| 1. | A Survey on Montgomery Modular Multiplication Algorithm used in Cryptography System | Pg.1-3 | |
| Authors: Jaya Bansal, Jagdish Nagar | View PDF | ||
| 2. | Design and Construction of Suction Pump for the Control of Domestic Insects | Pg.4-9 | |
| Authors: Zoaka, D. B., Alhaji, A.U., Burmamu, B.R., Tya, T.S.K., Kabri, H.U. | View PDF | ||
| 3. | Impact of Finite Circular Ground Plane on the Radiation Patterns of the Monopole Antenna | Pg.10-16 | |
| Authors: Lusekelo Kibona | View PDF | ||
| 4. | Gain Enhancement of the Monopole Antenna | Pg.17-22 | |
| Authors: Lusekelo Kibona | View PDF | ||
| 5. | Analysis of Electromagnetic Scattering Width from An Infinity Cylinder by Variation of the Normalized Radius | Pg.23-28 | |
| Authors: Lusekelo Kibona | View PDF | ||
| 6. | Raptor Code to Provide Security Services in Cloud | Pg.29-33 | |
| Authors: M. Newlin Rajkumar, A.Merin Rexiha | View PDF | ||
| 7. | Dynamic Allocation method for efficient Load Balancing in Cloud Computing Environment | Pg.34-37 | |
| Authors: T.T.Deepa | View PDF | ||
| 8. | An efficient and secure storage using delegated access control in Multi-Cloud environment | Pg.38-42 | |
| Authors: M.Newlin Rajkumar, P.M.Benson Mansingh, Dr.V.Venkatesa kumar | View PDF | ||
| 9. | Hybrid Intrusion Detection System with Higher Detection Accuracy | Pg.43-45 | |
| Authors: S .Kamesh | View PDF | ||
| 10. | Video Stegnography Based on Improved DCT 32*32 Vector Quantization Method | Pg.46-51 | |
| Authors: Prajna Vasudev, Kumar Saurabh | View PDF | ||
| 11 | Policies For Development Of Photovoltaic Technology:A Review | Pg.52-57 | |
| Authors: Deepika chauhan, Sanjay Agarwal, Mahendra Kumar Suman | View PDF | ||
| 12. | Efficient image watermark based on image Quality metric | Pg.58-64 | |
| Authors: Suman Shivhare, Swati Tiwari, Rajat Chouksey | View PDF | ||
| 13. | Security Challenges and it’s Solutions in Wireless Networks | Pg. 65-68 | |
| Authors: Chitra J. Patil, Shruti N. Pardeshi | View PDF | ||
| 14. | A Hardware/Software Co-Design Architecture Implementation of Canny Edge Detection using FPGA and MATLAB | Pg. 69-73 | |
| Authors: Mallavarapu.Ramu, T.V.S.Adinarayana | View PDF | ||
| 15. | Design and Implementation of an Efficient Water Quality and Quantity Monitoring System | Pg. 74-78 | |
| Authors :N. NarendraKumar , K. Vinayswethi, V.Naveen Kumar | View PDF | ||
| 16. | An Adaptive Fault Tolerance Management In Cloud Computing Using Replication And Fragmentation | Pg.79-82 | |
| Authors: M.R. Arunya, M. Karthic | View PDF | ||
| 17. | Srr Full Anonymity Protection In Manets | Pg. 83-87 | |
| Authors :Merly Varghese, A. Rengarajan | View PDF | ||
| 18. | Study Of Implementation Of Intrusion Detection System (Ids) Via Different Approachs | Pg, 88-92 | |
| Authors : Sachin Malviya, Suneet Joshi | View PDF | ||
| 19. | An Enhanced Authentication Scheme Based On Attribute Encryption For Personal Health Record Sharing | Pg: 93-96 | |
| Author: M. Newlin Rajkumar, Anju Achenkunju, V. Venkatesa Kumar | View PDF | ||
| 20. | Study of Opportunistic Network and MANET | Pg. 97-100 | |
| Authors:Dinakar.S, R.M.Bhavadharini, S.Karthik | View PDF | ||
| 21. | Time Series Decomposition Analysis of Production Quantity Using Historical data | Pg. 101-115 | |
| Authors: Ezeliora Chukwuemeka Daniel, Ubani Nelson O.Umeh Maryrose Ngozi, Mbeledeogu Njide N. | View PDF | ||
| 22. | Social Network Analysis – A Survey on Privacy of personal Data | Pg. 116-123 | |
| Authors: Dushyant Tanna | View PDF | ||
| 23. | DC CONSTANT CURRENT DRIVER | Pg.124-128 | |
| Authors: Shailendra S. Khinchi | View PDF | ||