Impact Factor : 4.396 icon | Submit Manuscript Online icon

Volume-2, Issue-5

No. Title and Author Area Country Page
101 PRIVACY AND SECURITY CONCERNS IN CLOUD COMPUTING
-sravani reddy
computer science and engineering
India
408-410
102 “Mobile Wallet” in real world using the J2ME
-Diljeet Singh Chhundawat ; Manish Verma; Nandkishor Patidar; Prabhat Kumar Singh
Computer Science
India
411-415
103 An Implementation of a Compact 32-Bit Advanced Encryption Standard Design for Embedded Systems
-Ms SOWMYA S ; Mr. Ravi H. Talawar
Electronics Engineering
India
416-419
104 survey on automatic profile change of smart phone
-Nalamothu abhishek
computer science
India
420-423
105 An MATLAB Implementation of Privacy preserving Speaker Verification and Identification using Gaussian Mixture Models
-Harisha G S ; Reshma M
Digital Electronics and Communication engineering
India
424-427
106 Design of Intelligent Mobile Vehicle Checking System Based on ARM7
-K SAIRAM
COMPUTER SCIENCE ENGINEERING
India
428-430
107 PIC18LF4620 Based Customizable Wireless Sensor Node to Detect Hazardous Gas Pipeline Leakage
-K PUNITH KUMAR
COMPUTER SCIENCE ENGINEERING
India
431-434
108 GPS RECEIVER IMPLEMENTATION USING SIMULINK
-N.NITHIN CHOWDARY ; C.ABHISHEK; N.SASIKIRAN
ELECTRONICS AND COMMUNICATION ENGINEERING
India
435-437
109 4G FUTURE TECHNOLOGY
-VASANTHA NARAYANAN
computer science
India
438-441
110 Perfect Reconstruction Of Quadrature Mirror Filter Bank Using Window Technique
-Charu Garg ; Priyanka Bansal
electronics and communication engineering
India
442-444
111 A Hybrid Approach for Re-current Frequent ItemSet Mining
-Surendra Tiwari ; Prof. Suma B
Computer Science
India
445-446
112 A NEW CLOUD BASED SUPERVISORY CONTROL AND DATA ACQUISITION IMPLEMENTATION TO ENHANCE THE LEVEL OF SECURITY USING TESTBED
-shaik javeedh
computer science engineering
India
447-451
113 servers of cloud computing
-snehith.jp ; sonti srihari
computer science and engineering
India
452-455
114 Review of Guidelines, Challenges and Design Frameworks for web publishing.
-K.S.Harikrishna ; Dr.D.VENKATA SUBRAMANIAN
computer science engineering
India
456-457
115 GRID TECHNIQUE FOR VIDEO TRANSMISSION AND STREAMING
-SAILESH TOPPO N ; SAILESH TOPPO N; K.LAKSHMANASWAMY
Computer Science and Engineering
India
458-459
116 Network and Security
-Kotha.Dinesh Babu
computer science engineering
India
460-462
117 Spectrum Sensing in Cognitive Radios for Efficient Utilisation of Resources
-Sheetal Bajaj ; Er. Rajni
Electronics & Communication
India
463-466
118 Performance Analysis of Enhanced Zone Routing Protocol (EZRP) in Mobile Ad Hoc Network
-Hema Rani ; Pooja Nagpal
Electronics & Communication
India
467-470
119 Secure replication of service accessibility in Mesh networking using dynamic path restoration
-sindhu kasirala
computerscience
India
471-474
120 Estimation in Software Development Using COCOMO and Functional Point Analysis
-Komal Garg ; Paramjeet Kaur; Shalini Kapoor; Shilpa Narula
software engineering
India
475-477
121 Security Issues in a SaaS Service Model
-Ami Ladani
Computer Engineering
India
478-483
122 Design and Analysis of Elliptical IIR filter using pipelined MAC Algorithm
-Sunil Kumar Yadav ; Rajesh Mehra
VLSI
India
484-486
123 THE EXPERIMENTAL ANALYSIS OF CLOSE LOOP PULSATING HEAT PIPE BY USING R-134a AT 83%,70%AND 50% FR
-Prashant B. Dukare ; Dr. Nilesh Diwakar; Dr.Rajiv Arya
Mechanical Department
India
487-492
124 An implementation on Towards generalizing classification based speech separation
