|
Title |
Pdf |
1
|
Fast And Accurate Fault Detection In Transmission Line Using Phasor Measurement
Komal Singh, Surya Prakash
|
Download
|
2
|
A Brief Survey on ICI Reduction Techniques in OFDM System
Monika Sahu, Prateek Nigam, Dr.Vijayshri Chaurasia
|
Download
|
3
|
The Impacts Of Hiv/Aids On The Development Of Children And Social Parenting
M. Mudiappan, R. Mangaleswaran
|
Download
|
4
|
Power Quality Improvement of Distributed System By using DVR
Nikita yadav,vinay tripathi
|
Download
|
5
|
A Systematic Study of Test Case Design in Software Testing
A.Nirmal Kumar, Dr.B.G.Geetha
|
Download
|
6
|
The Development of Eye Controlled HCI System for Paralytic Person
Bhagyshree Patil, Vishaka Asundkar, Pooja Khandebharad,
Prof.Mrs. Prajwal Gaikwad
|
Download
|
7
|
An Ontology Based Intelligent Information Retrieval System for Domain Documents
Priyadharshini.G, Saravana Balaji.B
|
Download
|
8
|
High Temperature Effect On
Concrete Using Fibres
Rahul S. Patil, Prakash M. Mohite
|
Download
|
9
|
A Survey on Enhancing Cloud Data Security Using Rsa Algorithm
Rajendra H.Rathod, Ms.R.R.Tuteja
|
Download
|
10
|
Multiphase Bidirectional Flyback Converter
Topology for Hybrid Electric Vehicles
Tulasi Jasti, Rambabu Chunduri
|
Download
|
11
|
Optimal Performance Measures of Retrial
Queuing Model with Fuzzy Parameters
Using Robust Ranking Technique
R.Ramesh , S.Kumara ghuru
|
Download
|
12
|
Microaggregation For The Protection Of Microdata
G.Ramya , A.Selvaraj , N.Anandh
|
Download
|
13
|
Query prophecy and implication for
Itinerant phones
P.J.Sinijoy, A.Marthe Ranjani
|
Download
|
14
|
Token Based Authentication with Decentralized Access Control in Clouds
Remya Ramakrishnan, Michael
|
Download
|
15
|
Optimization of Process Parameters for
Hardness of Aluminium Alloy 7068 During
Friction Stir Welding by Taguchi Method
R.K.Suresh
|
Download
|
16
|
New Identities Of Sybil Nodes Detection Based On Rss In Manets
P.S.Satheesh, M.Suresh Anand
|
Download
|
17
|
Review Of Steganography Techniques
Shivani Yadav, Deepak Goyal
|
Download
|
18
|
Image Reconstruction From Incomplete And Noisy Data Using Projection Based Deblurring
Mr. M.Yasin, Mr. AR.Arunachalam
|
Download
|
19
|
Robust Face Recognition Technique Based on Granular Computation and Hybrid WLD Spatial Feature Extraction
P.Raghu,D.Kavi Bharathy,M.Suresh Anand,J.Jegan Amarnath,J.K.Periasamy,A.Kumaresan
|
Download
|
20
|
Effect of aerobic training on percent body fat among
High school girls
M. Gejalakshmi & Dr. V. Vallimurugan
|
Download
|
21
|
Low Size And Low Power Consumption Wireless Capsule Endoscopy
Sushma Hattarki , Sanjay Pawar
Sushma R. Hattarki
|
Download
|
22
|
Software Model of “OSI” Layered Architecture
Syed Irfan Yaqoob, N.Priya
|
Download
|
23
|
The Common Carotid Artery Intimal-Media Thickness Measurement Using Automated Segmentation In Ultrasound Scan Image
D.Tamil selvan, L. Ashok Kumar
|
Download
|
24
|
Retrieving Information using Context Based Indexing Approach
Ms.M.Vanishree , Ms.R.Sudha
|
Download
|
25
|
Deep Sentiment Analysis of Social Network Using Ontology
Umasri.M.L1, Suresh Kumar. S
|
Download
|
26
|
Comparatively Study of An IHS-Based Color Distortion Reduction for Vegetation Extraction in IKONOS Imagery
A. Vakeswari, S.Brintha Rajakumari
|
Download
|
27
|
ACity Bus Ignition Control Mechanism
using
Multilevel Security System
Barath Narayanan. P. B, Varun Sundar Gandhi.V, Prithvikar Reddy. B, Mrs. Rajeswari. S
|
Download
|
28
|
Study of Wind Turbine Using Back to Back Converter
N.Veerakumar, P.Madasamy
|
Download
|
29
|
Genetic Algorithm Trained Artificial Neural
Network Maximum Power Point Tracking of PV
Cells
G. Venkateswarlu, P. Sangameswar Raju
|
Download
|
30
|
Genetic Algorithm Enhanced Fuzzy Logic Based
Controller of MPPT of PV Cells under Partially
Shaded Condition
G. Venkateswarlu, P. Sangameswar Raju
|
Download
|
31
|
Intrusion Detection System for Secure Data
Transmission in Mobile Ad hoc Network
Vijayakumar.P, Tamizharasan P.
