ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login
Archived Papers for Journal

International Journal of Engineering Sciences & Research Technology (IJESRT) >>

Vol.2, No.3

Publisher: Somil Mayur Shah

Publishing Date: 2014-03-30

  1. A Novel FP-Tree Algorithm for Large XML Data Mining

    Authors: Amit Kumar Mishra

  2. A Two Tier Approach For Content Based Microscopic Image Retrieval System

    Authors: Packia lakshmi.T

  3. A Two Tier Approach For Content Based Microscopic Image Retrieval System

    Authors: Packia lakshmi.T

  4. A Survey On Nature Inspired Routing Algorithms For Ad Hoc Network

    Authors: Sushma

  5. Efficient iris Recognition System to Improve Performance Measure for live videos

    Authors: Suganya

  6. Privacy Preserving Data Using Overlapping Slicing and Attribute Partitioning

    Authors: Dr.Sugumar R

  7. A Survey on Modern Era’s Online Object Tracking Algorithms

    Authors: Khemraj Deshmukh

  8. Robust and Efficient Approach Based Face Recognition System Using Log Likely

    Authors: Karthikeyan

  9. Experimental Investigation of Combustion, Performance

    Authors: K.Balasubramanian

  10. Optimization of Solvent Extraction of Oil From Wild Bush Mango Seed

    Authors: Ejikeme

  11. Purchasing Behavior of the Customer Using Co-Miner Algorithm

    Authors: S.S.Suganya

  12. Study of the Index Properties

    Authors: T.K. Lohani

  13. Distributed Shared Virtual File System

    Authors: Shilpa D. Ghode

  14. Augmented Reality

    Authors: Trupti Lotlikar

  15. Deep Sea Fishermen Patrol

    Authors: Gayathri.

  16. Survey on Resource Allocation Methods in Cloud Computing

    Authors: Hilda

  17. Preventing Password Reuse

    Authors: Indu

  18. Artificial Life with Artificial Intelligence

    Authors: Isharat Ali

  19. Malware :RFID

    Authors: Ankur Kumar Bist

  20. An Effective Implementation of Load Balanced Routing Scheme

    Authors: Anjaly Sara Panicker

  21. Power Consumption Technique to Improve the Network Life Time in Wireless Sensor Network

    Authors: the Network Life Time in Wireless

  22. An Efficient Biometric Attendance System using Fingerprint Verification Technique

    Authors: Jayant Waman Gonnade; Sagar Kantilal Deore

  23. Power Consumption Technique to Improve the Network Life Time in Wireless Sensor Network

    Authors: N K Kaphungkui

  24. Synthesis of Novel Methylene Bis4] Triazoles as Antibacteria

    Authors: G.Lalitha; V.Manaiah

  25. Soldier Monitor

    Authors: Zeel D. Shah; Dinal A. Shah

  26. Accelerometer Based Gesture Driven Embedded System for Differently Abled

    Authors: Ganesh D. More; Pushkaraj V.

  27. Accelerometer Based Gesture Driven Embedded System for Differently Abled

    Authors: Ganesh D. More; Pushkaraj V.

  28. Accelerometer Based Gesture Driven Embedded System for Differently Abled

    Authors: Ganesh D. More; Pushkaraj V.

  29. Accelerometer Based Gesture Driven Embedded System for Differently Abled

    Authors: Ganesh D. More; Pushkaraj V.

  30. Accelerometer Based Gesture Driven Embedded System for Differently Abled

    Authors: Ganesh D. More; Pushkaraj V.

  31. Accelerometer Based Gesture Driven Embedded System for Differently Abled

    Authors: Ganesh D. More; Pushkaraj V.

