1 |
Survey on Auditing Mechanism for Preserving Privacy in Cloud Computing
Harsha B. Patil
|
 |
 |
2 |
Review: Power Management Schemes for WiFi Communication
Wrushali D. Warshe
|
 |
 |
3 |
Text Independent Speaker Modeling and Identification Based On MFCC Features
Khurrath-ul-aien M.R
|
 |
 |
4 |
Comparison of LEACH protocol with Wormhole Attack and without Wormhole Attack in Wireless Sensor Net
P.Mahalakshmi
|
 |
 |
5 |
An Effective Colour Interpolation in CFA Images using Adaptive Enhancement Technique and SIFT Design
Punitha M
|
 |
 |
6 |
Fatigue Evaluation of Reinforced Concrete Highway Bridge
Habeeba A
|
 |
 |
7 |
Design and Implementation Radix-8 High Performance Multiplier Using High Speed Compressors
M.Satheesh
|
 |
 |
8 |
Reducing Rejection Rate by Applying Varying Parameters on Crankcase through Investment Casting Metho
Hardik R Mehta
|
 |
 |
9 |
Single Phase AC-DC Converter Employing Power Factor Correction Using High Frequency Isolation Using
Yogesh Dagur
|
 |
 |
10 |
Reproducing a Human Body from Image by Coarse to Fine Technique
Priyanka V.Thakare
|
 |
 |