SN |
Paper |
1 |
Pattern Classification of Partial Discharge in LV Winding Of 1-F Transformer Using PCA
Ganesh Rao,
Dr. Mrs. Shailja Shukla
|
2 |
Interaction of Electromagnetic Radiation from CRT Monitor with Human Body
Sandeep Kumar,
Santosh Kumar,
Ashwani K. Vashishtha
|
3 |
Twist of Aspect Oriented and Component Oriented
Shailendra N.Singh,
Dr. Manu Pratap Singh
|
4 |
Specification and Verification of Sliding Window Protocol using Predicate Logic
Sachin Kumar,
Veena Bharti,
Shikha Pandey
|
5 |
Overall Performance Improvement in Wireless Sensor Network System Using End-End Arguments
Preeti Khera,
Ashok Kumar,
Vibhuti PN Jaiswal
|
6 |
Discovering Active and Profitable patterns with RFM (Recency, Frequency and Monetary) Sequential Pattern Mining –A constraint based approach
C K Bhensdadia,
Y. P. Kosta
|
7 |
ERP System for Effective Management of Co-operative Sugar Industries - A Case Study of Sahyadri SSK Ltd Shiravade Karad (M.S.)
Rajendra D Kumbhar
|
8 |
Generating Test Patterns For FPGAs Using Multi-objective Genetic Algorithm
Ms.Sangeeta,
Mr.Vinay Chopra
|
9 |
Statistical approach of Social Network in community mining
Meenu Gupta,
Rajeev Yadav
|
10 |
Wireless Technology and Communication: The Pacemakers for the ERP
Rajiv Sharma,
Sunita Bharatwal,
Monika Sharma
|
11 |
Confronts and Issues in M-Commerce [A Business on Mobile and Net Approach
Rajeev Kr.Sharma,
Rupak Sharma,
Mr. Shailendra Raj
|
12 |
Neutrosophic Relational Database Search Approach to capture inconsistent information
Meena Arora,
Ranjit Biswas
|
13 |
An Approach for Detection and Correction of Design Defects in Object Oriented Software
Nirmal Kr. Gupta,
Dr. Mukesh Kr. Rohil
|
14 |
Issues Involved in Designing of User Interfaces to Fetch Quality Data for Automation of Results in a Typical University Examination System
Dr. Vikas Sharma ,
Anjana Sharma
|
15 |
Normalizer Based Encryption Technique [NBET] Using the Proposed Concept of Rubicryption
Rajdeep Chowdhury,
Saikat Ghosh
|
16 |
Survey of Double Based Number System and Their Application
Rajdeep Chowdhury,
Mousumi Basak
|
17 |
Metamaterial Properties and Applications
Shridhar E. Mendhe
|
18 |
Enhancement of Wired Equivalent privacy
Rajnesh Singh,
Vipin Rai,
Amit Kumar
|
19 |
Analysis and Design of Z-RAM for low leakage Current
Sukhvinder kaur,
Priya darshni,
Shivani Badoni,
Seema Rani
|
20 |
Metrics, Tools and Scientific Applications: Revolutionizing Engineering Design
Anisha Gupta,
Dr. Deepshikha Jamwal
|
21 |
Performance of Genetic Algorithms for Solving Flexible Job-Shop Scheduling Problem
Amit Kumar,
Rajnesh Singh
|
22 |
THR : A Two-Hop look ahead with Packet Buffering protocol for MANET
Dr.Ela Kumar,
Ravinder N.Rajotiya
|
23 |
AES: A Symmetric Key Cryptographic System
Punita Meelu,
Sitender Malik
|
24 |
Project Proposal on Impact Assessment of Village Resource Centres(VRC) in achieving millennium development goals
Sanjay Jamwal
|
25 |
Security & Privacy Preservation in VANET
Yogesh A. S.,
Dr. Avichal Kapur
|
26 |
CBIR based on Color & Texture
P. B. Thawari,
N. J. Janwe
|
27 |
Comparative Analysis of Data Security Techniques in Network Environment
Kanwaljit Singh,
Tejpreet Singh
|
28 |
Gayatri – A Fast Hindi Text To Speech System With Input Support For English Language
Danish Chopra
|
29 |
Association Rule Mining Based on Image Content
Deepa S. Deshpande
|
30 |
SCRUM: An Agile Framework
Rashmi Popli,
Dr. Naresh Chauhan
|
31 |
Congestion Control in Diffi-Serv using Fuzzy & Neural Methodology
Aastha,
Tarun Aggarwal,
Sachin Garg
|
