Volume: 2 | Issue: 09

Published: 2018-01-01 10:39:50


Harmonics Compensation of HAPF with Adaptive Fuzzy Dividing Rule

Mr.Polisetti Sudheer, \ Dr.S.Satyanaraya,
International Journal of Engineering and Computer Science  |  Published: 3 September 2013
Full text PDF

A Study on Semantic Web Mining And Web Crawler

S.Balan, Dr.P.Ponmuthuramaling,
International Journal of Engineering and Computer Science  |  Published: 30 September 2013
Full text PDF

A Data Mining Technique for Prediction of Coronary Heart Disease Using Neuro-Fuzzy Integrated Approach Two Level

Ashish Kumar Sen1 Shamsher Bahadur Patel Dr. D. P. Shukla
International Journal of Engineering and Computer Science  |  Published: 30 September 2013
Full text PDF

Development of Inventory Database System Using Radio Frequency Identification

N. Ishak, N. A. Ali, A. S. Ja’afar , S. H. Husin N. M. Z. Hashim,
International Journal of Engineering and Computer Science  |  Published: 30 September 2013
Full text PDF

Achieving Anonymity and Traceability in Wireless Networks

R. Manasa, Annapurna, G.Sowmya,
International Journal of Engineering and Computer Science  |  Published: 30 September 2013
Full text PDF

Contrast Enhancement Image Fusion With Using Gaussian Filter

Mandeep Kaur, Navpreet Singh,
International Journal of Engineering and Computer Science  |  Published: 30 September 2013
Full text PDF

Energy-Efficient Strategies for Cooperative Multichannel MAC Protocols

P.V.Naga Lakshmi B.Sasmitha C.Rama Krishna,
International Journal of Engineering and Computer Science  |  Published: 30 September 2013
Full text PDF

Faulty Node Detection in Multirate anypath Routing Protocol in Multi-Hop Wireless Networks

S.B.Manooj kumar, Dr.A.Kathirvel,
International Journal of Engineering and Computer Science  |  Published: 30 September 2013
Full text PDF

Towards Automated design of Combinational Circuits Using Evolutionary Techniques

K.Sagar, Dr.S.Vathsal,
International Journal of Engineering and Computer Science  |  Published: 30 September 2013
Full text PDF

Iris Segmentation and Recognization Using Log Gabor Filter and Curvelet Transform

K.Sathiyaraja, M.Dhineshkumar, N.Thiyagarajan,
International Journal of Engineering and Computer Science  |  Published: 30 September 2013
Full text PDF

An Efficient Twisted Edwards-Form Elliptic Curve for Fast Secured Message Passing Interface

P.Ramyadevi, Dr. P Krishnakumari,
International Journal of Engineering and Computer Science  |  Published: 30 September 2013
Full text PDF

Recommendation Diversity using Optimization Techniques and Ranking Method

S.Manimekalai, V.Kathiresan, P.Sumathi,, S.Manimekalai, V.Kathiresan, P.Sumathi,
International Journal of Engineering and Computer Science  |  Published: 30 September 2013
Full text PDF

Load Balancing Parallel Routing Protocol in Mobile Ad Hoc Network

M.Selladevi, P.Krishnakumari,
International Journal of Engineering and Computer Science  |  Published: 30 September 2013
Full text PDF

A DISCRETE CHAOTIC ENCRYPTION ALGORITHM USING LORENZ ATTRACTOR

1Rahul Ramakrishna, Rajeswari Seshadr,
International Journal of Engineering and Computer Science  |  Published: 30 September 2013
Full text PDF

Multi-criteria Recommender systems for Open Authorization

A.Ravali, G. sudhakar,
International Journal of Engineering and Computer Science  |  Published: 30 September 2013
Full text PDF

NETWORK ADVANCEMENT in 4G: TD-LTE Technology

Anu Rathi, Pulkit Narang, Sachin Kumar Rai, Mohita Aggarwal Meghna Kalra,
International Journal of Engineering and Computer Science  |  Published: 30 September 2013
Full text PDF

Risk aware and ALERT protocol for mitigating routing attacks in Mobile Ad hoc Networks

D. Francis Xavier Christopher, R.Nithya,
International Journal of Engineering and Computer Science  |  Published: 30 September 2013
Full text PDF

Network Coding as an Efficient Technique of Transmitting Data

Khundrakpam Johnson Singh, Usham Sanjota Chanu,
International Journal of Engineering and Computer Science  |  Published: 30 September 2013
Full text PDF

