International Journal of Emerging Technologies in Engineering Research (IJETER)

ISSN: 2454-6410

Published By : Teslaa Publications

Issues

  • Home
  • Volume-4 Issues-1

Volume-4 Issues-1


Static Typestate Verifier FED with Enriched Models

Authors: Immanuel Joshua.F,S. Jayanthi


View Article

Survey-Sharepoint Workflow Using Sharepoint Designer

Authors: Madhu Seles T,N. Viveka Priya


View Article

A Web-Based System for Classifying Social Network Users Using GEPHI

Authors: Babu Kannan,Priyadharshini ,V. Muthurathinam


View Article

Mining an Open Forum with Similar Words Scoring

Authors: Rajkumar K,G. AnnaPoorani


View Article

On The Binary Quadratic Diophantine Equation

Authors: K.Meena,S.Vidhyalakshmi,R.Janani


View Article

Overview on Security of Wireless Sensor Networks in Smart Network

Authors: Mohammad Trik,Hossein Mohammadi,Azadeh Rezaimehr,Fardin Mohammadi Darvandi


View Article

Transparency in Remote Method Invocation (RMI) for Distributed Systems: Middleware Layer

Authors: D.Madhavi


View Article

Application of a Reliable Technique for Transmission Lines Protection

Authors: Ihedioha Ahmed C.


View Article

RHome Automation Using Global System for Mobile Communications (Gsm)

Authors: Ihedioha Ahmed C,Eneh Ifeanyichukwu I.


View Article

Robust Digital Image Watermarking for Copyright Protection with SVD-DWT-DCT and Kalman Filtering

Authors: Samreet Kaur,Ravneet Kaur Sidhu


View Article

Implementation of AES on FPGA Using Application-Specific Instruction Processor

Authors: P.Kokila,T.G.Dhaarani,S.Nandhini,P.Premkumar


View Article

Data Prediction and Optimized Clustering For MPSO and CSO Based Clustering

Authors: S.S.Saravana Kumar


View Article

Study of Fluoride Concentration in the ground water of Atrauliya Nagar Panchayat Area of Azamgarh District

Authors: Shafqat Alauddin,Shailendra Yadav


View Article

Application of Enhanced Clustering For Different Data Mining Techniques

Authors: P.Suganyadevi,J.Savitha


View Article

A Review on Medical Image Compression Techniques

Authors: SeyyedHadi Hashemi-Berenjabad,Saeid Mojarrad


View Article

Tunnelling Authenticated Data from Raspberry PI and Message Intimation via GSM

Authors: S.Divya


View Article

A Ternary Quadratic Diophantine Equation

Authors: K.Geetha,Manju Somanath,M.A.Gopalan


View Article

An Efficient Channel Assignment Scheme for Vehicular Ad Hoc Network

Authors: Ranbir Singh Batth,Sushil Kamboj


View Article