Published: 2018-01-01

Identification of level of resemblance between web based documents

Surbhi, Kakar,, Surbhi, Kakar,
Full text

Abstract 131  | PDF 42 

Design Pattern Detection by Sub Graph Isomorphism Technique

Rajwant Singh Rao, Manjari Gupta,
Full text

Abstract 164  | PDF 53 

NFC Technology and Social Networking

Sukeshini S. , Tabhane,
Full text

Abstract 179  | PDF 24 

A New Approach to Minimise Network Blocking In 4g for Better Accessibility

Ms.P.Leela, Ms.M.V.S Ambika, Ms.K.Manichandana, Ms.P.Mounika, Mr. K.YashodharYadav,
Full text

Abstract 65  | PDF 25 

Secure Communication for Multiparty OSN

Jaheer Ahmed Syed , Shaik.Abdul,
Full text

Abstract 101  | PDF 19 

“Review on Redundancy in Electronics

r. Gurudatt Kulkarni, Prof. Mrs. Lalita Wani,
Full text

Abstract 117  | PDF 70 

Remote Method Invocation – Usage & Implementation

Nivedita Joshi, Pooja Singh,
Full text

Abstract 79  | PDF 230 

A new routing approach in P2P Networks

Samira, kalantary,
Full text

Abstract 66  | PDF 18 

Survey on Methods for Enhancing Web Navigation

Adhokshaj Haridas, Prof. Vinod Nayyar,
Full text

Abstract 64  | PDF 27 

Convergence of pv system with Buck-Boost Converter using MPPT Techniques.

Lipika Nanda, Sushree Sibani Das,
Full text

Abstract 120  | PDF 310 

A study on inverted Tshaped micro strip antenna at different frequencies

Deepak , DhaynendraParashar Dr.Vinod K.Singh, Rajeev S. Pathak,
Full text

Abstract 119  | PDF 44 

A Study on Scalable Internet Traffic Measurement and Analysis with Hadoop

Yogesh V. Kadam, Prof. Vaibhav Dhore,
Full text

Abstract 79  | PDF 64 

High Capacity and Low Distortion Reversible Image Watermarking using Integer Wavelet Transform

K.Hari Babu, M.Tech; T.Naga Jyothi, M.tech; K.Sowjanya,
Full text

Abstract 138  | PDF 35 

A Hamming Distance Based Dynamic Key Distribution Scheme for Wireless Sensor Networks

Ramu Kuchipudi , K.Vaishnavi Prapujitha, Y.G Shantha Reddy,
Full text

Abstract 74  | PDF 40 

Overview of Fifth Generation Mobile Communications

Kavita Sogale, Dr.D.J.Pete,
Full text

Abstract 133  | PDF 352 

Analysis Tool for Radar Data Using C‘ Oriented Approach

S.Manasseh, G. Rama Krishna, J.Madan Kumar,
Full text

Abstract 82  | PDF 66 

Recognizing Spam Zombies by Monitoring leaving Messages

R.Vasantha kumar, Mr.K.Ravi Kumar,
Full text

Abstract 105  | PDF 45 

A Realistic Approach to Systematic Reuse

Sampath Korra, Dr S.Viswanadha Raju , Dr A.Vinaya Babu,
Full text

Abstract 57  | PDF 21 

Low Quality Image Information Enhancement Using SVD Fusion Technique

Gagandeep Kour, Sharad P. Singh,
Full text

Abstract 149  | PDF 20 

Control of power flow in grid by using distribution facts controller

Madhu varkol, Manoja varkol, L.V.Ramana , K.Sandhya Rani,
Full text

Abstract 152  | PDF 75 

Cryptography Implementation in IP Datagram

C.Sajeev, C.Suyambulingom,
Full text

Abstract 124  | PDF 55 

Strength of Evolving Agent Population in MAS

M.Eniya, M.Vinothkumar,
Full text

Abstract 127  | PDF 19 

DC/DC Boost Converter Functionality in a Three-Phase IMC

Sree Vardhan, S.V. Panidhar ,
Full text

Abstract 108  | PDF 66