| Latest News |
| Research Article | Author | Pages | Download |
|---|---|---|---|
| Secure Android application for Farmers based on Ratings and reviews (SAFR) |
Rashmi Gaikwad, Ashwini Gawade, Priya Sinha, Prof. Sharmila Chopade
[2017]
View Abstract //php echo " [View Abstract]"; ?> |
194-197 |
|
| Efficient Energy Based Path Selection in Sensor Ad-Hoc Cognitive Radio Network |
Vijay Mishra, Prof. Kamlesh Chandravashi
[2017]
View Abstract //php echo " [View Abstract]"; ?> |
198-203 |
|
| A Survey on Security Schemes against Attack in Digital image Watermarking |
Kanhaiya Kumar, Prof. Dharmendra Kumar Singh
[2017]
View Abstract //php echo " [View Abstract]"; ?> |
204-207 |
|
| Various Approaches of Hiding Sensitive Information from Outsourced Dataset |
Dhanisha Mukundan, Dr. Varsha Namdeo
[2017]
View Abstract //php echo " [View Abstract]"; ?> |
208-211 |
|
| Security Schemes against Black hole Attack in Mobile Ad Hoc Network |
Prof. Shrikant Ahirwar, Ajesh Kumar Jhariya
[2017]
View Abstract //php echo " [View Abstract]"; ?> |
212-217 |
|
| A Survey on Localization Techniques in Wireless Sensor Networks |
Deepak Kumar Rai, Prof. Dharmendra Kumar Sing
[2017]
View Abstract //php echo " [View Abstract]"; ?> |
218-220 |
|
| Fuzzy Fault Tree Analysis of LPG Cross Country Pipelines -A Case Study |
V R Renjith, Meenuvijayan, Sabitha Soman
[2017]
View Abstract //php echo " [View Abstract]"; ?> |
221-227 |
|
| Comparative Data Analysis based K-Medoid Method and Effective K-Medoid Algorithm |
Kapil Patidar, Prof. Ankita Porwal
[2017]
View Abstract //php echo " [View Abstract]"; ?> |
228-232 |
|
| Effect of Tyre Pressure and Temperature on Rutting Characteristics of Warm Mix Asphalt in Bituminous Concrete Layer |
Aravind Chavan, Kiran Kumar .b .v
[2017]
View Abstract //php echo " [View Abstract]"; ?> |
233-240 |
|
| A Survey of Data Mining Clustering Algorithms Based on Partitioning Clustering |
Omlata Dohare, Prof. Aishwaryai Vishwakarma
[2017]
View Abstract //php echo " [View Abstract]"; ?> |
241-244 |
|
| Modern Face Recognition Algorithm and Techniques: A Survey |
Chaudhari Nivrutti Janardhan, Gagan Sharma, Rajesh Sharma
[2017]
View Abstract //php echo " [View Abstract]"; ?> |
245-249 |
|
| Method Based Survey on Pattern Matching |
Saba Khanum
[2017]
View Abstract //php echo " [View Abstract]"; ?> |
250-257 |
|
| A Study on Image Retrieval Features and Techniques with Various Combinations |
Khushbu Tandel, Dr. Varsha Namdeo
[2017]
View Abstract //php echo " [View Abstract]"; ?> |
258-261 |
|
| Role of Rhizosphere Bacteria in Augmenting Plant Growth |
Namrata S. Bhardwaj
[2017]
View Abstract //php echo " [View Abstract]"; ?> |
262-266 |
|
| A Multi-objective Optimization Approach for Optimal Location and Sizing of SVC to Enhance Power System Security |
T. N. V. L. N. Kumar, R. V. S. Satyanarayana
[2017]
View Abstract //php echo " [View Abstract]"; ?> |
267-274 |
|
| The Study of Gas Turbines and their Applications in Aircrafts and Electricity Generation |
Aseem Acharya, Richa Sharma
[2017]
View Abstract //php echo " [View Abstract]"; ?> |
275-278 |
|
| Effect of Demonetization on Employment Generation in Micro, Small and Medium Enterprises |
Devendra Kumar Tiwari, Deepika Tiwari
[2017]
View Abstract //php echo " [View Abstract]"; ?> |
279-284 |
|
| Multiparty Privacy by Utilizing Modified Frequent Pattern Tree and Super modularity Approach |
Archana Singh, Varun Singh
[2017]
View Abstract //php echo " [View Abstract]"; ?> |
285-288 |
|
| Soft Computing Based Relevant Image Retrieval by Using GLCM and Annotation |
Pooja Tripathi, Parikshit Tiwari
[2017]
View Abstract //php echo " [View Abstract]"; ?> |
289-293 |
|
| A Survey on Management Educational Institutions (A case study of Guntur and Krishna Districts of Andhra |
Pulla Rao Kota, Prof. S. Vijaya Raju
[2017]
View Abstract //php echo " [View Abstract]"; ?> |
294-301 |
|
| Modified Bayes Thresholding based Wavelet Filter for Gaussian Noise Removal |
Sandip Mehta
[2017]
View Abstract //php echo " [View Abstract]"; ?> |
302-305 |
|
| Digital Image Steganography using Particle Swarm Optimization with DCT and BPPCM |
Swati Patel, Prof. Jitendra Agrawal
[2017]
View Abstract //php echo " [View Abstract]"; ?> |
306-310 |
|
| A Review on WiMAX System Using Modulation Method |
Sonam Pyasi, Mrs. Megha Soni
[2017]
View Abstract //php echo " [View Abstract]"; ?> |
311-314 |
|
| Trusted path selection for resistance of black-hole Attack in MANET |
Md Shamsul Haque, Prof. Deepak Singh Tomar
[2017]
View Abstract //php echo " [View Abstract]"; ?> |
315-320 |
|
| Security Schemes against Attack in Digital image Watermarking Based DCT and EIPT |
Kanhaiya Kumar, Prof. Dharmendra Kumar Singh
[2017]
View Abstract //php echo " [View Abstract]"; ?> |
321-325 |
|
| An Efficient Product Rating Prediction by Removing Fake Users and Social Fuzzy Features |
Rajesh Kumar Soni, Prof. Aishwarya Vishwakarma
[2017]
View Abstract //php echo " [View Abstract]"; ?> |
326-329 |
|
| Performance Analysis of Curvelet Transform and Wavelet Transform for Stable Digital Images |
Ambika Thampuratty, Dharmendra Kumar Singh
[2017]
View Abstract //php echo " [View Abstract]"; ?> |
330-333 |
|
| Economic, Ecological and Human Outcomes of Bacteria |
Namrata S. Bhardawaj
[2017]
View Abstract //php echo " [View Abstract]"; ?> |
334-338 |
|
| Multiple-Scan Lossless Predictive Huffman Coding |
Sandip Mehta
[2017]
View Abstract //php echo " [View Abstract]"; ?> |
339-341 |
|
| GRID CONNECTED MULTILEVEL INVERTER SYSTEM |
Achie Malviya, Anuprita Mishra
[2017]
View Abstract //php echo " [View Abstract]"; ?> |
342-345 |
|
| Security against Attacks in Wireless Sensor Network: A Survey |
Sonali Mahaver, Prof. Kamlesh Chandravanshi
[2017]
View Abstract //php echo " [View Abstract]"; ?> |
346-351 |
|
| A Survey on Image Retrieval using Different Features and Techniques |
Sachendra Saxena, Prof. Anshul Bhattia
[2017]
View Abstract //php echo " [View Abstract]"; ?> |
352-356 |
|