Published: 2014-01-28

A Prototype of a Wirelessly Controlled Nuclear Centrifuge

Jacqueline J.George, Managib N. Abdelgader

Pages No. 3584-3587

Full text

Abstract 100  | PDF 42 

Graphical User Interface for Capacity Planning in Long Term Evolution

Jacqueline J.George, Sheemaa Ali Mohamed Hashim

Pages No. 3588-3592

Full text

Abstract 112  | PDF 192 

Protein Secondary Structure Prediction Using Improved Support Vector Machine And Neural Networks

Anureet Kaur Johal, Prof. Rajbir Singh

Pages No. 3593-3597

Full text

Abstract 117  | PDF 45 

A survey on Software as a service (SaaS) using quality model in cloud computing

Sarbojit Banerjee, Shivam Jain

Pages No. 3598-3602

Full text

Abstract 213  | PDF 362 

Denoising of Gaussian and Speckle Noise from XRay Scans using Haar Wavelet Transform

Satish Kumar Banal, Randhir Singh

Pages No. 3603-3606

Full text

Abstract 121  | PDF 88 

Influence of Fine Glass Aggregate On Cement Mortar

Mrs. Bhandari P.S., Mr. Dhale S.A., Mr. Ghutke V.S , Mrs. Pathan V.G.

Pages No. 3607-3610

Full text

Abstract 107  | PDF 212 

Oblique Decision Tree Learning Approaches : A survey

Ms.Sonal Patil, Ms. Sonal V. Badhe, Ms.Sonal Patil, Ms. Sonal V. Badhe

Pages No. 3611-3616

Full text

Abstract 116  | PDF 22 

New Technology for Mobility Based Wireless Sensor Networks

Dr. S Anitha, Mr. Veerbushana Belkeri
Full text

Abstract 213  | PDF 28 

Network Security: Security in Cloud Computing

Mr. Vikas Malik, Srishti Gupta, Jyoti Kaushik
Full text

Abstract 266  | PDF 2249 

A RESEARCH REVIEW ON DIFFERENT DATA HIDING TECHNIQUES

Dr.K.Sathiyasekar, S.Karthick Swathy Krishna K S
Full text

Abstract 136  | PDF 999 

Network Security: Li-Fi: Data Onlight Instead of Online

Mr. Vinod Saroha, Ritu Mehta
Full text

Abstract 236  | PDF 106 

Review & Proposal for a Cloud based Framework for Indian Higher Education

Sreevidya Subramanian, Dr.Ananthi Seshasaayee
Full text

Abstract 126  | PDF 270 

An Approach to Detect and Prevent Tautology Type SQL Injection in Web Service Based on XSchema validation

R. Joseph Manoj, Dr.A.Chandrasekhar, M.D.Anto Praveena
Full text

Abstract 227  | PDF 203 

A Novel Approach to Construct Deterministic Finite State Automata

Amrita Bhattacharjee, Bipul Syam Purkayastha
Full text

Abstract 245  | PDF 16 

Graphical Interpreter

Prof. A.Nagesh,A.Chiranjeevi, jayanth vangari, Malyala.Madhu shyam
Full text

Abstract 235  | PDF 23 

Fraud Detection in credit Card Transaction Using Hybrid Model

Ashish Gupta , Jagdish Raikwal
Full text

Abstract 324  | PDF 0 

Assessment of Service Composition Plan using Colored Petri Nets

Dr.A.Bhuvaneswari, S.Uma, S.Sakthitharan, G.Srinivasan
Full text

Abstract 235  | PDF 31 

SOA enabled e-administration for institutes providing higher education

Mr. Ajit R Pandey, Dr V M Thakare
Full text

Abstract 165  | PDF 30 

On some Security aspect of HPC Environment

Subrata Paul, Anirban Mitra, Ramanuja Nayak
Full text

Abstract 180  | PDF 29 

Defect Forecasting In Software System - Mining Approach

Priyank Dineshkumar Patel
Full text

Abstract 192  | PDF 82 

Hybridization Of Web Page Recommender Systems

Mr. S. R. Patil, Prof. S.K. Shirgave
Full text

Abstract 79  | PDF 64 

Pattern Recognition and Their Different Approach

Ajit Kumar, Rajeev Ranjan, Dr. B.Mishra
Full text

Abstract 183  | PDF 41 

COMPARATIVE ANALYSIS of LINEARLY POLARIZED PATCH ANTENNA for WI-FI and WLAN APPLICATIONS

Meghna Kucheria, ijendra Maurya, Parikshit Vasisht Taruna Sharma, Dr. Neela Chattoraj
Full text

Abstract 86  | PDF 24 

Energy Efficient Data Gathering Mechanism In Wireless Sensor Networks Using Mobile Collectors

K.Revanth Kumar Reddy, H.Usha Rani, K.Rubesh Kumar
Full text

Abstract 116  | PDF 25 

RECOGNITION OF FACIAL EXPESSION USING FACIAL MOVEMENT FEATURES

D. Rama Krishna Reddy, D. Hema Latha, K. Sudha
Full text

Abstract 99  | PDF 31