OBLIGING EVINCIBLE DATA CHATTELS FOR VERIFICATION IN DISTRIBUTED CLOUD APPLICATION

B.Nagalakshmi, Mr. Ramakrishna
International Journal of Engineering and Computer Science  |  Published: 30 September 2013
Full text PDF

Graphical Password or Graphical User Authentication as Effective Password Provider

Khundrakpam Johnson Singh, Usham Sanjota Chanu,
International Journal of Engineering and Computer Science  |  Published: 30 September 2013
Full text PDF

Paradigm shift for Project Managers in Agile Projects

Vakalanka Sai Phani Chandu Bharani Manapragada
International Journal of Engineering and Computer Science  |  Published: 30 September 2013
Full text PDF

Prevention of Selective Jamming Attacks Using Swarm intelligence Packet-Hiding Methods

R.karpagam, P.Archana,
International Journal of Engineering and Computer Science  |  Published: 30 September 2013
Full text PDF

Security Analysis Using Batch Verification Scheme

S.Alonshia, K.Ravikumar,
International Journal of Engineering and Computer Science  |  Published: 30 September 2013
Full text PDF

Software Product Development—an Approach Using Scrum

Vakalanka Sai Phani Chandu, Bharani Manapragada
International Journal of Engineering and Computer Science  |  Published: 30 September 2013
Full text PDF

ANALYSIS OF VULNERABILITY IN INTERNET FIREWALL USING RULE BASED ALGORITHM

T.Maheswari, Mr. A. Senthil Kumar
International Journal of Engineering and Computer Science  |  Published: 30 September 2013
Full text PDF

A Survey on LSB Based Steganography Methods

M. Pavani, S. Naganjaneyulu, C. Nagaraju,
International Journal of Engineering and Computer Science  |  Published: 30 September 2013
Full text PDF

Efficient Master /Slave Computing Using Threshold Value Specification

D.Deeba, A.Senthilkumar,
International Journal of Engineering and Computer Science  |  Published: 30 September 2013
Full text PDF

Detection of Flash Crowd Attack Based On Router Values Using Alarm Fixation

P.Sakila, ,A.Senthilkumar,
International Journal of Engineering and Computer Science  |  Published: 30 September 2013
Full text PDF

Survey On Vehicle And Toll Plaza For National Highways In India

Sathya.V , Abdul Samath.J,
International Journal of Engineering and Computer Science  |  Published: 30 September 2013
Full text PDF

PREVENTION OF TRESPASSER ACCESSING IN NETWORKS USING TICKET GRANTING SERVICE

C.Jayalakshmi, Mr. A. Senthil Kumar
International Journal of Engineering and Computer Science  |  Published: 30 September 2013
Full text PDF

Leakage Power Reduction by Using Sleep Methods

Vinay Kumar Madasu, B Kedharnath,
International Journal of Engineering and Computer Science  |  Published: 1 January 2018
Full text PDF

Power Efficient, High Performance SRAM array in 90nm CMOS Process

Ajay Kumar Singh, Mah Meng Seong,
International Journal of Engineering and Computer Science  |  Published: 1 January 2018
Full text PDF

Advanced Technique for Removal Of Salt & Pepper Noise In Images

Abhishek R , Srinivas N,
International Journal of Engineering and Computer Science  |  Published: 1 January 2018
Full text PDF

Sensitive Data Storage in Wireless Devices Using AES Algorithm

Anjali Patil, Rajeshwari Goudar,
International Journal of Engineering and Computer Science  |  Published: 1 January 2018
Full text PDF

A Comparative Study of Cloud based ERP systems with Traditional ERP and Analysis of Cloud ERP implementation

C.M. Navaneethakrishnan
International Journal of Engineering and Computer Science  |  Published: 1 January 2018
Full text PDF

User Access Control for Online Social Networks

Narayana Naidu Pachava, Sd. Akthar P. Babu,
International Journal of Engineering and Computer Science  |  Published: 1 January 2018
Full text PDF

Implementation of Saurp for Mobile Network

Krishna Sowmya Chinta, SD Afzal Ahmed P. Babu ,
International Journal of Engineering and Computer Science  |  Published: 1 January 2018
Full text PDF

A Survey of Various Method to improve the throughput of Zigbee Cluster Tree Networ

Mayuri Singhal , Neeraj Mehta,.
International Journal of Engineering and Computer Science  |  Published: 1 January 2018
Full text PDF

← View all issues

Author Resources