Published: 2017-12-31

Development New Press Machine using Programmable Logic Controller

N. M. Z. Hashim , N. M. T. N. Ibrahim,Z. Zakaria Fadhli Syahrial , H. Bakri,

Abstract 36  | PDF

Survey on Intelligent Transport System (ITS) application for vehicle speed limit monitoring and accident reporting

Sadiki Lameck Kusyama, Dr. Michael Kisangiri, Dina Machuve,

Abstract 35  | PDF

Development of Tomato Inspection and Grading System using Image Processing

N. M. Z. Hashim , N. H. Mohamad Z. Zakaria , H. Bakri, F. Sakaguchi,

Abstract 66  | PDF

Automatic vehicle over speed, accident alert and locator system for public transport (Buses)

Sadiki Lameck Kusyama, Dr. Michael Kisangiri, Dina Machuve,

Abstract 36  | PDF

Flood Detector Emergency Warning System

N. M. Z. Hashim , N. B. Hamdan Z. Zakaria, R. A. Hamzah A. Salleh,

Abstract 73  | PDF

Smart Casing for Desktop Personal Computer

N. M. Z. Hashim, A. F. Jaafar Z. Zakaria3, A. Salleh R. A. Hamzah,

Abstract 41  | PDF

A System for Monitoring and Reporting Excessive Passengers in Public Buses Case Study: Tanzania

Kilavo Hassan, Anael Sam, Dina Machuve,

Abstract 56  | PDF

Biometric Based Web Security Using Ridges of Finger

Md. Majharul Haque, R.H.M.Alaol Kabir, Md. Shakil Ahamed- -Shohag , Dr. Zerina Begum,

Abstract 46  | PDF

Kinetic And Correlation Studies Between Varying Corrosion Parameters And Corrosion Rate Of N-80 Oil Well Tubular Steel In 15% Hydrochloric Acid Pickling Solution Using Ficus Abutilifolia Plant Extract

Abubakar, G, Ibrahim, H., Mustafa M., Apugo-Nwosu, T. U., Nwobi B E I., Akuso, S. A. and Agboun D T

Abstract 46  | PDF

Corrosion Inhibition Studies Of Ficus Abutilifolia On N-80 Oil Well Tubular Steel In 15% Hydrochloric Acid Solution

Abubakar, G* ., Ibrahim,H., Apugo-Nwosu T.U.,Mustafa,M.,Akuso,S. A.,Agboun D T Nwobi, B.E. and Ayilara, S. I.,

Abstract 42  | PDF

A Review on “Adaptive Contriving Routing for Multihop Wireless Ad Hoc Networks

Mubina Begum,C RamaKrishna, Sasmita Behera,

Abstract 34  | PDF

A Review on” Packet-Hiding Methods to Hamper Selective Jamming Attacks in wireless networks

Pranita Chaudhar, C. RamaKrishna, Sasmita Behera,

Abstract 42  | PDF

A Software Test Data Generation Tool for Unit Testing Of C++ Programs Using Control Flow Graph

Goodubaigari Amrulla,

Abstract 40  | PDF

An Optimal Energy Efficient Video Distribution Over Cooperative Wireless Networks

K. Mohan Satya Narayana Reddy, K. Sathi Reddy,

Abstract 36  | PDF

Analysis Of Full Bridge Boost Converter For Wide Input Voltage Range

Ch. Abhilash, R. Shirisha, Khaja Rafi,

Abstract 41  | PDF

Empirical Study on Migrating Data From Relational Databases To Object-Oriented Technology.

Dr Leelavathi, Rajamanicakam,

Abstract 32  | PDF

A Collaborative Writing Tool on Cloud Environment

B. Manikyala Rao, Ch. Latha,

Abstract 32  | PDF

Computational Algorithm for Automatic Recognition of Vehicle Registration Plates

Ms. Preetika Sharma, Mr Gaurav Sapra, Mr Rachit Agarwal,, Ms. Preetika Sharma, Mr Gaurav Sapra, Mr Rachit Agarwal,

Abstract 30  | PDF

New Algorithm for Minimum Spanning Network Connectivity Problem

*Madhu Mohan Reddy P, Suresh Babu C Purusotham S Sundara Murthy M,

Abstract 32  | PDF

An Adaptive Energy Efficient Packet Forwarding Method for Wireless Sensor Networks

Sangeetha tamilmozhi, Dr. R. Pugazendi,

Abstract 41  | PDF

An Adaptive Energy Efficient Packet Forwarding Method for Wireless Sensor Networks

T. Sangeetha tamilmozhi, Dr. R. Pugazendi

Abstract 33  | PDF

Diagnosis and Risk Assessment of Cancer On Genes Dataset Using Data Mining Techniques

Arunkumar Sivaraman, Dr.M.Lakshmi, S.Arun Rajesh,

Abstract 50  | PDF

Traffic Flow Prediction Based on Optimized Type-2 Neuro-Fuzzy Systems

Mojtaba Paricheh , Assef Zare,

Abstract 34  | PDF

Review of "Achieving Secure, Scalable, and Finegrained Data Access Control in Cloud Computing"

