ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login
Archived Papers for Journal

International Journal of Computational Engineering Research(IJCER) >>

Vol.6, No.3

Publisher: IJCER

Publishing Date: 2015-03-31

  1. Secure Spectrum Sensing In Cognitive Radio Sensor Networks: A Survey

    Authors: Laila Nassef; Reemah Alhebshi

  2. A survey on multiple access technologies beyond fourth generation wireless communication system

    Authors: S.Chiranjeevi Reddy; K Ramprasad; ReddiBasha G

  3. The Parallel Architecture Approach, Single Program Multiple Data (Spmd) Implementation on Clusters of Terminals Using Java Rmi

    Authors: Sudhir Kumar Meesala; Pabitra Mohan Khilar; A. K. Shrivastava

  4. Maintenance and Performance Analysis of Draglines Used In Mines

    Authors: D. Vidyasagar; Dinkar B. Kishorilal

  5. Automation of Wheelchair Using Iris Movement

    Authors: Ashwini A. Nashte; S. S. Savkare; S. G. Kole

  6. Textile application in bio-potential recording used for medicinal purposes: an overview

    Authors: Tasnim N. Shaikh; S. B. Chaudhari; B. H. Patel; Megha Patel

  7. Double feedback technique for reduction of Noise LNA with gain enhancement

    Authors: K. RAJU M.Tech; R.SIREESHA M.Tech; K.VIJAY KUMAR M.Tech

  8. Robotic Soldier with EM Gun using Bluetooth Module

    Authors: AshteshDivakar; Prathamesh Rane; Rahul Bane

  9. Market Challenges for Pumped Storage Hydropower Plants

    Authors: Milan Ćalović; Dejan Mandić; Miodrag Mesarović

  10. A NOVEL BOOTH WALLACE MULTIPLIER FOR DSP APPLICATIONS

    Authors: Juny Mary Jose; Reen Paul

  11. An Comprehensive Study of Big Data Environment and its Challenges

    Authors: Saravanan.C

  12. On intuitionistic fuzzy

    Authors: Saranya M; Jayanthi D

  13. Experimental Investigation of Multi Aerofoil Configurations Using Propeller Test Rig

    Authors: Arun Prakash.J; Vishnu.V; Sathish Kumar; Sanjay Kumar.G

  14. Targeted Visual Content Recognition Using Multi-Layer Perceptron Neural Network

    Authors: Meer Tayyab Ali Moosavi; RafiahTabassum; Perisetti Sravani; Panuganti Devi Mounika; Lingam Harish Babu; Dr.P.S.Suhasini; P.Venkata Ganapathi.

  15. MINIMIZING LOCALIZATION ERROR AND ENSURE SECURITY OF DVHOP APPROACH

    Authors: Priyanka Arora; Kantveer

  16. Ontology-Based Approach for Knowledge Retrieval in Al-Quran Holy Book

    Authors: Azman Ta'a; Qusay Abdullah Abed; Bashah Mat Ali; Muhammad Ahmad

  17. Detection of Various Attacks Using Zero Knowledge Protocol in Wireless Security

    Authors: Ibrahim Aziz Patwekar

  18. Lightning Acquisition and Processing On Sensor Node Using NI cRIO

    Authors: Harshit Devakumar; Ajay Khandare; Dr. Panse

  19. Detection of Various Attacks using Zero Knowledge Protocol in Wireless Security

    Authors: Ibrahim Aziz Patwekar; V. C. Kotak

  20. An Optimized Parallel Mixcolumn and Subbytes design in Lightweight Advanced Encryption Standard

    Authors: Mary James; Deepa S Kumar

  21. Robotic Soldier with EM Gun using Bluetooth Module

    Authors: AshteshDivakar; Prathamesh Rane; Rahul Bane

  22. Analysis of UHF ISO/IEC 14443 Gen 2 RFID Technology

    Authors: Deepika K; Usha J

  23. Achieving Energy Efficiency of HVAC through Variable Frequency Drive

    Authors: Sumant Deshpande; Dr Mohan Buke

  24. Simulation of Critical Crack Length Propagation Using Fracture Mechanics

    Authors: DEGALA RAJENDRA; P RAVICHANDER R V PRASAD

  25. TYPE-2 FUZZY LINEAR PROGRAMMING PROBLEMS WITH PERFECTLY NORMAL INTERVAL TYPE-2 RESOURCE

    Authors: A.Srinivasan; G.Geetharamani

  26. Human Identification by Segmentation and Enhancement of Sclera using Matlab

    Authors: P.V RAMA RAJU; T. MADHURI; T.LAKSHMI KANTH; V.USHA SREE