| Latest News | 
| Research Article | Author | Pages | Download | 
|---|---|---|---|
| Secure Android application for Farmers based on Ratings and reviews (SAFR) | 
               Rashmi Gaikwad, Ashwini Gawade, Priya Sinha, Prof. Sharmila Chopade
               
                 [2017]
                 
                      View Abstract //php echo " [View Abstract]"; ?>  | 
                194-197 | 
 | 
    
| Efficient Energy Based Path Selection in Sensor Ad-Hoc Cognitive Radio Network | 
               Vijay Mishra, Prof. Kamlesh Chandravashi
               
                 [2017]
                 
                      View Abstract //php echo " [View Abstract]"; ?>  | 
                198-203 | 
 | 
    
| A Survey on Security Schemes against Attack in Digital image Watermarking | 
               Kanhaiya Kumar, Prof. Dharmendra Kumar Singh
               
                 [2017]
                 
                      View Abstract //php echo " [View Abstract]"; ?>  | 
                204-207 | 
 | 
    
| Various Approaches of Hiding Sensitive Information from Outsourced Dataset | 
               Dhanisha Mukundan, Dr. Varsha Namdeo
               
                 [2017]
                 
                      View Abstract //php echo " [View Abstract]"; ?>  | 
                208-211 | 
 | 
    
| Security Schemes against Black hole Attack in Mobile Ad Hoc Network | 
               Prof. Shrikant Ahirwar, Ajesh Kumar Jhariya
               
                 [2017]
                 
                      View Abstract //php echo " [View Abstract]"; ?>  | 
                212-217 | 
 | 
    
| A Survey on Localization Techniques in Wireless Sensor Networks | 
               Deepak Kumar Rai, Prof. Dharmendra Kumar Sing
               
                 [2017]
                 
                      View Abstract //php echo " [View Abstract]"; ?>  | 
                218-220 | 
 | 
    
| Fuzzy Fault Tree Analysis of LPG Cross Country Pipelines -A Case Study | 
               V R Renjith, Meenuvijayan, Sabitha Soman
               
                 [2017]
                 
                      View Abstract //php echo " [View Abstract]"; ?>  | 
                221-227 | 
 | 
    
| Comparative Data Analysis based K-Medoid Method and Effective K-Medoid Algorithm | 
               Kapil Patidar, Prof. Ankita Porwal
               
                 [2017]
                 
                      View Abstract //php echo " [View Abstract]"; ?>  | 
                228-232 | 
 | 
    
| Effect of Tyre Pressure and Temperature on Rutting Characteristics of Warm Mix Asphalt in Bituminous Concrete Layer | 
               Aravind Chavan, Kiran Kumar .b .v
               
                 [2017]
                 
                      View Abstract //php echo " [View Abstract]"; ?>  | 
                233-240 | 
 | 
    
| A Survey of Data Mining Clustering Algorithms Based on Partitioning Clustering | 
               Omlata Dohare, Prof. Aishwaryai Vishwakarma
               
                 [2017]
                 
                      View Abstract //php echo " [View Abstract]"; ?>  | 
                241-244 | 
 | 
    
| Modern Face Recognition Algorithm and Techniques: A Survey | 
               Chaudhari Nivrutti Janardhan, Gagan Sharma, Rajesh Sharma 
               
                 [2017]
                 
                      View Abstract //php echo " [View Abstract]"; ?>  | 
                245-249 | 
 | 
    
| Method Based Survey on Pattern Matching | 
               Saba Khanum
               
                 [2017]
                 
                      View Abstract //php echo " [View Abstract]"; ?>  | 
                250-257 | 
 | 
    
| A Study on Image Retrieval Features and Techniques with Various Combinations | 
               Khushbu Tandel, Dr. Varsha Namdeo
               
                 [2017]
                 
                      View Abstract //php echo " [View Abstract]"; ?>  | 
                258-261 | 
 | 
    
| Role of Rhizosphere Bacteria in Augmenting Plant Growth | 
               Namrata S. Bhardwaj
               
                 [2017]
                 
                      View Abstract //php echo " [View Abstract]"; ?>  | 
                262-266 | 
 | 
    
| A Multi-objective Optimization Approach for Optimal Location and Sizing of SVC to Enhance Power System Security | 
               T. N. V. L. N. Kumar, R. V. S. Satyanarayana
               
                 [2017]
                 
                      View Abstract //php echo " [View Abstract]"; ?>  | 
                267-274 | 
 | 
    
| The Study of Gas Turbines and their Applications in Aircrafts and Electricity Generation | 
               Aseem Acharya, Richa Sharma
               
