Published: 2018-01-02

Computer as An Essential Tool For Teaching and Learning In the Modern World: Case Study of Selected Secondary School within the Maiduguri Metropolitan Council, Borno State

Adati E. Chahari

Abstract 79  | PDF

An Approach to Implement Map Reduce with NoSQL Databases

Ashutosh Singh Chauhan, Anjali Kedawat, Pooja Parnami

Abstract 51  | PDF

An Enhanced General Self-Organized Tree-Based Energy-Balance Routing Protocol (EGSTEB) for Wireless Sensor Network

Sreela E. K., Asha G.

Abstract 46  | PDF

Study of Grid and Cluster based Network in Wireless Sensor Network

Honey Soni, Himanshu Soni

Abstract 50  | PDF

Real-Time GPS/GPRS Based Vehicle Tracking System

Mohammed Baqer M. Kamel

Abstract 123  | PDF

Impact of Cloud Based Services on Mental Health

Brijesh K. Upadhayay, Dr. Vaibhav Bansal

Abstract 61  | PDF

A Novel Approach For Medical Image Fusion Based On NSCT Theory

Yaduru Shilpa Pg Student , Dr. P. Abdul Khayum Professor

Abstract 46  | PDF

Forestalling Against Data Breaching

Gautam Chaturvedi , Shubha Chaturvedi , Minal Agarwal

Abstract 62  | PDF

Identification of User Search Behavior through Task Trail Clustering

Hima G., Jasila E.K.

Abstract 48  | PDF

Watermarking For Digital Content- A SURVEY

I.Kalaivani , R.R.Bhavani

Abstract 47  | PDF

An Enhancement on EASR Method for Sink Relocation in Wireless Sensor Network

Bahjasra A. , Asha G.

Abstract 56  | PDF

Study of Cryptography and Steganography System

Md. Khalid Imam Rahmani, Mr.Amit Kumar Goyal, Manisha Mudgal

Abstract 46  | PDF

Macs of Traction

K.Sandee, K.Sathish Kumar m.Tech

Abstract 42  | PDF

A 16-Core Processor with Shared-Memory and Message-Passing Communications

Shaik Mahmed basha, G.Nageswararao,(phD)

Abstract 45  | PDF

Efficient Incremental Clustering of Documents based on Correlation

A.Devender, B.Srinivas, A.Ashok

Abstract 37  | PDF

High Gain Multi Level Dual Load SEPIC Converter for Incremental Conductance MPPT

B. Narasimha Rao, Mrs. Alamuru Vani

Abstract 48  | PDF

A Survey on Detection and Prevention of Black Hole & Gray hole attack in MANET

Monika, Swati Gupta

Abstract 36  | PDF

Assessment Of Computer Managed Instruction For IMO State University, Nigeria

Ekwonwune Emmanuel Nwabueze, Ibebuogu Chinwe, Sam Ekeke Doris, Ayiam Chukwuma

Abstract 40  | PDF

Design of a Sun Tracker with Position Display

Anindita Sinha, Moushumi Das, Jayashree Singha

Abstract 50  | PDF

Design and Implementation of Vedic Algorithm using Reversible Logic Gates

Hemangi P.Patil, S.D. Sawant

Abstract 46  | PDF

Reduction Of Switching Activity In Noc By Using Data Encoding Schemes

Y.Supraja, R.S.Pratap Singh

Abstract 39  | PDF

Transformation-based Optimizations Framework (ToF) for Workflows and its Security issues in the Cloud Computing

S.Neelakandan, S.Muthukumaran

Abstract 45  | PDF

LTE-Advanced communication using in Femtocells Perspective

bhupendra Kumar, dr. Ganesh Prasad , madhuresh Kumar

Abstract 41  | PDF

Review Paper on Various Data Hiding Techniques

Ramandip singh, sukhmeet kaur

Abstract 59  | PDF

Optimized Multimodal Medical Image Fusion Approach Based On Phase Congruency And Directive Contrast In Nsct Domain

Kolusu Varalakshmi, N.Raj Kumar

Abstract 36  | PDF

Papr Reduction In Ofdm System By Using Clipping And Filtering And Weighted Method

