Published: 2018-01-01

A Study on Semantic Web Mining And Web Crawler

S.Balan, Dr.P.Ponmuthuramaling,
Full text

Abstract 189  | PDF 152 

Development of Inventory Database System Using Radio Frequency Identification

N. Ishak, N. A. Ali, A. S. Ja’afar , S. H. Husin N. M. Z. Hashim,
Full text

Abstract 307  | PDF 82 

Achieving Anonymity and Traceability in Wireless Networks

R. Manasa, Annapurna, G.Sowmya,
Full text

Abstract 182  | PDF 76 

Contrast Enhancement Image Fusion With Using Gaussian Filter

Mandeep Kaur, Navpreet Singh,
Full text

Abstract 179  | PDF 26 

Energy-Efficient Strategies for Cooperative Multichannel MAC Protocols

P.V.Naga Lakshmi B.Sasmitha C.Rama Krishna,
Full text

Abstract 204  | PDF 37 

Iris Segmentation and Recognization Using Log Gabor Filter and Curvelet Transform

K.Sathiyaraja, M.Dhineshkumar, N.Thiyagarajan,
Full text

Abstract 401  | PDF 292 

Recommendation Diversity using Optimization Techniques and Ranking Method

S.Manimekalai, V.Kathiresan, P.Sumathi,, S.Manimekalai, V.Kathiresan, P.Sumathi,
Full text

Abstract 184  | PDF 34 

Load Balancing Parallel Routing Protocol in Mobile Ad Hoc Network

M.Selladevi, P.Krishnakumari,
Full text

Abstract 176  | PDF 35 

A DISCRETE CHAOTIC ENCRYPTION ALGORITHM USING LORENZ ATTRACTOR

1Rahul Ramakrishna, Rajeswari Seshadr,
Full text

Abstract 302  | PDF 224 

NETWORK ADVANCEMENT in 4G: TD-LTE Technology

Anu Rathi, Pulkit Narang, Sachin Kumar Rai, Mohita Aggarwal Meghna Kalra,
Full text

Abstract 184  | PDF 158 

Network Coding as an Efficient Technique of Transmitting Data

Khundrakpam Johnson Singh, Usham Sanjota Chanu,
Full text

Abstract 412  | PDF 42 

Graphical Password or Graphical User Authentication as Effective Password Provider

Khundrakpam Johnson Singh, Usham Sanjota Chanu,
Full text

Abstract 310  | PDF 393 

Paradigm shift for Project Managers in Agile Projects

Vakalanka Sai Phani Chandu Bharani Manapragada
Full text

Abstract 286  | PDF

Security Analysis Using Batch Verification Scheme

S.Alonshia, K.Ravikumar,
Full text

Abstract 355  | PDF 30 

Software Product Development—an Approach Using Scrum

Vakalanka Sai Phani Chandu, Bharani Manapragada
Full text

Abstract 413  | PDF 26 

Harmonics Compensation of HAPF with Adaptive Fuzzy Dividing Rule

Mr.Polisetti Sudheer, \ Dr.S.Satyanaraya,
Full text

Abstract 172  | PDF 30 

A Survey on LSB Based Steganography Methods

M. Pavani, S. Naganjaneyulu, C. Nagaraju,
Full text

Abstract 435  | PDF 82 

Leakage Power Reduction by Using Sleep Methods

Vinay Kumar Madasu, B Kedharnath,
Full text

Abstract 398  | PDF 42 

Power Efficient, High Performance SRAM array in 90nm CMOS Process

Ajay Kumar Singh, Mah Meng Seong,
Full text

Abstract 173  | PDF 81 

Sensitive Data Storage in Wireless Devices Using AES Algorithm

Anjali Patil, Rajeshwari Goudar,
Full text

Abstract 400  | PDF 32 

User Access Control for Online Social Networks

Narayana Naidu Pachava, Sd. Akthar P. Babu,
Full text

Abstract 151  | PDF 53 

Implementation of Saurp for Mobile Network

Krishna Sowmya Chinta, SD Afzal Ahmed P. Babu ,
Full text

Abstract 168  | PDF 33