Article Block Based Information Hiding using Cosine, Hartley, Walsh and Haar Wavelets Authors :H. B. Kekre, Sudeep D. Thepade, Ratnesh N. Chaturvedi DOI : View Full Article
Article Robust LQR Control Design of Gyroscope Authors :Ashok S. Chandak, Anil J. Patil DOI : View Full Article
Article Securing Routing Protocol by Distributed Key Management and Threshold Cryptography in Mobile Ad hoc Network Authors :Neha Gupta, Manish Shrivastava DOI : View Full Article
Article Result Analysis of Proposed Image Enhancement Algorithm Based on a Self Organizing Map Network and Wavelet Transform Authors :Shobhit Verma, Hitesh Gupta DOI : View Full Article
Article Extracting Person Name, Date and Place from Text Documents Using LEX Tool Authors :Roohi Sharma DOI : View Full Article
Article A Secure Mechanism to Supervise Automotive Sensor Network by Client on Smart Phone Authors :T R Yashavanth, Ravi S Malashetty, V R Udupi DOI : View Full Article
Article Multi-Level Security for Automotive–RFID Based Technology with Lab VIEW Implementation Authors :Priya Darshini .V, Prakash.R, Prasannabalaje.S.M, Sangeetha Monica.T DOI : View Full Article
Article Attack Detection in Watermarked Images with PSNR and RGB Intensity Authors :Neha Chauhan, Akhilesh A. Waoo, P. S. Patheja DOI : View Full Article
Article Speech parameterization based on AM-FM model and its application in speaker identification using AANN Authors :D. Giften Francis Samuel, D. Synthiya Vinothini DOI : View Full Article
Article Credential Clustering in Parallel Comparability Frequency Amplitude Authors :Ameela.T, Kaleeswaran.D DOI : View Full Article
Article A Review of Protein-DNA Binding Motif using Association Rule Mining Authors :Virendra Kumar Tripathi, Hitesh Gupta DOI : View Full Article
Article A Survey of latest Algorithms for Frequent Itemset Mining in Data Stream Authors :U.Chandrasekhar, Sandeep Kumar. K, Yakkala Uma Mahesh DOI : View Full Article
Article Adaptive job Scheduling for Computational Grid based on Ant Colony Optimization with Genetic Parameter Selection Authors :Saurabh Mandloi, Hitesh Gupta DOI : View Full Article
Article A Survey of Middleware in different languages for Ubiquitous Services Authors :Neha Sharma, Usha Batra, Saurabh Mukherjee DOI : View Full Article
Article An Efficient Partition Technique to reduce the Attack Detection Time with Web based Text and PDF files Authors :Animesh Dubey, Ravindra Gupta, Gajendra Singh Chandel DOI : View Full Article
Article An Ensemble Method based on Particle of Swarm for the Reduction of Noise, Outlier and Core Point Authors :Satish Dehariya, Divakar Singh DOI : View Full Article
Article A Bandwidth-Efficient Cooperative Authentication and an En-route Filtering Scheme for Filtering Injected False Data in Wireless Sensor Networks Authors :T.R. Yashavanth, Ravi S Malashetty, Rashmi C.R DOI : View Full Article
Article Image Denoising based on Fourth-Order Partial Differential Equations: A Survey Authors :Anand Swaroop Khare, Ravi Mohan, Sumit Sharma DOI : View Full Article
Article Implement Security using smart card on Cloud Authors :Amish Kumar Aman, Vijay Prakash DOI : View Full Article
Article Association Rules Optimization: A Survey Authors :Anshuman Singh Sadh, Nitin Shukla DOI : View Full Article
Article Review of Information Authentication in Mobile Cloud over SaaS & PaaS Layers Authors :Vineet Guha, Manish Shrivastava DOI : View Full Article
Article Reactive Power Compensation in Transmission Line using Fuzzy Control Method: A Survey Authors :Yojna Saratkar, Arun Pachori DOI : View Full Article
Article An Efficient Image Denoising Method based on Fourth-Order Partial Differential Equations Authors :Anand Swaroop Khare, Ravi Mohan, Sumit Sharma DOI : View Full Article
Article Reactive Power Compensation on 132 KV Substation Using Soft Computing Techniques (Fuzzy Logic) Authors :Yojna Saratkar, Arun Pachori DOI : View Full Article