Contributing In Techno-Social Developement...
ISSN NO:2347-4890
1. A novel approach of an Efficient high bit Serial Multiplier Design using Ripple Counters and Full Adder Pg.1-6
Authors:  M. Radha, CH. Srinivasarao, S.Madhava Rao

View PDF

2. Study on Different Clustering Approaches for Document Clustering Pg.7-11
Authors: J.Sankari, Dr. R Manavalan  

View PDF

3.  Automation Of Public Transportation Service Information Pg.12-17
Authors:  G. Rajesh, N. suresh

View PDF

4. Hand Segmentation and Tracking Technique using Color Models Pg.18-21
Authors: Sunita Patidar, Dr. C. S. Satsangi  

View PDF

5. Soft Starting Wind Mill Poly Phase Induction Generator with Grid  Pg.22-24

Authors: Sanjay Mishra, Prof. Subrata Debdas, Prof. Yashwant Kashyap

 

 

View PDF

6. Performance Evaluation of MANET Routing Protocols with Scalability for HTTP Network Load Using OPNET Modeler Pg.25-28
Authors: Mandeep Singh, Amarvir Singh                                                   

View PDF

7. Construction of control chart constant with exponential and gamma process variate Pg. 29-52
Authors: R.R.L.KANTAM, B.SRIRAM

View PDF

8. Verification of Five Port Network Router using Advanced EDA tools Pg.53-58
Authors: K. Vital Chand Naik, G. Mangarao

View PDF

9. Intrusion detection by intrusion detection system Pg.59-61
Authors: Sachin Malviya, Suneet Joshi 

View PDF

 

10. An Efficiency  of Eliminating the Fan out Bottleneck in Parallel Long BCH Encoders using VHDL Pg.62-67
Authors: P.Sandhaya, S.Madhava Rao,

View PDF

 

11. The Construction and Investigation of Web Engineering for extending the enterprise’s core competence related studies Pg. 68-79 
 Authors: Hsien-Yu Lee, Nai-Jian Wang

View PDF

 

12. Radio resource management in IEEE 802.16 networks Pg. 80-86
Authors: Mohamed I. Yousef, Mohamed M. Zahra and Ahmed S. Shalaby

View PDF

 

13.

BIST architecture and implementing of a high speed 32-bit signed/ unsigned pipelined multiplier

Pg. 87-91

 

Authors: Deepak parashar

View PDF

 

14. Colour Image Encryption and Decryption by using Scan Approach      Pg. 92-96
Authors: Rinkee  Gupta, Jaipal Bisht

 View PDF