Comparison of Wilkinson Power Divider and Gysel Power Divider Using AdsŪ for the Frequency Range of 3 Ghz |
S.Banu, A.Vishwapriya, R.Yogamathi, A.V.Meenakshi and SPK.Babu, Periyar Maniammai University, India |
Volume : 2 volume number : 4 pdf |
A Performance Analysis of CLMS and Augmented CLMS Algorithms for Smart Antennas |
Y. Rama Krishna1, P E S N Krishna Prasad1, P.V. Subbaiah2 and B. Prabhakara Rao3, 1Prasad V. Potluri Siddhartha Institute of Technology, India, 2Amrita Sai Institute of Science & Technology, India and 3JNT University Kakinada, India |
Volume : 2 volume number : 4 pdf |
Achieving Optimum Value of k in a K-fold Multicast Network with Buffer using M/M/n/n+q/N Traffic Model |
Md. Mahmudul Hasan1, Most. Tajmary Mahfuz1 and Mohamed Ruhul Amin2, 1Daffodil International University, Bangladesh and 2East West University, Bangladesh |
Volume : 2 volume number : 4 pdf |
Achieving Optimum Value of k in a K-fold Multicast Network with Buffer using M/M/n/n+q/N Traffic Model |
Md. Mahmudul Hasan1, Most. Tajmary Mahfuz1 and Mohamed Ruhul Amin2, 1Daffodil International University, Bangladesh and 2East West University, Bangladesh |
Volume : 2 volume number : 4 pdf |
Achieving Optimum Value of k in a K-fold Multicast Network with Buffer using M/M/n/n+q/N Traffic Model |
Md. Mahmudul Hasan1, Most. Tajmary Mahfuz1 and Mohamed Ruhul Amin2, 1Daffodil International University, Bangladesh and 2East West University, Bangladesh |
Volume : 2 volume number : 4 pdf |
DSR Routing Decisions for Mobile Ad Hoc Networks using Fuzzy Inference System |
Pankaj Sharma1, Shruti Kohli2 and Ashok Kumar Sinha1, 1ABES Engineering college, India and 2BITEC, India |
Volume : 2 volume number : 4 pdf |
Enhanced Secure Routing Model for MANET |
Vinay Kumar Pandey1, Harvir Singh1 and Sanjay Kumar2, 1UTU, India and 2Benpour Technologies(P)Ltd, India |
Volume : 2 volume number : 4 pdf |
A Novel Chaos Based Modulation Scheme (CS-QCSK) With Improved Ber Performance |
K.Thilagam and K.Jayanthi, Pondicherry Engg. College, India |
Volume : 2 volume number : 4 pdf |
Alternatives to Redistribution Communities in Inter-domain traffic Engineering |
Vivekanandan Mahadevan, SRM University, India |
Volume : 2 volume number : 4 pdf |
MIPV6 Protocols: A Survey and Comparative Analysis |
K Vasu, Sudipta Mahapatra and C S Kumar, IIT Kharagpur, India |
Volume : 2 volume number : 4 pdf |
Model for Intrusion Detection System |
Neha Rani, Pankaj Sharma and Ashok Kumar Sinha, ABES Engineering College, India |
Volume : 2 volume number : 4 pdf |
Multifocus Image Fusion Using Multiresolution Approach with Bilateral Gradient Based Sharpness Criterion |
G Geetha, S.Raja Mohammad and Y.S.S.R. Murthy, Sri Vishnu Engineering College for Women, India |
Volume : 2 volume number : 4 pdf |
WALEACH: Weight Based Energy Efficient Advanced Leach Algorithm |
Ankit Thakkar and K Kotecha, Nirma University, India |
Volume : 2 volume number : 4 pdf |
Secure Multiparty Computation during Privacy Preserving Data Mining: Inscrutability Aided Protocol for Indian Healthcare Sector |
Zulfa Shaikh1 and Poonam Garg2, 1Acropolis Institute of Technology & Research, India and 2Institute of Management Technology, India |
Volume : 2 volume number : 4 pdf |
Real-Time Routing Protocols for Wireless Sensor Networks: A Survey |
Pradeep Chennakesavula, Jemimah Ebenezer and S.A.V Satya Murty, Indira Gandhi Centre for Atomic Research Kalpakkam, India |
Volume : 2 volume number : 4 pdf |
Impact of Contention Window on Congestion Control Algorithms for Wireless Adhoc Networks |
B.Nithya, C.Mala and Vijay Kumar B, NIT, India |
Volume : 2 volume number : 4 pdf |
