Published: 2017-12-30

Design of Low Power Variable Latency adder and Its Implementation in Decimation Filter

Sasikumar.J N.Kirthika

Abstract 27  | PDF

Grid computing Issues, Challenges, Need And Practice

Ayushi Pathak Nisha Kaushik

Abstract 20  | PDF

CYBER FORENSICS-A REVIEW

Dr D S, Kushwaha,

Abstract 25  | PDF

Use Of Information Technology In Rural Development”

Gosawi P.R., Madan B.S., Chopane V.V,

Abstract 29  | PDF

TA DETAILED REVIEW ON INCREASING RELIABILITY OF SOFTWARE BY AN INNOVATIVE APPROACH

K Manideep, A L Siridhara,

Abstract 19  | PDF

A Survey on SQL Injection attacks, their Detection and Prevention Techniques

Nithya1,R.Regan, , J.vijayaraghavan,

Abstract 64  | PDF

Gesture Recognition: A Communication and Future to Tablets

Kunal Gandhi, Ayushi Pathak, Nisha Kaushik

Abstract 18  | PDF

AN ADAPTIVE TECHNIQUE FOR FINGER CODE GENERATION USING SEGMENTATION WITH SPFB BASED TECHNIQUE

Dr. S. Pannirselvam , P. Raajan ,

Abstract 36  | PDF

CAD SYSTEM FOR LUNG CANCER DETECTION

Archana S, Dr.K.P.Kaliyamurthie, , Dr.V.Khanaa

Abstract 23  | PDF

: RESOURCE IDENTIFICATION IN GRID USING GRS

Sanjay Razdan

Abstract 22  | PDF

: A NOVEL TECHNIQUE OF REAL TIME VIDEO MONITORING SYSTEM

: Dharani.G, Jeevarathinam.K, Kavin.K, Pritiya.S,

Abstract 22  | PDF

ACTIVE SHAPE MODEL AND TOUCH LESS HAND GEOMETRY FOR PALM PRINT RECOGNITION

Gaganpreet kaur, Sandeep kaur, Dr. Dheerendra singh,

Abstract 24  | PDF

DESIGN OF THE MATHEMATICAL MODEL FOR ANALYSIS OF HUMAN RESPIRATORY SYSTEM

Ankit Kajaria,

Abstract 21  | PDF

Purelet approach and ICA Based Poisson Noise Reduction in MRI Data Set

Dr.S.Vasuki P.Karthikeyan, \G.Akshaya karthika

Abstract 22  | PDF

A Modified Version Of Extended Plafair Cipher (8x8)

Gaurav Shrivastava Manoj Chouhan, Manoj Dhawan

Abstract 22  | PDF

Secure Authentication Methods for Preventing Jamming Attacks In Wireless Networks

Y. Madhavi Latha, P. Rambabu,

Abstract 25  | PDF

Subscriber Theoretic Pricing for Video Streaming In Mobile Networks

P. Supraja, , Sd. Afzal Ahmed , P. Babu P.Radhika,

Abstract 20  | PDF

An Adaptive Architecture for Autonomic Orchestration of Web Services

Mrs.C.Sathya, Mrs.T.Hemalatha

Abstract 18  | PDF

TRANSFERRING VOICE OVER LOCAL AREA NETWORK THROUGH INTERNET PROTOCOL-PRIVATE BRANCH EXCHANGE

R.Anandhi, T.Aravindan,C.Elavarasan, R.Ramya C.Gomathi,

Abstract 19  | PDF

Survey Paper on Training of Cellular Automata for image

Swati, Chauhan,

Abstract 19  | PDF

Implementation of Secret Delegation for Secured Attribute Based Access Control In Cloud Computing

