAMMING

Author(s): Mohammad Nafees Fathima | G. Minni
Volume: 2
Issue: 4
Year: 2013
MOBILE NETWROK BASED PRICING OF THEORITICAL GAMING STRATEGY

Author(s): Ravi. Sivayya | Syed Sadat Ali
Volume: 2
Issue: 4
Year: 2013
AN OVERVIEW OF MOBILE SAMPLING OF SENSOR FIELD INFORMATION USING RESTRICTED TRANSMIT

Author(s): Jagadeesh Paluru | K Anusha
Volume: 2
Issue: 4
Year: 2013
DISTRIBUTING SEARCH LOGS A RELATIVE STUDY OF CONFIDENTIALITY GUARANTEES

Author(s): V. Sujeeth | A. Satchidanandam
Volume: 2
Issue: 4
Year: 2013
MULTILEVEL CASCADING STATCOM ORIENTED CONTROL OF DC BALANCED VOLTAGE CAPACITOR

Author(s): Vadlamudi Naresh | Ranapanga Saidulu
Volume: 2
Issue: 4
Year: 2013
A CONTROLLED STRATEGY OF THE DETECTED DATA ORINETED LEAKAGE

Author(s): R.Sunil Kumar | K. Anusha
Volume: 2
Issue: 4
Year: 2013
IRIS RECOGNITION FOR ATM BASED APPROACH

Author(s): J. Sowjanya | S. Srivani
Volume: 2
Issue: 4
Year: 2013
DESIGN OF RFID BASED ATTRACTION OF TOURISTMONITORING SYSTEM

Author(s): Kommula Sahithya Devi | R. Bharath
Volume: 2
Issue: 4
Year: 2013
DETECTION OF THE CUT BASED STRATEGY IN A NETWORK ORIENTED WIRELESS PHENOMENA

Author(s): Shaheen Begum | Akheel Mohammed | Ayesha .
Volume: 2
Issue: 4
Year: 2013
DATA PUBLISHING AND PRIVACY MAINTENANCE BY AN APPROACH ORIENTED SLICING

Author(s): Addagarla Harica | G. Minni
Volume: 2
Issue: 4
Year: 2013
EFFECTIVE RETRIEVAL OF THE IMAGES BASED ON THE CONTENT ORIENTED SKETCHES

Author(s): Mahesh T | Syed Yasin
Volume: 2
Issue: 4
Year: 2013
MEASURING WEIGHT MISUSE BY EFFECTIVE M-SCORE PHENOMENA

Author(s): Narendra Karampudi | Syed Sadat Ali
Volume: 2
Issue: 4
Year: 2013
IMAGE CLASSIFICATION FROM SEARCH ENGINE BASED WEB SHARING

Author(s): Sireesha Dhanekula | G. Minni
Volume: 2
Issue: 4
Year: 2013
METHODS ORIENTED WITH DETECTION OF FRAUD BASED ON CREDIT CARD ANALYSIS

Author(s): Akkineni Sriranjani | Syed Sadat Ali
Volume: 2
Issue: 4
Year: 2013
SEARCH SPECIFIC DOMAIN BY A MODEL OF RANKING

Author(s): P.Rama Teja | J.Ravi Kumar
Volume: 2
Issue: 4
Year: 2013
CLOUD COMPUTING BASED ORIENTATION

Author(s): K. Jithendar | K.Srujan Raju | K. Neeraja
Volume: 2
Issue: 4
Year: 2013
A PROJECT REPORT ON EMERGENCY HEALTHCARE BASED MOBILE COMPUTING FRAMEWORK

Author(s): J. Prashanth | Navnath D. Kale | N. Srinivas
Volume: 2
Issue: 4
Year: 2013
A SYSTEM BASED DRIVER ASSISTANCE FOR EFFECTIVE DETECTION OF PEDESTRIAN

Author(s): Bodigari Rakesh | P. Prakash
Volume: 2
Issue: 4
Year: 2013
An Advance towards Standard Utilities for Document Clustering

Author(s): Aggadi Gnanesh | M.Sudhir Kumar | M.Sudhir Kumar
Volume: 2
Issue: 4
Year: 2013
Data Based Text Encrypting in Audio

Author(s): Bommala Suneel Kumar | S. Satyanarayana
Volume: 2
Issue: 4
Year: 2013
History Search Organization

Author(s): P. Usha | Sheikh Gouse
Volume: 2
Issue: 4
Year: 2013
Queries Based Uncertain Locations across Mean Range Oriented Computation Efficiency

Author(s): G. Pushpa | M.V.Jagannatha Reddy
Volume: 2
Issue: 4
Year: 2013
Scheduling of Virtual Scheme for WSN Lifetime Maximisation

Author(s): P. Sateesh | K.Kiran Kumar
Volume: 2
Issue: 4
Year: 2013
Creating Profiles on Behaviour of User

Author(s): Pulikanti Chanakya | A.Shiva Kumar
Volume: 2
Issue: 4
Year: 2013
A Review on Similarity Measure View Point Oriented Clustering

Author(s): M.Vinaya Babu | K.J. Sarma
Volume: 2
Issue: 4
Year: 2013
A Project Report on Mining Based User Oriented Online Recommendation

Author(s): Rekha Bantu | V. Narmada | S. Aparna | V.Murali Mohan
Volume: 2
Issue: 4
Year: 2013
Network Oriented Blocking Followed by Misbehaving Oriented Phenomena