U.JyothiK., Nagi Reddy, B. Ravi Prasad,

Abstract 34  | PDF

HOP-COUNT ANALYSIS IN UNSTRUCTURED P2P NETWORKS

Mrs.R.Sivapriya, Mr.S.Dhanabal,

Abstract 30  | PDF

IMPROVING HIGH PERFORMANCE UTILIZATION OF INFRASTRUCTURE-AS-A-SERVICE CLOUDS

M.Anitha Mr.Veera Prasd, Mrs.T.HimaBindu ,

Abstract 28  | PDF

A Survey on LSB Based Steganography Methods

M. Pavani, S. Naganjaneyulu, C. Nagaraju,

Abstract 49  | PDF

IMPLEMENTATION OF WAVELET TRANSFORM, DPCM AND NEURAL NETWORK FOR IMAGE COMPRESSION

V.Krishnanai Dr.G.Manoj Someswar, K.Purushotham A.Rajaiah,

Abstract 34  | PDF

Comparison Of SINR In FemtoCell & MacroCell Network In MacroCell Environment

Kanak Raj Chaudhary, Rachna Arya,

Abstract 25  | PDF

Association Rule Mining on Type 2 Diabetes using FP-growth association rule

dita Rane Madhuri Rao

Abstract 61  | PDF

Ipv6 Security: Issue Of Anonymity

Varsha Alangar, Anusha Swaminathan

Abstract 55  | PDF

Iris Recognition using Discrete Sub-band Transform for Biometric Identification

Nidhi, Er. Pushpinder Singh,

Abstract 29  | PDF

Literature Survey of WATM

Dr. M. Usha Rani, K. Sailaja

Abstract 28  | PDF

Modeling and Predicting Total Ozone Column and Rainfall in Kodaikanal, Tamilnadu By Arima ProcessAmongst all weather happenings, ozone plays the very important role in human life as well as climate change. The understanding of Total Ozone Column (TOC) and

R.SamuelSelvaraj, Sachithananthem C.P., K.Thamizharasan,

Abstract 30  | PDF

Mosacing Using Laplacian of Gaussion Method

Payun S, Tembhurne,

Abstract 37  | PDF

A Novel Image Steganography (NIS) Technique

Amanpreet Kaur, Neetu Sardana,

Abstract 35  | PDF

OVERVIEW ON PASSENGERS OVERLOAD CONTROL IN PUBLIC BUSES CASE STUDY: TANZANIA

Kilavo Hassan, Anael Sam, Dina Machuve,

Abstract 92  | PDF

BRUTE FORCE ATTACK – BLOCKING TECHNIQUE

G. Sowmya, A. Naveen Kumar,

Abstract 83  | PDF

Comparative Analysis of CMOS Transmission Gate Based Adders

Swaranjeet Singh,

Abstract 31  | PDF

Prevention of Credit Card Fraudulence in Point-of-Sale Terminus

Manoj , Prabhakar,

Abstract 26  | PDF

STATISTICS OF CYBER CRIME IN INDIA: AN OVERVIEW

Rupinder , Pal Kaur,

Abstract 52  | PDF

Novel Approach for Secured Data Delivery in Congested Wireless Sensor Network

Divya Hiran, Dr. Jitendra Kumawat,

Abstract 33  | PDF

Internet Routing With Lightweight Route Attestation

M.V.R Jyothisree, V.Ramakrishna, Dr.A.V.Krishna Prasad,

Abstract 29  | PDF

Introduction on Data Warehouse with OLTP and OLAP

Arpit, Parekh,

Abstract 136  | PDF

Numerical Integration Over Polygonal Domains using Convex Quadrangulation and Gauss Legendre Quadrature Rules

H. T. Rathoda, B. Venkateshb Shivaram. K. Tc , Mamatha. T. Mb

Abstract 33  | PDF

An Allocation of Exploited Resources for Potent Parallel Data Processing In Cloud

Prof.Santosh Kumar. B, AnandKumar A.K,

Abstract 39  | PDF

Advance Reservations And Scheduling For Bulk Transfers In Research Networks

N.Naveen Kumar Sk.Meeravali, i2 B.Bobby Arun Kumar Nakka Thirupathi Kuda Nageswara Rao,

Abstract 32  | PDF

Multiple Routing Configurations For Fast Ip Network Recovery

Sk.Meeravali B.Bobby Arun Kumar, N.Naveen Kumar Nakka Thirupathi Rao, Kuda Nageswara Rao,

Abstract 38  | PDF

Review On Secure and Distributed Reprogramming Protocol

Ruchika Markan, ,Gurvinder Kaur,

Abstract 40  | PDF

Mining Association Rules for Web Crawling using Genetic Algorithm

J. Usharani Dr. K. Iyakutti,

Abstract 27  | PDF

Trust Aware AODV

V.Vallinayagi, Dr G.M, Nasira,

Abstract 34  | PDF

Literature Survey on Energy Consumption Control for Wireless Mobile Ad-hoc Network

Krishan Kumar YK Jain

Abstract 28  | PDF

Performance Evaluation of Dynamic Fuzzy Voter Used In Safety Critical Systems

P.Babul Saheb, K.Subbarao,

Abstract 32  | PDF