Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Home
About the Journal
Editorial Team
Editorial Process
Publication Ethics
Reviewers Guidelines
Mode of Payment
Call For paper
Author Instruction
Terms and Condition
Peer Review Process
Privacy Policy
Authorship Criteria
Contact
Refund and Cancellation Policy
Copyright Policy
Journal Scope
Plagiarism Policy
Online Submissions
Archives
Current Issue
Search
Search
Online Submissions
Contact
Register
Login
Search
Search
Home
/
Archives
/
Vol. 3 No. 2 (2015)
Vol. 3 No. 2 (2015)
Published:
2015-04-28
Articles
On Screen Randomized Keyboard with Virtual Password Functions
Neenu N A1, Sruthy Manmadhan2
FULLTEXT PDF
A Review: an analysis of Artificial Neural Network System
Kriti Changle
FULLTEXT PDF
E-Authentication Security Mode by Using Token System
Neha Sharma
FULLTEXT PDF
Effects of Climate Change on Built Environment in Lagos, Nigeria
Anthony Nkem Ede1 Kolapo Kayode Adeyemi2 Opeyemi Joshua3
FULLTEXT PDF
Noisy elimination for web mining based on style tree approach
Deepa.R1 , Nirmala Devi.R2
FULLTEXT PDF
English as a Tool of Global Change in the Field of Business Communication
Mr. Gaurav Yadav
FULLTEXT PDF
E Yield Prediction Precision of Rose Flower Recognition Using Segmentation
Rupinder Kaur
FULLTEXT PDF
Data Collection using Artificial Intelligence on Wireless Sensor Networks
Hemkumar D1, Mohan Gowda V2, Deepa R3
FULLTEXT PDF
HMM BASED OFFLINE SIGNATURE FORGERY DETECTION
Md. Saif Farooqui1, Mr. Manish Madhav Tripathi2
FULLTEXT PDF
SWARM INTELLIGENCE
Praveenkumar Rai1, Gyanranjan Dubey2, Chinmay Hardikar3, Moresh Mukhedkar4
FULLTEXT PDF
Review on: Honey Spot for Analysing Network Security and Related Issues
Rohini Sharma
FULLTEXT PDF
LIMTM: A FRAMEWORK FOR ASSIMILATING LINK BASED IMPORTANCE INTO SEMANTICALLY COHERENT CLUSTERS OF CORRELATED WORDS
Kanagadurga Natarajan M.Sivasundaravinayagamoorthy
FULLTEXT PDF
Data Security and Privacy Protection with Cryptography in Cloud Computing
Akshita Sharma
FULLTEXT PDF
Review: Analysis and Comparison of Smartphone in cloud computing
1#Abhidha Agrawal, 2#Divya Hada
FULLTEXT PDF
Wireless Sensor Network Security: A Survey
1Abhishek Chaudhary, 2 Nalin Chaudhary, 3 Aasiya Khatoon
FULLTEXT PDF
ACCESS CONTROL SYSTEM USING ARM PROCESSOR AND FACE RECOGNITION
Mr. Rane D.B.1, Miss. Antre D.R.2, Miss. Deokar P.V.3, Miss. Gadekar S.H.4
FULLTEXT PDF
ARM Based Coin Dispensing Facility and Fake Note Detection
Anap S.D#1, Harde Vanita #2, Kharde Darshani #3, Modak Ram #4
FULLTEXT PDF
Web Image Re-Ranked Specified From User Query Keywords
R.Deeba1, M.Siva Sundara Vinayaga Moorthy2
FULLTEXT PDF
Cell Phone Tower Management and Base Station Safety using GSM Technology
Akshay N. Hedaoo1, Paramodini P. Patil2, Kiran D. Rathod3, Moresh M. Mukhedkar4
FULLTEXT PDF
Study of Spatial and Topographical Variation of Rainfall in Kerman Province in Iran using GIS
B.Mahalingam Amin Noori Deldar
FULLTEXT PDF
A Survey on Incremental Software Development Life Cycle Model
Ankit Thakur1, Deepti Singh2, Harish Chandra Maurya3
FULLTEXT PDF
Performance analysis based on Google App Engine and Amazon Web Service
Divya Hada , Abhidha Agrawal
FULLTEXT PDF
Enhancing Security for NFC- A Survey
Mr. Nikhil M. Shrangare1, Prof. S.A.Joshi2
FULLTEXT PDF
ASSESSMENT OF SPATIAL AND TEMPORAL CHANGES IN FOREST USING GIS AND REMOTE SENSING TECHNIQUES: A CASE STUDY OF SANGMESHWAR TALUKA, MAHARASHTRA, INDIA
Sardar Ananda Patil B.Mahalingam
FULLTEXT PDF
PREFDB: SUPPORTING PREFERENCES AS FIRST-CLASS CITIZENS IN RELATIONAL DATABASES
Hariharan .G1, Kalai Selvam. M2 , S.Brintha Rajakumari3
FULLTEXT PDF
WIMAX Technology for Development of Rural Areas
Dr. K.A. Lathief
FULLTEXT PDF
EFFECT OF ENRICHMENT OF EXTRUDED PRODUCTS WITH DIFFERENT LEVELS OF WHEY PROTEIN CONCENTRATE (WPC) AND CASEINATES.