Author(s): Moghal Yaseen Pasha | Moghal Irfan Pasha
Volume: 2
Issue: 4
Year: 2013
Cloud Based Integration of the Data by Efficient Outsourcing

Author(s): Darshane Shriniwas Vasudev | N.Pavan Kumar | Md. Anwar Ali
Volume: 2
Issue: 4
Year: 2013
AN EFFICIENT AND PROTECTED ROUTING PRACTICE FOR HIGH RELIABILITY SENSOR NETWORKS

Author(s): E. Srinivas | M.Ekamabaram Naidu | Pasala Raja Prakasha Rao
Volume: 2
Issue: 4
Year: 2013
PREVENTION OF ATTACKS BASED ON DOS AND ITS DETECTION

Author(s): N.Vijaya Sunder Sagar
Volume: 2
Issue: 4
Year: 2013
ACCESSING QUERY LINK BASED MOBILE COMPUTING

Author(s): Atul Chandrahar Mali | S. Md. Ismail | Md. Anwar Ali
Volume: 2
Issue: 4
Year: 2013
AN APPROACH TOWARDS PUBLISH/SUBSCRIBE SYSTEM FOR WIRELESS NETWORKS

Author(s): Suman Kumar Shriramoju | Jagadeeshwar Madiraju | Adloori Ramesh Babu
Volume: 2
Issue: 4
Year: 2013
ROUTER BASED PACKET DISTRIBUTION IN A HIGH SWITCHING BANDWIDTH

Author(s): N.Naresh Kumar | M.Sudhir Kumar
Volume: 2
Issue: 4
Year: 2013
OBSTRUCTION OF ACCESS TO DISRUPTIVE CLIENTS IN ANONYMIZING NETWORK SYSTEMS

Author(s): S.K. Alisha | N.G.K. Murthy | P. Pothuraju | D. Srikar
Volume: 2
Issue: 4
Year: 2013
Performance of Quasi Orthogonal Space Time Codes on Rayleigh and Rician Fading Channel

Author(s): Sajjad Ahmed Ghauri | Hannan Adeel | Bilal Irshad | Agha Saif
Volume: 2
Issue: 4
Year: 2013
Data Mining through Time Series Forecasting Algorithm

Author(s): Thudum Venkatesh | Kondabathula DurgaCharan | Krishna Kumar Singh
Volume: 2
Issue: 4
Year: 2013
SIGNIFYING SENTENCE FRAMEWORK IN MACHINE LEARNING METHOD FOR INFORMATION MINING

Author(s): V.Praveen Kumar | V.V.R.L.S. Gangadhar
Volume: 2
Issue: 4
Year: 2013
AN EVALUATION AND SCHEME FOR FIGHTING INTERNET AUCTION DECEPTION

Author(s): G. Keerthichandra | M. Sivaswetha | M.Sudhir Kumar
Volume: 2
Issue: 4
Year: 2013
MULTI SHARES PRACTICE FOR PROMISING CONFIDENTIALITY IN CLOUD COMPUTING

Author(s): Poloju Kiran Kumar | Amjan Shaik | M.Sudhir Kumar
Volume: 2
Issue: 4
Year: 2013
SAFETY SUPERVISION OF FOCUSSING VITAL AREAS IN CLOUD COMPUTING

Author(s): Sagar Shivaji Sawant | S. Soujanya | G.Charles Babu
Volume: 2
Issue: 4
Year: 2013
TRADING ARRANGEMENT FOR UNCERTAINTY IN WIRELESS OPPORTUNISTIC ROUTING

Author(s): Ch.Satish Chandra | J. Sreedhar | M.Sudhir Kumar
Volume: 2
Issue: 4
Year: 2013
LIABILITY AS AN APPROACH FOR CONFIDENTIALITY FORTIFICATION IN THE CLOUD

Author(s): Bheemeshwar Yerra | Amjan Shaik | M.Sudhir Kumar
Volume: 2
Issue: 4
Year: 2013
A WELL-ORGANIZED APPROACH TOWARDS SOCIAL TAGGING OF MULTIMEDIA CONTENT

Author(s): M.Praveen Kumar | Manjula Patil
Volume: 2
Issue: 4
Year: 2013
TEXTURE DEPICTION SUBSEQUENT TO VISUAL PERCEPTION

Author(s): P. Rajitha | Y. Madhusekhar
Volume: 2
Issue: 4
Year: 2013
A RESOURCEFUL PRIVACY SAFEGUARDING METHOD AGAINST TRAFFIC ANALYSIS ATTACKS

Author(s): S.Venkata Subbaiah | A. Pravallika
Volume: 2
Issue: 4
Year: 2013
A RESOURCEFUL APPROACH TOWARDS QUERY LOAD SHEDDING IN MOBILE SYSTEMS

Author(s): Upendra Babu Paluru | K.Nagi Reddy
Volume: 2
Issue: 4
Year: 2013
ACCOMPLISHING OF RESPONSIBILITY, VERIFICATION AND RELIANCE IN CLOUD COMPUTING

Author(s): Shaik Abid | L.Ravi Kumar | G.Charles Babu
Volume: 2
Issue: 4
Year: 2013
AN EFFICIENT DEPICTION OF DENIAL OF SERVICE ATTACKS IN WIRELESS NETWORKS

