1. | Joint encryption/watermarking based on Arnold cat map and DCT | Pg. 1-5 |
Author(s):Hema S Meharwade, Veena S, Arathi R Shankar | Download |
2. | A LOW POWER FUSED ADD-MUTIPLY DESIGN BASED ON BOOTH RECODER | Pg. 6-11 |
Author(s):Vidya Baby; S.Prabhavathy | Download |
3. | A Wearable Cuff-less system for Continuous Monitoring of Blood Pressure | Pg. 12-15 |
Author(s):V.Ramesh Kumar; N.Salmaan; A.E.J.Sangeeth Raj | Download |
4. | Mechanical Properties of African mahogany (Khaya Senegalensis) Seeds | Pg. 16-21 |
Author(s):Usman, D. D; Ibrahim, M. E ; Yakubu, I. T; & Kabri, U. H | Download |
5. | Defending Network Identification for Browsers against web spoofing Attack Technique | Pg. 22-26 |
Author(s):Anil Tamrakar;Dr.K.N Singh;Suraj Prasad keshri | Download |
6. | Interference Mitigated Wireless Body Area Network System Using Windows Platform | Pg. 27-28 |
Author(s):C.Sathish Kumar; Chinju Das; Christo Baby; Kripa Maria Jose; Rehana P Ponnal | Download |
7. | Cloud Based Instant File Sharing System in Wireless College Campus Environment | Pg. 29-32 |
Author(s):Alfaz Memon ; Supriya Brahme ; Saurabh Khairnar ; Kunal Ahire | Download |
8. | A SURVEY ON DIFFERENT IMAGE SEGMENTATION TECHNIQUES AND K-MEANS ALGORITHM | Pg. 33-36 |
Author(s):A.Indhuja; V.Arunraj; L.R.Angeeth; S.Dhanalakshmi | Download |
9. | Energy Efficient Scheduling For Wimax Network | Pg. 37-43 |
Author(s):Anu Paul ; Anagha P ; Dr. M.Umaparvathi | Download |
10. | ENTERPRISE RESOURCE PLANNING FOR AUTOMOBILES | Pg. 44-47 |
Author(s):Ms. RuchitaMandal ;Ms.Monika Bagade ;Ms.Saylee Kamble ; Ms. Sayali Khapekar | Download |
11. | Comparison of Emotion Recognition Models in Spoken Dialogs | Pg. 48-54 |
Author(s):Preedhi Garg; Smriti Sehgal | Download |
12. | Case Study of Glue Code using .Net Platform | Pg. 55-59 |
Author(s):Manbir Kaur ;Gurpreet kaur | Download |
13. | Efficient Algorithm to Detect Email Date/Time Spoofing Technique using phishing attacks | Pg. 60-63 |
Author(s):Deepak Kumar Patel; Dr.K.N Singh; Suraj Prasad keshri | Download |
14. | Model to Create Virtualization of cloud Server using Hypervisor based Technology | Pg. 64-67 |
Author(s):Mohammad Istekhar; Dr.K.N Singh; Suraj Prasad keshri | Download |
15. | Improving Data Privacy through User Behavior Key Policy with Attribute-Based Cryptosystem | Pg. 68-71 |
Author(s):Mrs. Indira Shailendra Chadar ; Mr. Mohsin Sheikh | Download |
16. | STUDY OF WEIGHT OPTIMIZATION ON SPAR BEAM FOR THE WING OF AN AIRCRAFT | Pg. 72-79 |
Author(s):N.Maheswaran ; S.P.Venkatesan ; M.S.Sampath Kumar ; G.Velmurugan ; N.Sathishkumar ; M.Priya | Download |
17. | Multi-View Facial Expression Recognition Based on Group Sparse Reduced-Rank Regression | Pg. 80-84 |
Author(s):G.RAJA GOPAL | Download |
18. | 2D IMAGE CONTRAST ENHANCEMENT BASED ON LAYERED DIFFERENCE REPRESENTATION | Pg. 85-89 |
Author(s):M.Palpandian ;G.Muthulakshmi | Download |