Archive

Vol-3  Issue-1  January  2015

1) Designing Anonymity Server based on K Optimal Principle for Privacy Preserving Protocol

Prof. Yogesh S. Amle, Prof. Dr. Santosh S. Lomate , Prof. Rajesh A. Auti

Download PDF View Abstract

No. of Downloads: 10 | No. of Views: 2960

2) Alternative Approach of Handling DOS Vs Mobility Management with Effective Utilization of Client’s Needs

Jayamoorthy.S, Gosaladevi. G, , Sathiyanarayanan.P

Download PDF View Abstract

No. of Downloads: 11 | No. of Views: 2643

3) Adaptive E-Learning Based on Technology of Learning Navigation

KaziFakirMohammed, VinitNimkar, SushoptiGawde

Download PDF View Abstract

No. of Downloads: 6 | No. of Views: 1393

4) Development of a Data Type Upgraded BIGINT to INTCAL Data Type in A RDBMS

Mr. P.Sudheer, Mr. K.LNarasimharao, Mr. Yannam Apparao

Download PDF View Abstract

No. of Downloads: 8 | No. of Views: 1277

5) Discrimination Avoidance Methods in Data Mining

Prajakta A. Soundankar , .

Download PDF View Abstract

No. of Downloads: 6 | No. of Views: 1209

6) Review on Retrieving Biological Sequence Alignment using Smith-Waterman Algorithm

Komal B. Deshmukh, M. U. Kharat

Download PDF View Abstract

No. of Downloads: 8 | No. of Views: 1294

7) Integration of Heterogeneous Distributed Database Based on E-Commerce System

Vinit Nimkar , Kazi FakirMohammed, Sushopti Gawde

Download PDF View Abstract

No. of Downloads: 6 | No. of Views: 1295

8) Performance of MIMO-OFDM Transmission System on Wireless Networks

Bhagya.R, Dr.A.G. Ananth Professor

Download PDF View Abstract

No. of Downloads: 7 | No. of Views: 1253

9) An Approach to Anti- Plagiarism Using Machine Learning Methods

Durga Bhavani Dasari, Dr. Venu Gopala Rao. K

Download PDF View Abstract

No. of Downloads: 9 | No. of Views: 1453

10) Robust Data Hiding In Video Using Forbidden Zone and Selective Embedding

Yogita P. Shewale, Saurav S.Yewale, Shankar G.Patil, Hemant Jadhav

Download PDF View Abstract

No. of Downloads: 7 | No. of Views: 1158

11) Word Sense Disambiguation in Gujarati Language

Bhagyada Desai, Krinal Naik, Preeti Bhatt

Download PDF View Abstract

No. of Downloads: 10 | No. of Views: 1243

12) Trust Evaluation in Cloud Computing: A Survey

Kavita Rathi, Shivani Taneja

Download PDF View Abstract

No. of Downloads: 8 | No. of Views: 1129

13) Data Security Models In Cloud Computing: A Review

Kavita Rathi , Narender

Download PDF View Abstract

No. of Downloads: 7 | No. of Views: 1429

14) Performance Analysis of Image Segmentation Using Parallel Processing

Supriya Gupta , Mujeeb Rahman

Download PDF View Abstract

No. of Downloads: 7 | No. of Views: 1175

15) Enhancement of SMIB Performance Using PSS with Advanced Controllers

N.Siva Mallikarjuna Rao, B.V.Haritha

Download PDF View Abstract

No. of Downloads: 11 | No. of Views: 1225

16) Securing and Secrete Image Sharing Using Visual Cryptography Scheme

Rupali Lambe, Mayuri Ghadge, Tai Ingole, Pratiksha Surwase

Download PDF View Abstract

No. of Downloads: 8 | No. of Views: 1208

18) GPU-Graphics Processing Unit

Ramani Shrusti K, Desai Vaishali J, Karia Kruti K.

Download PDF View Abstract

No. of Downloads: 20 | No. of Views: 2670

19) Channel Spectral Efficiencies of Digital Cellular Standards

SugandhaJain, .

Download PDF View Abstract

No. of Downloads: 7 | No. of Views: 1342

20) Scene Text Recognition in Mobile Application by Character Descriptor and Structure

Prof.Jadhav Hemant B.(Guide), Pawar Anil N, Sambare Shailesh D, Nale Swapnali V, Unavane Snehal R

Download PDF View Abstract

No. of Downloads: 8 | No. of Views: 1159

21) Meliorate QOS of WIFI-WIMAXin Backhaul Networks

Ekta Singla, Parminder Singh

Download PDF View Abstract

No. of Downloads: 8 | No. of Views: 2245

Indexed by

Crossref logo