Volume-4 Issue-2, July 2014
- Version
- Download 48
- File Size 4.00 KB
- Create Date July 30, 2014
- .
Volume-4 Issue-2, July 2014, ISSN: 2278-3075 (Online) Published By: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP)
Preparation of Activated Carbon from the Stem of the Natural Plant Vitex Negundo and Evaluation of Their Physical and Chemical Properties A. Arun Kumar1, T. Chandra Sekaran2, K. Riaz Ahamed3Secure Search Engine for Mobile Users for Countering the Attacks over Internet Mohan Gowda G S1, Janardhan Singh2
Evaluation and Analysis of Active RFID Protocol in Wireless Sensor Networks Kiranpal Kaur1, Naveen Kumari2
Performance Optimized DCT Domain Watermarking Technique with JPEG Jyoti Rani1, Tazeem Ahmad Khan2
A Novel Approach to Trustable Data Storage in Cloud Computing Vegi Srinivas1, V. Valli KumariS2
Arm 7 Based Theft Control, Accident Detection & Vehicle Positioning System M.S. Joshi1, Deepali V. Mahajan2
Improvement of Network Efficiency by Preventing Black Hole Attack in Manet Gurnam Singh1, Gursewak Singh2
Design of Op-amp, Comparator and D Flip-Flop for Fifth Order Continuous-Time Sigma-Delta Modulator Sunita Arvind Rathod1, Siva Yellampalli2
Big Data: Challenges and Opportunities Anuranjan Misra1, Anshul Sharma2, Preeti Gulia3, Akanksha Bana4
Optimizing Big Data Anuranjan Misra1, Anshul Sharma2, Preeti Gulia3, Akanksha Bana4
Optimization of Stereolithography Process Parameters for Part Strength using Taguchi Technique Raju B. S1, Chandra Sekhar U2, Drakshayani D. N3
Impact Toughness of Concrete Reinforcement Bars Produced by the THERMEX Process and Ordinary Rolling Process Mohammad Sharear Kabir1, Md Moinul Islam2, Md Mohar Ali Bepari3
Use of Overhead Water Tank to Reduce Peak Response of the Structure Bhosale Dattatray1, G. R. Patil2, Sachin Maskar3
Linear-Quadratic Regulator Control for Human Following Robot in Straight Path Chetan Naik J1, S. L. Pinjare2, Jharna Majumdar3
Level-Based Data Security Model in Cloud Computing Kanupriya1, Meenakshi Sharma2
Enhanced Information Security using DNA Cryptographic Approach Abhishek Majumdar1, Meenakshi Sharma2
A New Approach of Intrusion Detection System with a Combination of Multilevel and Multiagent Arpita Biswas1, Meenakshi Sharma2
Evaluation of an Energy Efficient Cluster Based Routing in MANET Jaspinder Singh1, Meenakshi Sharma2
Code Quality Evaluation for Open Source Software System Ravinder Kaur1, Meenakshi Sharma2, Hardeep Singh3
Frequent Pattern Mining for XML Query-Answering Support Alfiya Iqbal Ahmed Shaikh1, Sanchika Bajpai2
Performance of Concrete Walls with Waste and Recycling Materials for Industrial Building Systems Seyed Yaser Mousavi Siamakani1, Abdul Kadir Bin Marsono2, Neelam Memon3, Shariwati Binti Mansor4, Hares Nikookar5
