Sr/ No |
Title |
Pdf |
1 |
SSL/TLS Security Negotiation: Through Fake
Certificate Injection
Abdul Jabbar Khilji, Mukesh M. Joshi |
Download
|
2 |
AN INVESTIGATION OF ELECTRONIC PROCUREMENT PRACTICES BY THE
MULTI-NATIONAL GAS AND OIL COMPANIES IN NIGERIA
Dr. McChester Odoh,Dr. Osita Ebere, Mrs. N. Mbeledogu
|
Download
|
3 |
COMPUTER SYSTEMS APPLICATION IN INVENTORY CONTROL AND MATERIAL MANAGEMENT
Dr. McChester Odoh,Dr. Osita Ebere, Mrs. N. Mbeledogu |
Download
|
4 |
Performance Evaluation Of Different Control Schemes For
Stabilization Of a Driven Pendulum System
Papi Reddy. I |
Download
|
5 |
A STEGANOGRAPHY METHOD TO HIDE DATA IN EDGES OF AN IMAGE
M. Pavani, S. Naganjaneyulu |
Download
|
6 |
Multilevel based STATCOM for PQ Enhancement
Abdul Kalam Sk, G V Prasanna Anjaneyulu |
Download
|
7 |
FILE TRANSFER PROTOCOL CONNECTION OVER A SINGLE –HOP BLUETOOTH RADIO LINK
P.N.V.Satyakonda, Dr.A.Srinivasa Rao
|
Download
|
8 |
Design and Analysis of Split-Capacitor
model of a Tapper Buffer using 120 nm
CMOS Technology
Rajneet kaur , Randhir Singh, Vibha Raj Nag |
Download
|
9 |
Comparative study of voiced-unvoicedsilence
classification of speech
Shridevi A. Jirli, Ramachandra G Turkani |
Download
|
10 |
A STUDY ON VARIOUS SECURITY METHODS IN VISUAL CRYPTOGRAPHY
Ramya Arul Mary .G, Sangeetha.N |
Download
|
11 |
Germicidal Ultraviolet LED Fixture For Public Waterless
Urinals And Wash Basins To Control TB Using Solar PV Panel
Mr.Ranjeet R Suryawanshi, Mr.Manik S Sonawne |
Download
|
12 |
EQUALIZATION USING LMS LINEAR EQUALIZER FOR
DOPPLER EFFECT USING M-ARY (M=2) PAM
Sanjeev Kumar Shah and Sur Madhur Pant |
Download
|
13 |
EVALUATION OF FLEXURAL STRENGTH OF COIR FIBER REINFORCED POLYMER MATRIX COMPOSITES
G Pathalingaprasad , Yellappa M, Puneet U, Satyamurthy M N, Giriswamy B G |
Download
|
14 |
Satellite Image Classification using Neural Network
and Support Vector Machine
Sarika Purao, Dr. Deven Shah, Sujata Kadu |
Download
|
15 |
PROVISION OF SECURITY TO UNSECURED OUTSOURCED DATA USING PROXIMITY MEASURE
Satyasri naga subbalaxmi, Mr. A. Krishna mohan |
Download
|
16 |
Power Efficient Wireless Inductive Coupling for
RF Telemetry Applicationsh
Saurabh Mehta, Manish Mehta |
Download
|
17 |
Design of Processor Interface Module for
P1750A Processor Using VHDL
Shridevi A. Jirli, Satyanarayana Kumari B , Dr.Shantharama Rai C |
Download
|
18 |
New Marketing and Premeditated Initiatives Advent of Cloud –Public and Private
Shruti Sandal, Dr.Mukeh M. Joshi |
Download
|
19 |
Mining Approach for Web Engineering on Development of Web based Business Intelligence Applications
G. Sirisha, M. Sridevi, Dr. A.V. Krishna Prasad
|
Download
|
20 |
Clustering based Multihop Cooperative
Protocol for Wireless Sensor Network
Pallavi H. Chitte, Prof. D.K.Chitre , Prof. Sonali Shukla |
Download
|
21 |
Study on Various Cloud Storage Systems
Sumit S. Sagane, Dr. G. R. Bamnote
|
Download
|
22 |
Personalized Image Search Optimization
Surekha R. Janrao , Dr. Lata Ragha |
Download
|
23 |
A Novel Approach for Graphical User
Authentication
Swati N. Sonune, Prof. Sandeep Sahu
|
Download
|
24 |
Authentication Schemes for Session Password
Using Sound Signature
Swati N. Sonune, Prof. Sandeep Sahu
|
Download
|
25 |
Mobile Devices Synchronization
Vidya N. Kawtikwar, Ramesh Sahabade |
Download
|
26 |
Entrepreneurial Competencies in Goat Production for Enhancing the Income
of Teachers of Agriculture in Secondary Schools in Enugu State, Nigeria
Asogwa, V. C. |
Download
|
27 |
An Overview of Business Process Modelling
Languages
Amit L Vadera , Yogesh R. Ghodasara |
Download
|
28 |
EVALUATION AND COMPARISON OF IMROVED OPTIMAL SLOTTED CSMA/CA PROTOCOL OVER SLOTTED AND UNSLOTTED CSMA/CA
Nimarta sidhu,Paramjeet Singh,Shweta Rani |
Download
|
29 |
