S.No. |
Title |
Author |
Pages |
View |
Google Scholar |
1 |
An Approach to Simplify Reversible Logic Circuits
|
Pabitra Roy, Subrata Das, Samar Sensarma |
1-6 |
9384 |
View |
2 |
FPGA Based Quadruple Precision Floating Point Arithmetic for Scientific Computations
|
Mamidi Nagaraju, Geedimatla Shekar |
7-12 |
9715 |
View |
3 |
Reduction of Co-Channel Interference in transmit/Receive diversity (TRD) in MIMO System
|
Manisha Rathore, Puspraj Tanwar |
13-17 |
9802 |
View |
4 |
Survey paper on different approaches of Threshold Cryptography
|
Neha Gupta, Manish Shrivastava, Aditya Goel |
18-23 |
9646 |
View |
5 |
Modeling & Simulation of Multi-Pulse Converters for Harmonic Reduction
|
Deependra Singh, Hemant Mahala, Paramjeet Kaur |
24-32 |
9435 |
View |
6 |
Design and Experimental Implementation of Bipedal robot
|
Sreejith C, Sreeshma K |
33-39 |
9445 |
View |
7 |
Removal of cyclic prefix in Adaptive Non-Contiguous OFDM for Dynamic Spectrum Access using DWT and WT
|
Saket kumar, Puspraj Tanwar |
40-44 |
9141 |
View |
8 |
Medical Image Protection using steganography by crypto-image as cover Image
|
Vinay Pandey, Manish Shrivastava |
45-48 |
9572 |
View |
9 |
Prevention of Cross-Site Scripting Vulnerabilities using Dynamic Hash Generation Technique on the Server Side
|
Shashank Gupta, Lalitsen Sharma, Manu Gupta, Simi Gupta |
49-54 |
9560 |
View |
10 |
A Review of Content Based Image Classification using Machine Learning Approach
|
Sandeep Kumar, Zeeshan Khan, Anurag jain |
55-60 |
9081 |
View |
11 |
Location Privacy Using User Anonymity and Dummy Locations
|
Prince Kumar Sahu, Saroj Kumar Chandra |
61-64 |
9382 |
View |
12 |
Comparison and Analysis of an efficient Image Compression Technique Based on Discrete 2-D wavelet transforms with Arithmetic Coding
|
Deepika Sunoriya, Uday Pratap Singh, Vineet Ricchariya |
65-74 |
9390 |
View |
13 |
Performance Evaluation of Cross Layer QoS scheduling for Long Term Evolution Network
|
D. Vinayagam, R. Kurinjimalar, D. Srinivasan |
75-83 |
9580 |
View |
14 |
Biorthogonal Wavelet Transform Digital Image Watermarking
|
B. Rajendra Prasad, K.Vinayaka Kota, B. Mysura Reddy |
84-89 |
9443 |
View |
15 |
Analysis of fault using microcomputer protection by symmetrical component method
|
Ashish Choubey, Latika Pande |
90-95 |
9524 |
View |
16 |
Investigation of rerouting system in Optical Network
|
Sushil Chaturvedi, Manish Shrivastava |
96-98 |
9054 |
View |
17 |
Swing Detection Using Onto Tree
|
Rakesh Pandit, Parag Sohoni, Sachin Patel |
99-105 |
9526 |
View |
18 |
Transmission of Power to the Island Using HVDC (From Indian continent to Lakshadweep island)
|
B. Vijayalakshmi, C. Ram Kumar |
106-110 |
9518 |
View |
19 |
An Empirical Study on feature selection for Data Classification
|
S.Rajarajeswari, K.Somasundaram |
111-115 |
8993 |
View |
20 |
Studies on IPTV over IMS test bed
|
K. Sundara Raja Raja Perumal, D. Vinayagam, K. Porkamalapathandevi |
116-122 |
9642 |
View |
21 |
An Optimized Feature Selection for Image Classification Based on SVM-ACO
|
Priyanka Dhasal, Shiv Shakti Shrivastava, Hitesh Gupta, Parmalik Kumar |
123-128 |
9352 |
View |
22 |
Design and Comparative Study of Three Photovoltaic Battery Charge Control Algorithms in MATLAB/SIMULINK Environment
|
Ankur Bhattacharjee |
129-137 |
9703 |
View |
23 |
Secure Query Processing and Routing in Wireless Sensor Networks
|
R. Jebakumar, P. Vivekanandan |
138-141 |
9415 |
View |
24 |
Analysis and comparison of the 4-PSK and 8-PSK STTC over Rayleigh fading Channels for determining Performance
|
Pragya Gupta , Uday Pratap Singh, Vineet Richhariya |
142-149 |
8960 |
View |
25 |
Reduction of Noise Image Using LMMSE
|
Joginder Singh, R. B. Dubey |
150-155 |
9540 |
View |
26 |
An Efficient Wavelength variation approach for Bend Sensing in Single mode-Multimode-Single mode Optical Fiber Sensors
|
Abdul Samee Khan, Mohd. Sarwar Raeen |
156-162 |
9277 |
View |
27 |
A Review of Multi-Class Classification for Imbalanced Data
|
Mahendra Sahare, Hitesh Gupta |
163-168 |
9593 |
View |
28 |
Finding Frequent Pattern with Transaction and Occurrences based on Density Minimum Support Distribution
|
Preeti Khare, Hitesh Gupta |
169-174 |
10781 |
View |
29 |
A New Classification Approach for PolSAR Images
|
T. J. Singh Chugh, R. B. Dubey and Sujata |
175-181 |
9148 |
View |
30 |
SVD Detection for Cognitive Radio Network based on Average of Maximum-Minimum of the ICDF
|
Mohd. Fahad Fahim, Mohd. Sarwar Raeen |
182-187 |
9360 |
View |
31 |
Design Hybrid method for intrusion detection using Ensemble cluster classification and SOM network
|
Deepak Rathore, Anurag Jain |
188-194 |
9488 |
View |
32 |
A Study Paper on IDS Attack Classification Using Various Data Mining Techniques
|
Sneha Kumari, Maneesh Shrivastava |
195-200 |
9328 |
View |
33 |
Feature Extraction of Mammograms
|
Monika Sharma, R. B. Dubey, Sujata, S. K. Gupta |
201-209 |
9279 |
View |
34 |
A Review of Density-Based clustering in Spatial Data
|
Pragati Shrivastava, Hitesh Gupta |
210-213 |
9332 |
View |
35 |
Java Based Resource Sharing with Secure Transaction in User Cloud Environment
|
Sanjay Kumar Brahman, Brijesh Patel |
214-218 |
10107 |
View |
36 |
BER Analysis of MIMO-OFDM System using BPSK Modulation Scheme
|
Shruti Trivedi, Mohd. Sarwar Raeen, Shalendra Singh pawar |
219-226 |
10390 |
View |
37 |
Tag Based Client Side Detection of Content Sniffing Attacks with File Encryption and File Splitter Technique
|
Syed Imran Ahmed Qadri, Kiran Pandey |
227-233 |
10591 |
View |