![]() |
RefrigerationAuthors: A. SethPage No.: 01-03 | |
![]() |
Rapid Prototyping in CADAuthors: Pankaj DanodiaPage No.: 04-06 | |
![]() |
Study and Analysis of Channel Estimation Techniques in MIMO OFDM SystemAuthors: Deepika Sharma, Rajiv Chechi, Alka KalraPage No.: 07-10 | |
![]() |
Classifier Comparison for Defect Detection II Ceramic Tiles Using GLCMAuthors: Meenakshi Sharma, Gurleen SidhuPage No.: 11-15 | |
![]() |
Novel Technique Used for Image Steganography Based on Frequency DomainAuthors: Kirti Gautam, Sapna AggarwalPage No.: 16-22 | |
![]() |
Managing Change in Business OrganisationsAuthors: K.L.Bhardwaj,Divyanshu BhardwajPage No.: 23-27 | |
![]() |
Integration of Sound Signature in CCP Image Authentication SystemAuthors: Kailas I PatilPage No.: 28-30 | |
![]() |
E-Business Security Environment and Ethical ChallengesAuthors: Bijender Singh YadavPage No.: 31-36 | |
![]() |
Benefits of Integrated Team Management of Projects: A Live ExampleAuthors: S Ramakrishna, Ruchira BhargavaPage No.: 37-41 | |
![]() |
Mobile ComputingAuthors: Neeraj Jindal, Aditi Sharma, Vaishali AgrawalPage No.: 42-45 | |
![]() |
Red TactonAuthors: Neeraj Jindal, Aditi Sharma, Vaishali AgrawalPage No.: 46-50 | |
![]() |
RSA the Mathematical ApproachAuthors: Neeraj Jindal, Aditi Sharma, Vaishali AgrawalPage No.: 51-53 | |
![]() |
Medical Image SegmentationAuthors: Geeta Hanji, M.V.Latte, Madhuri DeshakPage No.: 54-58 | |
![]() |
Analysis & Comparison Different AddersAuthors: Pradeep Kumar Sharma, Anamika Singh, Nityanand SharmaPage No.: 59-68 | |
![]() |
A New Analysis for Response of Laminated Composite Skew Plates under Step LoadingAuthors: Ahmad Hosseini, Mahdi Hosseini, Amin AhmadiPage No.: 69-72 | |
![]() |
Impact Loading and Perforation of Plates for Development of Armor Shells – A Numerical AnalysisAuthors: Ahmad Hosseini, Mahdi Hosseini, Amin AhmadiPage No.: 73-76 | |
![]() |
Study of Performance of Wind TurbineAuthors: Navin Kumar Kohli,L.K. PatelPage No.: 77-79 | |
![]() |
Behavior Study of D-Statcom with Load VariationAuthors: Afshan Ali, Vinesh Agarwal, Vinod Kumar YadavPage No.: 80-84 | |
![]() |
Steganalysis and Image Quality MeasuresAuthors: Neha SinghPage No.: 85-88 | |
![]() |
An Improvement on Ad-Hoc Wireless Network Routing Based On AODVAuthors: Laxmi Shrivasatava, Nidhi SaxenaPage No.: 89-91 | |
![]() |
Image Processing OperationsAuthors: Deepika Saxena,Somya ChaudharyPage No.: 92-96 | |
![]() |
Phishing Attacks and Cyber Crimes : An Current ViewAuthors: Kishan Lal , Jagpal Singh, Anil Kumar ShrotriyaPage No.: 97-105 | |
![]() |
Bluetooth a Secure Mode of Data TransmissionAuthors: Kausar Ali, Akshata Saxena, Meghna MittalPage No.: 106-109 | |
![]() |
Human Resource ManagementAuthors: Nidhi MalhanPage No.: 110-112 | |
![]() |
Improvement in Power Transmission Capability by Using Facts DevicesAuthors: Chetan Jaiswal, Bhanu Pratap SoniPage No.: 113-117 | |
![]() |
Novel Approach of Exploring ICT for Rural DevelopmentAuthors: Faimida M. Sayyad, Dr. Jagdish BakalPage No.: 118 |