Visit Us On TwitterVisit Us On FacebookVisit Us On Linkedin

May

S.NO

TITLE & AUTHORSPAGE NO
1Inflation and Economic Growth: Inflation Threshold Level Analysis for Ethiopia
Authors: Dr.P. Nandeeswara Rao, Abate Yesigat
1-7
2Low Cost Briquetting of Metallurgical Dust Fines
Author: Praveen Mallampati
8-12
3Design of A Multiband Flexible Divider Using A Low Power Single Phase Clock Distribution Network
Authors: Sadaf Rukhsar, Mahesh R.K
13-16
4Design and Implementation High Speed with Compensation Circuit Using KOGGE Stone Adder Tree
Authors: Rubina Firdous, Mahesh R.K
17-20
5STATISTICAL TRAFFIC ANALYAIS MODEL FOR ANONYMOUS MANETs
Authors: Shashikanth Nayak, Dr. Amutha.S
21-27
6Majority Logic Fault Detection with Difference Set Cyclic Code and LDPC Codes for Memory Applications
Authors: Kubra Begum, Mahesh R.K
28-31
7User Recognition Based on Face using Local Binary Pattern (LBP) with Artificial Neural Network (ANN)
Authors: Abhilasha A Patil, Lakshmi Maka
32-35
8A Survey on Context Driven Activity Recognition and Analysis in Wide Area Surveillance
Authors: Anjana B H, Rashmi S R, Dr. R Krishnan
36-42
9An application, challenges and routing protocol in Mobile Ad-Hoc Network
Authors: Avinash patil, G.B.Hangargi
43-48
10VLSI Implementation of Fast Addition Using Quaternary Signed Digit Number System
Authors: Jyoti R Hallikhed, Mahesh R.K
49-53
11Comparative Analysis of PCA, DWT & Hybrid (PCA_DWT) Based Image Fusion Techniques
Authors: Jyothi, Dr. Lalitha Y. S
54-57
12Automated Lung Nodule Detection and Classification using Morphological Segmentation and Texture features
Authors: Veena Puranikmath, Dr. Lalita Y S, Shivaganga Patil
58-61
13Efficient Data Transmission Clustering Method Using Compressive Sensing for Wireless Sensor Networks
Authors: Nagraj, Dr. A R Aswatha
62-65
14Design of High Speed 64-Bit MIPS Soft-Core Processor
Authors: Suman B. Pujari, Devi Meenakshi
66-68
15Brain Image Severance Using Fuzzy Logic and Neural Networks for Tumor Exposure
Authors: Priyanka Koralli, Shivaganga Patil
69-72
16Microblaze implementation of hb-2 crypto system with its cryptosystem with its authentication protocol
Authors: Sapna S, Chandana B R
73-77
17Optimized hardware implementation of RC6 Algorithm on FPGA for Cloud Security
Authors: Smitha Rose Varghese, Nafeesath T P, Dr.Jose Alex Mathew
78-80
18Preserving Source Privacy And Massage Authentication In WSN
Authors: Sandeep Awale, Dr. A Sreenivasan
81-84
19Wavelet Based Image Fusion for Detection of Brain Tumor
Authors: Ambika, Shivaganga Patil
85-87
20Authenticated Secure Communication for Cognitive Radio Networks
Authors: Vamshi U R, Prof. Divya Shetty, Dr. Jose Alex Mathew
88-89
Paper uploading is in progress. Author(S) are requested to complete their paper formalities.

Leave a Reply

Your email address will not be published. Required fields are marked *