A Proposed Method for Image Steganography using Edge Detection

Author(s): Sneha Arora | Sanyam Anand
Volume: 8
Issue: June 2013
Year: 2013





Ant Colony Optimization For Improving Network Lifetime In Wireless Sensor Networks

Author(s): Amandeep Singh | Sunny Behal
Volume: 8
Issue: June 2013
Year: 2013





Internet is an Effective Tool for E-Shopping

Author(s): Ch. Seetha Ram
Volume: 8
Issue: June 2013
Year: 2013





Performance Evaluation and Optimization of Wireless Sensor Networks

Author(s): Prashant Sen | Anil Rao Pimplapure | Dr Jayant Dubey
Volume: 8
Issue: June 2013
Year: 2013





Deadwood Detection and Elimination in Text Summarization for Punjabi Language

Author(s): P. Vishvapathi | Dr. S.Ramachandram | Dr.A.Govardhan3
Volume: 8
Issue: June 2013
Year: 2013





Deadwood Detection and Elimination in Text Summarization for Punjabi Language

Author(s): Mandeep kaur | Jagroop Kaur
Volume: 8
Issue: June 2013
Year: 2013





Simulation of Fuzzy Inductance Motor using PI Control Application

Author(s): Rafiya Begum | Zakeer Motibhai | Girija.Nimbal | S.V.Halse
Volume: 8
Issue: June 2013
Year: 2013





Impact of Computer Based Information Systems on Organisation Performance in Videocon Ltd.

Author(s): Dinesh Gupta
Volume: 8
Issue: June 2013
Year: 2013





Comparative Analysis of Different Protocols to Manage Large Scale Networks

Author(s): Anil Rao Pimplapure | Prashant Sen | Dr Jayant Dubey
Volume: 8
Issue: June 2013
Year: 2013





Enrolment Data of Disabled Students Of IGNOU: A Case Study Using ID3

Author(s): Nidhi Chopra
Volume: 8
Issue: June 2013
Year: 2013