S. Murali Krishna, R. Sudheer Babu

Abstract 36  | PDF

Prevention Of Cross Site Scripting Attack Using Filters By String Based Approach

S. Karthika Devi, Dr.E. Ramaraj

Abstract 38  | PDF

An Algorithmic approach to improve Network Performance for 1G-EPON

Dr. Vibhakar Shrimali, Dr. Sibaram Khara, Mr. Abhishek Gaur

Abstract 37  | PDF

SQL Injection Detection Based On Replacing The SQL Query Parameter Values

R.Latha, Dr.E. Ramaraj

Abstract 42  | PDF

Data Center Management: Viewing Racks in the Network through Dot net platform

Ahad Abdullah

Abstract 50  | PDF

Space Time Block Codes With Spatial Modulation

P.V.N.Lekhya (M.Tech) , D.R.Srinivas, M.S., (Ph.D)

Abstract 43  | PDF

Data Encoding And Decoding Techniques For NOC Applications

Swetha M, Mr. Sunil G

Abstract 33  | PDF

Inter frame Video Duplication Forgery Detection: A Review

Harmanpreet Kaur, Manpreet Kaur

Abstract 20  | PDF

A Rational Approach on Model Based Slicing

Tamanna , Dr. Sukhvir Singh

Abstract 33  | PDF

A Review of Web Forum Crawling Techniques

Priyanka Bandagale, Dr.Lata Ragha, Atiya Kazi

Abstract 35  | PDF

Interactive Dustbin

Krutika Agrawal

Abstract 21  | PDF

Profit Maximization Of SAAS By Reusing The Available VM Space In Cloud Computing

Richa, Hari Singh

Abstract 25  | PDF

A Fuzzy Improved ACO Approach for Test Path Optimization

Ritu, Ajay Dureja

Abstract 22  | PDF

Building Secure, Concurrent, Distributed DBaaS with Confidential Data over Threshold Access Structure

A.Blessy, Varun Chand

Abstract 20  | PDF

Aperiodic task Scheduling Algorithms for Multiprocessor systems in Real Time environment

Nirmala H, Dr.Girijamma

Abstract 19  | PDF

Improved Degraded Document Image Binarization Using DBMF And Edge Pixel Stroke

Tarnjot Kaur Gill, Mr.Aman Arora

Abstract 20  | PDF

Weighted Guided Image Filtering For Image Fusion

Shilpa Mohanan

Abstract 23  | PDF

Resourceful Power Aware Routing Protocol in MANET

Shakti Arora, Ayushi

Abstract 24  | PDF

Multidimensional Image Compression

M. S. Narayanan

Abstract 27  | PDF

Medical Image Fusion Using Redundant Wavelet Based ICA Co-Variance Analysis

Rajveer Kaur, Er. Gurpreet Kaur

Abstract 41  | PDF

A Novel Fuzzy Based Single Switch Converter For High Speed Srm Drive Applications

G. Siva Kumar, B. Raja Sekhar

Abstract 18  | PDF

Comparison of Improved Routing Protocol (IPL_AOMDV) and Existing Routing Protocol (PL_AOMDV) For Wireless Ad-hoc Network

Gurpreet Kaur, Naveen Kumari

Abstract 19  | PDF

Improving the Security of Workflow-based System using Multiple XML Digital Signature

Mayuri Anil Jain, Prof. Uday Joshi

Abstract 20  | PDF

FRDMS For Fuzzy Querying Based On GEFRED Model

Annu Rani , Sandeep Jaglan

Abstract 29  | PDF

Comparison of AOMDV With and Without Black Hole Attack

Ritika Sharma, Bhawna Singla

Abstract 19  | PDF

Development and Characterization of Hybrid Natural Fiber Reinforced Composites based on Poly- propylene Resin

G.M Neeha, E.Srikanth

Abstract 22  | PDF

Public Sentiment Interpretation On Twitter - A Survey

R.Urega, Dr.M.Devapriya

Abstract 20  | PDF

Confined Decentralize Cloud Storage Using Authentic Access Contol Scheme

Ms.C.Bindu , Mrs.G.Nalini

Abstract 20  | PDF

Study of Growing Grapes Technique for Malware Detection

Mr. Bhushan Kinholkar

Abstract 19  | PDF

Stochastic Analysis Of The LMS And NLMS Algorithms For Cyclostationary White Gaussian Inputs

