Sr/No/ |
Title |
Pdf |
1 |
Natural and Anthropogenic Environmental Effect
on Livestock Husbandry: A Case Study of
Shahjahanpur District, India
Mushir Ali, Syed Murshid Husain
|
Download
|
2 |
QR Code Based Digital Academic Transcripts
Shraddha Nalkar, Monika Talekar, Priyanka Bamne, Snehal Patil
|
Download
|
3 |
Design and Simulation of Cutting Slot Dual-Band
PIFA Antenna for GSM System
Atul Nogia, P.K.Singhal
|
Download
|
4 |
Human Powered Flywheel Motor By Using Double Lever Inversion Mechanism
A.P. Narkhedkar, Prof. A.K. Pitale, Prof J.P.Modak , K.K. Padghan
|
Download
|
5 |
Software Requirement Prioritization Using Aging Process
Karthik.S, Kamalraj.R, Karthik.S
|
Download
|
6 |
E2AACK—A Secure Intrusion Jamming Technique against Malicious agent
using DSA algorithm
M.Saravanan
, A.ThomasPaulRoy
, Dr.N.Balasubadara
|
Download
|
7 |
Reliable security for Multiple Applications in
Wireless Networks using concealed data aggregation
A.V.Allin Geo, Dr.Kaliyamurthie
|
Download
|
8 |
A Survey on Mitigation of Blackhole Attacks
on AODV in MANET
Mohanapriya R , Saranya K, Rajesh Babu M
|
Download
|
9 |
A New Approach To Vehicle Security System Using Face Recognition
J.K.Periasamy, B.Sneha, G.Sarangan, S.Madhumitha, G.Kalaivani
|
Download
|
10 |
Hiding Data using Motion Vector and Linear Block
Codes in Video Steganography
Rucha Bahirat, Amit Kolhe
|
Download
|
11 |
Performance Of Synchronous Machine Dynamics Using A Novel Equivalent Circuit Model
Rajnish Kumar, Er.Pratibha Tiwari
|
Download
|
12 |
Attribute Enhanced Sparse Codewords For Face Image Retrieval
Dr.K.Sakthivel, M.Pradeep
|
Download
|
13 |
Comparative Analysis of OLSR, DSR, ZRP
Routing Protocols in Mobile Ad-Hoc
Networks
N. Durga Prasad, K.Divya
|
Download
|
14 |
Competent System-on-Chip Energy Supervision with a Segmented Bloom Sieve
R.Deepa, M. Brundha
|
Download
|
15 |
Analysis of Color Image Compression Using Wavelet Transform Method at Particular Decomposition Level
Mr.Y.S.Jagdale, Mrs.J.K.Patil, Mr.S.B.Jadhav
|
Download
|
16 |
Performance variations in Digital CMOS circuit
technologies due to temperature
Nikhil Saxena, Sushmita Dandeliya, Ravi Shrivastava
|
Download
|
17 |
Heuristic Approach to Enrich Servers
Performance
Sanket Lalge, Sonali Bhondve, Sucheta Jeurkar, Prasenjeet Paratwagh
|
Download
|
18 |
Development of test rig for gear inspection
Tharesh K. Gawande, Prof. A.M.Bombatkar
|
Download
|
19 |
Behavior of Mechanical Reinforcement in R.C.C. Exterior Beam-Column Joint
H. P. Patel, Prof. S. M. Kulkarni, Prof. A. A. Parikh, Prof. K. J. Parmar
|
Download
|
20 |
Security Concerns in Cloud Computing
Anu Gupta
|
Download
|
21 |
Parametric study of composite slab using ANSYS
Jatin Patel, Prof. S. M. Kulkarni, Prof. A. A. Parikh
|
Download
|
22 |
Experimental Investigation Using Egg shell Powder in Concrete for Durability
N.H.Panchal, Prof. S. M. Kulkarni, Dr. V. P. Parekh, Prof. A. A. Parikh
|
Download
|
23 |
Selection of Supplier’s Criteria by Using Interpretive Structural Modeling
Rachit Kumar Verma, Manish Kumar Sagar
|
Download
|
24 |
Task Scheduling in Cloud Computing using Enhanced Genetic Algorithm
K.R.Prasanna Kumar, K.Kousalya
|
Download
|
25 |
Color Texture Classification Using Local Feature Extraction
Subodh Shivaji Bhoite, Prof. Sanjay Shamrao Pawar
|
Download
|
26 |
Fluid Structure Interaction based Flutter Prediction
A. A. Belkhede, Dr. K. S. Zakiuddin, P. B. Khope
|
Download
|
27 |
A Survey Study On Electrocardiogram (ECG) Signal Noise
Reduction Techniques
Sonu Singh Kaurav, Karuna Markam
|
Download
|
28 |
Automatic Evaluation of Water Quality Based on High Speed Networking
Biplab Kumar Parida, Fahim Khan, Balmikee Kumar
|
Download
|
29 |
Survey Study: Symmetric Key Encryption Algorithms
Dr. Madhu Goel ,Rupinder Kaur
|
Download
|
30 |
Chameleon: A Load Balancing Model For Public Cloud
Abdul Jaleef P K, P Sivaprakash ,D Sumathi
|
Download
|
31 |
Research Survey of RFID Security and Privacy Based on Identification and Authentication Protocols
Yunus Usman Memon,Sameen Ahmed Khan
|
Download
|
32 |
A Secure Processing on Payment Reports with
Advanced Encryption Standard in Multihop
Wireless Networks
Kesavan P, Selvavinayagam G
|
Download
|
33 |
A review on drive test and site selection for Mobile Radio Communication
Govind Sati, Dr. Sonika Singh
|
Download
|
34 |
Performance Analysis Of Thermal Power Plant Sgtps
Pooja Talwar , Prof. S.K. Bajpai, Prof Shalini Vaishya
|
Download
|
35 |
A review paper on
Authentication Services in Cloud Computing
Environment
Mamta Tewari
|
Download
|
36 |
Monitoring Of Patients Using Wireless Sensor Feedback System
Neethu J Sivan, Mrs.Swati Kumari
|
Download
|
37 |
Trust Based Secure Payment Scheme for
Multihop Wireless Networks
T. Boobathy Ramkumar, Dr.T.Kalaikumaran ,Dr.S.Karthik
|
Download
|
38 |
Efficient Clustering techniques for WSN- a survey
Mamta Tewari, Reenu Saini
|
Download
|
39 |
Leakage power analysis Techniques for Nano CMOS Digital Circuits
Pankaj Agrawal, Nikhil Saxena, Waris junaid
|
Download
|
40 |
Design and Realization of NIR Optical Spectroscopy Systems
Sarbjeet Kaur
|
Download
|
41 |
A Comparative Study of the Total Domination
with Paired Domination
Dr. J. Deva Raj, V. Sujin Flower
|
Download
|
42 |
Co-ordinated Design of PSS and TCSC Damping
Controllers in Multi-machine Power System using PSO
Prafull Kumar Verma, Dr.A.K.Bhardwaj
|
Download
|
43 |
An Efficient Biometric Authentication System for Generating Virtual Identities
N.Parthiban, G.Selvavinayagam
|
Download
|
44 |
Design and Implementation for an Improved Version of Cloud Computing
Architecture by using Concept of Ontology with Query Retrieval and
Refinement Mechanism
SARABU V BALAMURALIDHAR[1], Dr.V.BALAJI [2]
|
Download
|