Design and simulation of circularly polarized pentagonal-shaped microstrip patch antenna at RFID frequency 2.4 Hz |
Bondili Kohitha Bai, Bhupendra singh and vinod shokeen, ASET, Amity University, India |
Volume : 2 volume number : 1 pdf |
Adaptive and Dynamic Wireless Routers with Smart Antenna for Power Management |
S.Venkata Krishnan, R.Sriram and N.Senthil Kumar, Sri Sai Ram Engineering College, India |
Volume : 2 volume number : 1 pdf |
Mobility Aware Routing Protocol in Ad-Hoc Network |
Suman Halder, Partha Pratim Meta and Sukla Banerjee, RCC Institute of Information Technology, Kolkata, India |
Volume : 2 volume number : 1 pdf |
Design of A Scheme for Secure Routing in Mobile Ad Hoc Networks |
V.Sesha Bhargavi1 M.Seetha1 S.Viswanadharaju2, 1GNITS,Hyderabad, India and 2JNTUH,Hyderabad, India |
Volume : 2 volume number : 1 pdf |
Pentagonal shaped microstrip patch antenna in wireless capsule endoscopy system |
Bondili Kohitha Bai and Anita Thakur, ASET, Amity University, India |
Volume : 2 volume number : 1 pdf |
Improvement of CRF Based Manipuri POS Tagger by Using Reduplicated MWE (RMWE) |
Kishorjit Nongmeikapam1, Lairenlakpam Nonglenjaoba1, Yumnam Nirmal1 and Sivaji Bandhyopadhyay1, 1Manipur University, India and 2Jadavpur University, India |
Volume : 2 volume number : 1 pdf |
A Novel Method for Petri Net Modeling |
Chen-xi SHAO1,3, Er-hui ZHOU1,2, Zhen-zhong SHAO4, Wei-hua WANG5, Xue-feng WU1, 1University of Science and Technology of China, China, 2Information Center of Hospital, China, 3Anhui Province Key Laboratory of Software in Computing and Communication, China, 4Jianghuai Automobile Co., Ltd, China and 5Liwei Automobile Oil-pump Co., Ltd., China |
Volume : 2 volume number : 1 pdf |
Dependable Web Services Security Architecture Development Theoretical and Practical Issues - Spatial Web Services Case Study |
D.Shravani1 P.Suresh Varma2 K.Venkateswar Rao3 B.Padmaja Rani3 and M.Upendra Kumar4, 1Rayalaseema University, India, 2Adikavi Nannaya University, India, 3JNTUH CEH Hyderabad, India and 4MGIT Hyderabad, India |
Volume : 2 volume number : 1 pdf |
Robust Adaptive Threshold Algorithm based on Kernel Fuzzy Clustering on Image segmentation |
Tara.Saikumar1, B.K.Anoop2 and P.S.Murthy3, 1CMR Technical Campus, India, 2MACE, India and 3CMRIT, India |
Volume : 2 volume number : 1 pdf |
MDAV2K: A Variable-Size Microaggregation Technique for Privacy Preservation |
S. K. Chettri1 and B. Borah2, 1Saint Mary's College, India and 2Tezpur University, India |
Volume : 2 volume number : 1 pdf |
A Survey on Web Pre-Fetching and Web Caching Techniques in a Mobile Environment |
Greeshma G. Vijayan and Jayasudha J. S, SCT College of Engineering, India |
Volume : 2 volume number : 1 pdf |
Assessment of systolic and diastolic cycle duration from speech analysis in the state of anger and fear |
Nivedita Deshpande1, KavitaThakur1 and A.S.Zadgaonkar2, 1Pt. Ravishankar University, India and 2Dr. C.V. Raman University, India |
Volume : 2 volume number : 1 pdf |
Dwt-SVD Based Secured Image Watermarking for Copyright Protection Using Visual Cryptography |
Sushila Kamble, Vikas Maheshkar, Suneeta Agarwal and Vinay K Srivastava, MNNIT, Allahabad, India |
Volume : 2 volume number : 1 pdf |
A Comparative Study of Incentive Mechanisms Used in Peer-To-Peer System |
Guruprasad Khataniar1, Sankhapani Bharali2 and Archana Khataniar3, 1Assam Engineering Institute, India, 2Girl's Polytechnic, Assam, India and 3Bajali College, Assam, India |
Volume : 2 volume number : 1 pdf |
Innovative field of cryptography: DNA cryptography |
Er.Ranu Soni1, Er.Vishakha Soni2 and Er.Sandeep Kumar Mathariya2, 1LNCT Indore, India and 2PCST Indore, India |
Volume : 2 volume number : 1 pdf |
Application of Genetic Algorithm in Designing a Security Model for Mobile Adhoc Network |
Kumar Nikhil, Swati Agarwal and Pankaj Sharma, ABES Engineering College, India |
Volume : 2 volume number : 1 pdf |
Frequent Subgraph Mining Algorithms - A Survey and Framework for Classification |
K.Lakshmi1 and T. Meyyappan2, 1Sir M.Visvesvaraya Institute of Technology, India and 2AlagappaUniversity, India |
Volume : 2 volume number : 1 pdf |
Application of Autonomic Computing Principles in Virtualized Environment |
Anala M R and Shobha G, RVCE, India |
Volume : 2 volume number : 1 pdf |
Object Shape Representation by Kernel Density Feature Points Estimator |
Tranos Zuva1, Oludayo O. Olugbara2, Sunday O. Ojo3 and Seleman M.Ngwira1, 1Tshwane University of Technology, South Africa, 2Durban University of Technology, South Africa and 3Faculty of Information and Communication Technology, South Africa |
Volume : 2 volume number : 1 pdf |