Dynamic Channel Allocation Scheme to Handle Handoff in Wireless Mobile Network |
Alagu S and Meyyappan T, Alagappa University, India |
Volume : 2 volume number : 4 pdf |
Efficient Defense System for IP Spoofing in Networks |
Emil Kuriakose John and Sumaiya Thaseen, VIT University, India |
Volume : 2 volume number : 4 pdf |
Generation of Secure One-Time Password Based on Image Authentication |
Himika Parmar, Nancy Nainan and Sumaiya Thaseen, VIT University, India |
Volume : 2 volume number : 4 pdf |
Bulk Binding Update Procedure for PMIPV6 Based Intelligent Transportation Systems |
K Vasu, Sudipta Mahapatra and C S Kumar, IIT Kharagpur, India |
Volume : 2 volume number : 4 pdf |
A Reliable and Energy Efficienct Routing Protocol for Manets |
Pallavi Kaliyar1, Kavita Pandey2 and Gagan Singla3, 1Shri Ram College of Engineering & Technology, India, 2Jaypee institute of information technology, India and 3Aryabhatta Group of institutions, India |
Volume : 2 volume number : 4 pdf |
Punjabi Text Clustering by Sentence Structure Analysis |
Saurabh Sharma and Vishal Gupta, Panjab University, India |
Volume : 2 volume number : 4 pdf |
Punjabi Text Classification using Naive Bayes, Centroid and Hybrid Approach |
Nidhi and Vishal Gupta, Panjab University, India |
Volume : 2 volume number : 4 pdf |
Event Coreference Resolution using Mincut based Graph Clustering |
Sangeetha.S and Michael Arock, National Institute of technology, India |
Volume : 2 volume number : 4 pdf |
A New Method for Preserving Privacy in Data Publishing |
R.Mahesh and .T.Meyyappan, Alagappa University, India |
Volume : 2 volume number : 4 pdf |
Representation of Uncertain Data Using Possibilistic Network Models |
P. E. S. N. Krishna Prasad1, K. Madhavi2 and B. D. C. N. Prasad1, 1Prasad V. Potluri Siddhartha Institute of Technology, India and 2Dadi Institute of Engineering and Technology, India |
Volume : 2 volume number : 4 pdf |
Dynamic Task Partitioning Model in Parallel Computing |
Javed Ali and Rafiqul Zaman Khan, Aligarh Muslim University, India |
Volume : 2 volume number : 4 pdf |
Review on Transform Based Medical Image Compression |
Sherin Jabbar and Shaiju Panchikkil, MES Engineering College, India |
Volume : 2 volume number : 4 pdf |
Extended Wavelet Transform Based Image Inpainting Algorithm for Natural Scene Image Completion |
K.Sangeetha, P.Sengottuvelan and E.Balamurugan, BIT, India |
Volume : 2 volume number : 4 pdf |
Implementation of Fuzzy Logic with High Security Registration Plate (HSRP) for Vehicle Classification and Checking in Toll-Plaza |
V. Sathya1 and J. Abdul Samath2, 1MGR College, India and 2SRIT, India |
Volume : 2 volume number : 4 pdf |
Digital Video Holography- A Robust Tool for Communication |
S.Ponchitra, K.Murali and P.K.Palanisamy, Anna University, India |
Volume : 2 volume number : 4 pdf |
Privacy Preserving Clustering in Data Mining Using VQ Code Book Generation |
D.Aruna Kumari, Rajasekhara Rao and M.Suman, K.L.University, India |
Volume : 2 volume number : 4 pdf |
SOM-PAD: Novel Data Security Algorithm on Self Organizing Map |
Marghny Mohamed1, Abeer Al-Mehdhar2 and Mohamed Bamatraf1, 1Assiut University, Egypt and 2Hadhramout University of Science and Technology, Yemen |
Volume : 2 volume number : 4 pdf |
A Concert Evaluation of Exemplar Based Image Inpainting Algorithms for Natural Scene Image Completion |
K.Sangeetha, P.Sengottuvelan and E.Balamurugan, BIT, India |
Volume : 2 volume number : 4 pdf |
A Study of Power Saving Technique in Wireless Networks |
Mamta Agiwal and Kashif Ahmed, CMRIT, India |
Volume : 2 volume number : 4 pdf |