Author(s): A.Dastagiri Reddy | Y. Madhusekhar
Volume: 2
Issue: 4
Year: 2013
PROBABILITY OF INITIATION AND IDENTIFYING JAMMING ATTACKS IN WIRELESS NETWORKS

Author(s): T.Charan Singh | Dayakar Kondamudi | G.Charles Babu
Volume: 2
Issue: 4
Year: 2013
RAPID EFFECTIVE SYSTEM DOUBLING FOR CLOUD COMPUTING

Author(s): K.Nageswara Reddy | B.Venkata Ramani | G.Charles Babu
Volume: 2
Issue: 4
Year: 2013
EFFECTIVE ADVANCEMENT OF AUTHENTIC TRAFFIC CONTROL CLOUDS

Author(s): Mahipal Peddamanna | G.Krishna Veni
Volume: 2
Issue: 4
Year: 2013
AN EFFECTIVE APPROACH TOWARDS THE CREDIT CARD FRAUDULENCE DISCLOSURE METHODS

Author(s): C. Anjaneyulu | Y. Madhusekhar
Volume: 2
Issue: 4
Year: 2013
A PROTECTED DECENTRALIZED ELIMINATION CODE FOR DISPERSED NETWORK STORAGE

Author(s): Gundrati Santosh Kumar | L.Ravi Kumar | G.Charles Babu
Volume: 2
Issue: 4
Year: 2013
A REVIEW ON SAFETY CONCERNS IN SERVICE DELIVERY ILLUSTRATION OF CLOUD COMPUTING

Author(s): M.Vijay Kumar | K.Veera Kishore
Volume: 2
Issue: 4
Year: 2013
PROFICIENT BUILDING OF AGGREGATES IN PROBABILISTIC DATABASES

Author(s): M.Sai Kumar | B.V.Ravi Prasad
Volume: 2
Issue: 4
Year: 2013
RECOVERING THE PERFORMANCE OF DISPERSED APPLICATIONS WITH DYNAMIC NETWORKS

Author(s): Yadla Kiran Kumar | G.Shiva Krishna
Volume: 2
Issue: 4
Year: 2013
ADVANCEMENT FOR INVOLUNTARY RECONFIGURATION FOR AMPLE RESPONSIBLE STORAGE SYSTEMS

Author(s): Velikanti Kiran Kumar | A. Satchidanandam
Volume: 2
Issue: 4
Year: 2013
A Quick Review on Reordering Approaches in Statistical Machine Translation Systems

Author(s): Arefeh Kazemi | Amirhassan Monadjemi | Mohammadali Nematbakhsh
Volume: 2
Issue: 4
Year: 2013
Adaptive Decision Feedback Equalizer (ADFE)

Author(s): Sajjad Ahmed Ghauri | Hannan Adee | Muhammad Safi-ur-Rehman Butt | Muhammad Arslan
Volume: 2
Issue: 4
Year: 2013
DESIGEN AND ANALYSIS OF LOW-VOLTAGE ANALOG MULTIPLEXER USING FOUR-QUADRIC 50 nm CMOS TECHNOLOGY

Author(s): Mohammad Ali Bordbar | Saeed Ghorbani
Volume: 1
Issue: 4
Year: 2012
A Comparative Analysis of classification of Micro Array Gene Expression Data using Dimensionality Reduction Techniques

Author(s): TamilSelvi Madeswaran | G.M.Kadhar Nawaz
Volume: 1
Issue: 4
Year: 2012
Towards Optimal Joint Network Management and Flow Control

Author(s): Ghulam Abbas
Volume: 1
Issue: 4
Year: 2012
STUDY OF FRACTAL COMPRESSION FOR TEXT IMAGES

Author(s): Rodolfo Romero | Jesus Yalja Montiel
Volume: 1
Issue: 4
Year: 2012
Architecture and Implementation of Real Time Vehicle Tracking System Using Wireless, Sensor Devices and Google Maps API

Author(s): Khizar Ahmed Syed | Kiran Kumar Sreenivasiah | S. M. Ahmed | Shiva Kumar
Volume: 1
Issue: 4
Year: 2012
A STUDY ON ADHOC NETWORK ROUTING PROTOCOLS

Author(s): Venkata Suryanarayana | M. Ambica
Volume: 1
Issue: 4
Year: 2012
A Novel Block Cipher Involving a Key Bunch Matrix and a Permutation

Author(s): V.U.K. Sastry | Shirisha Kakarla
Volume: 1
Issue: 4
Year: 2012
Channel Shortening for doubly selective channels using TEQ, MMSE and LMS

Author(s): Sajjad Ahmed Ghauri | Farhan Sohail | SherazAlam Khan | Farrukh Tahir | Anum Tariq | Maria Tariq
Volume: 1
Issue: 4
Year: 2012
Monitoring the paddy crop field using zigbee network

Author(s): Sri Harsha Karri | T.V. Janardhana Rao | A. Pravin | K. Rajasekhar
Volume: 1
Issue: 4
Year: 2012
Timeserving Routing Protocol Implementation to accomplish best throughput and fairness

Author(s): Narasimha Rao V L Potta | B. Sarath Kumar
Volume: 1
Issue: 4
Year: 2012
Implementation of Cryptographic Algorithm Based on MicroBlaze

