View / Download : 161256
S.No. Title Author Pages View Google Scholar
1 Block Based Information Hiding using Cosine, Hartley, Walsh and Haar Wavelets
H. B. Kekre, Sudeep D. Thepade, Ratnesh N. Chaturvedi 1-6 6842 View
2 Robust LQR Control Design of Gyroscope
Ashok S. Chandak, Anil J. Patil 7-12 6197 View
3 Securing Routing Protocol by Distributed Key Management and Threshold Cryptography in Mobile Ad hoc Network
Neha Gupta, Manish Shrivastava 13-18 6166 View
4 Result Analysis of Proposed Image Enhancement Algorithm Based on a Self Organizing Map Network and Wavelet Transform
Shobhit Verma, Hitesh Gupta 19-25 6144 View
5 Extracting Person Name, Date and Place from Text Documents Using LEX Tool
Roohi Sharma 26-29 6251 View
6 A Secure Mechanism to Supervise Automotive Sensor Network by Client on Smart Phone
T R Yashavanth, Ravi S Malashetty, V R Udupi 30-35 6297 View
7 Multi-Level Security for Automotive–RFID Based Technology with Lab VIEW Implementation
Priya Darshini .V, Prakash.R, Prasannabalaje.S.M, Sangeetha Monica.T 36-40 6289 View
8 Attack Detection in Watermarked Images with PSNR and RGB Intensity
Neha Chauhan, Akhilesh A. Waoo, P. S. Patheja 41-45 6763 View
9 Speech parameterization based on AM-FM model and its application in speaker identification using AANN
D. Giften Francis Samuel, D. Synthiya Vinothini 46-49 6509 View
10 Credential Clustering in Parallel Comparability Frequency Amplitude
Ameela.T, Kaleeswaran.D 50-55 6365 View
11 A Review of Protein-DNA Binding Motif using Association Rule Mining
Virendra Kumar Tripathi, Hitesh Gupta 56-59 6345 View
12 A Survey of latest Algorithms for Frequent Itemset Mining in Data Stream
U.Chandrasekhar, Sandeep Kumar. K, Yakkala Uma Mahesh 60-65 6184 View
13 Adaptive job Scheduling for Computational Grid based on Ant Colony Optimization with Genetic Parameter Selection
Saurabh Mandloi, Hitesh Gupta 66-71 6390 View
14 A Survey of Middleware in different languages for Ubiquitous Services
Neha Sharma, Usha Batra, Saurabh Mukherjee 72-79 6321 View
15 An Efficient Partition Technique to reduce the Attack Detection Time with Web based Text and PDF files
Animesh Dubey, Ravindra Gupta, Gajendra Singh Chandel 80-86 7585 View
16 An Ensemble Method based on Particle of Swarm for the Reduction of Noise, Outlier and Core Point
Satish Dehariya, Divakar Singh 87-91 6497 View
17 A Bandwidth-Efficient Cooperative Authentication and an En-route Filtering Scheme for Filtering Injected False Data in Wireless Sensor Networks
T.R. Yashavanth, Ravi S Malashetty, Rashmi C.R 92-97 6537 View
18 Image Denoising based on Fourth-Order Partial Differential Equations: A Survey
Anand Swaroop Khare, Ravi Mohan, Sumit Sharma 98-101 6586 View
19 Plasmonics based VLSI processes
Shreya Bhattacharya 102-105 6375 View
20 Implement Security using smart card on Cloud
Amish Kumar Aman, Vijay Prakash 106-110 6079 View
21 Association Rules Optimization: A Survey
Anshuman Singh Sadh, Nitin Shukla 111-115 6793 View
22 Review of Information Authentication in Mobile Cloud over SaaS & PaaS Layers
Vineet Guha, Manish Shrivastava 116-121 6488 View
23 Reactive Power Compensation in Transmission Line using Fuzzy Control Method: A Survey
Yojna Saratkar, Arun Pachori 122-125 6483 View
24 An Efficient Image Denoising Method based on Fourth-Order Partial Differential Equations
Anand Swaroop Khare, Ravi Mohan, Sumit Sharma 126-131 6632 View
25 Reactive Power Compensation on 132 KV Substation Using Soft Computing Techniques (Fuzzy Logic)
Yojna Saratkar, Arun Pachori 132-139 6138 View