Performance Evaluation of Different Techniques for Texture Classification |
Ashwini Dange, Mugdha Khade, Payal Kulkarni and Pooja Maknikar, VIT, India |
Volume : 2 volume number : 4 pdf |
Weighted Performance comparison of DWT and LWT with PCA for Face Image Retrieval |
J.Madhavan1, K.Porkumaran2, 1Adhiyamaan College of Engineering, India and 2Dr. NGP college of Engineering and Technology, India |
Volume : 2 volume number : 4 pdf |
New Algorithm for Sensitive Rule Hiding Using Data Distortion Technique |
Kasthuri S1 and Meyyappan T2, 1Swami Dayananda College of Arts and Science, India and 2Alagappa University, India |
Volume : 2 volume number : 4 pdf |
Automatically Estimating Software Effort and Cost using Computing Intelligence Technique |
Jin-Cherng Lin , Han-Yuan Tzeng, and Yueh-Ting Lin, Tatung University, Taiwan |
Volume : 2 volume number : 4 pdf |
Backpropagation Learning Algorithm Based on Levenberg Marquardt Algorithm |
S.Sapna1, A.Tamilarasi2 and M.Pravin Kumar1, 1K.S.R College of Engineering, India and 2Kongu Engineering College, India |
Volume : 2 volume number : 4 pdf |
The Unified Operation Structure for Symmetric-Key Algorithm |
Kuo-Tsang Huang1 , Sung-Shiou Shen2 and Jung-Hui Chiu1, 1Chang Gung University, Taiwan and 2DE LIN Institute of Technology, Taiwan |
Volume : 2 volume number : 4 pdf |
Effectiveness Prediction of Memory Based Classifiers for the Classification of Multivariate Data Set |
C. Lakshmi Devasena, Sphoorthy Engineering College, India |
Volume : 2 volume number : 4 pdf |
Data Forwarding in Opportunistic Network Using Mobile Traces |
B.Poonguzharselvi and V.Vetriselvi, Anna University, India |
Volume : 2 volume number : 4 pdf |
A Registry Based Discovery Mechanism for E-Learning Web Services |
Demian Antony D'Mello, Pramod Prabhu, Naveen Baliga, Nikhil Misquith and Flexon Fernandes, St. Joseph Engineering College, India |
Volume : 2 volume number : 4 pdf |
Top Down Approach to find Maximal Frequent Item Sets using Subset Creation |
Jnanamurthy HK, Vishesh HV, Vishruth Jain, Preetham Kumar and Radhika M. Pai, Manipal University, India |
Volume : 2 volume number : 4 pdf |
Evolution of Wireless Mobile Communication Networks and Future of Cellular Market in India |
Arjun Kondur, Mayur Rao, Pavan Kumar B S and Rajeshwari Hegde, BMS College of Engineering, India |
Volume : 2 volume number : 4 pdf |
Secured Text Message Transmission with Implementation of Concatenated CFB Cryptographic Algorithm |
S.Saravana Kumar, R.Dharani, Aniruth Sabapathy, D.Nirmaldas and S.Srikanth, Panimalar institute of technology, India |
Volume : 2 volume number : 4 pdf |
Web Log Preprocessing Based on Partial Ancestral Graph Technique for Session Construction |
S.Chitra1 and B.Kalpana2, 1Government Arts College, India and 2Avinashilingam Institute of Home Science and Higher Education for Women, India |
Volume : 2 volume number : 4 pdf |
Creation of a Test Bed Environment for Core Java Applications using White Box Testing Approaches |
Priya R. L and Dhanamma Jagli, V. E. S. Institute of Technology, India |
Volume : 2 volume number : 4 pdf |
A Novel Approach for Energy Efficient Hierarchy Based Routing in Sensor Networks |
S.Karthikeyan1 and S.Jayashri2, 1Sathyabma University, India and 2Adhiparasakthi engineering college, India |
Volume : 2 volume number : 4 pdf |
Techniques for Component Reusable Approach |
Sukanay.M, Biruntha.S, Karthik.S, Kalaikumaran.T, SNS College of Technology, India |
Volume : 2 volume number : 4 pdf |
Next Generation 4G WiMAX Networks - IEEE 802.16 Standard: |
Shantanu Pathak and Shagun Batraa, SRM University, India |
Volume : 2 volume number : 4 pdf |