S.No. |
Title and Authors of Paper |
Page.No. |
01 |
Internet of Thing Based Tourism System: Survey and Proposed Solutions
Rula Amjed, Dr. Muayad Sadik Croock |
118-122 |
02 |
A REVIEW OF CLUSTERING BASED ROUTING APPPROACHES IN VEHICULAR ADHOC NETWORK
Harmanjot Kaur, Er. Sandeep Kad |
123-131 |
03 |
Computing the Time Complexity of ANFIS Algorithm
Retantyo Wardoyo, Linda Nur Afifa |
132-135 |
04 |
To Enhance the Energy Efficient Active RFID protocol for Clock Synchronization using MAC-based Technique
Jobenpreet kaur,Meenakshi Bansal |
136-141 |
05 |
Compact СPW Ultra Wideband F Slotted Microstrip Antenna for Wireless Applications
Iram Yameen Khan, Shivraj Singh |
142-146 |
06 |
EMBEDDED BASED CONTROL PANEL FOR SORTING APPLICATION
Soniya Yadav, Dhanashree Gavali,Aishwarya Bhopale,K. D. Salukhe |
147-149 |
07 |
Image Enhancement by using Histogram Equalization Technique in Matlab
Muhammad Zohaib, Ali Shan, Attiq Ur Rahman, Hazrat ALi |
150-154 |
08 |
An Unprecedented Approach of Skew Detection and Correction for Online Bengali Handwritten Words
Gouranga Mandal |
155-159 |
09 |
FUZZY BASED MALICIOUS NODES DETECTION IN MOBILE AD-HOC NETWORKS
Er. Harmeet Singh,Dr.Vijay Dhir |
160-167 |
10 |
Smart Trash Pool System for Smart Cities
A.Sebastian, S. Sivagurunathan |
168-173 |
11 |
A Review of Cloud Computing Environment and Security Challenges
Dr. Savita, Satish Kumar |
174-182 |
12 |
Body Monitoring System Using Rule Based Sensor Networks
Dr.Manoj Sharma |
183-187 |
13 |
Developed Ad Hoc On-demand Distance Vector Routing Protocol for Wireless Sensor Networks
Radhwan Jawad Kadhim, and Dr Muayad Sadik Croock |
188-191 |
14 |
Increasing the Route Stability for MANET through BTSNA-DS Algorithm
Mrs. R. SARASWATHI,Dr. A.SUBRAMANI |
192-203 |
15 |
ROBUST IMPERCEPTIBLE DIGITAL IMAGE WATERMARKING BASED ON DISCRETE WAVELET&COSINE TRANSFORMS
Raj kumar Jaiswal , S. Ravi |
204-213 |
16 |
History and Architecture of Wireless Sensor Networks for Ubiquitous Computing
Vandana Jindal |
214-217 |
17 |
A Survey on Agriculture Crop Recommender System
Saiyyad Mohmmad Ali Muzffar Ali |
218-220 |
18 |
Double encryption using Private Key and Content Based Public Key
Bharatula Lakshmi Sai Prasanna, Palaparthi Meghana, Mr. Isunuri Bala Venkateswarlu |
221-224 |
19 |
HOME AUTOMATION AND SECURITY USING INTERNET OF THINGS
K.Rithu Hebbar, M.Kiran Kumar, K.Surekha, K.Mallika Sobha Devi, K. Sai Akshaya Priya |
225-229 |
|
Remaining Papers will be available soon…. |
|