|
Download
|
32
|
Mitigating Unemployment and Enhancing Sustainable Self Employment of Youths in Nigeria
through Agricultural Education
Vincent C. Asogwa and Irimiah A. Ezhim
|
Download
|
33
|
Power on wrist for women and school children to testimony
By gps and gsm using wireless personal area network
A.Jyotsna, V. Sowmiya, Mrs.K.Subbulaksmi
|
Download
|
34
|
Enhance the Reverse Dictionary Using Jaccard
Indexing Algorithm
J.Mohan, Dr.K.P. Kaliyamurthie
|
Download
|
35
|
Enhancement of Noise Corrupted ECG Beats Using Elman Artificial
Neural Network: An Experimental Approach
Ajay Abrol
|
Download
|
36
|
The Bluenet Switch Control Network Based on CAN and Android
Mohammed Fazil TK, Manu Varghese C, Mohammed Shabid, Jasmin M
|
Download
|
37
|
Database attacks and security: a review
Ms. Mira K. Sadar, Mr. Pritish A.Tijare , Mr. Swapnil N.Sawalkar
|
Download
|
38
|
An Intricate Information and Visual Treat for the Craft Rainfall Predication by region based segregation and Characteristic Segmentation of Clouds from Remote Sensing Images Using Multi-Kernel Fuzzy C-Means Algorithm (MKFCM)
D. Napoleon, K.Ragul
|
Download
|
39
|
Survey on Various Ranking Algorithms
Manpreet Kaur Gill, Nidhi Bhatla
|
Download
|
40
|
Design & Development of Coaxial Wing Micro Air
Vehicle
Manoj J Watane, Dushyant B Pawar
|
Download
|
41
|
Wireless Based Monitoring System For An
Advanced Class Room
Manisha Toppo, Sweety Kumari , Ekta Kumari
|
Download
|
42
|
Survey on Clustering Techniques in Data Mining for Software Engineering
Maninderjit Kaur, Sushil Kumar Garg
|
Download
|
43
|
Surety and security of transactions using upgrading web-system
Manigandan, K.G.S. Venkatesh
|
Download
|
44
|
A novel patient centric framework for secure sharing of confidential health records in cloud computing
Susmitha Mandava, Mrs.ANURADHA
|
Download
|
45
|
Content Based and Link Based Page Ranking Algorithms: A Survey
Madhurdeep Kaur, Asst. Prof. Charanjit Singh
|
Download
|
46
|
Efficient Cryptographic Image Compression by Pixel Reorganizing
Leena Roslin Jenifer.M, G.Sudha
|
Download
|
47
|
A Novel Protocol Analysis For Data Consistency Using Graph Thory In Vanet Mddp
Lavanya.R,Kavitha.V M.E.