Author(s): Indrayani Ishwardayal Patle | Jitendra Zalke
Volume: 1
Issue: 4
Year: 2012
BANDWIDTH ENHANCED E- SHAPED MICROSTRIP ANTENNA WITH PAIR OF WIDE SLITS

Author(s): Shushant Kumar Jain | Asha Singh Kushwah | Avnish Sharma | Yogesh Sharma
Volume: 1
Issue: 4
Year: 2012
UNDISTURBED COLLABORATIVE DEMONSTRATION FOR PATTERN CLASSIFICATION

Author(s): Himaja Kadali | M.D Parveen Sulthana | P. Suresh
Volume: 2
Issue: 3
Year: 2013
A COLLECTIVE APPROACH TOWARDS ENERGY-BASED STRUCTURE FOR AUTONOMOUS LEARNING

Author(s): Ananya Pothula | Ch.Navya Deepthi | P. Suresh
Volume: 2
Issue: 3
Year: 2013
AN EFFECTIVE APPROACH TOWARDS THE AUTOMATIC IMAGE LISTING

Author(s): Yarlagadda Umamaheswari | P.U.V Pavan Kumar | P. Suresh
Volume: 2
Issue: 3
Year: 2013
ONLINE ASSORTMENT OF SELECTIVE TRACKING FEATURES

Author(s): Ajith Medukonduru | Manjula Patil
Volume: 2
Issue: 3
Year: 2013
EFFICIENT PRIVACY SAFEGUARDING METHODS FOR SOCIAL NETWORKS

Author(s): Mahesh Hundekar | A. Satchidanandam
Volume: 2
Issue: 3
Year: 2013
MUTUAL DEVELOPMENT AND POWER MANAGING FOR WIRELESS AD-HOC NETWORKS

Author(s): A.Srinivasa Reddy | B. Venkanna | V.Hari Prasad
Volume: 2
Issue: 3
Year: 2013
SECURITY MANAGEMENT FOR CONSIDERABLE REGIONS IN A ASSURED CLOUD COMPUTING

Author(s): Vijaya Alapati | T. Swapna | Pasala Raja Prakasha Rao
Volume: 2
Issue: 3
Year: 2013
A RESOURCEFUL EVALUATION OF PERMUTATION-BASED ALGORITHM

Author(s): R.Pavan Kumar | B.Ravi Prasad
Volume: 2
Issue: 3
Year: 2013
AN OVERVIEW OF ACTIVE CHANNEL ALLOTMENT FOR WIRELESS MULTICAST AND BROADCAST SERVICE

Author(s): M.Rajendra Reddy | K.Nagi Reddy
Volume: 2
Issue: 3
Year: 2013
A PROFICIENT APPROACH TOWARDS WIRELESS SENSOR NETWORK SAFETY MODEL

Author(s): K.Y. Maheswari | A. Satchidanandam
Volume: 2
Issue: 3
Year: 2013
A VALUABLE IMPROVEMENT TOWARDS THE PACKET LOSS CONTROL

Author(s): Radhabai. B.Kalaskar | Manjula Patil
Volume: 2
Issue: 3
Year: 2013
ESTABLISHING CORRESPONDING DEPENDENTS OVER P2P NETWORKS

Author(s): Chandrakala Patil | Manjula Patil
Volume: 2
Issue: 3
Year: 2013
A COMPETENT APPROACH OF DATA AGGREGATION IN TREE BASED WIRELESS SENSOR NETWORKS

Author(s): T.Pavan Kumar | K.Nagi Reddy
Volume: 2
Issue: 3
Year: 2013
CONSTRICTING THE PATH OF MOVABLE OBJECTS IN SENSOR NETWORKS

Author(s): P. Srikantam | G.Shiva Krishna
Volume: 2
Issue: 3
Year: 2013
DISPERSED LIABILITY REASSURANCE FOR DATA ALLOTMENT IN CLOUD COMPUTING

Author(s): S Vara Vinod Ungarala | Sri P B V Raja Rao
Volume: 2
Issue: 3
Year: 2013
A COMPETENT APPROACH OF DATA AGGREGATION IN TREE BASED WIRELESS SENSOR NETWORKS

Author(s): Divyatheja Gadikota | Pasala Raja Prakasha Rao | Chittam Venkata Rajesh
Volume: 2
Issue: 3
Year: 2013
BUILDING OF DECISION TREE CLASSFIERS BY MEANS OF DATA IMPROBABILITY NUMERICAL FEATURES

Author(s): Devender Rondla | G. Krishna Veni
Volume: 2
Issue: 3
Year: 2013
A STUDY ON CREDIT CARD DECEPTION EXPOSURE METHODS

Author(s): Rajesh Manda | G.Shiva Krishna
Volume: 2
Issue: 3
Year: 2013
A FUZZY CHARACTERISTIC SELECTION AND EXTRACTION FOR TEXT CATEGORIZATION

Author(s): Jhansi Koorapati | G.Vijaya Lakshmi | R. Nagaraju
Volume: 2
Issue: 3
Year: 2013
A PROSPEROUS ENCROACHMENT TOWARDS THE SUPERVISION OF PACKET LOSS

Author(s): B.Bhavani Neehar Reddy | Pasala Raja Prakasha Rao | Chittam Venkata Rajesh
Volume: 2
Issue: 3
Year: 2013
Routing Protocols In Mobile Ad Hoc Networks: A Survey

