Latest News |
Research Article | Author | Pages | Download |
---|---|---|---|
A Survey on Stock Market Prediction Using SVM |
Sachin Sampat Patil
[2016]
View Abstract //php echo " [View Abstract]"; ?> |
01-07 | |
Survey on Ant Colony Optimization |
Shweta Teckchandani
[2016]
View Abstract //php echo " [View Abstract]"; ?> |
8-12 | |
COMPUTING SHORTEST DISTANCE OF HAMILTONIAN FUZZY CYCLES USING EIGEN VALUES |
Abarna Parthiban
[2016]
View Abstract //php echo " [View Abstract]"; ?> |
13-17 | |
Stock Market Prediction Using Support Vector Machine |
Sachin Sampat Patil
[2016]
View Abstract //php echo " [View Abstract]"; ?> |
18-25 | |
A Review on Concise and Lossless Representation of High Utility Item sets with CHUD Algorithm |
Abhijit P. Ingale
[2016]
View Abstract //php echo " [View Abstract]"; ?> |
26-31 | |
A Review on Performance Evaluation of Channel Assignment in Wireless Network Using Genetic Algorithm |
Tapesh Bharti
[2016]
View Abstract //php echo " [View Abstract]"; ?> |
32-35 | |
A Novel Method by using Bipolar Merits for Mazher-Eslam Variability frequency Algorithm to assess HRV for diagnostic |
Eslam I Alsaba
[2016]
View Abstract //php echo " [View Abstract]"; ?> |
36-43 | |
A Serve on Slicing: Method of Data Publishing While Maintaining Privacy |
Devpal Yadav
[2016]
View Abstract //php echo " [View Abstract]"; ?> |
44-50 | |
Sybil Attack Multiple Identification Security Mechanism in MANET |
Priyanka Patware
[2016]
View Abstract //php echo " [View Abstract]"; ?> |
51-59 | |
Simplifying Hall-Yarborough Equation of State for Better Prediction of Hydrocarbon Compressibility Factors |
Ibrahim A,isehunwa, S.o,a.d.i, Sulaiman,salahudeen, I
[2016]
View Abstract //php echo " [View Abstract]"; ?> |
60-68 | |
Energy Efficient Routing with MAX-LEACH Protocol in WSN |
Nidhi Ghodki, Neeraj Singh, Deepanjali Joshi, Mukesh Dikshit
[2016]
View Abstract //php echo " [View Abstract]"; ?> |
69-73 | |
Energy Efficient VM Migration in Cloud for Load Balancing |
Shweta Teckchandani, Kailash Patidar
[2016]
View Abstract //php echo " [View Abstract]"; ?> |
74-78 | |
Optimization of Multi objective Economic Load Dispatch with Emission Constraint Using New PSO |
Ravi Shankar, Hemant Mahala
[2016]
View Abstract //php echo " [View Abstract]"; ?> |
79-85 | |
ANALYSIS OF VARIOUS INTRUSION DETECTION TECHNIQUES |
Sana Sheikh,angad Singh
[2016]
View Abstract //php echo " [View Abstract]"; ?> |
86-90 | |
Transforming an Existing Distribution Network into Autonomous Micro-Grid Using PSO to Reduce Losses & Improve Voltage Profile |
Nitin Chandrakant Patil, Prabhodh Kumar Khampariya
[2016]
View Abstract //php echo " [View Abstract]"; ?> |
91-95 | |
Implementation of CHUD based on Association Matrix |
Abhijit P. Ingale, Kailash Patidar, Megha Jain
[2016]
View Abstract //php echo " [View Abstract]"; ?> |
96-100 | |
Review on Superconducting Fault Current Limiter |
Pravin S. Chaudhari, Prabhod Kumar Khampariya
[2016]
View Abstract //php echo " [View Abstract]"; ?> |
101-108 | |
Review of Realization of Three Phase Two Stage Grid System by Using LLC Resonant Converter |
Bhooshan Dileep Darkonde, Prof. Prabhodh Kumar Khampariya
[2016]
View Abstract //php echo " [View Abstract]"; ?> |
109-118 | |
Low Area 8 Bit Multiplier using Hardware Reuse Technique |
Rakesh Patel, Prof. Himanshu Nautiyal, Prof. Sangeeta Shukla
[2016]
View Abstract //php echo " [View Abstract]"; ?> |
119-124 | |
Investigation of Power aware and rate control in CSMA/CA based Mobile Ad-Hoc Communication |
Ajay Kumar Golait, Dr. Poonam Sinha
[2016]
View Abstract //php echo " [View Abstract]"; ?> |
125-136 | |
Cost and Size Analysis of Hybrid System Using homer Optimization |
Nagma Bee, Siju George
[2016]
View Abstract //php echo " [View Abstract]"; ?> |
137-143 | |
A Survey of Secure Routing in Mobile Ad-hoc Network |
Utsav Singhi,prof. Gagan Sharma
[2016]
View Abstract //php echo " [View Abstract]"; ?> |
144-150 | |
A Fast Name Lookup Method in NDN Based on Hash Coding |
Mr. Shuaibo Feng, Assoc. Prof. Mingchuan Zhang, Assoc. Prof. Ruijuan Zheng
[2016]
View Abstract //php echo " [View Abstract]"; ?> |
151-159 | |
Nearest Neighbour based Security Scheme against Black Hole attack in MANET |
Swati Saxena,prof Ms. Sini Shibu
[2016]
View Abstract //php echo " [View Abstract]"; ?> |
160-168 | |
LSB Based Watermarking of Digital Images against Various Attack |
Abhishek Ray, Prof. K. K. Tiwari
[2016]
View Abstract //php echo " [View Abstract]"; ?> |
169-175 |