Recent Issue April 2014

Recent Issue April 2014

VOLUME 3, ISSUE 4, APRIL 2014 Automated Village Council System Using RFID VINIT MALPURE, GEETANJALI MATE, ANIKET PAWAR, VISHAL NARWADE, HIREN PATEL, VISHAL KADAM Department of Information Technology, Rajarshi Shahu College of Engineering, University of Pune Abstract...
Recent Issue March 2014

Recent Issue March 2014

VOLUME 3, ISSUE 3, MARCH 2014 Reliable Skin Detection Using Hybrid Neural Network Model KHALID A. KAABNEH Department of Multimedia, Collage of Information Technology, Isra University, PO Box 22, Amman Jordan Abstract Real Time Communication Simulator PROF. GEETA...
Recent Issue February 2014

Recent Issue February 2014

VOLUME 3, ISSUE 2, FEBRUARY 2014 Malicious Host and Problem of Blocking for Mobile Agent Proposed Solution DR. HEMAN PATHAK Associate Professor, Department of Computer Science, GKV, Haridwar, Uttarakhand, India Abstract Efficient Use of Bi-Orthogonal Wavelet Transform...
Recent Issue January 2014

Recent Issue January 2014

Review Paper on FPGA Based Implementation of Advanced Encryption Standard (AES) Algorithm ASHWINI R.TONDE, AKSHAY P.DHANDE P.R.Patil College of Engg. &Technology, Maharashtra, India Abstract Study of Characteristics for Dielectric Properties of Various Biological...
Recent Issue December 2013

Recent Issue December 2013

VOLUME 2, ISSUE 12, December 2013   Secure Network Coding Approach with Distributed Reprogramming Protocol for Cluster Based Ad-hoc Networks in Dynamic Key Management of Wireless Sensor Networks PRIYANKA MANHAS, PARMINDER KAUR Student, Department of Computer Science...
Recent Issue November 2013

Recent Issue November 2013

VOLUME 2, ISSUE 11, November 2013   Fast Quality Inspection of Food Products using Computer Vision A. AL-MARAKEBY, AYMAN A. ALY, FARHAN A. SALEM Mechatronics Section, Faculty of Engineering, Taif University, Taif, 888, Saudi Arabia Systems and Computers Engineering...
Recent Issue October 2013

Recent Issue October 2013

VOLUME 2, ISSUE 10, OCTOBER 2013   A Survey on Attack Prevention and Handling Strategies in Graph Based Data Anonymization S.CHARANYAA, T.SHANMUGAPRIYA M.Tech., Student, Dept of Information Technology, S.N.S. College of Technology, Coimbatore, TamilNadu, India...
Recent Issue September 2013

Recent Issue September 2013

VOLUME 2, ISSUE 9, SEPTEMBER 2013 Analysis of MD5 Algorithm Safety against Hardware Implementation of Brute Force Attack AL-MARAKEBY Systems and Computers Engineering Dept., Faculty of Engineering, Al-Azhar University, Cairo, Egypt Abstract Design and Implementation...
Recent Issue August 2013

Recent Issue August 2013

VOLUME 2, ISSUE 8, AUGUST 2013 Papr Analysis of 8x8 Mimo OFDM and OFDM System ANURAG SHARMA, ANKUSH KANSAL Student-ME, Electronics and Communication Department, Thapar University, Patiala, India Assistant Professor, Electronics and Communication Department, Thapar...
Recent Issue July 2013

Recent Issue July 2013

VOLUME 2, ISSUE 7, JULY 2013 FPGA Synthesis of Fuzzy Based Simple Traffic Controller DR. R.HARIKUMAR, M.BALASUBRAMANI Professor, ECE, Bannari Amman Institute of Technology, Sathyamangalam, India Research Scholar, ECE, Bannari Amman Institute of Technology,...
Open chat
Chat with IJARCCE