Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Home
About the Journal
Editorial Team
Editorial Process
Publication Ethics
Reviewers Guidelines
Mode of Payment
Call For paper
Author Instruction
Terms and Condition
Peer Review Process
Privacy Policy
Authorship Criteria
Contact
Refund and Cancellation Policy
Copyright Policy
Journal Scope
Plagiarism Policy
Online Submissions
Archives
Current Issue
Search
Search
Online Submissions
Contact
Register
Login
Search
Search
Home
/
Archives
/
Vol. 5 No. 3 (2017)
Vol. 5 No. 3 (2017)
Published:
2017-06-28
Articles
STUDY OF ESTIMATION OF DIRECTION OF ARRIVAL FOR TRANSMITTER ARRANGEMENT IN WIRELESS MOBILE COMMUNICATION
1Manish Kumar Goyal, 2Prof. Puran Gour
FULLTEXT PDF
Wireless Information and Power Transfer in Single-User OFDM System
Ayush Sabat1, Abhishek Bhardwaj1, ChintapalliSrivatsav1, Dr. Prabu K2
FULLTEXT PDF
Computer games and online journalism
Aleksander F. Ivanko, Mikhail A. Ivanko, Elena V. Kulikova; Julia M. Sultanova
FULLTEXT PDF
An Efficient and High Performance Multiplier Using Radix-4 Algorithm with Hybrid Carry Look Ahead Adder
[1]Vaheeda sayyad, [2]Nagarajakumari Nelam
FULLTEXT PDF
Non-Linear Finite Element Analysis of Steel Plate Retrofitted RC Beam Using ANSYS
Nandhu Prasad*1, Ramveer Tyagi2, John Hansdak3
FULLTEXT PDF
Review of Non-Linear Finite Element Analysis of Steel Plate Retrofitted RC Beam Using ANSYS
Nandhu Prasad*1, Ramveer Tyagi2, John Hansdak3
FULLTEXT PDF
Comparative Analysis for Gurmukhi and Devanagari Script at Word Level
Sapna Dhiman1, Rohit Sachdeva2, Sumeet Kumar3 , Neha Khanna4
FULLTEXT PDF
A protected and active Multi-keyword Ranked Search intend over Encrypted Cloud Records
Mr. T.Charan Singh1, Mrs. K. Jhansi2, Mrs. K. Praveena2
FULLTEXT PDF
A Floating Point Multiplier Design Using Karatsuba and Urdhva-Tiryagbhyam Algorithms for High Speed Applications
G. Mercy Joyce 1, A.Parvathi 2
FULLTEXT PDF
ANALYISING THE ENHANCED INTRUSION DETECTION SYSTEM
1Pankaj, 2Mr. Puneet Garg
FULLTEXT PDF
INTEGRATION OF MULTILAYER SECURITY ON CLOUD SERVER
1Preeti, 2Mr. Mahesh Kumar
FULLTEXT PDF
ENHANCING IRIS BASED SECURITY SYSTEM USING EDGE DETECTION MECHANISM
1 Pooja, 2 Mr. Mahesh Kumar
FULLTEXT PDF
Meta Data File Management System using BigData
Dr.Ch .GVN Prasad1, M. yashoda2 A.Mamatha3
FULLTEXT PDF
Internet of Things: Security Challenges and There Proposed Solutions
Vikas Kumar1, Dr. Neetu Sharma2
FULLTEXT PDF
Enhancement in K-Mean Clustering in Big Data
1Ritu, 2Mahesh Kumar
FULLTEXT PDF
Periodic Discrete Non-Binary Signals with Perfect Autocorrelation
A. V. Titov1 and G. J. Kazmierczak2
FULLTEXT PDF
Implementation on Integration of Biometric Technique to Security in Cloud Computing
Ankur Gupta1, Puneet Garg2
FULLTEXT PDF
Image Fusion Based on Transform Domain Techniques
Smt.M. Tirupathamma
FULLTEXT PDF
Increasing Interest of Power Engineering Students with Powerworld@ Simulator and Soft Computing Techniques
Fouzul Azim Shaikh
FULLTEXT PDF
Power System Grid Blackout Mitigation Using Branch Participation
Fouzul Azim Shaikh
FULLTEXT PDF
New Techniques for Prevention of Power System Collapse
Fouzul Azim Shaikh
FULLTEXT PDF
A study on process of Multi Data Agent of Web Log Files
Keshav Dev Gupta, Dr. Kavita
FULLTEXT PDF
SIMULATION OF C-OTA FOR LOW POWER APPLICATIONS
1Mohd Arshad, 2Mohd Ibrahim Siddique, 3Naresh Kumar, 4Naseem Rao
FULLTEXT PDF
A SURVEY ON TRUTH DISCOVERY METHODS FOR BIG DATA
Mr. Bastin thiyagaraj1, Dr. A. aloysius2
FULLTEXT PDF
Online Shopping: A study of buying behaviour of the consumer
Jaideep Singh
FULLTEXT PDF
WOMEN’S ROLE IN TOURISM AND HOSPITALITY INDUSTRY: PEOPLE’S PERCEPTION
Krishna Sharma
FULL TEXT PDF
Make a Submission
Make a Submission
Information
For Readers
For Authors
For Librarians
Developed By
Open Journal Systems
Keywords