Latest News |
Research Article | Author | Pages | Download |
---|---|---|---|
Secure Android application for Farmers based on Ratings and reviews (SAFR) |
Rashmi Gaikwad, Ashwini Gawade, Priya Sinha, Prof. Sharmila Chopade
[2017]
View Abstract |
194-197 |
![]() |
Efficient Energy Based Path Selection in Sensor Ad-Hoc Cognitive Radio Network |
Vijay Mishra, Prof. Kamlesh Chandravashi
[2017]
View Abstract |
198-203 |
![]() |
A Survey on Security Schemes against Attack in Digital image Watermarking |
Kanhaiya Kumar, Prof. Dharmendra Kumar Singh
[2017]
View Abstract |
204-207 |
![]() |
Various Approaches of Hiding Sensitive Information from Outsourced Dataset |
Dhanisha Mukundan, Dr. Varsha Namdeo
[2017]
View Abstract |
208-211 |
![]() |
Security Schemes against Black hole Attack in Mobile Ad Hoc Network |
Prof. Shrikant Ahirwar, Ajesh Kumar Jhariya
[2017]
View Abstract |
212-217 |
![]() |
A Survey on Localization Techniques in Wireless Sensor Networks |
Deepak Kumar Rai, Prof. Dharmendra Kumar Sing
[2017]
View Abstract |
218-220 |
![]() |
Fuzzy Fault Tree Analysis of LPG Cross Country Pipelines -A Case Study |
V R Renjith, Meenuvijayan, Sabitha Soman
[2017]
View Abstract |
221-227 |
![]() |
Comparative Data Analysis based K-Medoid Method and Effective K-Medoid Algorithm |
Kapil Patidar, Prof. Ankita Porwal
[2017]
View Abstract |
228-232 |
![]() |
Effect of Tyre Pressure and Temperature on Rutting Characteristics of Warm Mix Asphalt in Bituminous Concrete Layer |
Aravind Chavan, Kiran Kumar .b .v
[2017]
View Abstract |
233-240 |
![]() |
A Survey of Data Mining Clustering Algorithms Based on Partitioning Clustering |
Omlata Dohare, Prof. Aishwaryai Vishwakarma
[2017]
View Abstract |
241-244 |
![]() |
Modern Face Recognition Algorithm and Techniques: A Survey |
Chaudhari Nivrutti Janardhan, Gagan Sharma, Rajesh Sharma
[2017]
View Abstract |
245-249 |
![]() |
Method Based Survey on Pattern Matching |
Saba Khanum
[2017]
View Abstract |
250-257 |
![]() |
A Study on Image Retrieval Features and Techniques with Various Combinations |
Khushbu Tandel, Dr. Varsha Namdeo
[2017]
View Abstract |
258-261 |
![]() |
Role of Rhizosphere Bacteria in Augmenting Plant Growth |
Namrata S. Bhardwaj
[2017]
View Abstract |
262-266 |
![]() |
A Multi-objective Optimization Approach for Optimal Location and Sizing of SVC to Enhance Power System Security |
T. N. V. L. N. Kumar, R. V. S. Satyanarayana
[2017]
View Abstract |
267-274 |
![]() |
The Study of Gas Turbines and their Applications in Aircrafts and Electricity Generation |
Aseem Acharya, Richa Sharma
[2017]
View Abstract |
275-278 |
![]() |
Effect of Demonetization on Employment Generation in Micro, Small and Medium Enterprises |
Devendra Kumar Tiwari, Deepika Tiwari
[2017]
View Abstract |
279-284 |
![]() |
Multiparty Privacy by Utilizing Modified Frequent Pattern Tree and Super modularity Approach |
Archana Singh, Varun Singh
[2017]
View Abstract |
285-288 |
![]() |
Soft Computing Based Relevant Image Retrieval by Using GLCM and Annotation |
Pooja Tripathi, Parikshit Tiwari
[2017]
View Abstract |
289-293 |
![]() |
A Survey on Management Educational Institutions (A case study of Guntur and Krishna Districts of Andhra |
Pulla Rao Kota, Prof. S. Vijaya Raju
[2017]
View Abstract |
294-301 |
![]() |
Modified Bayes Thresholding based Wavelet Filter for Gaussian Noise Removal |
Sandip Mehta
[2017]
View Abstract |
302-305 |
![]() |
Digital Image Steganography using Particle Swarm Optimization with DCT and BPPCM |
Swati Patel, Prof. Jitendra Agrawal
[2017]
View Abstract |
306-310 |
![]() |
A Review on WiMAX System Using Modulation Method |
Sonam Pyasi, Mrs. Megha Soni
[2017]
View Abstract |
311-314 |
![]() |
Trusted path selection for resistance of black-hole Attack in MANET |
Md Shamsul Haque, Prof. Deepak Singh Tomar
[2017]
View Abstract |
315-320 |
![]() |
Security Schemes against Attack in Digital image Watermarking Based DCT and EIPT |
Kanhaiya Kumar, Prof. Dharmendra Kumar Singh
[2017]
View Abstract |
321-325 |
![]() |
An Efficient Product Rating Prediction by Removing Fake Users and Social Fuzzy Features |
Rajesh Kumar Soni, Prof. Aishwarya Vishwakarma
[2017]
View Abstract |
326-329 |
![]() |
Performance Analysis of Curvelet Transform and Wavelet Transform for Stable Digital Images |
Ambika Thampuratty, Dharmendra Kumar Singh
[2017]
View Abstract |
330-333 |
![]() |
Economic, Ecological and Human Outcomes of Bacteria |
Namrata S. Bhardawaj
[2017]
View Abstract |
334-338 |
![]() |
Multiple-Scan Lossless Predictive Huffman Coding |
Sandip Mehta
[2017]
View Abstract |
339-341 |
![]() |
GRID CONNECTED MULTILEVEL INVERTER SYSTEM |
Achie Malviya, Anuprita Mishra
[2017]
View Abstract |
342-345 |
![]() |
Security against Attacks in Wireless Sensor Network: A Survey |
Sonali Mahaver, Prof. Kamlesh Chandravanshi
[2017]
View Abstract |
346-351 |
![]() |
A Survey on Image Retrieval using Different Features and Techniques |
Sachendra Saxena, Prof. Anshul Bhattia
[2017]
View Abstract |
352-356 |
![]() |