Author(s): Reetika Khetarpal | Bhushan Dua
Volume: 2
Issue: 3
Year: 2013
GOLD SEQUENCE GENERATION-A VLSI IMPLEMENTATION (16nm TECHNOLOGY)

Author(s): Yogendra Jangid | Deepesh Shukla | Gaurav Jeswani | Vinod Agarwal | Vivek Kumar Jain | Yatendra Rathore | R. S. Meena | Pankaj Shukla
Volume: 2
Issue: 3
Year: 2013
GSM Based Vehicle Security System

Author(s): Rinju Dutta | Sushmita Gogoi | Shreya Boro | Rakesh Basumatary | Tanvira Ismail
Volume: 2
Issue: 3
Year: 2013
ELECTRICITY METER READING USING GSM

Author(s): Tanvira Ismail | Partha Protim Dutta | Dipannita Das | Bikash Borgohain | Amit Prasad
Volume: 2
Issue: 3
Year: 2013
Designing a Wi- Fi Enabled Robot

Author(s): K. Sai Rohit Singh | Mohammed Ali Hussain
Volume: 2
Issue: 3
Year: 2013
Adapting Tactile Graphic Tool for Portable Digital Pads and Tablet PCs

Author(s): Robinson Thamburaj | Atulya Nagar
Volume: 2
Issue: 3
Year: 2013
Speech Enhancement Using Spectral Subtraction Method

Author(s): Sadashiv Badiger | Bairu Krishnaji Saptalakar
Volume: 2
Issue: 3
Year: 2013
Feedback Controller Design for AQM using Lambert-W function

Author(s): Neeraj Choudhary | Jagdeep Singh Lather
Volume: 2
Issue: 3
Year: 2013
A WELL-ORGANIZED ESTIMATION OF INDEFINITE LOCATION RELIANT QUERIES

Author(s): S.Praveen Kumar | R.V. Krishnaiah
Volume: 2
Issue: 3
Year: 2013
A PROFICIENT APPROACH TOWARDS THE DETECTION OF INTRUSIONS IN MULTI-TIER APPLICATIONS

Author(s): K.Rama Chary | M. Srinivas
Volume: 2
Issue: 3
Year: 2013
AN EFFECTIVE APPROACH TOWARDS CREDIT CARD DECEPTION DISCOVERY METHODS

Author(s): K. Nirusha | R.V. Krishnaiah
Volume: 2
Issue: 3
Year: 2013
CARRIER-FREQUENCY HARMONIZATION STRUCTURE FOR ENHANCED AMPLITUDE MODULATION FUNCTION

Author(s): B.V.Subba Rao | P. Satyanarayanna
Volume: 2
Issue: 3
Year: 2013
AN EFFICIENT HIERARCHICAL QOS ALGORITHM FOR WIRELESS SENSOR NETWORKS

Author(s): Narendra Kumar | Sri Lavanya Sajja
Volume: 2
Issue: 3
Year: 2013
A SURVEY ON VARIOUS WATERMARKING METHODS FOR GIS VECTOR DATA

Author(s): P. Bhanuchandar | M.Siva Ganga Prasad | K.Phani Srinivas
Volume: 2
Issue: 3
Year: 2013
A WELL-ORGANIZED AND SECURE ROUTING TECHNIQUE FOR HIGH INTEGRITY SENSOR NETWORKS

Author(s): K.Adi Lakshmi | M. Srinivas
Volume: 2
Issue: 3
Year: 2013
AN EFFICIENT APPROACH TOWARDS PROGRAMMABLE MEMORY BUILT-IN SELF-TEST FOR EMBEDDED MEMORY

Author(s): P. Sireesha | P. Prakash
Volume: 2
Issue: 3
Year: 2013
IMPROVED DEPTH CONCEPTION WITH SHARPNESS AUGMENTATION FOR STEREO VIDEO

Author(s): P. Balanna | K. Suvarna | K. Sudhakar
Volume: 2
Issue: 3
Year: 2013
AN EMINENT REVERSIBLE DATA HIDING SYSTEM WITH EDGE PREDICTION AND VARIATION EXPANSION

Author(s): Satharla Raga Deepthi | H. Devanna | K. Sudhakar
Volume: 2
Issue: 3
Year: 2013
CONFIDENTIALITY SHIELDING COOPERATIVE MULTILEVEL DRM BUILDING

Author(s): M.Krishna Naik | T. Chakrapani | K. Sudhakar
Volume: 2
Issue: 3
Year: 2013
DIMINISHING OF IMAGE BY MEANS ON DISCRETE PRODUCT PATTERN

Author(s): Kataru Sateesh Kumar | H. Devanna | K. Sudhakar
Volume: 2
Issue: 3
Year: 2013
AN ELUCIDATION TO GAIN ATTACK ON WATERMARKING METHODS

Author(s): N. Daniel | I. Sandhya | Pasala Raja Prakasha Rao
Volume: 2
Issue: 3
Year: 2013
CONDENSED-STATE PROGRESSION DISCOVERY THROUGH CONVOLUTIONAL CODES

Author(s): Chiranjeevi Oguri | C. Rambabu | S.M.A. Naveed
Volume: 2
Issue: 3
Year: 2013
A RESOURCEFUL AND SAFE ROUTING METHOD FOR ELEVATED RELIABILITY SENSOR NETWORKS

