Volume 2 Issue 6, June 2014
Downloads: 0 | Views: 1
Electronics & Communication Engineering, India, Volume 2 Issue 6, June 2014
Pages: 1 - 4Optical method for Images Encryption Based on Chaotic BakerMap and Double Random Phase Encoding
Anusha G. K; Nilajkar R. M
Downloads: 0 | Views: 0
Mechanical Engineering, India, Volume 2 Issue 6, June 2014
Pages: 5 - 9A Study for Remedial Measures of Improper Temperature Indication System Used in IC Engines to Minimize Engine Losses
Sunil Anand; Amit Kumar Marwah
Downloads: 0 | Views: 0
Computer Engineering, India, Volume 2 Issue 6, June 2014
Pages: 10 - 14Performance Monitoring in Virtual Organization Using Domain Driven Data Mining and Opinion Mining
Santhamma; Nagaveni B. Biradar
Downloads: 0 | Views: 0
Computer Engineering, India, Volume 2 Issue 6, June 2014
Pages: 15 - 20Privacy-Preserving Public Auditing using TPA for Secure Cloud Storage
Jyoti R Bolannavar
Downloads: 0 | Views: 0
Computer Engineering, India, Volume 2 Issue 6, June 2014
Pages: 21 - 26Smart Parking System Based On Reservation
Mohit Patil; Rahul Sakore
Downloads: 0 | Views: 0
Computer Engineering, India, Volume 2 Issue 6, June 2014
Pages: 27 - 32AMES-Cloud: A Framework of Adaptive Mobile Video Streaming and Efficient Social Video Sharing in the Clouds
Shobha. D Jalikoppa
Downloads: 0 | Views: 0
Electronics & Communication Engineering, India, Volume 2 Issue 6, June 2014
Pages: 33 - 37Digital Image Processing Techniques for Object Tracking System Using Kalman Filter
Kiran .S. Khandare; Nilima R.Kharsan
Downloads: 0 | Views: 0
Civil Engineering, India, Volume 2 Issue 6, June 2014
Pages: 38 - 41Use of Artificial Wetland for Treatment of Dairy Industry Waste Water for Analysis of BOD and COD
Pachpute A. A; Kankal S. B; M.V Jadhav
Downloads: 0 | Views: 0
Computer Engineering, India, Volume 2 Issue 6, June 2014
Pages: 42 - 47A User Identity Management Protocol Using Efficient Dynamic Credentials
Sheetal S. Dharwadkar; Rashmi M. Jogdand
Downloads: 0 | Views: 0
Computer Engineering, India, Volume 2 Issue 6, June 2014
Pages: 48 - 51Detection of Selective Forwarding Attacks in Wireless Sensor Networks: A Survey
J. Anne Shirley; J. John Raybin Jose