S.No. |
Title |
Author |
Pages |
View |
Google Scholar |
1 |
Image-Independent Compression Scheme Using Adslets
|
D. Prathyusha Reddi, M. N. Giri Prasad, S. Varadarajan |
1-10 |
11372 |
View |
2 |
Implementation of MAC by using Modified Vedic Multiplier
|
Sreelekshmi M. S., Farsana F. J., Jithin Krishnan, Rajaram S, Aneesh R |
11-15 |
11679 |
View |
3 |
Spade-Shaped Patch Antenna for Ultra Wideband Wireless Communication Systems
|
Rashid A. Fayadh, F. Malek, Hilal A. Fadhil |
16-22 |
11793 |
View |
4 |
Hybrid Level Integration of Biometric Traits for Security Applications
|
Manjunath S Gabasavalagi, Sanjeevakumar M. Hatture, Nalinakshi B. G, Rashmi P. Karchi |
23-31 |
11940 |
View |
5 |
Effective Steganalytic Algorithm based on Residual Value of Pixels in an Image
|
T. J. Benedict Jose, P. Eswaran |
32-36 |
11635 |
View |
6 |
DICOM Image Retrieval Using Novel Geometric Moments and Image Segmentation Algorithm
|
Amol Bhagat, Mohammad Atique |
37-46 |
11446 |
View |
7 |
A Real time Data Acquisition and Monitoring Device for Medical Applications based on Android Platform
|
Jithin Krishnan, Niranjan D. Khambete , Biju B |
47-51 |
12245 |
View |
8 |
Performance Analysis of Some TCP Variants for Routing over Mobile Ad hoc Networks
|
Ibrahim K. Tabash, M. Salim Beg, Nesar Ahmad |
52-57 |
13171 |
View |
9 |
Web Based Image Retrieval System Using Color, Texture and Shape Analysis: Comparative Analysis
|
Amol P Bhagat, Mohammad Atique |
58-66 |
11126 |
View |
10 |
Assessing the Quality of M-Learning Systems using ISO/IEC 25010
|
Anal Acharya, Devadatta Sinha |
67-75 |
11682 |
View |
11 |
Automatic Detection of Adenocarcinoma using Active Contours
|
NeelapalaAnilKumar, M. SatyaAnuradha, Pilla Srinivas, Ravuri Daniel |
76-79 |
12214 |
View |
12 |
Performance analysis of adjustable window based FIR filter for noisy ECG Signal Filtering
|
N. Mahawar, A. Datar, A. Potnis |
80-86 |
11826 |
View |
13 |
Energy Meter Design to reduce Power Consumption
|
Roopsai V., Varun Krishna K.G., Ram Kumar R.M., Selvarathinam S. |
87-91 |
10984 |
View |
14 |
Modified Ticketing System using Radio Frequency Identification (RFID)
|
Varun Krishna K.G., Selvarathinam S., Roopsai V., Ram Kumar R.M. |
92-98 |
11852 |
View |
15 |
VHDL Implementation of Fast and Efficient Viterbi decoder
|
Rajesh. C, A Sreenivasa Murthy |
99-104 |
11291 |
View |
16 |
Review Paper on Performance Evaluation of Nut and Bolt Recognition System Using Artificial Neural Network
|
Shruti Paunikar, Sandeep Shrivastava |
105-109 |
11485 |
View |
17 |
Evaluating the Performance of an Admissible Kernel Function in Banach Space for Binary Data
|
Sangeeth.R, B.Kalpana |
110-113 |
11534 |
View |
18 |
Desktop Virtualization Solutions-A Comprehensive Survey
|
Vasuprada Vijayakumar, Chitra V, Priya D |
114-122 |
12226 |
View |
19 |
Image Based Measurement of Length and Distance of an Inaccessible Object
|
Md. Imdadul Islam, Mahbubul Alam, Sarnali Basak, Md. Al-Amin Khandaker, S M Raihan Azim |
123-128 |
11513 |
View |
20 |
Real Time Vibration Control of Active Suspension System with Active Force Control using Iterative Learning Algorithm
|
Kalaivani, Lakshmi, Rajeswari |
129-134 |
11376 |
View |
21 |
Reverse Engineering: An Analysis of Static Behaviors of Object Oriented Programs by Extracting UML Class Diagram
|
Mrinal Kanti Sarkar, Trijit Chatterjee, Dipta Mukherjee |
135-141 |
11363 |
View |
22 |
The Effect of Accounting Information Systems in Accounting
|
Awosejo, O.J, Kekwaletswe, R, M, Pretorius, P and Zuva, T |
142-150 |
13135 |
View |
23 |
Investigation of Faults, Errors and Failures in Wireless Sensor Network: A Systematical Survey
|
Karthick Raghunath K.M, Rengarajan N |
151-163 |
12515 |
View |
24 |
Horizontal Aggregation in SQL to Prepare Dataset for Generation of Decision Tree using C4.5 Algorithm in WEKA
|
Mayur N. Agrawal, Ankush M. Mahajan, C.D. Badgujar, Hemant P. Mande, Gireesh Dixit |
164-169 |
11671 |
View |
25 |
A Literature Survey on Automatic Query Expansion for Effective Retrieval Task
|
Jagendra Singh, Aditi Sharan, Sifatullah Siddiqi |
170-178 |
12424 |
View |
26 |
Implementation of OpenSSL API’s for TLS 1.2 Operation
|
Maria Navin J R, Suresh P, Pradeep K R |
179-183 |
11596 |
View |
27 |
An Improved Image Denoising Technique for Digital Mobile Camera Images
|
Anna Saro Vijendran, Bobby Lukose |
184-190 |
12594 |
View |
28 |
Extract Knowledge and Association Rule from Free Log Data using an Apriori Algorithm
|
Hemant N. Randhir, Ravindra Gupta ,G.R. Selokar |
191-196 |
12184 |
View |
29 |
Pour Point Description of Watershed Based on DEM of Bilaspur District
|
Manish Mahant Manikpuri, Sapna Choudhary |
197-200 |
11397 |
View |
30 |
Data sharing and Management based on RC4 in User Cloud Environment
|
Sanjay Kumar Brahman, Brijesh Patel |
201-206 |
11144 |
View |
31 |
Comparative Study of K-means and Robust Clustering
|
Shashi Sharma, Ram Lal Yadav |
207-210 |
12411 |
View |
32 |
Key Generation and Verification for Image Authentication
|
Soheb Munir, A.S.Zadgaonkar, Manish Shrivastava |
211-214 |
10645 |
View |
33 |
Designing of Anti Dengue Drug Molecule against Insilico Modeled Target DC-Sign (CD-209)
|
Prashantha C.N, Arti Patil, Shanmuga Priya |
215-223 |
11766 |
View |
34 |
A Review of Intrusion Detection Technique by Soft Computing and Data Mining Approach
|
Aditya Shrivastava, Mukesh Baghel, Hitesh Gupta |
224-228 |
12199 |
View |