Current Issue
Vol. 4 No. 08 (2015)
Published:
2018-01-02
Articles
-
An Enhancement on EASR Method for Sink Relocation in Wireless Sensor Network
Abstract : 80PDF : 61 -
A 16-Core Processor with Shared-Memory and Message-Passing Communications
Abstract : 74PDF : 60 -
High Gain Multi Level Dual Load SEPIC Converter for Incremental Conductance MPPT
Abstract : 71PDF : 64 -
A Survey on Detection and Prevention of Black Hole & Gray hole attack in MANET
Abstract : 57PDF : 43 -
Assessment Of Computer Managed Instruction For IMO State University, Nigeria
Abstract : 58PDF : 50 -
Design and Implementation of Vedic Algorithm using Reversible Logic Gates
Abstract : 67PDF : 51 -
Papr Reduction In Ofdm System By Using Clipping And Filtering And Weighted Method
Abstract : 67PDF : 50 -
Prevention Of Cross Site Scripting Attack Using Filters By String Based Approach
Abstract : 57PDF : 61 -
SQL Injection Detection Based On Replacing The SQL Query Parameter Values
Abstract : 62PDF : 90 -
Data Center Management: Viewing Racks in the Network through Dot net platform
Abstract : 73PDF : 68 -
Profit Maximization Of SAAS By Reusing The Available VM Space In Cloud Computing
Abstract : 43PDF : 42 -
Aperiodic task Scheduling Algorithms for Multiprocessor systems in Real Time environment
Abstract : 47PDF : 43 -
Improved Degraded Document Image Binarization Using DBMF And Edge Pixel Stroke
Abstract : 43PDF : 42 -
Medical Image Fusion Using Redundant Wavelet Based ICA Co-Variance Analysis
Abstract : 77PDF : 45 -
A Novel Fuzzy Based Single Switch Converter For High Speed Srm Drive Applications
Abstract : 42PDF : 40 -
Improving the Security of Workflow-based System using Multiple XML Digital Signature
Abstract : 37PDF : 34 -
Stochastic Analysis Of The LMS And NLMS Algorithms For Cyclostationary White Gaussian Inputs
Abstract : 49PDF : 62 -
Implementation Of I2c Multi Task And Multi Slave Bus Controller Using Verilog
Abstract : 86PDF : 68 -
Implementation of mobile crowd network for equalized distribution of work processing
Abstract : 42PDF : 31 -
Implementation of Interface between AXI and DDR3 memory Controller for SoC
Abstract : 193PDF : 88 -
Hyperspectral Image Denoising with a Spatial – Spectral View Fusion Strategy
Abstract : 55PDF : 40 -
Potential based similarity metrics for implementing hierarchical clustering
Abstract : 54PDF : 44 -
Performance Evaluation of Secure tunnel technique using IPv6 Transition over IPv4 Channel
Abstract : 39PDF : 29 -
An E-commerce Feedback Comment Mining Using SentiWordNet Tool and K-Means Clustering Method
Abstract : 48PDF : 43 -
Robust Utkin’s Observer Based Controller for Deregulated Hydro-Thermal LFC Problem
Abstract : 42PDF : 37