Performance Evaluation of JPEG Image Compression Using Symbol Reduction Technique |
Bheshaj Kumar1,Kavita Thakur1 and G.R. Sinha2, 1Pt. R. S. University,Raipur,India and 2Shri Shankarachrya College of Engineering & Technology, |
Volume : 2 volume number : 1 pdf |
Content-Based Image Retrieval Using Modified Human Colour Perception Histogram |
Shaila S.G and A.Vadivel, National Institute of Technology, India |
Volume : 2 volume number : 1 pdf |
Terrian Identification Using Co-Clustered Model of the Swarm Intellegence & Segmentation Technique |
Ritesh Srivastava1 Shivani Agarwal2 Ankit Goel2 Vipul Gupta2, 1Galgotia College, Greater Noida and 2IMS Engineering College, Ghaziabad |
Volume : 2 volume number : 1 pdf |
Human Vision Thresholding with Enhancement for Dark Blurred Images for Local Content Preservation |
Chelsy Sapna Josephus and Remya .S, University of Kerala, India |
Volume : 2 volume number : 1 pdf |
Hardware Software Co-Simulation of Motion Estimation in H.264 Encoder |
S. Valarmathi1, R. Vani2 and M. Sangeetha1, 1Karpaga Vinayaga College of Engg. and Technology, India and 2Anna University of Technology, India |
Volume : 2 volume number : 1 pdf |
Medical Image Texture Segmentation Usingrange Filter |
Amir Rajaei, LalithaRangarajan and ElhamDallalzadeh, University of Mysore, India |
Volume : 2 volume number : 1 pdf |
Tile Boundary Artifacts Reduction of JPEG2000 Compressed Images |
Singara Singh, R. K. Sharma and M. K. Sharma, Thapar University, India |
Volume : 2 volume number : 1 pdf |
State Space Point Distribution Parameter for Support Vector Machine Based CV Unit Classification |
N K Narayanan1 T M Thasleema1 and V Kabeer2, 1Kannur University, India and 2University of Calicut, India |
Volume : 2 volume number : 1 pdf |
Openness of Search Engine": A Critical Flaw in Search Systems; A Case Study on Google, Yahoo and Bing |
Katuru SM Kalyana Chakravarthy, ISTQB Certified QA Engineer, India |
Volume : 2 volume number : 1 pdf |
Automatic Assessment of Programming assignment |
Surendra Gupta and Shiv Kumar Dubey, Shri G. S. Institute of Technology & Science, India |
Volume : 2 volume number : 1 pdf |
A Framework Studio for Component Reusability |
N Md Jubair Basha1 and Salman Abdul Moiz2, 1Muffakham Jah College of Engineering & Technology India and 2MVSR Engineering College, India |
Volume : 2 volume number : 1 pdf |
Boolean Specification Based Testing Techniques: A Survey |
Usha Badhera, Purohit G.N and S.Taruna, Banasthali University, India |
Volume : 2 volume number : 1 pdf |
A Novel Algorithm for Watermarking and Image Encryption |
Rakesh S, Ajitkumar A Kaller, Shakshari B C and Annappa B, National Institute of Technology - Karnataka, India |
Volume : 2 volume number : 1 pdf |
Integrating Related XML Data into Multiple Data Warehouse Schemas |
Soumya Sen1, Ranak Ghosh2, Debanjali Paul2 and Nabendu Chaki1, 1University of Calcutta Kolkata, India and 2Barrackpore Rastraguru Surendranath College, India |
Volume : 2 volume number : 1 pdf |
Symmetric Encryption Algorithm in Speech Coding for Defence Communications |
Akella Amarendra Babu1 and Ramadevi Yellasiri2, 1Progressive Engineering College, India and 2Chaitanya Bharathi Institute of Technology, Hyderabad, India |
Volume : 2 volume number : 1 pdf |
Early Stage Software Development Effort Estimations - Mamdani FIS Vs Neural Network Models |
Roheet Bhatnagar and Mrinal Kanti Ghose, Sikkim Manipal University, India |
Volume : 2 volume number : 1 pdf |
An Innovative SQA Service Maturity Model Using CMMI And ITIL |
Shankar Gurumoorthy, Senior Quality Leader, Bangalore, India |
Volume : 2 volume number : 1 pdf |
Applying Requirement Based Complexity for the Estimation of Software Development and Testing Effort |
Ashish Sharma1 and Dharmender Singh Kushwaha2, 1GLA University, Mathura, India and 2MNNIT, Allahabad, India |
Volume : 2 volume number : 1 pdf |
SXC-JMS: A WEB -Based Journal Management System |
Sahon Bhattacharyya, Kalyan Mondal, Shalabh Agarwal and Asoke Nath, St. Xavier's College, India |
Volume : 2 volume number : 1 pdf |
Adaptive Guidance System for SPEM |
Hamid Khemissa1 Mohamed Ahmed-nacer1 and Mourad Oussalah2, 1USTHB University, Algeria and 2Nantes University |
Volume : 2 volume number : 1 pdf |
Program Test Data Generation for Branch Coverage with Genetic Algorithm: Comparative Evaluation of A Maximization and Minimization Approach |
Ankur Pachauri Gursaran, Dayalbagh Educational Institute, Agra |
Volume : 2 volume number : 1 pdf |
Knowledge Base of Project Managers in the South African ICT Sector |
Robert T. Hans1and Pantaleo M.D. Rwelamila2, 1Tshwane University of Technology, South Africa and 2University of South Africa, South Africa |
Volume : 2 volume number : 1 pdf |