Academic Journals Database
Disseminating quality controlled scientific knowledge

International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)

ISSN: 2278--1323
Publisher: Shri Pannalal Research Institute of Technolgy


ADD TO MY LIST
 
Investigation of SAR inside Different Enclosures and Reduction Techniques PDF available

Author(s): J.JANISH BLESSY, T.ANITA JONES MARY, Dr.C.S.RAVICHANDRAN
Volume: 2
Issue: 3
Year: 2013
An Efficient Sharing of Personal Health Records Using DABE in Secure Cloud Environment PDF available

Author(s): T . Parameswaran | S. Vanitha | K.S. Arvind
Volume: 2
Issue: 3
Year: 2013
Price Adjustment for Double Auction Based Scheduling in Grid Environment PDF available

Author(s): Santhiya H, Karthikeyan P
Volume: 2
Issue: 3
Year: 2013
TOSCA ENABLING CLOUD PORTABILITY PDF available

Author(s): Sahithi Tummalapalli | RaviKanth. P | Yuvaraj. K | Sreenivas Velagapudi
Volume: 2
Issue: 3
Year: 2013
Position based Routing Protocols for Wireless Ad hoc Networks: A Critical Survey PDF available

Author(s): Saba Khalid,Shish Ahmad,Prof. Dr. Mohd Rizwan Beg
Volume: 2
Issue: 3
Year: 2013
Fuzzy Inference System for Image Processing PDF available

Author(s): Abhradita Deepak Borkar, Mithilesh Atulkar
Volume: 2
Issue: 3
Year: 2013
A Countermeasure for Black Hole Attack in Mobile WiMAX Networks PDF available

Author(s): M. Deva Priya | Dr. M.L. Valarmathi | S. Aishwarya | K. Jaya Bharathi
Volume: 2
Issue: 3
Year: 2013
Respiratory Cancerous Cells Detection Using TRISS Model and Association Rule Mining PDF available

Author(s): Ayyadurai.P1, Kiruthiga.P, Valarmathi.S, Amritha.S
Volume: 2
Issue: 3
Year: 2013
A Scalable Privacy-Preserving Verification Correctness Protocol to Identify Corrupted Data in Cloud Storage PDF available

Author(s): Neethu Mariam Joseph | Esther Daniel | Vasanthi N A
Volume: 2
Issue: 3
Year: 2013
Efficient Timeslot Assignment and Route Discovery Mechanism for Mobile Clients PDF available

Author(s): Gayathri. R , T. Prabakaran
Volume: 2
Issue: 3
Year: 2013
OVERVIEW OF NIGHTTIME SOLAR CELL PDF available

Author(s): H.N.Kamalaskar , Prof.P.H.Zope , Prof.S.R.Suralkar
Volume: 2
Issue: 3
Year: 2013
Network security protocol with cryptography and RFID system PDF available

Author(s): P. SWETHA | R. SUKANYA
Volume: 2
Issue: 3
Year: 2013
Cloud Computing: An Architecture, its Security Issues & Attacks PDF available

Author(s): Kalpana N. Meher | Prof. P. S. Lokhande
Volume: 2
Issue: 3
Year: 2013
E- Commerce impact on Indian Markt: a Survey on social impact PDF available

Author(s): Tryambak Hiwarkar
Volume: 2
Issue: 3
Year: 2013
An Efficient Authentication and Access Control Scheme to Protect Integrity of Anonymous Networks PDF available

Author(s): Santhosh S, Asst. Prof. Alok Ranjan
Volume: 2
Issue: 3
Year: 2013
Real Time Data Acquisition and Home Parameters Monitoring using LabVIEW PDF available

Author(s): Mr.Rajesh R. Karhe | Mr.C.S. Patil | Mr. Mahesh S. Patil
Volume: 2
Issue: 3
Year: 2013
A Review of Web Page Ranking Algorithm PDF available

Author(s): Parveen Rani
Volume: 2
Issue: 3
Year: 2013
A Novel BIST based Diagnosis Technique to Detect Faults in FPGA PDF available

Author(s): Ms.N.Ramya, Ms. N. Kirthika
Volume: 2
Issue: 3
Year: 2013
Improving the Efficiency of Ranked keyword Search over Cloud Data PDF available

Author(s): Kiruthigapriya Sengoden | Swaraj Paul
Volume: 2
Issue: 3
Year: 2013
Chunk Scheduling Strategies In Peer to Peer System-A Review PDF available

Author(s): Sanu C , Deepa S S
Volume: 2
Issue: 3
Year: 2013
PERFORMANCE ANALYSIS OF MULTICAST ROUTING PROTOCOLS IMAODV, MAODV, ODMRP AND ADMR FOR MANET PDF available

Author(s): J.Gold Beulah Patturose, P.Immanuel Vinoth
Volume: 2
Issue: 3
Year: 2013
Secured Cost Effective Group Handover Authentication Scheme For WiMAX Networks PDF available

Author(s): Mohanaprasanth.P, B.Sridevi, Dr.S.Rajaram
Volume: 2
Issue: 3
Year: 2013
CAN BASED REAL TIME IMPLEMENTATION IN AUTOMOBILE USING ARM. PDF available

Author(s): Mr. VIJAY BHAMARE , Mr. CHIRINJEEVI.
Volume: 2
Issue: 3
Year: 2013
Preamplification of Signal between Satellites PDF available

Author(s): Babisha.S. Sumi | K. Shanthalakshmi
Volume: 2
Issue: 3
Year: 2013
ARCHITECTURE OF 4-BIT PIPELINE ADC IN CMOS TECHNOLOGY PDF available

