+1-831-854-7284 contact@ijser.org

Sunday 27 October 2013

IJSER | Volume 3, Issue 6 , June 2012 Edition Page 4 page 2-3

10:40

Share it Please
Authors can check the complete details on www.IJSER.org  journal website
Volume 3, Issue 6,  June 2012 Edition  Link to Main Website

Cryptography Algorithms and approaches used for data security[Full-Text[References]
Gaurav Sharma, Ajay Kakkar

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

Development and Validation of UV- Spectrophotometric Method for the determination of Doxazosin Mesylate in pharmaceutical Formulations[Full-Text[References]
N.V.S. NAIDU,T.NIRANJAN, K. BABUNAIDU P. SUGUNA
--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

Control of Solid-State Lamps Using a Multiphase Pulse width Modulation Technique and AC side Power Factor Correction[Full-Text[References]
B. Jyothi, Dr. P. Linga Reddy

-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

Re-Engineering Concept on Enhancing the Thermal Efficiency of Thermal Power Station Boiler[Full-Text[References]
Prof. S.Renganathan, M.E

--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

Persistent Software Attributes And Architecture For Distributed Application[Full-Text[References]
Ravi Uyyala, RaghuRamBattini,Kundan Kumar Mishra

------------------------------------------------------------------------------------------------------------

DCT Based Modified SLM Technique for PAPR Reduction in OFDM Transmission[Full-Text[References]
Mr.Jobin Raj, Mr.M.Malleswaran

--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

A Study of the Efficiency of a WSP during a Dry Season; The Case of Mikililand Estate, Addis Ababa, Ethiopia[Full-Text[References]
Metadel Adane Mesfine; Mekibib David Dawit

--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

Investigate the Self-efficacy and Attitudes of Teachers towards e-learning in Saudi Arabia[Full-Text[References]
Bassfar Zaid, Rozinah Jamaludin, Merza Abas

--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

Probe Feed Microstrip Patch Antenna Computer Aided Design Methology [Full-Text[References]
N.T. Markad, Dr. R.D. Kanphade, Dr. D. G. Wakade

--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

Optimizing the Concept of Autonomy for Language Learning Purposes in the Digital Libraries: A Context Model for Language Learning[Full-Text[References]
Hussam Eddin Alfitouri Elgatait & Wan Mohd Fauzy

--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

Data Hiding Technique using Steganography and Dynamic Video Generation[Full-Text[References]
Abhishek Mangudkar, Prachi Kshirsagar, Vidya Kawatikwar, Umesh Jadhav

--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

A Long Endurance Policy (LEP): An Improved Swap Aware Garbage Collection For NAND Flash Memory Used As A Swap Space In Electronic Devices[Full-Text[References]
Arushi Agarwal , Surabhi Maddhesiya, Priya Singh and Rajendra Kumar Dwivedi


--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

Advancements and Applications of Ant Colony Optimization: A Critical Review[Full-Text[References]
Jitender Kaushal

--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

Seismic Performance Evaluation of Torsionally Asymmetric Buildings[Full-Text[References]
Dr. B.G. Naresh Kumar and Avinash Gornale

--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

Study of "MHILIBHRD-V" Architecture of databases[Full-Text[References]
Prof. S.R. Thakare, Dr. C.A. Dhawale, Prof. A.B. Gadicha

--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

I/O Efficient Algorithm for Graph Pattern Matching Problem[Full-Text[References]
Pushpi Rani, Abhishek Srivastava

-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

Using Histogram-based Consistency Measures with Improved GVC for Photorealistic 2D to 3D Reconstruction[Full-Text[References]
Dr. Kalpana Yadav, Ms Ankita, Megha Pahwa, Niharika Sachdeva, Shruti Choudhary

--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

Media Access Control Spoofing Techniques and its Counter Measures[Full-Text[References]
Mrs. Hatkar Archana A, Ms. Varade Gauri A, Mr. Hatkar Arvind P
-------------------------------------------------------------------------------------------------------------------------------------------------------------

0 comments:

Post a Comment