Mrs.G.Mariammal, Dr.N.Uma Maheswari Dr.R.Venkatesh Mr.P.Lakshmanan,

Abstract 18  | PDF

Multi Benfit’s Through Compression For Large Data Stored In Cloud

1 M.Ravi Kumar, S.Manoj Kumar

Abstract 20  | PDF

Performance Analysis of Content Based Image Retrivel

Arul Murugan A, Jothi Vignesh C, Nijanthan S, Rajasekar Vignesh E,

Abstract 22  | PDF

A Novel Cloud Computing Architecture Supporting E-Governance

M.Shahul Hameed, A.Appunraj DR.T.Nalini

Abstract 18  | PDF

4G, the fourth generation of mobile Communication

Ansh Agarwal Adesh Sharma, Manish Rawat,

Abstract 24  | PDF

Study of Smartphone Attacks and Defenses

Bhavya Chojar, Divya Lal, Kunal Gandhi, Kshitij Salari

Abstract 18  | PDF

Mobile Wireless Networks :Challenges

Manish Rawat Adesh Sharma, Ansh Agarwal Mandeep kaur,

Abstract 20  | PDF

IMAGE STREAM TRANSFER USING REAL TIME PROTOCOL

Sandeep Rao Priya Rani Pandey, Avinash

Abstract 210  | PDF

Multiuser Short Message Service Based Wireless Electronic Notice Board

Gowtham.R Kavipriya.K , Kesavaraj.G , Nathe Aen Mr. S.Maragatharaj,

Abstract 36  | PDF

Designing of Mobile Robot with Mecanum Wheel

Dr.V.Khanaa, Dr.Krishna Mohanta,

Abstract 33  | PDF

An R-Tree Node Splitting Algorithm Using MBR Partition for Spatial Query

Dr.V.Khanaa, Dr.Krishna Mohanta

Abstract 16  | PDF

Graph Clustering In Social Networks Based On Attribute Similarities

S. Kalaichezhian

Abstract 16  | PDF

"Identifying high throughput path in Wireless Mesh Networks with bandwidth Guarantees

Regan. R, Divya.K, Madheswari.R,

Abstract 22  | PDF

Improved Security Architecture For Up Keeping Routing Services on Ad Hoc Networks

VRegan. R, Ilakkiya veera, Kousalya.J,

Abstract 17  | PDF

Secure Migration of Various Database over A Cross Platform Environment

R.Vinodha, Mr.R.Suresh

Abstract 21  | PDF

n Artificial Neural Network Based Vessel Detection On The Optic Disc Using Retinal Photograph

Sharmila .S,

Abstract 17  | PDF

Tracking System for Wireless Devices in Wifi Environment

Deepali Khatwar, Vaishali Katkar

Abstract 22  | PDF

Design of Ultra High Band Pass Filter By Using Di-Electric Resonator

Rajni Yadav, Kavita Dagar, Bhanu Yadav,

Abstract 20  | PDF

An Efficient Framework for Name Disambiguition In Digital Library

J. Pricilla

Abstract 26  | PDF

Extraction of Html Documents From Heterogeneous WebPages Using Cluster Techniques

Sruthi Kamban K.S, M.Sindhuja,

Abstract 19  | PDF

A Secure Environment for Unsafe Component Loading

Veeralakshmi S, Sindhuja M,

Abstract 16  | PDF

Health Monitoring System for Induction Motors

Dr.R. Udayakumar Dr.V. Khanaa,

Abstract 17  | PDF

Optimization of Group Elevator Scheduling

Dr.R. Udayakumar, Dr.V. Khanaa,

Abstract 16  | PDF

Secure Educational Network

Dr.R. Udayakumar, Dr.V. Khanaa

Abstract 16  | PDF

Sixth Sense Technology

Dr.R. Udayakumar, Dr.V. Khanaa

Abstract 23  | PDF

Mobile Application Development Strategies

Ms. Warhekar Snehal P* Prof. Gaikwad V.

