IJSHRE Volume 3 Issue 4
1. | Review on Fuzzy Relational Clustering Algorithm for Clustering Sentence-Level Text | Pg. 1-4 |
Author(s):Priyanka Tayade, Poorva Joshi, Shraddha Golhar, V.N.Dhawas | Download |
2. | Review on use of Intelligent Agents in Traffic Control System | Pg. 5-8 |
Author(s):Madhulika Pandey; Smriti Sehgal | Download |
3. | A Model to Detect Dynamic Virtual Execution on Untrusted Machine | Pg. 9-11 |
Author(s):Baby Afroz; Dr. K.N Singh; Suraj Prasad keshri | Download |
4. | A Model of Analysis Virtualization of Multi cloud Data Exchange privacy and security | Pg. 12-15 |
Author(s):Kaval Jeet Kour Saini; Dr. K.N Singh; Suraj Prasad keshri | Download |
5. | A Model of Advance Telecommunications Techniques For 5G Wireless Networks IPS | Pg. 16-19 |
Author(s):Neha Parveen; Dr. K.N Singh; Suraj Prasad keshri | Download |
6. | An Efficient Iris Recognition System using DCT Transform based on Feed Forward Neural Networks | Pg. 20-24 |
Author(s):Amrata Gupta, Mr. Sachin Mahajan | Download |
7. | A NOVEL ALGORITHM DUFP for MINING ASSOCIATION RULES in DYNAMIC DATABASES | Pg. 25-31 |
Author(s):Shahana Sheikh, Mr. Rupesh Patidar | Download |
8. | Performance Analysis of AlGaN/GaN HEMT with Asymmetrical passivation layer | Pg. 32-35 |
Author(s):Smitha G S ; Dr. Kiran Bailey; Narayan. T. Deshpande | Download |
9. | PINEAPPLE LEAF FIBER REINFORCED POLYMER COMPOSITE AS A REPLACEMENT FOR ABS PLASTICS IN INDUSTRIAL SAFETY HELMET SHELL – A REVIEW | Pg. 36-46 |
Author(s):N.Saravanan, P.Muthukumar, P.S.Sampath | Download |
10. | STUDY OF MAXIMUM POWER POINT TRACKING USING PERTURB AND OBSERVE METHOD FOR BOOST CONVERTER | Pg. 47-50 |
Author(s):Arpit Pandey, Abhijit Mandal | Download |
11. | Development of Tracker for Monitoring OCP based system using SV and OVM | Pg. 51-54 |
Author(s):Aneesh Kumar Ravuri, Radha R C | Download |
12. | Bi-share visual cryptographic technique an Implementation | Pg. 55-59 |
Author(s):Neha Prajapati, C S Satsangi | Download |
13. | Comparative Analysis on Maximum Power Point Tracking using Perturb and Observe Method for Boost and Buck-Boost Converter | Pg. 60-63 |
Author(s):Arpit Pandey, Abhijit Mandal | Download |
14. | Introduction to Buffer Overflow Attack | Pg. 64-68 |
Author(s):Nilesh Kunhare; Sanjay Kumar Tehariya | Download |
15. | Error-Resilient Video Communication Using AVC Over Wireless Networks | Pg. 69-74 |
Author(s):Priyanka Katti; Dr.K P Lakshmi | Download |
16. | An Algorithm For Detecting Brain Abcess In MRI Images | Pg. 75-79 |
Author(s):Krishna MuraliShyam G.N: Dr.A.Meera; Smitha P Ullal; Dr. Savithri Bhat | Download |
17. | ACOUSTIC ECHO CANCELLATION AND DENOISING USING ADAPTIVE FILTER AND DWT | Pg. 80-84 |
Author(s):Laxmikant; Shaila V Hegde | Download |
18. | Enhanced Algorithm For Tracking number Plate From Vehicle Using Blob Analysis | Pg. 85-88 |
Author(s):Shashikumar Naubadkar; Dr. A Meera | Download |
19. | A New Approach for Zone Identification on Printed Gujarati Text: Vertical Bar Method | Pg. 89-93 |
Author(s):Shweta Agravatt; Mukesh Goswami; Hardik Agravatt | Download |