SN |
Paper |
1 |
Correlation studies of PPG finger pulse profiles for Biometric systemDr. Mandeep Singh,
Spiti Gupta |
2 |
Comparatively Analysis of Agile Software Development
Ajaydeep,
Lekha,
Kavita dawra,
Vipul Sethi,
Manisha
|
3 |
Motion Analysis in Video using Optical Flow Techniques
A.S.Khobragade,
K.D.Kulat,
C.G.Dethe
|
4 |
Some Problems of Human Resources Management, Industrial Relations, Conflicts and Legal Considerations – An Overview
S.K. Khola,
Dr. O.S. Yadav
|
5 |
Fast-NCC based Strip Super-Resolution Video Mosaic Creation
Kantilal Rane,
Sunil Bhirud
|
6 |
Issues and Challenges involved in Multipath Routing with DYMO Protocol
Dr Yogesh Chaba,
Dr. R. B. Patel,
Rajesh Gargi
|
7 |
An Overview about Cloud Computing
Anandhi,
Dr. K. Chitra
|
8 |
Revised AES And Its Modes of Operation
Mohan H.S,
Dr.A.Raji Reddy
|
9 |
Application of Knowledge Management In Education Industry
Prajakta C. Dhote,
Chandrakant N. Dhote
|
10 |
A Study on the Usage of Knowledge Management Practice in Avasarala Technologies Limited (ATL)
A.Mani Maran
|
11 |
Impulse Noise Removal in Images Using Morphological Set Notation
Motiur Rahman,
Abu Naim Uddin Rajiv,
Ziaul Haque,
Abdul Aziz,
A.S.M Delowar Hossain
|
12 |
Implementation of Enhanced Modified Hill Cipher by P-box and –M-box Technique
Shurabhi Khare,
Prof. Niket Bhargawa,
Prof. Rajesh Shukla,
Prof. (Dr.) Manoj Shukla
|
13 |
Advanced Image analysis Based System for Automatic Detection and classification of Malarial Parasite in Blood Images
Neetu Ahirwar,
Sapnojit. Pattnaik,
Bibhudendra Acharya
|
14 |
Implemented Encryption Scheme Using Even(10’s and 2’s) Complement with Binary Addition Approach
Sharad Patil,
Dr. Ashok Patil,
Dr. Ajay Kumar
|
15 |
Examining of Reconfiguration and Rerouting approaches: WDM Networks
Sushil Chaturvedi,
Manish shrivastava,
Aditya Goel
|
16 |
Modification of Adaptive Logarithmic Method for Displaying High Contrast Scenes by automating the bias value parameter
Sumandeep Kaur,
A.P Sumeet Kaur
|
17 |
Existing trends in intrusion detection - a comparative analysis
Manish Shrivastava,
Shubha Mishra
|
18 |
Malware detection using data mining techniques
Raviraj Choudhary,
Ravi Saharan
|
19 |
Implementation of Object Tracking and Velocity Determination
L.Koteswara Rao,
K.SivanagiReddy,
K.Pradeep Vinaik
|
20 |
DCT-Based Reduced Face for Face Recognition
Vikas Maheshkar,
Sushila Kamble,
Suneeta Agarwal,
Vinay Kumar Srivastava
|
21 |
DWT-SVD based Robust Image Watermarking using Arnold map
Sushila Kamble,
Vikas Maheshkar,
Suneeta Agarwal,
Vinay Kumar Srivastava
|
22 |
Analyzing the Ambiguity in RNA Structure using Probabilistic Approach
Rajesh Kr. Varun,
Sunil Gupta
|
23 |
Multimodal Biometrics in Identity ManagementJaya Lakshmi,
I. Ramesh Babu,
P. Sai Kiran |
24 |
Reusability of Software Components using SVM Based Classifier Approach
Upasana Sharma,
Parminder Singh,
Sandeep S.Kang
|
25 |
An Analysis in Comparison Related to the Problem of Developing Web-Based Information Systems
Sudesh Kumar,
Dr.Ela Kumar
|
26 |
XML based Information Management in Healthcare, Data Mining and Distributed Systems
Sudesh Kumar,
Deepak Sinwar
|
27 |
Information Management with Applicability using XML
Sudesh Kumar,
Dr.Ela Kumar
|
28 |
Managing intellectual property rights in software engineering
T.M.Kirankumar
|
29 |
AETC: An Automated Electronic Toll Collection Using ZigBee
Surendra S. Dalu
|
30 |
Secure Routing in MANET
Budesh Kanwer
|
31 |
Study on Mobile Adhoc Network Routing Protocols
Monika
|
32 |
Statistical Filter to Remove noise in Digital Images
Rajat
|
33 |
Control plane design issues of IP over WDM networks for interconnection
Anshu Oberoi,
J.S.Sohal,
R.S.Kaler
|
34 |
An improved statistical filter for spam detection combining Bayesian method and regression analysis
Srikanth,
S. Ramakrishna,
K.V.S.Sarma
|
35 |
A Review of Routing Protocols in Mobile Ad Hoc Networks
Naveen Garg,
Kiran Aswal,
Dinesh C Dobhal
|
36 |
Comprehensive Study of Association Rules in Data Mining
Amandeep Mehta,
Dr Vivek Chandra
|
37 |
A Survey on Connectivity Monitoring and Maintenance for Wireless Sensor Networks
D.G.Anand,
Dr.H.G.Chandrakanth,
Dr.M.N.Giriprasad
|
38 |
Leakage current controlling mechanism Using High K Dielectric + Metal Gate
Abhishek Kumar
|
39 |
Interval Type-2 Fuzzy System for Autonomous Navigational Control of Non-holonomic Vehicles
Satvir Singh Sidhu,
Jasbir Singh Saini,
Arun Khosla
|
40 |
Sensing the Sixth Sense Technology
Aastha,
Rashmi,
Sakshi Bhatia,
Geeta Rani
|
41 |
Measuring Software Reusability using SVM Based Classifier Approach
Ajay Kumar
|
42 |
Making Biometric System more Robust with Multibiometrics
Darshan Lal,
Bharat Bhushan,
Chander Kant
|
43 |
Wireless Networks for Next Generations
Sachin Garg
|
44 |
Intelligent Mobile Environnements Recovery Techniques
Apekshit Sharma,
Chandrakant Sharma
|
45 |
Processing Of Management Information System With In Small And Large Scale Enterprises
Kanta Jangra,
Kavita Dua
|
46 |
An Nested Encryption Scheme For Secure Electronic Transaction
Dinesh Kumar,
Kavita Dua
|
47 |
Economic Phenomenon In Computer Technology
Manju Lata,
Karan Singh
|
48 |
Health Care Management Information Systems with Object Oriented Methodology
Kanta Jangra,
Kavita Dua
|
49 |
Analysis of Different Congestion Control Formats for TCP/IP Networks
Gesu Thakur
|