Published: 2018-01-01

Identification of level of resemblance between web based documents

Surbhi, Kakar,, Surbhi, Kakar,
Full text

Abstract 77  | PDF 38 

Design Pattern Detection by Sub Graph Isomorphism Technique

Rajwant Singh Rao, Manjari Gupta,
Full text

Abstract 99  | PDF 48 

NFC Technology and Social Networking

Sukeshini S. , Tabhane,
Full text

Abstract 104  | PDF 21 

A New Approach to Minimise Network Blocking In 4g for Better Accessibility

Ms.P.Leela, Ms.M.V.S Ambika, Ms.K.Manichandana, Ms.P.Mounika, Mr. K.YashodharYadav,
Full text

Abstract 34  | PDF 21 

Secure Communication for Multiparty OSN

Jaheer Ahmed Syed , Shaik.Abdul,
Full text

Abstract 59  | PDF 15 

“Review on Redundancy in Electronics

r. Gurudatt Kulkarni, Prof. Mrs. Lalita Wani,
Full text

Abstract 66  | PDF 53 

Remote Method Invocation – Usage & Implementation

Nivedita Joshi, Pooja Singh,
Full text

Abstract 41  | PDF 207 

A new routing approach in P2P Networks

Samira, kalantary,
Full text

Abstract 38  | PDF 15 

Survey on Methods for Enhancing Web Navigation

Adhokshaj Haridas, Prof. Vinod Nayyar,
Full text

Abstract 34  | PDF 24 

A study on inverted Tshaped micro strip antenna at different frequencies

Deepak , DhaynendraParashar Dr.Vinod K.Singh, Rajeev S. Pathak,
Full text

Abstract 68  | PDF 41 

A Study on Scalable Internet Traffic Measurement and Analysis with Hadoop

Yogesh V. Kadam, Prof. Vaibhav Dhore,
Full text

Abstract 45  | PDF 57 

High Capacity and Low Distortion Reversible Image Watermarking using Integer Wavelet Transform

K.Hari Babu, M.Tech; T.Naga Jyothi, M.tech; K.Sowjanya,
Full text

Abstract 69  | PDF 31 

A Hamming Distance Based Dynamic Key Distribution Scheme for Wireless Sensor Networks

Ramu Kuchipudi , K.Vaishnavi Prapujitha, Y.G Shantha Reddy,
Full text

Abstract 45  | PDF 36 

Overview of Fifth Generation Mobile Communications

Kavita Sogale, Dr.D.J.Pete,
Full text

Abstract 77  | PDF 328 

Analysis Tool for Radar Data Using C‘ Oriented Approach

S.Manasseh, G. Rama Krishna, J.Madan Kumar,
Full text

Abstract 44  | PDF 58 

Recognizing Spam Zombies by Monitoring leaving Messages

R.Vasantha kumar, Mr.K.Ravi Kumar,
Full text

Abstract 68  | PDF 40 

A Realistic Approach to Systematic Reuse

Sampath Korra, Dr S.Viswanadha Raju , Dr A.Vinaya Babu,
Full text

Abstract 37  | PDF 20 

Low Quality Image Information Enhancement Using SVD Fusion Technique

Gagandeep Kour, Sharad P. Singh,
Full text

Abstract 89  | PDF 18 

Control of power flow in grid by using distribution facts controller

Madhu varkol, Manoja varkol, L.V.Ramana , K.Sandhya Rani,
Full text

Abstract 98  | PDF 69 

Cryptography Implementation in IP Datagram

C.Sajeev, C.Suyambulingom,
Full text

Abstract 72  | PDF 52 

Strength of Evolving Agent Population in MAS

M.Eniya, M.Vinothkumar,
Full text

Abstract 79  | PDF 14 

DC/DC Boost Converter Functionality in a Three-Phase IMC

Sree Vardhan, S.V. Panidhar ,
Full text

Abstract 66  | PDF 61