Published: 2018-01-01

Identification of level of resemblance between web based documents

Surbhi, Kakar,, Surbhi, Kakar,
Full text

Abstract 12  | PDF 26 

Design Pattern Detection by Sub Graph Isomorphism Technique

Rajwant Singh Rao, Manjari Gupta,
Full text

Abstract 8  | PDF 24 

NFC Technology and Social Networking

Sukeshini S. , Tabhane,
Full text

Abstract 14  | PDF 7 

A New Approach to Minimise Network Blocking In 4g for Better Accessibility

Ms.P.Leela, Ms.M.V.S Ambika, Ms.K.Manichandana, Ms.P.Mounika, Mr. K.YashodharYadav,
Full text

Abstract 3  | PDF 14 

Secure Communication for Multiparty OSN

Jaheer Ahmed Syed , Shaik.Abdul,
Full text

Abstract 7  | PDF 7 

“Review on Redundancy in Electronics

r. Gurudatt Kulkarni, Prof. Mrs. Lalita Wani,
Full text

Abstract 8  | PDF 25 

Remote Method Invocation – Usage & Implementation

Nivedita Joshi, Pooja Singh,
Full text

Abstract 4  | PDF 131 

A new routing approach in P2P Networks

Samira, kalantary,
Full text

Abstract 5  | PDF 6 

Survey on Methods for Enhancing Web Navigation

Adhokshaj Haridas, Prof. Vinod Nayyar,
Full text

Abstract 8  | PDF 9 

A study on inverted Tshaped micro strip antenna at different frequencies

Deepak , DhaynendraParashar Dr.Vinod K.Singh, Rajeev S. Pathak,
Full text

Abstract 7  | PDF 28 

A Study on Scalable Internet Traffic Measurement and Analysis with Hadoop

Yogesh V. Kadam, Prof. Vaibhav Dhore,
Full text

Abstract 7  | PDF 38 

High Capacity and Low Distortion Reversible Image Watermarking using Integer Wavelet Transform

K.Hari Babu, M.Tech; T.Naga Jyothi, M.tech; K.Sowjanya,
Full text

Abstract 8  | PDF 17 

A Hamming Distance Based Dynamic Key Distribution Scheme for Wireless Sensor Networks

Ramu Kuchipudi , K.Vaishnavi Prapujitha, Y.G Shantha Reddy,
Full text

Abstract 9  | PDF 24 

Overview of Fifth Generation Mobile Communications

Kavita Sogale, Dr.D.J.Pete,
Full text

Abstract 9  | PDF 266 

Analysis Tool for Radar Data Using C‘ Oriented Approach

S.Manasseh, G. Rama Krishna, J.Madan Kumar,
Full text

Abstract 9  | PDF 38 

Recognizing Spam Zombies by Monitoring leaving Messages

R.Vasantha kumar, Mr.K.Ravi Kumar,
Full text

Abstract 11  | PDF 28 

A Realistic Approach to Systematic Reuse

Sampath Korra, Dr S.Viswanadha Raju , Dr A.Vinaya Babu,
Full text

Abstract 10  | PDF 12 

Control of power flow in grid by using distribution facts controller

Madhu varkol, Manoja varkol, L.V.Ramana , K.Sandhya Rani,
Full text

Abstract 7  | PDF 42 

Cryptography Implementation in IP Datagram

C.Sajeev, C.Suyambulingom,
Full text

Abstract 9  | PDF 37 

Strength of Evolving Agent Population in MAS

M.Eniya, M.Vinothkumar,
Full text

Abstract 6  | PDF 5 

DC/DC Boost Converter Functionality in a Three-Phase IMC

Sree Vardhan, S.V. Panidhar ,
Full text

Abstract 10  | PDF 41