Uninterruptible Power Supply: Interleaved Power Factor Improvement Techniques using Parallel Topology
Nimesh R Saxena, Ashwini Kumar, Ritesh Gosai |
Download
|
30 |
Efficient Query Processing in Data
Warehouse Using Bitmap Indexing
Mr. Nikhil Dasharath Karande |
Download
|
31 |
EFFECT OF SUBSTATRE PARAMETERS ON RETURN LOSS AND RADIATION CHARACTERISTICS OF INSET FED ANTENNA
Parul ,Swarna pundir, Vikas Uttraja |
Download
|
32 |
UNBALANCED OPERATION OF DIODECLAMPED
THREE-LEVEL INVERTER
Nama Shilpa,Dr.j.bhagwan reddy,Dr.john arun kumar |
Download
|
33 |
A Novel Method For Preventing Jamming Attacks Using Random Padding
B.R.S.S.Raju, A.Vasudeva Rao |
Download
|
34 |
Enhancement of Arithmetic operators in Hill Cipher algorithm of Encipher & Decipher
Mohammad Rafeek Khan , Md Imran Alam |
Download
|
35 |
Performance Evaluation of Different Cryptographic
Algorithms: DES, 3DES, AES,IDEA & BLOWFISH
Md Imran Alam, Mohammad Rafeek Khan |
Download
|
36 |
Performance Analysis of Hybrid Channel Over UWB OFDM Systems
Shah Megha N., K.Praveen |
Download
|
37 |
Software Component Reuse with various Attributes
Navjot Kaur, Dr. Sushil Garg
|
Download
|
38 |
Design and Implementation of L.U.T by Anti symmetric product coding (APC) and odd-multiple-storage (OMS)
Manasi Vilas Late, Bharathi D. |
Download
|
39 |
Survey Of A Network Management Architecture In Wireless Sensor Network
MAHESH NAIDU SWARNA, Dr.A.SrinivasaRao
|
Download
|
40 |
Spectrum Sensing in Cognitive Radio – A Collaborative Approach
Mrs. Mahua Bhowmik
|
Download
|
41 |
PID Versus Fuzzy Logic Based Intelligent Controller Design for a Refined Cascade PID Control for Power Plant Industrial Boiler Control System
A.Madan kumar , Dr. A.M.Prasad |
Download
|
42 |
Reliable Techniques For Data Publishing From Sparse Datasets
Janipalli Lavanya, D. Srinivas
|
Download
|
43 |
Detection of kidney tumor for Computed Tomography images using
Region Growing Segmentation
Mr.KuldeepPawar, Mrs.Jayamala.K.Patil
|
Download
|
44 |
A Novel AES Algorithm Based On FPGA
G.CHAMUNDI, K.RAMBABU
|
Download
|
45 |
Runoff potential indices of watersheds a case study of Tilaiya catchment by using
Remote Sensing and GIS techniques
Mr. Kartic Bera |
Download
|
46 |
Security Protocols for Sensor Networks Using Protocol Architecture
NAGA GOPI KARANKI, Dr.A SrinivasaaRao |
Download
|
47 |
Performance Evaluation of Solar
Renewable Energy System by Genetic
Algorithm
Mr. Jitendra Kumar Sharma, Mr. Vikas Khare
|
Download
|
48 |
Hardware Implementation of RCA Based S-Box for
PRESENT Encryption Algorithm
K.J.Jegadish Kumar, B.Partibane, B.Vinodh |
Download
|
49 |
Color Image Segmentation Techniques
Miss. Jayashri T.Zambre, Mr. Amar B.Deshmukh |
Download
|
50 |
An Enhanced Data Distribution Technique For
Dynamic Wireless Sensor Network.
Hemant patel,Aakanksha S. Choubey |
Download
|
51 |
Fusion of Iris Feature and Palm print
Features for security applications
K.GURU PRASAD, K.ASHOK KUMAR |
Download
|
52 |
GROWING STOCK OF MANIPUR FORESTS:
ITS CHANGING SCENARIO
A. SANATOMBA SINGH
|
Download
|
53 |
ANALYSIS ON VARIOUS SEARCH
ALGORITHM FOR MULTIPLE HISTORIES
J. Dharani , L. Sharmila |
Download
|
54 |
DESIGN OF ZIGBEE BASED AUTOMATIC ENERGY
METER READING SYSTEM THROUGH GSM AND GPRS
S.Arun ,Dr.ASiddappa Naidu
|
Download
|
55 |
HYBRID METER READING SYSTEM USING GSM,GPRS
AND ZIGBEE.
S.Arun , Dr.siddapa Naidu |
Download
|
56 |
SIMULATION IN MEMS OF THE STATUS OF SPECIFIC
GRAVITY OF URINE AND ITS CORRELATION IN DATA MINING
Arpita Gupta, G.U.Kharat |
Download
|
57 |
CHANNAL ASSIGNMENT BASED ON LOAD
FOR MULTI CHANNEL MULTI RADIO
WIRELESS MESH NETWORK
Arepalli peda gopi, Dr.A.Srinivasa Rao |
Download
|
58 |
A Multi Channel Queueing Model with Controllable Arrival
Rates with Vacation
Dr. Naveen Kumar |
Download
|