Sr/ No |
Title |
Pdf |
1 |
Dimensionality Reduction using Clustering
for Text Categorization
Ch. Aparna, S.J.R.K.Padmini Valli V |
|
2 |
Analyzing Network Data Usage through SNMP
G.Praneeth Kumar,M.R.Narasinga Rao |
|
3 |
An Effective Comprehensive Approach of Intrusion Detection System for AMI
Dr. A. Srinivasa Rao ,Pamidi Anil Kumar |
|
4 |
Analysis of MIMO techniques for Space-Time Block Coded Spatial modulation
Miteshkumar K. Chaudhari , Kunal M. Pattani , Bhavin I. Patel
|
|
5 |
Implementation and Comparative Analysis of different Vertical handoff algorithm for WLAN and 3G.
Bhaumik S. Khakhil, K.M.Pattani
|
|
6 |
Data Mining Tools and Technologies used for Competitive Intelligence
Jogi.Suresh, T.Ramanjaneyulu, Ch.Trinath |
|
7 |
VLSI Implementation of Weighted Modulo 2n+1 Adder
Jyothi Kamatam, Kumaraswamy Gajula |
|
8 |
Modified interference reduction technique in WCDMA using cell resizing.
Miss Neeraj Malik, Naveen Kumar Malik, Ms. Babita
|
|
9 |
Minimizing Delay and Maximizing Lifetime for WSN
Ms. NEERAJ , Ms. MONIKA , GAURAV |
|
10 |
Efficient Image Super Resolution Algorithm based on LMMSE filter & Interpolation for Natural Images
RAMEEZ R BELIM, DHARMESH N KHANDHAR |
|
11 |
Analysis of Sierpinski carpet multiband Fractal antenna for wireless applications
Hitesh H. Mathukiya,Kalpesh R. Ranipa |
|
12 |
Fuzzy Similarity and ID3 algorithm for anti-spam Filtering
Binsy Thomas, Dr. J.W.Bakal |
|
13 |
Research of Modern Embedded Computer System Challenging Program Techniques for the Global Computer Science & Engineering Applications of Distributed Computing for 2012-2013
Bedre Heeramani, B.Nagaraj |
|
14 |
Feature Selection Algorithms for various Dataset
Dr. J.W.Bakal , Ashwini Deshmukh |
|
15 |
CFS and Improved CFS: CFS-SSCFS and Improved CFS: CFS-SS
Dr. J.W.Bakal , Ashwini Deshmukh |
|
16 |
A Conceptual Framework for Analysing the Entry Points to SOA Adoption of a CRM Process
Prasenjit Kundu , Bikram Kesari Ratha, Debabrata Das |
|
17 |
A Survey of XML Tree Patterns
P.Sravanthi, D.Padma |
|
18 |
Design of Online protection strategy for huge
Social Networks
Aramandla Sameera,Ch.Aparna |
|
19 |
Secured Cloud Storage from Single Cloud to Multi Cloud
ravi Kumar Kuchipudi, yengala Amaraiah |
|
20 |
Slicing: A New Approach to Privacy Preserving
Data Publishing
CH.Krishna Prasad, T.Sravanthi |
|