Abstract 21  | PDF

Heterogeneous Mobility Management and Vision for Wireless Networks

Madhurima V, T.Venkat Narayana Rao Lallu Nayak,

Abstract 16  | PDF

Software Quality Prediction: A Review and Current Trends

P. Ranjeet Kumar *, R. Ramesh, T.Venkat Narayana Rao Shireesha Dara

Abstract 17  | PDF

Carry Bypass & Carry Select Adder Using Reversible Logic Gates

Yedukondala Rao Veeranki Alok Katiyar, Venkata Reddy Kopparthi,

Abstract 267  | PDF

Protection of Data Base Security via Collaborative Inference Detection

Alok Kumar Shukla, Ajay Sharma, Dharmendra Kumar,

Abstract 16  | PDF

Minutiae Based Fingerprint Recogntion

Ritu Ritu

Abstract 16  | PDF

Role Based Query Modification for Relational Database systems

Ahmed H. Araf Nawal El-Fishawy, Mervat M. Mousa

Abstract 21  | PDF

A Review on Tcp Westwood Protocol For Simulated And Internet Environment

Vijay P Reshamwala Kaushika D Patel

Abstract 19  | PDF

Quantification Analysis of Chaotic Fractal Dimensions

Hemant Kumar Singh Prof. Deepa Gupta

Abstract 43  | PDF

Microscopic Image Analysis for Plant Tissue Using Image Processing Technique

rof. Satange D. N Ms. Pasarkar Anagha A Ms. Chauhan Priyanka D

Abstract 51  | PDF

OVERVIEW OF TEXT SUMMARIZATION EXTRACTIVE TECHNIQUES

Mrs Pimpalshende A. N.

Abstract 44  | PDF

DATA MINING TECHNIQUES FOR SOFTWARE EFFORT ESTIMATION TO IMPROVE COST EFFICIENCY

Ms. K. Gayathiri Dr. T. Nalini ,Dr. V. Khanaa,

Abstract 18  | PDF

RELIABILITY APPROACH OF DATA GATHERING PROTOCOL FOR MOBILE USERS IN WIRELESS SENSOR NETWORK

Miss. Chaitali G. Taral, Dr.P.R.Deshmukh Prof. G.S.Thakare

Abstract 17  | PDF

Integration of 2 D Secure Barcode in Identity Cards:A New Approach

Manisha Bajpai Arun Prakash Agrawal

Abstract 26  | PDF

An overview of Mobile Ad Hoc Networks for the Proactive, Reactive and Hybrid Routing Protocol

Sumedha S. Deshpande Krutika V. Asare, Swapnil Deshpande

Abstract 23  | PDF

Hybrid Dwt-Dct Coding Techniques for Medical Images

Mrs. Mishra Keerti Mrs.Verma Deepti, Mr. Verma R.L.

Abstract 23  | PDF

A Hybrid Watermarking Scheme For Medical Images

Mrs. Verma Deepti, , Mrs.Mishra Keerti Mr.Verma R.L

Abstract 17  | PDF

A Hybrid Watermarking Scheme For Medical Images

Mrs. Verma Deepti Mrs.Mishra Keerti ,Mr.Verma R.L.

Abstract 16  | PDF

USE OF ARTIFICIAL NEURAL NETWORK TO IDENTIFY CARCINOMA CELL

Miss. Kuralkar Samruddhi S. *, Dr. Deshmukh P.R

Abstract 17  | PDF

Wireless Cellular Communications Security Issues and Types of Attacks with WAP

K.V.N.R. Sai Krishna

Abstract 18  | PDF

Image Segmentation Using Cellular Automata: A Technical Survey

Priyanka Shotrya Sanjeev Bhardwaj

Abstract 27  | PDF

“The Pertinence of Intelligent System in the field of Digital Image Forensics”

Miss. Pande Ankita V Prof. Shandilya V.K.