Author(s): P.Nagaiah Goud | G.N.V.Ramana Rao
Volume: 2
Issue: 3
Year: 2013
A PROGRESSION TOWARDS ROUTING EXPERTISE FOR ENHANCEMENT OF INTERNET PROTOCOL NETWORKS

Author(s): Patlola Jyothirmai | Gandla Nageswararao
Volume: 2
Issue: 3
Year: 2013
EXPLORATION OF THE WEB BY MEANS OF MOBILE IMAGES FOR LOCATION DETECTION

Author(s): Munukuntla Jyothsna | M. Srinivas
Volume: 2
Issue: 3
Year: 2013
EFFECTIVE ANALYSIS OF NETWORK TOPOLOGY REPRESENTATION ON ACTIVE WORM ATTACKS

Author(s): Kore Kunal Sidramappa | A. Satchidanandam | K.Nagi Reddy
Volume: 2
Issue: 3
Year: 2013
EFFECTIVE EXAMINATION ON DEVELOPMENT POLICIES FOR MULTI-HOP WIRELESS NETWORKS

Author(s): Kamble Nagaraj Pralhad | Manjula Patil | K.Nagi Reddy
Volume: 2
Issue: 3
Year: 2013
EFFICIENT PERFORMANCE OF ROUTING ALGORITHMS IN SENSOR NETWORKS

Author(s): Vanitha Komira | T.Soma Shekar | T.Venkata Ramana
Volume: 2
Issue: 3
Year: 2013
SAFETY MANAGEMENT FOR SIGNIFICANT REGIONS IN A TRUSTED CLOUD COMPUTING

Author(s): Thatikonda Radhika | A. Ramesh | T.Venkata Ramana
Volume: 2
Issue: 3
Year: 2013
VIGOROUS ROUTING AND ADVANCEMENT IN WIRELESS MESH NETWORKS

Author(s): K.Murali Mohan | A. Ramesh | .T.Venkata Ramana
Volume: 2
Issue: 3
Year: 2013
A SURVEY ON EFFICIENT ROUTING TECHNOLOGY FOR A RAPID INTERNET PROTOCOL NETWORK IMPROVEMENT

Author(s): Morampudi Naresh | T.Soma Shekar | T.Venkata Ramana
Volume: 2
Issue: 3
Year: 2013
IMPROVING RESOURCE ADMINISTRATION USING ACTIVE LOAD ESTIMATION

Author(s): M. Yadagiri | P.Pranai Kumar | T.Venkata Ramana
Volume: 2
Issue: 3
Year: 2013
ACHIEVEMENT OF LIABILITY, AUDITABILITY AND RELIANCE IN CLOUD COMPUTING

Author(s): Ramya Sree Uppalapati | K.Nagi Reddy
Volume: 2
Issue: 3
Year: 2013
AN ASSESSMENT ON PROFICIENT ROUTING KNOWLEDGE FOR A FAST INTERNET PROTOCOL NETWORK ENHANCEMENT

Author(s): B. Naresh | .K.J. Sarma | Pasala Raja Prakasha Rao
Volume: 2
Issue: 3
Year: 2013
A RESOURCEFUL DEVELOPMENT OF SPATIAL PREFERENCE DATA

Author(s): K. Seetharamaiah | Ch.V.Mahavira Lakshmi
Volume: 2
Issue: 3
Year: 2013
COMFORTING DISSEMINATED ACCOUNTABILITY FOR DATA SHARING IN THE CLOUD

Author(s): K. Pravallika | P.B.V Raja Rao
Volume: 2
Issue: 3
Year: 2013
AN ASSESSMENT OF PIONEERING WATERMARKING METHODS FOR IMAGE AUTHENTICATION

Author(s): U. Sivaji
Volume: 2
Issue: 3
Year: 2013
A VALUABLE PROGRESS ON THE WAY TO CREDIT CARD DECEPTION REVELATION SYSTEM

Author(s): K.Nagasai Goutham Kumar | Pasala Raja Prakasha Rao
Volume: 2
Issue: 3
Year: 2013
AN EXPANSION TOWARDS THE CONFIDENTIALITY SAFEGUARDING OF HEALTH RECORDS

Author(s): R. Iswarya | M.Sudhir Kumar | L. Malathi
Volume: 2
Issue: 3
Year: 2013
A COMPETENT PROGRESS TOWARDS PRESERVING THE DATA CONSISTENCY IN STORAGE OUTSOURCING

Author(s): Divya Malakapalli | M.Sudhir Kumar | J. Tirupathi
Volume: 2
Issue: 3
Year: 2013
AN EFFICIENT APPROACH OF AMORPHOUS PEER-TO-PEER SYSTEMS

Author(s): R.V.V.S.V. Prasad | B.S.N. Murty
Volume: 2
Issue: 3
Year: 2013
INACTIVE ATTACK EXAMINATION FOR ASSOCIATION-BASED ANONYMITY SYSTEMS

Author(s): S. Sowmya | M.Sudhir Kumar | K.Ranjith Reddy
Volume: 2
Issue: 3
Year: 2013
Automated Facial Feature Points Extraction

Author(s): Arun Kumar Nagdeve | Somesh Kumar Dewangan
Volume: 1
Issue: 3
Year: 2012
An algorithm of Total Variation for Image Inpainting