                 [2017]
                 
                      View Abstract //php echo " [View Abstract]"; ?>  | 
                275-278 | 
 | 
    
| Effect of Demonetization on Employment Generation in Micro, Small and Medium Enterprises | 
               Devendra Kumar Tiwari, Deepika Tiwari
               
                 [2017]
                 
                      View Abstract //php echo " [View Abstract]"; ?>  | 
                279-284 | 
 | 
    
| Multiparty Privacy by Utilizing Modified Frequent Pattern Tree and Super modularity Approach | 
               Archana Singh, Varun Singh
               
                 [2017]
                 
                      View Abstract //php echo " [View Abstract]"; ?>  | 
                285-288 | 
 | 
    
| Soft Computing Based Relevant Image Retrieval by Using GLCM and Annotation | 
               Pooja Tripathi, Parikshit Tiwari
               
                 [2017]
                 
                      View Abstract //php echo " [View Abstract]"; ?>  | 
                289-293 | 
 | 
    
| A Survey on Management Educational Institutions (A case study of Guntur and Krishna Districts of Andhra | 
               Pulla Rao Kota, Prof. S. Vijaya Raju
               
                 [2017]
                 
                      View Abstract //php echo " [View Abstract]"; ?>  | 
                294-301 | 
 | 
    
| Modified Bayes Thresholding based Wavelet Filter for Gaussian Noise Removal | 
               Sandip Mehta
               
                 [2017]
                 
                      View Abstract //php echo " [View Abstract]"; ?>  | 
                302-305 | 
 | 
    
| Digital Image Steganography using Particle Swarm Optimization with DCT and BPPCM | 
               Swati Patel, Prof. Jitendra Agrawal
               
                 [2017]
                 
                      View Abstract //php echo " [View Abstract]"; ?>  | 
                306-310 | 
 | 
    
| A Review on WiMAX System Using Modulation Method | 
               Sonam Pyasi, Mrs. Megha Soni
               
                 [2017]
                 
                      View Abstract //php echo " [View Abstract]"; ?>  | 
                311-314 | 
 | 
    
| Trusted path selection for resistance of black-hole Attack in MANET | 
               Md Shamsul Haque, Prof. Deepak Singh Tomar
               
                 [2017]
                 
                      View Abstract //php echo " [View Abstract]"; ?>  | 
                315-320 | 
 | 
    
| Security Schemes against Attack in Digital image Watermarking Based DCT and EIPT | 
               Kanhaiya Kumar, Prof. Dharmendra Kumar Singh
               
                 [2017]
                 
                      View Abstract //php echo " [View Abstract]"; ?>  | 
                321-325 | 
 | 
    
| An Efficient Product Rating Prediction by Removing Fake Users and Social Fuzzy Features | 
               Rajesh Kumar Soni, Prof. Aishwarya Vishwakarma
               
                 [2017]
                 
                      View Abstract //php echo " [View Abstract]"; ?>  | 
                326-329 | 
 | 
    
| Performance Analysis of Curvelet Transform and Wavelet Transform for Stable Digital Images | 
               Ambika Thampuratty, Dharmendra Kumar Singh
               
                 [2017]
                 
                      View Abstract //php echo " [View Abstract]"; ?>  | 
                330-333 | 
 | 
    
| Economic, Ecological and Human Outcomes of Bacteria | 
               Namrata S. Bhardawaj
               
                 [2017]
                 
                      View Abstract //php echo " [View Abstract]"; ?>  | 
                334-338 | 
 | 
    
| Multiple-Scan Lossless Predictive Huffman Coding | 
               Sandip Mehta
               
                 [2017]
                 
                      View Abstract //php echo " [View Abstract]"; ?>  | 
                339-341 | 
 | 
    
| GRID CONNECTED MULTILEVEL INVERTER SYSTEM | 
               Achie Malviya, Anuprita Mishra
               
                 [2017]
                 
                      View Abstract //php echo " [View Abstract]"; ?>  | 
                342-345 | 
 | 
    
| Security against Attacks in Wireless Sensor Network: A Survey | 
               Sonali Mahaver, Prof. Kamlesh Chandravanshi
               
                 [2017]
                 
                      View Abstract //php echo " [View Abstract]"; ?>  | 
                346-351 | 
 | 
    
| A Survey on Image Retrieval using Different Features and Techniques | 
               Sachendra Saxena, Prof. Anshul Bhattia
               
                 [2017]
                 
                      View Abstract //php echo " [View Abstract]"; ?>  | 
                352-356 | 
 |