Thejaswini M. L H.G. Ramachandra rao
FULLTEXT PDF
An intelligent system for exam generation
A. F. Elgamal1, H. A. Abas2, E.A.Elayat3
FULLTEXT PDF
PRE-SERVICE TEACHER’S ATTITUDE TOWARDS USING CYBER RESOURCES
Dr. Reena Rani* Miss Manisha**
FULLTEXT PDF
Review: Flexible System Call (Flex SC) Scheduling with Exception-Less System Calls
Jyotshana Upadhyay, Ayushi Agrawal
FULLTEXT PDF
Survive of Social Networking System
Pinkey Sharma
FULLTEXT PDF
Extracting Weighted Frequent Patterns from Web Log Data
Priyanka Baraskar1, Supriya Chavan2, Dipshree Dhage3, Samruddhi Giri4, Jayshree Jha5
FULLTEXT PDF
Design and Analysis of Storage Element using different Technologies
1Hardeep Kaur, 1Sukhdeep Kaur, 2Er.Poonam Rani
FULLTEXT PDF
HARDWARE DEMONSTRATION OF SMART HOME ENERGY MANAGEMENT SYSTEM
Arti Kedar1, S. B. Somani2
FULLTEXT PDF
Security in Cloud Using Virtualization
Mr. Anil Kumar, Mr. Pradeep M
FULLTEXT PDF
Semiconductor Memories and its Faults
Mr. Neetin Sahu1, Mr. Chandrahas Sahu2, Miss Soumya Agrawal3
FULLTEXT PDF
The fuzzy intuitive sets in the decision-making
Zdeněk Půlpán1, Jiří Kulička2
FULLTEXT PDF
Survey of Image Denoising Methods using Double-Density Complex DWT
Shashank Kumar1, Prof. Yogesh Bahendwar2
FULLTEXT PDF
Turbine Penstock Model for analyzing variation of Length of penstock on mechanical power of Hydropower plant
Monika Soni, Simardeep kaur
FULLTEXT PDF
Review paper on Design of DFT using CORDIC algorithm
Mr. Ashwin D. Baragawane1, Mrs. P. Gajbhiye2
FULLTEXT PDF
Comparative study of Built in Self Test for memory
Mr. Neetin Sahu, Mr. Chandrhas Sahu
FULLTEXT PDF
Prediction of fatigue life of a connecting rod under variable loading using ansys
1Veeranjaneyulu Itha,2 Vajrala Venkata Reddy, 3Srikanth Karumuri
FULLTEXT PDF
Computational Modeling and Simulation of Thermodynamical and Structural Properties Using Different Reference Systems
1A. Maarouf, T. 1El hafi, 1Y. Madmoun, 1K. ELhasnaoui 2M. Ouarch
FULLTEXT PDF
SUITABLE LOCATION SITES FOR THE CONSTRUCTION OF UNDERGROUND DAMS OR HILL LAKES BY THE CONTRIBUTION OF GIS: APPLICATION TO THE PLAIN OF SAÏSS (North, MOROCCO)
1EL IBRAHIMI A., 2BAALI A., 1COUSCOUS A., 1EL KAMEL T., 3BOUDAD B.
FULLTEXT PDF
Make a Submission
Make a Submission
Information
For Readers
For Authors
For Librarians
Developed By
Open Journal Systems
Keywords