Author(s): Shubhangi N. Ghate | Shilpa Achaliya | Smitha Raveendran
Volume: 1
Issue: 3
Year: 2012
ANALYSIS OF HSV COLOR SPACE FOR IMAGE RETRIEVAL

Author(s): Rachita Sharma | Sanjay Kumar Dubey
Volume: 1
Issue: 3
Year: 2012
Automated Face Detection in Color Images using Skin Region and Adaptive template Matching

Author(s): Chandrashekar M Beedimani
Volume: 1
Issue: 3
Year: 2012
A Study of Remote Sensing Technology and its Applications

Author(s): Subrahmanyeswara Rao. Maradani
Volume: 1
Issue: 3
Year: 2012
A Novel Content Based Image Retrieval using Variance Color Moment

Author(s): Hariharapavan Kumar Bhuravarjula | V.N.S Vijaya Kumar
Volume: 1
Issue: 3
Year: 2012
Profiling on Superscalar Pipelining Architecture and Multi-Pipeline Scheduling Policies

Author(s): Tarun Bhalla | Mohit Mittal
Volume: 1
Issue: 3
Year: 2012
Hybrid Approach for Measuring String Similarity and its Usage in Supply Type Questions’ Answer Evaluation

Author(s): Khyati Rajulkumar Shah | Mayuri Patel | Jikitsha Sheth | Kalpesh Lad
Volume: 1
Issue: 3
Year: 2012
Performance Analysis of Physical Layer of WiMAX System using Simulink

Author(s): Anurag Sharma | Anita Garhwal
Volume: 2
Issue: 2
Year: 2013
Productivity Inference with Dynamic Bayesian Models in Software Development Projects

Author(s): Abou Bakar Naman | M.Ikram. Lali
Volume: 1
Issue: 2
Year: 2012
A New Focus on Distance Learning for Physically Impaired Students: A Multi-agent Oriented Approach

Author(s): Shiladitya Pujari | Subrata Mondal
Volume: 1
Issue: 2
Year: 2012
Embedded System For Intelligent Ambulance And Traffic Control Management

Author(s): Sarika Baburao Kale | Gajanan P. Dhok
Volume: 2
Issue: 2
Year: 2013
An Efficient Approach for Countering Black Hole Attack in MANETs

Author(s): S.J. Sultanuddin | Mohammed Ali Hussain
Volume: 2
Issue: 2
Year: 2013
RED TACTON HUMAN AREA NETWORKING

Author(s): Priyanka Kakade | Khobragade S V
Volume: 2
Issue: 2
Year: 2013
Mitigating effect of high GDOP on position fix accuracy of Pseudolite only Navigation System

Author(s): K Tiwary | G Sharada | Dr. Prahalada
Volume: 2
Issue: 2
Year: 2013
Virtual Class Management

Author(s): Drashti Shrimal | Shraddha Singh | Deepika Rajendra Jain
Volume: 2
Issue: 2
Year: 2013
Implementing the ARM7 Soft Core Processor in FPGA

Author(s): Y.B.T. Sundari | T. Surender Reddy | Laxminarayana G
Volume: 2
Issue: 2
Year: 2013
Regression Model Diagnostic, Test and Robustification in the Presence of Multicollinear Covariates: A Review

Author(s): Olushina Olawale Awe | Isaac Oluseyi Ajao | Michael A.Olagunju
Volume: 2
Issue: 2
Year: 2013
Biometrics -A Review

Author(s): Surjeet Singh | Upasna Gambhir
Volume: 2
Issue: 2
Year: 2013
Mutual Information-Based Supervised Attribute Clustering for Large Microarray Sample Classification

Author(s): Senthamarai Kannan S | Sherin Mariam John
Volume: 2
Issue: 2
Year: 2013
Forgery Detection in Offline Handwritten Signature using Global and Geometric Features

Author(s): Ashish Chandra Verma | Dipankar Saha | H. Saikia
Volume: 2
Issue: 2
Year: 2013
Low power add and shift multiplier design using BZFAD architecture

Author(s): Prasann D Kulkarni | S.P. Deshpande | G.R. Udupi
Volume: 2
Issue: 2
Year: 2013
Implementation of Integrity of Voice and face Recognition for Home Security by using GSM AND ZIGBEE

Author(s): Chandrasekhar Lokanadham | B. Purna V. Subbarao | V. Santhisri
Volume: 1
Issue: 2
Year: 2012
A Distributed Synchronous Algorithm for Minimum-Weight Spanning Trees

Author(s): Md Mohsin Ali | Mst Shakila Khan Rumi
Volume: 1
Issue: 2
Year: 2012
Corpus based Emotion Extraction to implement prosody feature in Speech Synthesis Systems

Author(s): Manoj B Chandak | Swati Bhutekar
Volume: 1
Issue: 2
Year: 2012
RSA Algorithm Implementation for Ciphering Medical Imaging

Author(s): Samoud Ali | Cherif Adnen
Volume: 1
Issue: 2
Year: 2012
Architecture of Mobile application, Security issues and Services involved in Mobile Cloud Computing Environment

Author(s): Swarnpreet SIngh Saini | Ritu Bagga | Devinder Singh | Tarun Jangwal
Volume: 1
Issue: 2
Year: 2012
AUTOMATION OF ROTOMOULDING PLANT (RP) USING PLC

