Design and Simulation of Fan Shape Fractal Antenna for XBand Application

Author(s): Yogesh Bhomia | Devesh Kumar Singh Rathore
Volume: 2
Issue: 4
Year: 2013





Metamaterial Based Antenna with Modified SRR Structure

Author(s): Manish Upadhyay | Sudeep Singh Somvanshi
Volume: 2
Issue: 4
Year: 2013





Effect of sectoring on the capacity of CDMA multi-hop communication network

Author(s): Kshipra Yadav | Dr.Manish Rai
Volume: 2
Issue: 4
Year: 2013





Modified GDI Technique - A Power Efficient Method For Digital Circuit Design

Author(s): Pankaj Verma | Ruchi Singh | Y. K. Mishra
Volume: 2
Issue: 4
Year: 2013





PUBLIC LINEAR PROGRAMMING SOLUTION FOR THE DESIGN OF SECURE AND EFFICIENT COMPUTING IN CLOUD

Author(s): T.Amardeep | Dr.R.V.Krishnaiah
Volume: 2
Issue: 4
Year: 2013





INTEGRATED EXPRESSIONAL AND COLOR INVARIANT FACIAL RECOGNITION SCHEME FOR HUMAN BIOMETRIC SYSTEM

Author(s): E.Mary shyla, | M.Punithavalli
Volume: 2
Issue: 4
Year: 2013





Design of a Floating-Point Fused Add-Subtract Unit Using Verilog

Author(s): Mayank Sharma, | Prince Nagar, | Ghanshyam Kumar Singh | Ram Mohan Mehra
Volume: 2
Issue: 3
Year: 2013





Protection of DNS using HAVAL

Author(s): Raghvendra Vikram Singh | Deepak Chaudhary
Volume: 2
Issue: 3
Year: 2013





DC Motor Load Analysis and Cooling Consideration to Optimise the Power Consumption- Case Study

Author(s): Mr. K.G. Bante | Mr. S.G. Tarnekar | Mr. D.R. Tutakane
Volume: 2
Issue: 3
Year: 2013





UML Modelling: The Rational E-Development

Author(s): Er. Meenu Gupta | Dr. Rajeev Yadav | Minakshi Memoria
Volume: 2
Issue: 3
Year: 2013





Eye State and Head Position Technique for Driver Drowsiness Detection

Author(s): Ayush Joshi | Shruti Gujrati | Amit Bhati
Volume: 2
Issue: 3
Year: 2013





Intrusion Detection Based On Clustering Algorithm

Author(s): Nadya El MOUSSAID | Ahmed TOUMANARI | Maryam ELAZHARI
Volume: 2
Issue: 3
Year: 2013





COMPARATIVE ANALYSIS OF A3, EECDS AND KNEIGH TREE PROTOCOLS IN WIRELESS SENSOR NETWORKS

Author(s): Glory Pachnanda | Kuldeep Singh | Lalita Gangwar
Volume: 2
Issue: 3
Year: 2013





Design and Analysis of PI like Fuzzy Logic Controlled Buck Converter

Author(s): M.SIVA RAMA KRISHNA | Dr S. SATYA NARAYANA
Volume: 2
Issue: 3
Year: 2013





DETECTION OF LANDMINES USING IMPULSE GROUND PENETRATING RADAR

Author(s): RAMAKRISHNA PORANDLA | PODILI RAMU | GELLA RAVIKANTH
Volume: 2
Issue: 3
Year: 2013





Enhanced Image Segmentation Using Fuzzy Logic

Author(s): Manpreet singh
Volume: 2
Issue: 3
Year: 2013





Parallelizing Network Flow Using ϵ-relaxation Algorithm

Author(s): Kalpesh Adhatrao | Abhishek Aswar | Aishwarya Iyer | Amroz Siddiqui
Volume: 2
Issue: 3
Year: 2013





Analysis of xDSL Technologies

Author(s): Dimple Saproo | Megha Goyal | Asha Bhagashra | A.N.Mahajan
Volume: 2
Issue: 3
Year: 2013





Lesion detection in eye due to Diabetic Retinopathy

Author(s): Himanshu Saxena | Rohit Singhal
Volume: 2
Issue: 3
Year: 2013





Analysis to Compensate Dispersion in Optical Communication Link Using Chirp Grating

Author(s): Anandita joy agarwal | Mukesh kumar | A.K Jaiswal | Rohini Saxena
Volume: 2
Issue: 3
Year: 2013





An Efficient and Reliable Handover Mechanism in WiMAX Network

Author(s): Sandeep Antil
Volume: 2
Issue: 3
Year: 2013





Information Diffusion and Provenance in Online Social Media Networks

Author(s): Naman Goel | Arun Kumar Agrawal
Volume: 2
Issue: 3
Year: 2013





CMOS current comparator with Regenerative property

Author(s): Lino M Samuel | K.V. Meena, | Savita Y Patil,
Volume: 2
Issue: 3
Year: 2013





Comparison of different techniques of dispersion compensation

Author(s): Anandita joy Agarwal | Mukesh kumar | Rohini Saxena
Volume: 2
Issue: 3
Year: 2013





Comparison on Time Basis of Atrial Fibrillation with Normal Sinus Rhythm ECG on MATLAB