S.Amarnath Reddy, G.Amjad Khan

Abstract 19  | PDF

A study on Task Scheduling Algorithms in Grids

W.Viyakulamary, T.Kokilavani

Abstract 19  | PDF

A Review on Energy Efficient Clustering Techniques in WSN

Amanjot kaur, Navreet Kaur, and Ap Diviya Bharti

Abstract 20  | PDF

A Data mining model for Customer Relationship Management -A Review

Rekha K S

Abstract 28  | PDF

Component-Based: The Right Candidate for Restructuring the Nature of Software Development in Organizations

Badamasi Imam Ya’u

Abstract 20  | PDF

The Role of Informatics in Cancer Personalized Medicine

Badamasi Imam Ya’u

Abstract 49  | PDF

Implementation Of I2c Multi Task And Multi Slave Bus Controller Using Verilog

Shaik.Fazil Ahmed Y.Murali,,M.Tech

Abstract 63  | PDF

Implementation of mobile crowd network for equalized distribution of work processing

Vandana Sahu, Prof. Santosh Tamboli

Abstract 22  | PDF

Reconfigurable Modified Viterbi Decoder For A WiFi Receiver

Y.Radhika, G.Mukesh,M.Tech

Abstract 23  | PDF

Power-Management Strategies for a Grid-Connected PV-FC Hybrid System

Sk.Riyaz, K.Sathish Kumar M.Tech,

Abstract 36  | PDF

An RTOS Architecture for Industrial Wireless Sensor Network Stacks with Multi-Processor Support

D.saritha, R.Prashanthi M.Tech

Abstract 27  | PDF

Implementation of Interface between AXI and DDR3 memory Controller for SoC

Onteru Sreenath, Syed kareemsaheb Associate Prof.

Abstract 112  | PDF

Detecting Phishing Websites Based On Improved Visual Cryptography

Reshma Ramdas T

Abstract 20  | PDF

Handful Trends in the Banking Security

Deepa Malviya

Abstract 21  | PDF

Hyperspectral Image Denoising with a Spatial – Spectral View Fusion Strategy

Princee Parul, Rakesh Gandhi

Abstract 22  | PDF

Analysis of Star, Tree and Mesh Optical Network Topologies for successive distance between nodes Using Optimized Raman-EDFA Hybrid Optical Amplifier

Rajpreet Singh, Dr. Sanjeev Dewra

Abstract 27  | PDF

Potential based similarity metrics for implementing hierarchical clustering

M.K.V.Anvesh, Dr. B. Prajna

Abstract 26  | PDF

A Review on HTTP Streaming Strategies in Media Streaming

Hina Rani, Er.khushboo Bansal

Abstract 31  | PDF

A Review: Image enhancement approaches using Histogram Equalization

Lalit, Ankur Gupta

Abstract 25  | PDF

Performance Evaluation of Secure tunnel technique using IPv6 Transition over IPv4 Channel

Kamna Chauhan, Pooja Jain

Abstract 22  | PDF

Green cloud computing: reduced overload with a better architecture

Dhusia Kalyani, Rizvi Z. Ahsan, Firoz Neda, Telgote Stuti , and Ramteke W. Pramod

Abstract 26  | PDF

An E-commerce Feedback Comment Mining Using SentiWordNet Tool and K-Means Clustering Method

Tinku Varghese, Subha Sreekumar

Abstract 28  | PDF

C Source Code Auto Review Tool for Secure Programming of Indian Spacecraft Ground Software Elements, GEOSCHEMACS

K.V.Maruthi Prasad, J.Krishna Kishore

Abstract 27  | PDF

Improving Playfair Algorithm To Support User Verification And All The Languages In The World Including Kurdish Language

Omed Hassan Ahmed, Aram Mahmood Ahmed, Sarkar Hasan Ahmed

Abstract 34  | PDF

Opportunities and Challenges of Quality-Assured contributions of Life Cycle Data Network for Web-shared Publication.

Lalkrishna, Bhupendra kumar, Dr. Ganesh Prasad, Manoj Yadav & Madhuresh Kumar

Abstract 41  | PDF

Robust Utkin’s Observer Based Controller for Deregulated Hydro-Thermal LFC Problem

L.Shanmukha Rao, N.V.Ramana

Abstract 26  | PDF