|
Download
|
48
|
Fake Content Detection in an Image Hashing Approach with Feature Level Fusion
S.Narendhiran, K.Omprakash
|
Download
|
49
|
A Comprehensive Review of Link Based
Ranking Algorithms
Harleen Kaur , Dr. Raman Maini
|
Download
|
50
|
Three Phase Single Stage Transformer Less Grid Connected PV System
S.Karthikeyan, P.Ganesan
|
Download
|
51
|
Resonant PWM ZVZCS DC To DC Converters For Renewable Energy Applications
B.Karthikeyan, Prof.Jebasalma
|
Download
|
52
|
A Novel Algorithm for the Generation of Secret-key
V.Kamaraj, K.J.Jegadish Kumar
|
Download
|
53
|
A review of automatic speech
Emotion recognition
Jagvir Kaur, Abhilash Sharma
|
Download
|
54
|
Improving Reliability in Heterogeneous Wireless Sensor Networks
A.Hemalatha, Dr.R.Venkatesh
|
Download
|
55
|
Labview Based Smart Irrigation System With Wsn And Fuzzy Choice Making Control
Aarthi.R and Mr.J.Manikandan
|
Download
|
56
|
A Survey on Various Clustering Algorithms
Gurpreet Kaur, Nidhi Bhatla
|
Download
|
57
|
A Paper on COMPOSITE SERVICE SELECTION
J. Gowtham Kumar , B. Sudheer Kumar, K.Narasimhulu
|
Download
|
58
|
Aligning Performance of MSMEs with Economy
Dr E.B.Khedkar
|
Download
|
59
|
Hybrid Intrusion Detection System Using
Packet Header Anomaly Detection Algorithm
Sandeep Bhorde, Geetanjali Khabale, Priyanka Shinde , Prof. Minal Zope
|
Download
|
60
|
Optimum DC motor speed control using PSO technique
Geeta Kumari, Surya Prakash
|
Download
|
61
|
An Adaptive Distributed Computing with
Fault Tolerance and Recovery
Mrs.K.Gayathri, Mr.B.Ganesh Prabu
|
Download
|
62
|
Toxicity Of Organophosphorus Pesticide Malathion Influenced By Ph And Temperature On The Freshwater Fish Cyprinus Carpio
Dr. Atul Vasnt Rao Sagane, Dr.Pushpa Singh, Dr. Ashok Kumar Mishra and Dr. Pradeep Khampariya
|
Download
|
63
|
Assessment Of Ambient Air Quality At Gare - Pelma Coal Blocks At Tamnar, District-Raigarh (C.G), India
Sandeep Kumar Mishra, Hemlata Verma, Vinod Mishra and Dr. Rashmi Arnold
|
Download
|
64
|
Tourism And Resource Development: A Case Study Of Madhya Pradesh, India
Satyendra Kumar Mishra, Dr. Devendra N. Pandey, Hemlata verma and
Dr. Sandeep Kumar Shukla
|
Download
|
65
|
Assessment Of Water Quality In Tons River In And Around The Chakghat Area, Using Nsf-Wqi
Sandeep Kumar Mishra, Satyendra Kumar Mishra and Dr. Rashmi Arnold
|
Download
|
66
|
Gender and age-wise indices
Of plasmodium spp. In mauganj of rewa city M.P.
Dharmendra Kumar Patel, Dr. Devendra N. Pandey,
Gaurav Yadav and Dr. Sandeep K. Shukla
|
Download
|
67
|
Effect of tetracycline on
Early development of
Chick embryo
Gaurav Yadav, Dr. Devendra N. Pandey and Dharmendra Kumar Patel
|
Download
|
68
|
Monthly Variation Of Primary Productivity Of Obar Pond Rewa (M.P.), INDIA
Sangita Mishra, Neha Pandey, Dr. Devendra N. Pandey, and Dr. Sandeep Kumar Shukla
|
Download
|
69
|
Identifying Clone Attack In Mobile Sensor Network Using Localized Algorithm
Divya.S, Mrs. V. Kavitha
|
Download
|
70
|
Review of Watermarking relational database Using Optimization Techniques
Monika Gharu, Deepak Sharma
|
Download
|
71
|
A Fast Fuzzy Minimum Spanning Tree Clustering Based Feature Subset Selection Algorithm For High-Dimensional Data
l
V.Deepa, T. Deepa
|
Download
|
72
|
Real Time MMS Security For Mobile Communication Using Steganography
Chinar Bhandari , Ashish Bandi, Sonu Gupta , Avinash Jadhav
|
Download
|
73
