Archived Papers for Journal
International Journal of Computational Engineering Research(IJCER) >>
Vol.6, No.3
Publisher: IJCER
Publishing Date: 2015-03-31
- Secure Spectrum Sensing In Cognitive Radio Sensor Networks: A SurveyAuthors: Laila Nassef; Reemah Alhebshi
- A survey on multiple access technologies beyond fourth generation wireless communication systemAuthors: S.Chiranjeevi Reddy; K Ramprasad; ReddiBasha G
- The Parallel Architecture Approach, Single Program Multiple Data (Spmd) Implementation on Clusters of Terminals Using Java RmiAuthors: Sudhir Kumar Meesala; Pabitra Mohan Khilar; A. K. Shrivastava
- Maintenance and Performance Analysis of Draglines Used In MinesAuthors: D. Vidyasagar; Dinkar B. Kishorilal
- Automation of Wheelchair Using Iris MovementAuthors: Ashwini A. Nashte; S. S. Savkare; S. G. Kole
- Textile application in bio-potential recording used for medicinal purposes: an overviewAuthors: Tasnim N. Shaikh; S. B. Chaudhari; B. H. Patel; Megha Patel
- Double feedback technique for reduction of Noise LNA with gain enhancementAuthors: K. RAJU M.Tech; R.SIREESHA M.Tech; K.VIJAY KUMAR M.Tech
- Robotic Soldier with EM Gun using Bluetooth ModuleAuthors: AshteshDivakar; Prathamesh Rane; Rahul Bane
- Market Challenges for Pumped Storage Hydropower PlantsAuthors: Milan Ćalović; Dejan Mandić; Miodrag Mesarović
- A NOVEL BOOTH WALLACE MULTIPLIER FOR DSP APPLICATIONSAuthors: Juny Mary Jose; Reen Paul
- An Comprehensive Study of Big Data Environment and its ChallengesAuthors: Saravanan.C
- On intuitionistic fuzzy Authors: Saranya M; Jayanthi D
- Experimental Investigation of Multi Aerofoil Configurations Using Propeller Test RigAuthors: Arun Prakash.J; Vishnu.V; Sathish Kumar; Sanjay Kumar.G
- Targeted Visual Content Recognition Using Multi-Layer Perceptron Neural NetworkAuthors: Meer Tayyab Ali Moosavi; RafiahTabassum; Perisetti Sravani; Panuganti Devi Mounika; Lingam Harish Babu; Dr.P.S.Suhasini; P.Venkata Ganapathi.
- MINIMIZING LOCALIZATION ERROR AND ENSURE SECURITY OF DVHOP APPROACHAuthors: Priyanka Arora; Kantveer
- Ontology-Based Approach for Knowledge Retrieval in Al-Quran Holy BookAuthors: Azman Ta'a; Qusay Abdullah Abed; Bashah Mat Ali; Muhammad Ahmad
- Detection of Various Attacks Using Zero Knowledge Protocol in Wireless SecurityAuthors: Ibrahim Aziz Patwekar
- Lightning Acquisition and Processing On Sensor Node Using NI cRIOAuthors: Harshit Devakumar; Ajay Khandare; Dr. Panse
- Detection of Various Attacks using Zero Knowledge Protocol in Wireless SecurityAuthors: Ibrahim Aziz Patwekar; V. C. Kotak
- An Optimized Parallel Mixcolumn and Subbytes design in Lightweight Advanced Encryption StandardAuthors: Mary James; Deepa S Kumar
- Robotic Soldier with EM Gun using Bluetooth ModuleAuthors: AshteshDivakar; Prathamesh Rane; Rahul Bane
- Analysis of UHF ISO/IEC 14443 Gen 2 RFID TechnologyAuthors: Deepika K; Usha J
- Achieving Energy Efficiency of HVAC through Variable Frequency DriveAuthors: Sumant Deshpande; Dr Mohan Buke
- Simulation of Critical Crack Length Propagation Using Fracture MechanicsAuthors: DEGALA RAJENDRA; P RAVICHANDER R V PRASAD
- TYPE-2 FUZZY LINEAR PROGRAMMING PROBLEMS WITH PERFECTLY NORMAL INTERVAL TYPE-2 RESOURCEAuthors: A.Srinivasan; G.Geetharamani
- Human Identification by Segmentation and Enhancement of Sclera using MatlabAuthors: P.V RAMA RAJU; T. MADHURI; T.LAKSHMI KANTH; V.USHA SREE