Vol. 4 No. 07 (2015)
Published:
2018-01-02
Articles
-
Articles
Impacts of Television Serials on Tamil Rural Women: A Data Mining Case Study of Theni District
303 321 -
Articles
A Novel Ber Analysis Approach For Different Modulation Schemes For Conventional And Wavelet Based Ofdm System
298 242 -
-
-
-
-
-
-
-
-
-
-
-
Articles
Design And Development Of Algorithm To Avoid Wormhole Attacks In Wireless Networks For Proactive Algorithms
397 246 -
Articles
A Feasible Approach to Design a Cmos Domino Circuit at Low Power VLSI Application Design
290 245 -
Articles
Design Of Energy-Efficient Clustering Algorithm for Large Scale Wireless Sensor Networks
313 247 -
-
Articles
ARM Based Application Of Data Hiding Process By Using Anti Forensics Technique For Authentication
286 249 -
-
-
-
-
-
Articles
Design of An Efficient Aging-Aware Reliable Multiplier Based On Adaptive Hold Logic
325 250 -
-
Articles
Spectral _Spatial Classification For Hyper Spectral Images Based On An Effective Extended Random Walker
354 252 -
Articles
Spray Forming of Al-10Si-20Pb, Al-10Si-20Sn and Al-20Sn alloy: A Comparative study of their microstructure and wear characteristics
344 247 -
Articles
Comparative analysis of Statistical Parameters of Finger Knuckle in Digital Image Processing
278 236 -
Articles
Comparative analysis of Statistical Parameters of Finger Knuckle in Digital Image Processing
264 244 -
Articles
Performance Evaluation of LMS, DLMS and TVLMS Digital Adaptive FIR filters by using MATLAB
379 281 -
-
-
-
-
Articles
Simulation Of High Voltage Gain Boost Converter For Battery Charging With PV System In A Single Stage Conversion
297 233 -
-
-
-
Articles
Implementation of ERP module for the key processes of hull production in shipbuilding industry
367 236 -
Articles
Duplicate Detection In Hierarchical XML Multimedia Data Using Improved Multidup Method
321 229 -
-
Articles
On Improving Side channel Attack defence mechanism using ECPM technique under Elliptic curve Cryptography
167 208 -
-
-
-
-
-
-
-
Articles
An Efficient Denial-of-Service Attack Detection System Based on Multivariate Correlation Analysis
128 206 -
-
-
-
-
-
-
Articles
Detection and Prevention of Black Hole & Gray hole attack in MANET using Digital signature Techniques
163 216 -
Articles
Assessing Version Consistency by Identifying systematic Code Changes during Runtime
147 202 -
-
-
-
-
Articles
Investigation of The Effect Of Water-Cement Ratio On The Modulus Of Rupture Of Concrete
157 213 -
-
-
-
-
-
Articles
Ant Colony Optimization Algorithm for Software Project Scheduling Using Critical Chain Project Management
165 222 -
-
-
Articles
Enhancing Security of MANETs by Implementing Elliptical Curve based Threshold Cryptography
186 208 -
-
-
-
Articles
Programmable Direct Memory Access Controller Design Using Advanced High Performance Bus Protocol
152 592 -
Articles
Implementation of FPGA Architecture for OFDM-SDR with an optimized Direct Digital Frequency Synthesizer
144 225 -
-
-
Articles
Optimized Analytical Study to Show the Impact of CFO on the Performance of LTE Uplink
160 208 -
-
-
-
-
-
-
-
-
Articles
EBHEAL: Distributed and Localized Mechanism for Coverage Hole Detection and Healing
150 200 -
-
-
-
-
-
Articles
Comparative Analysis of Different Technique for Detection of Noise in Restored Image
153 229 -
-
-
Articles
Using Genetic Algorithm For Optimization Of Mobile Agent In Wireless Sensor Network: A Survey
125 187 -
-
Articles
Breast Cancer Using KMSVM Techniques In Wisconsin Detect Prognostic Breast Cancer Data Sets
131 204 -
-
Articles
An High Equipped Data Hiding Algorithm Based On Secret Fragment Visible Mosaic Images And Pixel Color Transformations For Secure Image Transmission
157 193 -
-
-
-
-
-
-
-
Articles
“Study of Performance Enhancement and Optimizing Various Parameters of Lateral IMOS”
142 224 -
-
-
-
-
-
-
-
Articles
Study of Software Quality and Risk Estimation and Quality Cost Analysis using empirical study
132 292 -
-
Articles
Scalable and Efficient Data acquisition in Service Oriented Vehicular Adhoc Networks
145 201 -