Archive

Vol-3  Issue-1  January  2015

1) Designing Anonymity Server based on K Optimal Principle for Privacy Preserving Protocol

Prof. Yogesh S. Amle, Prof. Dr. Santosh S. Lomate , Prof. Rajesh A. Auti

Download PDF View Abstract

No. of Downloads: 10 | No. of Views: 2848

2) Alternative Approach of Handling DOS Vs Mobility Management with Effective Utilization of Client’s Needs

Jayamoorthy.S, Gosaladevi. G, , Sathiyanarayanan.P

Download PDF View Abstract

No. of Downloads: 11 | No. of Views: 2446

3) Adaptive E-Learning Based on Technology of Learning Navigation

KaziFakirMohammed, VinitNimkar, SushoptiGawde

Download PDF View Abstract

No. of Downloads: 6 | No. of Views: 1281

4) Development of a Data Type Upgraded BIGINT to INTCAL Data Type in A RDBMS

Mr. P.Sudheer, Mr. K.LNarasimharao, Mr. Yannam Apparao

Download PDF View Abstract

No. of Downloads: 8 | No. of Views: 1170

5) Discrimination Avoidance Methods in Data Mining

Prajakta A. Soundankar , .

Download PDF View Abstract

No. of Downloads: 6 | No. of Views: 1114

6) Review on Retrieving Biological Sequence Alignment using Smith-Waterman Algorithm

Komal B. Deshmukh, M. U. Kharat

Download PDF View Abstract

No. of Downloads: 8 | No. of Views: 1178

7) Integration of Heterogeneous Distributed Database Based on E-Commerce System

Vinit Nimkar , Kazi FakirMohammed, Sushopti Gawde

Download PDF View Abstract

No. of Downloads: 6 | No. of Views: 1192

8) Performance of MIMO-OFDM Transmission System on Wireless Networks

Bhagya.R, Dr.A.G. Ananth Professor

Download PDF View Abstract

No. of Downloads: 7 | No. of Views: 1155

9) An Approach to Anti- Plagiarism Using Machine Learning Methods

Durga Bhavani Dasari, Dr. Venu Gopala Rao. K

Download PDF View Abstract

No. of Downloads: 9 | No. of Views: 1334

10) Robust Data Hiding In Video Using Forbidden Zone and Selective Embedding

Yogita P. Shewale, Saurav S.Yewale, Shankar G.Patil, Hemant Jadhav

Download PDF View Abstract

No. of Downloads: 7 | No. of Views: 1057

11) Word Sense Disambiguation in Gujarati Language

Bhagyada Desai, Krinal Naik, Preeti Bhatt

Download PDF View Abstract

No. of Downloads: 10 | No. of Views: 1158

12) Trust Evaluation in Cloud Computing: A Survey

Kavita Rathi, Shivani Taneja

Download PDF View Abstract

No. of Downloads: 8 | No. of Views: 1026

13) Data Security Models In Cloud Computing: A Review

Kavita Rathi , Narender

Download PDF View Abstract

No. of Downloads: 7 | No. of Views: 1368

14) Performance Analysis of Image Segmentation Using Parallel Processing

Supriya Gupta , Mujeeb Rahman

Download PDF View Abstract

No. of Downloads: 7 | No. of Views: 1059

15) Enhancement of SMIB Performance Using PSS with Advanced Controllers

N.Siva Mallikarjuna Rao, B.V.Haritha

Download PDF View Abstract

No. of Downloads: 10 | No. of Views: 1119

16) Securing and Secrete Image Sharing Using Visual Cryptography Scheme

Rupali Lambe, Mayuri Ghadge, Tai Ingole, Pratiksha Surwase

Download PDF View Abstract

No. of Downloads: 8 | No. of Views: 1110

18) GPU-Graphics Processing Unit

Ramani Shrusti K, Desai Vaishali J, Karia Kruti K.

Download PDF View Abstract

No. of Downloads: 19 | No. of Views: 2508

19) Channel Spectral Efficiencies of Digital Cellular Standards

SugandhaJain, .

Download PDF View Abstract

No. of Downloads: 7 | No. of Views: 1217

20) Scene Text Recognition in Mobile Application by Character Descriptor and Structure

Prof.Jadhav Hemant B.(Guide), Pawar Anil N, Sambare Shailesh D, Nale Swapnali V, Unavane Snehal R

Download PDF View Abstract

No. of Downloads: 8 | No. of Views: 1062

21) Meliorate QOS of WIFI-WIMAXin Backhaul Networks

Ekta Singla, Parminder Singh

Download PDF View Abstract

No. of Downloads: 8 | No. of Views: 2150

Indexed by

Crossref logo