Visit Us On TwitterVisit Us On FacebookVisit Us On Linkedin

October

S.NOTITLE & AUTHORSPage No
1Design of QSD Number System Addition using Delayed Addition Technique
Authors: S.Mallesh, Dr.C.V.Narasimhulu
1-4
2Identity Based Detection of Spoofing Attackers in Wireless Networks and Practical Solutions
Authors: M.Venkateshwarlu, P.Rajendra Prasad, T.Madhu, Dr.T.Siva Sankar Reddy
5-11
3Data Mining Techniques for School Failure and Dropout System
Authors: K.Swathi, D.Sujatha
12-15
4The Architecture Design for Find Outing Vehicle Position System using Communication Networks
Authors: Sayed Shoyeb Mohiuddin, B. Satish Chandra
16-20
5Congestion control using Image Processing
Authors: Nagaraj Eshwaraj, Jagdish Mulge
21-23
6A High Speed Wallace Tree Multiplier Using Modified Booth Algorithm for Fast Arithmetic Circuits
Authors: S Sapna, Vamshi U R
24-28
7A Time-Area-Power Efficient High Speed Vedic Mathematics Multiplier using Compressors
Authors: Kishan.P, G. Sai Kumar
29-34
8Implementation of Area Effective Carry Select Adders
Authors: Narender. J, T. Naga Raju
35-42
9MIST Effective Masquerade Attack Detection in the Cloud
Authors: Tallapaneni Madhavi
43-46
10Privacy Preserving Based Cloud Storage System
Authors: V.Shravani, T.V.Ramanamma
47-50
11Preventing SQL Injection Attacks in Web Application
Authors: D.Spandana, Devi Prasad Mishra, Dr. S. Sreenatha Reddy ,Dr. Sandeep Singh Rawat
51-57
12Assessment of Raw Milk Quality by Neural Networking (N-N) Model in Macedonia Dairy Farms
Authors: Vesna Karapetkovska Hristova, Julijana Tomovska,M. Ayaz Ahmad,Biljana Trajkovska,Georgi Bonev
58-61
13Resource Allocation in MIMO – OFDM Communication System under Signal Strength Analysis
Authors: Shivageetha, G. Parameshwar
62-66
Paper uploading is in progress. Author(S) are requested to complete their paper formalities.

Leave a Reply

Your email address will not be published. Required fields are marked *