1 |
A Literal Review of Android Software Development Technique
Srinivasan.J
|
1-4 |
|
2 |
A Study on the Usage of GSM Technology in Fire Safety Measurements
Srinivasan.J,Thirunavukarasu.M
|
5-8 |
|
3 |
Automated Identification Based On Seam Carving Technique And Set Partioning Techniqu..
S. Dhivya,S. Sathya
|
9-14 |
|
4 |
Implementation of GSM Technology in Prison Locker System
Srinivasan.J,Krishnamoorthy.M
|
15-18 |
|
5 |
MAXIMIZING THE NETWORK LIFETIME BY USING EFFICIENT POWER AWARE ROUTINGIN MANET
Durga.T
|
19-26 |
|
6 |
TAILTHEFT: MODELING AND REDUCING ENERGY CONSUMPTION FOR USER EQUIPMENTS IN CELLUL..
Suganya.S
|
27-32 |
|
7 |
WIRELESS VOICE CONTROLLED ROBOTICS ARM
R.ASWINBALAJI,A.ARUNRAJA
|
33-38 |
|
8 |
Study and Analysis of Spectrum Sensing Techniques and Implementation of Matched Filt..
VinothVenkatesh D,Banushree S,Amrin Z
|
39-45 |
|
9 |
ENHANCED LAUNCH-OFF SHIFT AND LAUNCH-OFF CAPTURE POWER REDUCTION IN TRANSITION FAUL..
C.Shirly Salomi,S.Premalatha
|
46-49 |
|
10 |
DESIGN OF ELC LOADED ULTRA WIDE BAND METAMATERIAL ANTENNA
B.Saravanya,R.Rajeswari
|
50-53 |
|
11 |
ENERGY EFFICIENT GCKNF-SM ALGORITHM FOR MOBILE SENSOR NETWORKS
B.Revathy,G.Rekha
|
53-57 |
|
12 |
Enhanced Prioritization Criteria and Evaluation Metric of t-way Combinatorial Intera..
Mrs. B. Vani,Dr. R. Deepalakshmi
|
58-63 |
|
13 |
Segmentation of Images Using Kernel Fuzzy C Means Clustering
T.Kanmani,L.Jawahar
|
64-71 |
|
14 |
A Novel Encryption Based Framework for Cloud Databases
T.Kavitha,A.Ajitha
|
72-80 |
|
15 |
DISCRETE POWER CONTROLLED BASED MACHINE TO MACHINE COMMUNICATION USING WIRELESS SE..
M.Vasim Babu,A.V.Ramprasad,A.Nasreen Banu
|
81-84 |
|
16 |
ENHANCED HIGH SPEED CAM ARCHITECTURE USING PARITY BIT BASED ML SENSING
M.SANTHOSHI,S.DHIVYA
|
85-90 |
|
17 |
Designing Genetic Algorithm for Network-on-chip architecture
N.RAMALAKSHMI,N.HEMALATHA
|
91-96 |
|
18 |
AN EFFICIENT DECODING ARCHITECTURE WITH IMPROVED ERROR CORRECTING TECHNIQUE FOR NA..
S.NARKISH HASHMA,S.SARANYA DEVI
|
97-103 |
|
19 |
DESIGN OF ENHANCED BIST ARCHITECTURE FOR INPUT VECTOR MONITORING
H.Sribhuvaneshwari,S.Selvi
|
104-109 |
|
20 |
Critical-Path Analysis and Low-Complexity Implementation of the LMS Adaptive Algorithm
S. Mofiya Fargana,G. Mahendran
|
110-114 |
|