|
Security Analysis of Exclusive 128 Bit NLFSR Based Stream Cipher
Biju N, Jegadish Kumar K. J
|
Download
|
74
|
An Effective Treematch Algorithm For Xml Tree Pattern Matching
Balamurugan.V, Rajeswari.D
|
Download
|
75
|
Implementation of Packet Scheduling With Buffer Management to Improve Network Performance
Dr. R. Shanmugasundaram , V. Azhaharasan , Dr. S. Pannirselvam
|
Download
|
76
|
Analysis Of A Two-Unit Cold Standby System With Instructions And The Accidental Effects
Archana Malik
|
<Download
|
77
|
Dispersed Store Cancellation Technique For Maintain Reverse Consistancy In Wireless Mobile Network
S.Ashwini ,G.Michael
|
Download
|
78
|
Shockless Power Generation: an Alternative Energy Source
Mr. Ashish Fande, Mr. Sunil Dewangan, Mr. Rahul Pillai, Mr. Sourav Kumar Gupta,
Mr. Rajesh Dewangan, Ms. Aakanksha Choudhary
|
Download
|
79
|
Optimization Of Solar Energy Harvester System For Wireless Sensor Networks
J.Aruljustin, A.Arunya Revathi
|
Download
|
80
|
Medical Image Segmentation based on Thresholding
Aparna M. Nichat, S. A. Ladhake
|
Download
|
81
|
An adaptive risk management and access control framework with obligation to mitigate insider threats
Annamma Monisha.I, Dr.A.Grace Selvarani
|
Download
|
82
|
Preventing Phishing Attack Using Visual
Cryptography
Prof. Prajwal Gaikwad, Akanksha Chimote, Shubhangi Bhaladhare, Mayuri Dahiwal, Ankita Ambade
|
Download
|
83
|
Sms Spam Detection Techniques An Analytical Research Method
Anchal, Abhilash Sharma
|
Download
|
84
|
Protection Intimidation in Prepaid Cellular Phone
Dr.K.P.Kaliyamurthie , M.Anbarasu
|
Download
|
85
|
Survey on Encryption Algorithms to Overcome
Security Issues in Cloud Computing
Amandeep Kaur Gill, Charanjit Singh
|
Download
|
86
|
Improving Security of Content Distribution Using Hash Function and Random Linear Network Coding
Akshay Chindarkar, Amey Gujar, Swati Shishupal
|
Download
|
87
|
An Effective Video Annotation of Semantic and
Visual Context Using Spatiotemporal Fuzzy KMeans
Clustering
Akileshwari R, Grace Selvarani A
|
Download
|
88
|
Energy aware routing algorithm of Green communication in Energy Renewable
Wireless Mesh Networks
M. Sudharsan, Ms.R.Jananee, C. Yaamini
|
Download
|
89
|
Diversity Of Entomofauna In Northern Chhattisgarh India
K.Venu Achari, K. R. Sahu
|
Download
|
90
|
Comparative Analysis of Maximized Efficiency and Power Factor of Power Converters for Photovoltaic System Application
C.Rajesh Kumar, R.Radhamani
|
Download
|
91
|
Cut Detection Techniques In Wireless Sensor Networks: A Review
Ranjit Kaur, Mr. Sukhwinder Singh Sran
|
Download
|
92
|
Performance analysis of optical
Communication system with SPM and
GVD
Sumit Parouha, Anubhuti Khare
|
Download
|
93
|
Vanet Routing On City Environment Using Real-Time Routing History And BAHG
M. Vijayakumar, S. Madhavi
|
Download
|
94
|
Biometric authentication using mouse
Gesture dynamics
Kaushal Kumar,Sanjay Kumar
|
Download
|
95
|
Wading into wetlands of manipur:
Sustainable management strategies and action plans
Arambam Sanatomba Singh
|
Download
|
96
|
Analysis of Si-Ge based n-channel Tunnel FET with High-k Spacers
A.Simon Prabu , G.Sudhagar, M.Muthamizhan
|
Download
|
97
|
VICTOR Data Center Network Virtualization Architecture: A
Review
Ms. Pratiksha R. Yewale, Mr Vishwas T. Gaikwad, Mr. Harshal N.Datir
|
Download
|
106 |
Review of Solar Water Heating Systems
|
Download
|