Author(s): Ms. R. M. Shende ,Prof. P. R. Gumble
Volume: 2
Issue: 3
Year: 2013
Real Time Static Hand Gesture Recognition System in Complex Background that uses Number system of Indian Sign Language PDF available

Author(s): Jayshree R.Pansare, Hrushikesh Dhumal, Sanket Babar,Kiran Sonawale, Ajit Sarode
Volume: 2
Issue: 3
Year: 2013
A Novel Role Based Cross Domain Access Control Scheme for Cloud Storage PDF available

Author(s): Punithasurya K | Esther Daniel | Dr. N.A. Vasanthi
Volume: 2
Issue: 3
Year: 2013
FGEST: FINGER TRACKING AND GESTURE RECOGNITION IN SMARTPHONES PDF available

Author(s): Pratham Parikh | Shubham Gupta | Swatil Patel | Varun Nimbalkar
Volume: 2
Issue: 3
Year: 2013
Design and VLSI Implementation of DIP Based Rod Quality Inspection PDF available

Author(s): G. Rajakumar | Dr.D. Manimegalai
Volume: 2
Issue: 3
Year: 2013
A modified Clustering algorithm based on Optimization method. PDF available

Author(s): J.Mercy Geraldine, P.Kiruthiga
Volume: 2
Issue: 3
Year: 2013
Performance Analysis on Learning Algorithms with various Facial Expressions in Spiking Neural Networks PDF available

Author(s): J.Lincy Kiruba , A.Diana Andrushia
Volume: 2
Issue: 3
Year: 2013
Improved Performance of Multiuser System Using Combined Diversity with Nagakami Fading Channel PDF available

Author(s): Gowthami.S, Jayanthi.K , Dr.V.P.Arunachalam
Volume: 2
Issue: 3
Year: 2013
Investigation on Performance of Trust Based Model and Trust Evaluation of Reactive Routing Protocols in MANET PDF available

Author(s): Dharam Vir | Dr. S.K. Agarwal | Dr.S.A. Imam
Volume: 2
Issue: 3
Year: 2013
A New Multiplier - Accumulator Architecture based on High Accuracy Modified Booth Algorithm PDF available

Author(s): J. Y. Yaswanth babu, P. Dinesh Kumar
Volume: 2
Issue: 3
Year: 2013
PSO optimized reduced order PID Controller design PDF available

Author(s): Yogendra Kumar Soni | Rajesh Bhatt
Volume: 2
Issue: 3
Year: 2013
Biometrics using Electronic Voting System with Embedded Security PDF available

Author(s): Alaguvel.R , Gnanavel.G ,Jagadhambal.K
Volume: 2
Issue: 3
Year: 2013
Multiple Event-Driven Node Localization in Wireless Sensor Networks PDF available

Author(s): Martin Victor K, Mrs. K. Ramalakshmi
Volume: 2
Issue: 3
Year: 2013
Use of Open Source Software in Engineering PDF available

Author(s): Dr. Pardeep Mittal, Jatinderpal Singh
Volume: 2
Issue: 3
Year: 2013
THROUGHPUT OPTIMIZATION IN MOBILE NETWORKS USING MILP ON EB BILLING APPLICATIONS PDF available

Author(s): D.KOWSALYA DEVI, G.PRABU , P.TAMILSELVAM
Volume: 2
Issue: 3
Year: 2013
AUTOMATED AUDITING AND LOGGING MECHANISM FOR SECURE DATA STORAGE IN CLOUD USING PROXY RE-ENCRYPTION PDF available

Author(s): J.Shyamala, D.Femila, B.Vinisha Cathrine Antonus
Volume: 2
Issue: 3
Year: 2013
A Survey on Data Aggregation Techniques for Wireless Sensor Networks PDF available

Author(s): Kriti Saini | Parveen Kumar | Jatin Sharma
Volume: 2
Issue: 3
Year: 2013
Study of User Experience (UX) and UX Evaluation methods. PDF available

Author(s): Vignesh Balasubramoniam, Niranjan Tungatkar
Volume: 2
Issue: 3
Year: 2013
Radix-4 Encoder & PPG Block for Multiplier Architecture using GDI Technique PDF available

Author(s): Ankita Dhankar, Satyajit Anand
Volume: 2
Issue: 3
Year: 2013
ADAPTIVE SHARING METHOD FOR MULTIPLE CONTINUOUS QUERY PDF available

Author(s): Mariat Thomas,Mr. G. Naveen Sundar
Volume: 2
Issue: 3
Year: 2013
Cloud Computing: Migration from Traditional Systems to the Cloud PDF available

Author(s): Ganesh Olekar,Vikram Sreekumar
Volume: 2
Issue: 3
Year: 2013
Technologies of Cloud Computing - Architecture Concepts based on Security and its Challenges PDF available

Author(s): Nandini Mishra,Kanchan khushwha,Ritu chasta
Volume: 2
Issue: 3
Year: 2013
Efficient Road Traffic Policing With Coordinators and Routers Using Radio Frequency PDF available

Author(s): Sathish Nagarajan, P Kavitha
Volume: 2
Issue: 3
Year: 2013
Hippocratic Database- Persisting privacy in e- banking PDF available

Author(s): Minakshi Memoria, Neha Malik
Volume: 2
Issue: 3
Year: 2013
Prediction Based Data Collection in Wireless Sensor Network PDF available

Author(s): V. Mathibala | Mrs. Seiya Susan Thomas
Volume: 2
Issue: 3
Year: 2013
Review of authentication and digital signature methods in Mobile ad hoc network PDF available

Author(s): Amol Bhosle, Yogadhar Pandey
Volume: 2
Issue: 3
Year: 2103

Tango Jona
Tangokurs Rapperswil-Jona

    
RPA Switzerland

RPA Switzerland

Robotic process automation