Latest News |
Research Article | Author | Pages | Download |
---|---|---|---|
Secure Android application for Farmers based on Ratings and reviews (SAFR) |
Rashmi Gaikwad, Ashwini Gawade, Priya Sinha, Prof. Sharmila Chopade
[2017]
View Abstract //php echo " [View Abstract]"; ?> |
194-197 | |
Efficient Energy Based Path Selection in Sensor Ad-Hoc Cognitive Radio Network |
Vijay Mishra, Prof. Kamlesh Chandravashi
[2017]
View Abstract //php echo " [View Abstract]"; ?> |
198-203 | |
A Survey on Security Schemes against Attack in Digital image Watermarking |
Kanhaiya Kumar, Prof. Dharmendra Kumar Singh
[2017]
View Abstract //php echo " [View Abstract]"; ?> |
204-207 | |
Various Approaches of Hiding Sensitive Information from Outsourced Dataset |
Dhanisha Mukundan, Dr. Varsha Namdeo
[2017]
View Abstract //php echo " [View Abstract]"; ?> |
208-211 | |
Security Schemes against Black hole Attack in Mobile Ad Hoc Network |
Prof. Shrikant Ahirwar, Ajesh Kumar Jhariya
[2017]
View Abstract //php echo " [View Abstract]"; ?> |
212-217 | |
A Survey on Localization Techniques in Wireless Sensor Networks |
Deepak Kumar Rai, Prof. Dharmendra Kumar Sing
[2017]
View Abstract //php echo " [View Abstract]"; ?> |
218-220 | |
Fuzzy Fault Tree Analysis of LPG Cross Country Pipelines -A Case Study |
V R Renjith, Meenuvijayan, Sabitha Soman
[2017]
View Abstract //php echo " [View Abstract]"; ?> |
221-227 | |
Comparative Data Analysis based K-Medoid Method and Effective K-Medoid Algorithm |
Kapil Patidar, Prof. Ankita Porwal
[2017]
View Abstract //php echo " [View Abstract]"; ?> |
228-232 | |
Effect of Tyre Pressure and Temperature on Rutting Characteristics of Warm Mix Asphalt in Bituminous Concrete Layer |
Aravind Chavan, Kiran Kumar .b .v
[2017]
View Abstract //php echo " [View Abstract]"; ?> |
233-240 | |
A Survey of Data Mining Clustering Algorithms Based on Partitioning Clustering |
Omlata Dohare, Prof. Aishwaryai Vishwakarma
[2017]
View Abstract //php echo " [View Abstract]"; ?> |
241-244 | |
Modern Face Recognition Algorithm and Techniques: A Survey |
Chaudhari Nivrutti Janardhan, Gagan Sharma, Rajesh Sharma
[2017]
View Abstract //php echo " [View Abstract]"; ?> |
245-249 | |
Method Based Survey on Pattern Matching |
Saba Khanum
[2017]
View Abstract //php echo " [View Abstract]"; ?> |
250-257 | |
A Study on Image Retrieval Features and Techniques with Various Combinations |
Khushbu Tandel, Dr. Varsha Namdeo
[2017]
View Abstract //php echo " [View Abstract]"; ?> |
258-261 | |
Role of Rhizosphere Bacteria in Augmenting Plant Growth |
Namrata S. Bhardwaj
[2017]
View Abstract //php echo " [View Abstract]"; ?> |
262-266 | |
A Multi-objective Optimization Approach for Optimal Location and Sizing of SVC to Enhance Power System Security |
T. N. V. L. N. Kumar, R. V. S. Satyanarayana
[2017]
View Abstract //php echo " [View Abstract]"; ?> |
267-274 | |
The Study of Gas Turbines and their Applications in Aircrafts and Electricity Generation |
Aseem Acharya, Richa Sharma
[2017]
View Abstract //php echo " [View Abstract]"; ?> |
275-278 | |
Effect of Demonetization on Employment Generation in Micro, Small and Medium Enterprises |
Devendra Kumar Tiwari, Deepika Tiwari
[2017]
View Abstract //php echo " [View Abstract]"; ?> |
279-284 | |
Multiparty Privacy by Utilizing Modified Frequent Pattern Tree and Super modularity Approach |
Archana Singh, Varun Singh
[2017]
View Abstract //php echo " [View Abstract]"; ?> |
285-288 | |
Soft Computing Based Relevant Image Retrieval by Using GLCM and Annotation |
Pooja Tripathi, Parikshit Tiwari
[2017]
View Abstract //php echo " [View Abstract]"; ?> |
289-293 | |
A Survey on Management Educational Institutions (A case study of Guntur and Krishna Districts of Andhra |
Pulla Rao Kota, Prof. S. Vijaya Raju
[2017]
View Abstract //php echo " [View Abstract]"; ?> |
294-301 | |
Modified Bayes Thresholding based Wavelet Filter for Gaussian Noise Removal |
Sandip Mehta
[2017]
View Abstract //php echo " [View Abstract]"; ?> |
302-305 | |
Digital Image Steganography using Particle Swarm Optimization with DCT and BPPCM |
Swati Patel, Prof. Jitendra Agrawal
[2017]
View Abstract //php echo " [View Abstract]"; ?> |
306-310 | |
A Review on WiMAX System Using Modulation Method |
Sonam Pyasi, Mrs. Megha Soni
[2017]
View Abstract //php echo " [View Abstract]"; ?> |
311-314 | |
Trusted path selection for resistance of black-hole Attack in MANET |
Md Shamsul Haque, Prof. Deepak Singh Tomar
[2017]
View Abstract //php echo " [View Abstract]"; ?> |
315-320 | |
Security Schemes against Attack in Digital image Watermarking Based DCT and EIPT |
Kanhaiya Kumar, Prof. Dharmendra Kumar Singh
[2017]
View Abstract //php echo " [View Abstract]"; ?> |
321-325 | |
An Efficient Product Rating Prediction by Removing Fake Users and Social Fuzzy Features |
Rajesh Kumar Soni, Prof. Aishwarya Vishwakarma
[2017]
View Abstract //php echo " [View Abstract]"; ?> |
326-329 | |
Performance Analysis of Curvelet Transform and Wavelet Transform for Stable Digital Images |
Ambika Thampuratty, Dharmendra Kumar Singh
[2017]
View Abstract //php echo " [View Abstract]"; ?> |
330-333 | |
Economic, Ecological and Human Outcomes of Bacteria |
Namrata S. Bhardawaj
[2017]
View Abstract //php echo " [View Abstract]"; ?> |
334-338 | |
Multiple-Scan Lossless Predictive Huffman Coding |
Sandip Mehta
[2017]
View Abstract //php echo " [View Abstract]"; ?> |
339-341 | |
GRID CONNECTED MULTILEVEL INVERTER SYSTEM |
Achie Malviya, Anuprita Mishra
[2017]
View Abstract //php echo " [View Abstract]"; ?> |
342-345 | |
Security against Attacks in Wireless Sensor Network: A Survey |
Sonali Mahaver, Prof. Kamlesh Chandravanshi
[2017]
View Abstract //php echo " [View Abstract]"; ?> |
346-351 | |
A Survey on Image Retrieval using Different Features and Techniques |
Sachendra Saxena, Prof. Anshul Bhattia
[2017]
View Abstract //php echo " [View Abstract]"; ?> |
352-356 |