-SHWETHA D.N ; Reshma.M
Electronics and communication Engineering
India
493-497
125 Effective video storing technique using indexing
-k.Ramaswamy ; Dr.D.VENKATA SUBRAMANIAN
computer science engineering
India
498-499
126 Detection Of Clones from UML Diagrams
-Pamilpreet Singh ; Harpreet Kaur
Computer Engineering
India
500-503
127 Text Detection Using Adjacency Relationship in Connected Components
-Brajesh Kumar
Computer Science Engineering
India
504-506
128 Unified Extensible Firmware Interface: Security solution for modern computer secure boot
-Krishna Kumar S ; Prof. Shravani G S
Computer Network security
India
507-509
129 IMPROVISATION OF MATERIAL HANDLING ACTIVITIES FOR CONTINUOUS CONVEYOR MIXED MODEL ASSEMBLY LINE
-SAGAR V ; H RAMAKRISHNA; Mr.Rajashekhar.S Bademi
INDUSTRIAL ENGINEERING MANAGEMENT
India
510-512
130 INTRUSION DETECTION USING MFCC , VQA AND LBG ALGORITHM
-CHARU CHHABRA ; ARCHIT KUMAR
COMPUTER SCIENCE ENGINEERING
India
513-517
131 Green Computing
-P.Harish Kumar
Computer Science and Engineering
India
518-519
132 Networking application on coding development
-R.Rajalakshmi
Computer science engineering
India
520-522
133 A Practical Incentive System for Multihop Wireless Networks
-M.SUDHAKAR REDDY ; K.VENKAT; B.HARSHAVARDHAN; D.SIDDHANATH
ELECTRONICS AND COMMUNICATION ENGINEERING
India
523-525
134 chunking algorithim for data deduplication
-sachit ghimire ; D.venkata subramanian
computer engineering
India
526-529
135 Ideal Modelling of Data Mining
-Harshil Joshi ; Keval Parikh
Computer Engineering
India
530-533
136 An Implementation of Spectrum Sharing Scheme between Cellular Users and Ad-hoc Device to Device users
-Akilesh S ; Ravi H Talawar
Digital Electronics and Communication engineering
India
534-540
137 CLASSIFICATION OF CANCEROUS TISSUES BASED ON PATTERN RECOGNITION AND FEED FORWARD NEURAL NETWORK
-S.K.HEMAPREETHY
Image Processing
India
541-545
138 DATA MINING AND WAREHOUSING
-N.MANASA REDDY ; N.MANASA REDDY
COMPUTER SCIENCE AND ENGINEERING
India
546-549
139 Grain Cleaning Machine with the Use of the Electrical Energy
-Nikunj K. Patel
Mechanical Engineering
India
550-551
140 IMAGE PROCESSING ON DISTRIBUTED ENVIRONMENT
-MUTHU LAKSHMI .L ; MUTHU LAKSHMI .L
COMPUTER SCIENCE AND ENGINEERING
India
552-553
141 Heart Disease Prediction using Naive Bayes Classification in Data Mining
-RUCHIKA RANA ; Jyoti Pruthi
computer sc
India
554-557
142 An Inquisitive Model for Security Of Web Services
-MONIKA ; k.dheeraj
Computer Science Engineering
India
558-562
143 Performance of WSNs under the Effect of Collisions and Interference
-p.yeshwanth kumar ; mani
computer science & engineering
India
563-568
144 Dynamic Channel Allocation Parameters for best use
-Sushant Jhingran ; Sher Jung Khan
Computer Science
India
569-570
145 Detection of transportation mode using mobile phones
-Jayashree.M
Information technology
India
571-573
146 PARTIAL CORPUS CALLOSAL AGENESIS
-A.sultan
Computer Science and Engineering
India
574-575
147 IMPLEMENTATION OF CHAOTIC ALGORITHM FOR IMAGE TRANSCODING
-PRADEEP K GM ; Dr. RAVIKUMAR M .S
ELECTRONICS & COMMUNICATIONS ENGINEERING
India
576-581
148 Optimization of Governor Cover Leakage Testing Process to Reduce the Rejection Rate at the Customer End
-Rajiv.K.S ; H.Ramakrishna
Industrial Engineering
India
582-585
149 Snake Robotics
-Sathish Kumar
Robotics
India
586-588
150 Cyborg
-T. Arul Raj
Robotics
India
589-593
PREV 1 2 3 4 5 NEXT
Volume - 2, Issue - 5 -