|
Programmatically Signing of JAR Files S. Nageswara Rao, G. Varaprasada Rao
|
View | Download | 1-7
|
|
|
Adaptive Image Search Based on CBIR K. Suresh Babu, K. Johnpaul
|
View | Download | 8-12
|
|
|
Detection of DDOS Attacks Using Snort Detection Nagoor Meerasaheb Lanke, CH. Raja Jacob
|
View | Download | 13-17
|
|
|
Comparative Study of Microstrip Antenna for Different Subsrtate Material at Different Frequencies Mrs. Punita Mane, Dr. S.A Patil, Mr.P.C.Dhanawade
|
View | Download | 18-23
|
|
|
Multi Targeted Graphical User Interface Compiler Sayali Ahire, Shubhangi Keskar, Shubhangi Devikar, Kalyani Gavade, Prof. H. H. Patel, D. V. Motghare
|
View | Download | 24-26
|
|
|
Extracting Query Search from XML Data Using FMADM Geddam. Manasadevi, G. Varaprasad Rao
|
View | Download | 27-33
|
|
|
Picture Interest Points Classification Using Innovative Group Formulations K. VenkateswaraRao, N. Venkatram
|
View | Download | 34-39
|
|
|
Enhanced Production of Cephalosporin by Adsorption of Cephalosporium Acremonium Spores on Various Support Materials A. Swaroopa Rani, Goutham Rao HRVN, A. Kiran Kumar, Tulasi CDSLN, Venkatesh .L
|
View | Download | 40-43
|
|
|
Effect of Tube Spacing on the Displacement Amplitude of Flow past an Inline and Staggered Tube Array Vimal D. Tandel, Rajesh V. Patil
|
View | Download | 44-49
|
|
|
Anti-Theft Tracking System and Security System for Automobiles using GSM and ARM B. Kiran Kumar, Mr. E. Venkat Reddy, Akbar Mohammad
|
View | Download | 50-55
|
|
|
Importance of Software Engineering Education Environment in Cloud Computing Rashid Husain
|
View | Download | 56-62
|
|
|
Metabolic Pathway Analysis Using Constraint Programming Howida Ali Abd Elgader, Mohamed Aboualhoda
|
View | Download | 63-69
|
|
|
Fault Node Recovery Algorithm for a Wireless Sensor Network Chaitrali Brahme, Srushti Gadadare, Rutushree Kulkarni, Pranjal Surana, Prof. M. V. Marathe
|
View | Download | 70-76
|
|