Published: 2015-09-26

A NEW TECHNIQUE TO ENCRYPT A CODE WORD

Arnab Chowdhury
Abstract 298 | PDF Downloads 117
PDF

Page 516-527

A SECURED AUTHENTICATED WATERMARKING TECHNIQUE

Priyanka U, Remya K R, Reenu R, Sai Subha V
Abstract 147 | PDF Downloads 52
PDF

Page 547-554

SECURED LIFI (SECURED VISIBLE LIGHT COMMUNICATION)

Mohit Hapani, Mangesh Joshi, Rajkumar Maradia
Abstract 479 | PDF Downloads 199
PDF

Page 579-584

INFLUENCE OF TELECOMMUNICATION TOWER ON RESPONSE OF HOST STRUCTURE

Vikaskumar Pandey
Abstract 729 | PDF Downloads 125
PDF

Page 489-498

A REVIEW ON THE MATERIALS USED FOR BEARING AND FAILURE BEHAVIOR

Nishant Jonathan Rubens, Seshagiri R, Harihara Sakthi Sudhan
Abstract 229 | PDF Downloads 312
PDF

Page 528-546

PLANNING SCHEDULING OF GRADE SEPARATOR

Srikanth R, Manjunath K. R
Abstract 429 | PDF Downloads 100
PDF

Page 555-578

EXTRACTION OF TARTARIC ACID FROM TAMARIND PULP AND ANALYSIS OF THE ACID COMPOSITION IN LEAVES

Gullipalli Santhosh Roopa, V. Kasiviswanatham
Abstract 739 | PDF Downloads 1895
PDF

Page 478-488

DESIGN SIMULATION & IMPLEMENTATION OF FOUR QUADRANT OPERATION OF DC DRIVE

Vijay M. Purohit, Milind S. Marathe
Abstract 144 | PDF Downloads 49
PDF

Page 585-590