RefrigerationAuthors: A. SethPage No.: 01-03 | ||
Rapid Prototyping in CADAuthors: Pankaj DanodiaPage No.: 04-06 | ||
Study and Analysis of Channel Estimation Techniques in MIMO OFDM SystemAuthors: Deepika Sharma, Rajiv Chechi, Alka KalraPage No.: 07-10 | ||
Classifier Comparison for Defect Detection II Ceramic Tiles Using GLCMAuthors: Meenakshi Sharma, Gurleen SidhuPage No.: 11-15 | ||
Novel Technique Used for Image Steganography Based on Frequency DomainAuthors: Kirti Gautam, Sapna AggarwalPage No.: 16-22 | ||
Managing Change in Business OrganisationsAuthors: K.L.Bhardwaj,Divyanshu BhardwajPage No.: 23-27 | ||
Integration of Sound Signature in CCP Image Authentication SystemAuthors: Kailas I PatilPage No.: 28-30 | ||
E-Business Security Environment and Ethical ChallengesAuthors: Bijender Singh YadavPage No.: 31-36 | ||
Benefits of Integrated Team Management of Projects: A Live ExampleAuthors: S Ramakrishna, Ruchira BhargavaPage No.: 37-41 | ||
Mobile ComputingAuthors: Neeraj Jindal, Aditi Sharma, Vaishali AgrawalPage No.: 42-45 | ||
Red TactonAuthors: Neeraj Jindal, Aditi Sharma, Vaishali AgrawalPage No.: 46-50 | ||
RSA the Mathematical ApproachAuthors: Neeraj Jindal, Aditi Sharma, Vaishali AgrawalPage No.: 51-53 | ||
Medical Image SegmentationAuthors: Geeta Hanji, M.V.Latte, Madhuri DeshakPage No.: 54-58 | ||
Analysis & Comparison Different AddersAuthors: Pradeep Kumar Sharma, Anamika Singh, Nityanand SharmaPage No.: 59-68 | ||
A New Analysis for Response of Laminated Composite Skew Plates under Step LoadingAuthors: Ahmad Hosseini, Mahdi Hosseini, Amin AhmadiPage No.: 69-72 | ||
Impact Loading and Perforation of Plates for Development of Armor Shells – A Numerical AnalysisAuthors: Ahmad Hosseini, Mahdi Hosseini, Amin AhmadiPage No.: 73-76 | ||
Study of Performance of Wind TurbineAuthors: Navin Kumar Kohli,L.K. PatelPage No.: 77-79 | ||
Behavior Study of D-Statcom with Load VariationAuthors: Afshan Ali, Vinesh Agarwal, Vinod Kumar YadavPage No.: 80-84 | ||
Steganalysis and Image Quality MeasuresAuthors: Neha SinghPage No.: 85-88 | ||
An Improvement on Ad-Hoc Wireless Network Routing Based On AODVAuthors: Laxmi Shrivasatava, Nidhi SaxenaPage No.: 89-91 | ||
Image Processing OperationsAuthors: Deepika Saxena,Somya ChaudharyPage No.: 92-96 | ||
Phishing Attacks and Cyber Crimes : An Current ViewAuthors: Kishan Lal , Jagpal Singh, Anil Kumar ShrotriyaPage No.: 97-105 | ||
Bluetooth a Secure Mode of Data TransmissionAuthors: Kausar Ali, Akshata Saxena, Meghna MittalPage No.: 106-109 | ||
Human Resource ManagementAuthors: Nidhi MalhanPage No.: 110-112 | ||
Improvement in Power Transmission Capability by Using Facts DevicesAuthors: Chetan Jaiswal, Bhanu Pratap SoniPage No.: 113-117 | ||
Novel Approach of Exploring ICT for Rural DevelopmentAuthors: Faimida M. Sayyad, Dr. Jagdish BakalPage No.: 118 |