Author(s): Rajan Chaudhary | Santosh Kumar
Volume: 2
Issue: 3
Year: 2013





Data mining a kidney failure data set using Rough Sets

Author(s): Prof. K Govinda Rajulu | Prof. B K Tripathy
Volume: 2
Issue: 3
Year: 2013





Automated Robot with Object Recognition and Handling Features

Author(s): Amiraj Dhawan | Anuradha Bhat | Soumya Sharma | Harish Kumar Kaura
Volume: 2
Issue: 3
Year: 2013





Performance Evaluation of Complex Multiplier Using Advance Algorithm

Author(s): Gopichand D. Khandale | Laxman P. Thakare | Dr. A. Y. Deshmukh
Volume: 2
Issue: 3
Year: 2013





Analysis of High Dimensional Data & Study on Classification Mining Technique

Author(s): Anupama Tammi, | V Bhavya
Volume: 2
Issue: 3
Year: 2013





Compression of a filtered Image using DCT-Technique

Author(s): Ms. Deepti Mehta | Ms. Kavita Chauhan
Volume: 2
Issue: 3
Year: 2013





Modeling of Surface Reflectance of Acid Textured Multicrystalline Silicon Wafer for Solar Cell Application

Author(s): Firoz Khan | Abdul Mobin
Volume: 2
Issue: 3
Year: 2013





VLSI based FFT Processor with Improvement in Computation Speed and Area Reduction

Author(s): M.Sheik Mohamed | K.Jalal Deen | Dr.R.Ganesan
Volume: 2
Issue: 3
Year: 2013





Regression model for Quality of Web Services dataset with WEKA

Author(s): Shalini Gambhir | Puneet Arora | Jatin Gambhir
Volume: 2
Issue: 3
Year: 2013





FPGA Implementation of Double Precision Floating Point Multiplier using Xilinx Coregen Tool

Author(s): Sukhvir Kaur | Parminder Singh Jassal
Volume: 2
Issue: 3
Year: 2013





FPGA Implementations of the Hummingbird Cryptographic Algorithm

Author(s): Ashwani Sengar, | Ghanshyam Kumar Singh | Ram Mohan Mehra
Volume: 2
Issue: 3
Year: 2013





Temperature-aware virtual machine in Para Virtualization Cloud Environment

Author(s): Vikas Kumar
Volume: 2
Issue: 3
Year: 2013





Patch Antenna with Low Pass Filter Design to Supress Higher Order Harmonics in Efficient Rectenna Design

Author(s): Shailendra Singh Ojha | P.K. Singhal | Anshul agarawal | Akhilesh Gupta
Volume: 2
Issue: 2
Year: 2013





A Survey on Password Security Systems

Author(s): Ms. A. G. Khairnar | Prof. N. L. Bhale
Volume: 2
Issue: 2
Year: 2013





Design and Simulation of CPW-FED Printed Antenna for Ultra Wide Band (UWB) and Wireless LAN (WLAN) Applications

Author(s): P.Prabhu | C. Poongodi | R.Ranjith Kumar | K. Prabhakaran
Volume: 2
Issue: 2
Year: 2013





A Novel Compact CPW-FED Printed Dipole Antenna for UHF RFID and Wireless LAN Applications

Author(s): P. Prabhu | C.Poongodi | R.Ranjith Kumar | K. Prabhakaran
Volume: 2
Issue: 2
Year: 2013





The Roadmap for Cyber Crime Investigation

Author(s): Natasha Singh | Sona Rani
Volume: 2
Issue: 2
Year: 2013





Autonomic Data Replication in Cloud Environment

Author(s): Dhananjaya Gupt, | Mrs.Anju Bala
Volume: 2
Issue: 2
Year: 2013





ANALYSIS OF COMMUNICATION RECEIVER PERFORMANCE IN PRESENCE OF NOISE JAMMING USING VISSIM/COMM

Author(s): M.L.S.N. Swarajya Lakshmi | D. S.Ram Kiran | Dr. Niranjan Prasad | Dr. M. S. G Prasad
Volume: 2
Issue: 2
Year: 2013





Design of Self-Tuning Fuzzy PI controller in LABVIEW for Control of a Real Time Process

Author(s): A.K.Pal | I.Naskar
Volume: 2
Issue: 2
Year: 2013





Survey on Video on Demand over Mobile Ad-Hoc Networks

Author(s): Deepika Saini | Sandeep Mann
Volume: 2
Issue: 2
Year: 2013





Design of Cross-Shaped Slot Loaded Wideband Microstrip Patch Antenna for Mobile Communication

Author(s): Deepak Shukla | Archana Sharma | Abha Jain
Volume: 2
Issue: 2
Year: 2013





Environmental/Economic Power Dispatch Problem Using Particle Swarm Optimization

Author(s): Neha Mishra | Manjaree Pandit
Volume: 2
Issue: 2
Year: 2013





Designing Parallel Bus Using Universal Asynchronous Receiver Transmitter

Author(s): Satyandra Sharad | Anjali Shobhna | Prof. Satender Sharma
Volume: 2
Issue: 2
Year: 2013





Bandwidth and Gain Enhanced with H-slotted Microstrip Patch for Wireless Communication

Author(s): Pritam Singha Roy | Moumita Guha | Dr. Samik Chakraborty
Volume: 2
Issue: 2
Year: 2013





Information Security through e- learning using VTE

Author(s): Aditi Srivastava | Sonal Sinha
Volume: 2
Issue: 2
Year: 2013