32 |
Study of Cardiovascular Dynamics with Recursive Simulator Generation Approach
Biswarup Neogi,
Soumya Ghosal,
Soumyajit Mukherjee,
Sinchan Ghosh,
Achintya Das
|
33 |
Reduction of Leakage by Input Vectors with Constrained NBTI Degradation
Ram Rakesh,
K.S.Yadav,
Jaipal
|
34 |
Measurement of bottleneck using pathneck
Gouri M. Patil,
Ajay Kumar
|
35 |
Artificial Intelligence – Man or Machine
Sandeep Rajani
|
36 |
Comparative Analysis of Gabor Filter & FTT Filter Based Fingerprint Recognition System
Ruchi Rai,
Abhishek Rai,
Ashish Bagla,
Ankit Singhal
|
37 |
Consumerism and Deceptive Advertisement Claim: An Experimental Investigation
Dr. Joshua O. Miluwi
|
38 |
Impact of Information Technology on the Development of Rural Economy of India
Parveen Sharma
|
39 |
Biological Computer Model to solve NP Complete problem
Shalini Rajawat,
Vijay Singh Rathore,
Naveen Hemrajani
|
40 |
Segmentation & Analysis of Osteosarcoma Cancerous Bone Micro Array Images - 1
Anand Jatti
|
41 |
Knowledge Management with Information Technology
Daisy kansal,
Deepak Sengar
|
42 |
Modular Neural Network based Arrhythmia Classification System using ECG Signal Data
Shivajirao M. Jadhav,
Sanjay L. Nalbalwar,
Ashok A. Ghatol
|
43 |
Web Content Mining Tools: A Comparative Study
V. Bharanipriya,
V. Kamakshi Prasad
|
44 |
Wearable computing and Related Issues
Inderdeep Kaur,
Arshpreet Kaur
|
45 |
Testing Hyperion Database Systems
Jyoti Duhan
|
46 |
Performance Evaluation of Cluster-based Routing Protocols used in Heterogeneous Wireless Sensor Networks
Rajni Meelu,
Rohit Anand
|
47 |
Investigation on security in LMS MOODLE
Sheo Kumar,
Kamlesh Dutta
|
48 |
Simulation techniques for biologically active Prosthetic Feet -An Overview
Biswarup Neogi,
Soumyajit Mukherjee,
Soumya Ghosal,
Sinchan Ghoshd,
Achintya Dase
|
49 |
Macroscopic View on the Structure of the e-Management Control and Evaluation System for the University of Technology, Jamaica
Ashok B. Kulkarni,
Valeri Pougatchev
|
50 |
Building of e-Management Control and Evaluation System for an Educational Institution: The University of Technology, Jamaica solutions
Ashok B. Kulkarni,
Valeri Pougatchev
|
51 |
Training Need Assessment: A Critical Study
Sunita Dahiya,
Ajeya Jha
|
52 |
Traffic Grooming, Routing, and Wavelength Assignment in Optical WDM Mesh Networks
K.SHEKAR,
D. Sreenivasa Rao
|
53 |
An efficient partitioning algorithm to find un-expected behavioural data points
K.Subramanian,
E.Ramaraj
|
54 |
Analysis, Comparison and Performance Evaluation of BNP Scheduling Algorithms In Parallel Processing
Parneet Kaur,
Dheerendra Singh,
Gurvinder Singh,
Navneet Singh
|
55 |
AMBA dedicated DMA controller with multiple masters using VHDL
Archana Tiwai,
D.J.Dahigaonkar
|
56 |
Implementation of Single Sign-on and Delegation Mechanisms in Alchemi.NET based Grid Computing Framework
Manisha Bhardwaj,
Sarbjeet Singh,
Makhan Singh
|
57 |
Liveness Detection of Biometric Traits
Mohmad Kashif Qureshi
|
58 |
Exploring Testing Strategies
Ajay Jangra,
Gurbaj Singh,
Jasbir Singh,
Rajesh Verma
|
59 |
Analyzing WLANs standards for Wireless Sensor Network
Ajay Jangra,
Rajesh Verma
|
60 |
Estimation by Analogy in the Perspective Educational Web Hypermedia Applications
Dheerendra Singh,
K. S. Dhindsa
|
61 |
A Genetic Algorithm for Management Data Stream in VANET
S. Raghay,
S. El Hadaj,
T. Noel
|
62 |
Enhanced Goal Based Modeling Technique
Kavita,
Shikha,
Sunila
|
63 |
X-Log Authentication Technique to Prevent SQL Injection Attacks
B. Indrani ,
Dr. E. Ramaraj
|