An Approach for Securely Upload Files with Low Latency Optimization in Cloud Server
|
2017 |
Abdullah, Fatima |
Peer — Peer Packet Packet Authentication with Digital Signature in Mobile Adhoc Network
|
2017 |
Salman, Mohd. |
A Study on Different Word Sense Disambiguation Approachesand their Application on Indian Regional Languages
|
2017 |
Walia, Himdweep |
Ontology an aid to Software Development Activity: An Insight
|
2017 |
Krishnan, Preeta |
Julia: Paradigm Shift to Computing
|
2017 |
Saurabh, Sudhanshu |
Stress Calculation and Optimization of Connecting Rod With Help of FEA
|
2017 |
Manoj, Sharma |
Fabricate and Compare the Mechanical and Tribological Behaviour of Al6061-Mg-Scba-Graphite and Al16061-Mg-Scba
|
2017 |
Garg, Er. Shubham Kumar |
Nonlinear Transient Analysis of Piezo Laminated FGM Plate Under Electro-Thermo-Mechanical Loading
|
2017 |
Sharma, Saurav |
Reduction of Defects in Automobile Filter Industry using Six Sigma Approach
|
2017 |
Umesh |
Analysis of Blowby and Ring motion between Piston rings and cylinder Liner
|
2017 |
Husain, S. Q. |
Multi-Objective Evaluation of Machinability of Dies Steel H-11 in Milling using RSM based Desirability
|
2017 |
Chahal, Mandeep |
Study of Gruneisen Parameter (Y) with the Help of Equations of State
|
2017 |
Gangwar, Shailendra |
Role of Technology in Retailing
|
2017 |
Chauhan, Vineeta |
Consumer Protection: Some Problems and Prospects
|
2017 |
Arora, Meena |
Analysis and Development of Web Based Decision Support System for Municipal Corporation
|
2017 |
Dwivedi, Avinash |
Using Logistic Regression to Classify Students Based on Non Academic Parameters
|
2017 |
Ranjan, Raju |
Multi-Objective Genetic Algorithm(MOGA) — A sequential Approach to Apriori Algorithm for Interesting Rule Mining
|
2017 |
Tyagi, Reshu |
High Confidence System for Secure Computation of Face Recognition Based on Cryptography
|
2017 |
Gupta, Arun Mittal Harendra Singh Hridesh |
Performance study of Routing Protocols for Mobile Ad Hoc Networks
|
2017 |
Shukla, Pushkal K. |
Detection and Monitoring of Wormhole Attack in MANET
|
2017 |
Katiyar, Sandhya |