Author(s): Bushra Naz Soomro | Naveed Ahmed Jaffari | Faisal KaimKhani
Volume: 2
Issue: 2
Year: 2013
Acquisition and Utilization of Statistical Consulting/Collaboration Skills among University Students in Nigeria: A Recent Survey

Author(s): Olushina Olawale Awe | Dayo Micheal Oguntuase
Volume: 2
Issue: 2
Year: 2013
Selection of Multi-Cloud Storage Using Cost Based Approach

Author(s): Sai Kiran M | Gowtham Kumar Neredumilli | Praveen Kumar Rao K
Volume: 2
Issue: 2
Year: 2013
Cloud Security Based On Oracle Storage Using Transparent Table Encryption Technique

Author(s): Ankita Prakash Baheti | Surendra Vasantrao Patil
Volume: 2
Issue: 2
Year: 2013
Drowsiness Detection Based on Eye Shape Measurement

Author(s): Shashidhar M. Sugur | Vidyagouri B. Hemadri | U.P. Kulkarni
Volume: 2
Issue: 2
Year: 2013
Achieving Information Accountability in Cloud Computing Environment

Author(s): P Sobha Rani | V. Sangeeta | P.Suresh Babu
Volume: 2
Issue: 2
Year: 2013
COMPARATIVE STUDY OF LOAD BALANCING TECHNIQUES FOR OPTIMIZATION OF NETWORK LIFETIME IN WIRELESS SENSOR NETWORKS

Author(s): Lalit Kumar Saraswat | Sachin Kumar
Volume: 2
Issue: 2
Year: 2013
Uniform Payment System for Banking Industries: A Case Study in Bangladesh

Author(s): Md. Baharul Islam | Md. Tukhrejul Inam | Md. Ekramul Kabir
Volume: 2
Issue: 2
Year: 2013
Data Mining in Medical Application for better Detection of Disease

Author(s): Fanil V. Gada | Kartik R. Yadav | Rupen Deepak Shah
Volume: 2
Issue: 2
Year: 2013
A NEW DATA HIDING METHOD USING PIXEL POSITION AND LOGICAL AND OPERATION

Author(s): Ravi Saini | Rajkumar Yadav
Volume: 1
Issue: 1
Year: 2012
A Novel approach of Hybrid Method of Hiding the Text Information Using Stegnography

Author(s): Thamaraiselvan R | A. Saradha
Volume: 1
Issue: 1
Year: 2012
A hybrid k-Mean-GRASP for partition based Clustering of two-dimensional data space as an application of p-median problem

Author(s): Sunil Nadella | Kiranmai M V S V | Narasimha Gugulotu
Volume: 1
Issue: 1
Year: 2012
A number of Real Time Operating Systems Implemented in Hardware

Author(s): Aashish A. Gadgil
Volume: 2
Issue: 1
Year: 2013
SEGMENTATION BASED DETECTION OF BRAIN TUMOUR

Author(s): Bairu Krishnaji Saptalakar | Rajeshwari H
Volume: 2
Issue: 1
Year: 2013
Power Efficient Data Transmission in a Clustering Protocol with Mobile Sink

Author(s): Sathish G P | B.R.Shyamala Devi
Volume: 2
Issue: 1
Year: 2013
Media - Oriented Rate Selection Algorithm for IEEE 802.11 WLANs

Author(s): Syed Umar | Mohammed Ali Hussain
Volume: 2
Issue: 1
Year: 2013
Implementation of OFDM and Channel Estimation using LS and MMSE Estimators

Author(s): Sajjad Ahmed Ghauri | Sheraz Alam | M. Farhan Sohail | Asad Ali | Faizan Saleem
Volume: 2
Issue: 1
Year: 2013
Spectrum Sensing for Cognitive Radio Networks over fading channels

Author(s): Sajjad Ahmed Ghauri | I M Qureshi | M. Farhan Sohail | Sheraz Alam | M. Anas Ashraf
Volume: 2
Issue: 1
Year: 2013
Geodesic Approach for 3D Image Construction using Laser Triangulation Method

Author(s): Tallha Akram | QiChang Duan | Muhammad Usman
Volume: 2
Issue: 1
Year: 2013
AUTOMATION OF ROTOMOULDING PLANT (RP) USING PLC

Author(s): Bushra Naz Soomro | Bushra Naz | Faisal Kaim Khani
Volume: 2
Issue: 1
Year: 2013
Detecting a Moving Object

Author(s): Archana Sidhanti | Anusha Sidhanti
Volume: 2
Issue: 1
Year: 2013
VEHICLE LICENSE PLATE CHARACTER SEGMENTATION – A VEHICLE LICENSE PLATE CHARACTER SEGMENTATION – A STUDY

Author(s): V. Karthi Keyan | R. Sindhu | K. Anusha | D.S. Vijith
Volume: 2
Issue: 1
Year: 2013
A PRACTICAL APPROACH TO WORKING OF WEB SEARCH ENGINE

Author(s): Vijaya Kumar P N | Raghunatha Reddy V
Volume: 2
Issue: 1
Year: 2013
Development and performance of new-Antenna Diversity Techniques for OFDM Systems

Author(s): Abdelhamid Cherifi | B. Yagoubi | B.S. Bouazza | A. Garadi
Volume: 2
Issue: 1
Year: 2013
Affiliate Program      Why do you need a reservation system?