Volume 3 Issue 5, May 2015: Page 10
Downloads: 0 | Views: 26
Electronics & Communication Engineering, India, Volume 3 Issue 5, May 2015
Pages: 56 - 60Performance Measures of DWDM System under the Impact of Four Wave Mixing
S. Esther Jenifa, K. Gokulakrishnan
Downloads: 0 | Views: 20
Electronics & Communication Engineering, India, Volume 3 Issue 5, May 2015
Pages: 61 - 64Image Compression Using Back Propagation Neural Network
Neha Jaiswal
Downloads: 0 | Views: 18
Electronics & Communication Engineering, India, Volume 3 Issue 5, May 2015
Pages: 65 - 68Design and Analysis of Multiband Sierpinski Carpet Fractal Antenna for Wireless Communications
Rajiv Krishna Prasad, Architha Kishore, P Nagaraju
Downloads: 0 | Views: 22
Optical engineering, India, Volume 3 Issue 5, May 2015
Pages: 69 - 73Performance Measure of FSO by Modified AND Subtraction Method
I. Dhasan Aswin Raj, K. Gokulakrishnan
Downloads: 1 | Views: 23
Mechanical Engineering, India, Volume 3 Issue 5, May 2015
Pages: 74 - 77Design and Analysis of Composite Leaf Spring by Using FEA and ANSYS
Rupesh N. Kalwaghe, Prof. K. R. Sontakke
Downloads: 0 | Views: 24
Management, Kenya, Volume 3 Issue 5, May 2015
Pages: 78 - 85Determinants of Capital Structure Decisions of Listed Insurance Companies in Kenya: A Survey of Insurance Companies in Nakuru Town
Jane Wanjiku Muiruri, Dr. Nemwel Bosire
Downloads: 0 | Views: 25
Information Technology, Nigeria, Volume 3 Issue 5, May 2015
Pages: 86 - 92Mitigating Security Threats in Virtualized Environments
Bashir Aliyu Yauri, Joshua Abah
Downloads: 0 | Views: 21
Computer Engineering, India, Volume 3 Issue 5, May 2015
Pages: 93 - 96An Improved LEACH Protocol using Fuzzy Logic in Wireless Sensor Network
Neha Sanadhya, Waris Junaid
Downloads: 0 | Views: 22
Computer Engineering, India, Volume 3 Issue 5, May 2015
Pages: 97 - 99A System to Clarify Unwanted Messages from OSN User Surface
Aarti Supe, R. N. Phursule
Downloads: 0 | Views: 26
Computer Engineering, India, Volume 3 Issue 5, May 2015
Pages: 100 - 101Implementation of Mobile-Healthcare Application Giving Access Control, Security and Privacy to Patients Confidential Data
Sharanya N R, Parkavi A