Abstract 20  | PDF

“Digital Image Processing Approach for Fruit and Flower Leaf Identification and Recognition”

Miss. Pande Ankita V Prof. Shandilya V.K

Abstract 43  | PDF

Achieving Energy Efficiency by the Enhancement Of Mac Protocol To Prevent Nav Attack

Pathak Vivek Gangal Ambrish

Abstract 24  | PDF

Improving Decision Support Systems with Data mining, Data warehousing, OLAP and OLTP Technologies

Ms. Ramteke M. A*, Prof. Dhande S. S,

Abstract 32  | PDF

An Aperture Coupled Feed Approach to Gain and Bandwidth Enhancement of Microstrip Patch Array Antennas

Fathima Anees S Mrs. Rajini A R

Abstract 23  | PDF

IMAGE RECONSTRUCTION OF WATER WAVES USING BISPECTRUM TECHNIQUES

Miss. Solio Anchal A. Dr. Ladhake S.A

Abstract 20  | PDF

Image Segmentation Using Graph Partition Methods

Gayathri.S Thamizh Illakiya.M K. John Singh,

Abstract 24  | PDF

Anomaly Detection: An Application of Visual Surveillance

M. Aishwarya, S. Shanu

Abstract 20  | PDF

Dynamic Routing With Security Considerations

Abhinav Srivastava Amritanshu Srivastava Gaurav Kumar Mall

Abstract 75  | PDF

A SURVEY OF BROADCASTING PROTOCOLS IN WIRELESS NETWORK

Nayak Divya, Prof. Shukla Suwesh, Shrivastava Manish

Abstract 17  | PDF

ARTIFICIAL VISION SYSTEM FOR AUTOMATIC NUMBER PLATE IDENTIFICATION

Miss. Kuralkar Samruddhi S. Dr. Deshmukh

Abstract 19  | PDF

WEB MINING AND ITS CATEGORIES – A SURVEY

*M.Srividya D.Anandhi M.S.Irfan Ahmed

Abstract 28  | PDF

PROTECTED CASH WITHDRAWAL IN ATM USING MOBILE PHONE

M.R.Dineshkumar .S.Geethanjali R.Karthika M.Nagaraj N.Vijayanandam,

Abstract 25  | PDF

PHOTO SHARING WEBSITES USING PERSONALIZED AND NON-PERSONALIZED IMAGE SEARCH

V.Dhavamani V.Shalini , Dr.K.P.Kaliyamurthie Dr.K.P.Kaliyamurthie

Abstract 21  | PDF

SECURITY AND KEY DISTRIBUTION IN BINDING OF IP TO DNS

Arvind Kumar Gupta Pravin Tripathi,Sat

Abstract 16  | PDF

: A STUDY OF FUNDAMENTALS AND PRINCIPLES OF SOFTWARE ENGINEERING PROCESS

Niraj jNake

Abstract 22  | PDF

ASPECTS OF SECURITY IN CLOUD COMPUTING

: Anu Rathi, Yogesh Kumar Anish Talwar

Abstract 27  | PDF

SIMULATION AND EXPERIMENTAL STUDIES ON HYDRODYNAMICS CHARACTERISTICS OF COCURRENT THREE PHASE FLUIDISATION USING FUZZY LOGIC

: Anish .T. Achankunju Sivalingam A, , Kannadasan T.

Abstract 33  | PDF

PERFORMANCE EVALUATION OF LOCALIZATION TECHNIQUE IN WIRELESS SENSOR NETWORK

Urvashi Singh Manish kumar Jha

Abstract 20  | PDF

A SURVEY ON SECURITY IN MOBILE ADHOC NETWOR

Dr. Anna Saro Vijendran A. Kamatchi,

Abstract 16  | PDF

ACTIVE SOURCE ROUTING PROTOCOL FOR MOBILE NETWORK:

Anil Kumar Prasad Anamika Bhusan, Divya Gupta

Abstract 66  | PDF

EMPIRICAL ANALYSIS OF CORRELATION BETWEEN C&K METRICS AND TESTABILITY

Jaspreet kaur, Raj Kumari

Abstract 24  | PDF