  32. Minmal rp-open Sets and Maximal rp-open Sets

    Authors: Sellamuthu.M. S. Balasubramanian

  33. Minmal rp-open Sets and Maximal rp-open Sets

    Authors: Sellamuthu.M. S. Balasubramanian

  34. Spreading Codes Performance for Correlation Function Using MATLAB

    Authors: Divya Srivastava; R.K. Prasad

  35. Introducing Tsunami, Affected Area, Impacts and Prevention on Vigorous Tsunami in Cotal Areas of india

    Authors: Basant Rai

  36. Contra v-Closed Mappings

    Authors: S. Balasubramanian; P. Aruna Swathi Vyjayanthi

  37. The aim of this paper is to introduce and study the concept of Contra v interrelationship between other Contra

    Authors: Divya S Pattathuparambil

  38. Performance Analysis of Space Time Block Coded Spatial Modulation (STBC_SM)

    Authors: Sailesh Dubey; Aniket Kulshreshtha

  39. Contra v-Open Mappings

    Authors: S. Balasubramanian; C. Sandhya

  40. Optimized Replica Node Attack Detection

    Authors: Manickavasagam

  41. Optimized Replica Node Attack Detection

    Authors: Manickavasagam

  42. Optimizing Throughput for Distributed Systems in Wireless Sensor Networks

    Authors: Nandhini.G; Vinod.S

  43. A Survey on Low Power Memory Design Techniques

    Authors: Z. Mahesh Kumar

  44. A Survey on Low Power Memory Design Techniques

    Authors: Z. Mahesh Kumar

  45. A Survey on Low Power Memory Design Techniques

    Authors: Z. Mahesh Kumar

  46. Analysis of Automatic Aircraft Landing Using

    Authors: M. Pradhibha; T.V.U. Kiran Kumar; P. Thamarai

  47. Adaptive Lightweight ORS in Mobile Adhoc Networks

    Authors: J.Priscilla; S.Saravana Kumar

  48. Analysis of QPSK system with Zero- Forcing Equalizer

    Authors: Pragya Sharma

  49. Design of UWB Printed slot Antenna for Bluetooth, GPS & GSM Applications

    Authors: S.P.Shinde; M. M. Jadhav

  50. Performance Comparison of Physical Clock Synchronization Algorithms

    Authors: Z. Mahesh Kumar; R. Manjula

  51. Performance Comparison of Physical Clock Synchronization Algorithms

    Authors: Z. Mahesh Kumar; R. Manjula

  52. Performance Comparison of Physical Clock Synchronization Algorithms

    Authors: Z. Mahesh Kumar; R. Manjula

  53. Trees Outside Forest (TOF) in Pinjore Block of Panchkula District, Haryana

    Authors: Archana; K E Mothi Kumar

  54. Trees Outside Forest (TOF) in Pinjore Block of Panchkula District, Haryana

    Authors: Archana; K E Mothi Kumar

  55. Trees Outside Forest (TOF) in Pinjore Block of Panchkula District, Haryana

    Authors: Archana; K E Mothi Kumar

  56. A Comparative Study on Various Security Attacks in MANET

    Authors: V.Saravanan; A.Sumathi

  57. Effective Backbone Scheduling Replacement Algorithm

    Authors: D. Sharmila; R. Sujitha

  58. Authenticate the Centralized Network Using NIS(Network Information System)

    Authors: Upasna Chaudhary; Poonam Kshtriya

  59. Authenticate the Centralized Network Using NIS(Network Information System)

    Authors: Upasna Chaudhary; Poonam Kshtriya

  60. S.C.M.I.P - Software Controlled Monochromatic Image Painter

    Authors: Urvaksh K. Tavadia

  61. Paramount Real Estate through Android

    Authors: R.Sukanya; M.V Bramhananda Reddy

  62. Runoff Process Using By Overland Time of Concentration Model and

    Authors: G.V. Ramana; G. K.Viswanadh

  63. Band Width and Gain Optimization of a Wide Band Gap Coupled Patch Antenna

    Authors: Saurabh Jain; Vinod Kumar Singh

  64. Student Interaction Based on Smart MIWI Technology

    Authors: V.Vinothbabu; P. Thamarai

  65. Video Frame Extraction Process on Canny Edge Detector

    Authors: Dr.T.Arumuga Maria Devi