International Journal of Emerging Technologies in Engineering Research (IJETER)

ISSN: 2454-6410

Published By : Teslaa Publications

Issues

  • Home
  • Volume-4 Issues-3

Volume-4 Issues-3


High Dimensional Data Using Fuzzy C – Means Clustering For Sensitive Distance Metric

Authors: G.Shanthini,P.Ponsekar,S.Vidhya


View Article

Fundamental Group of the Torus and the Dunce Cap

Authors: Dr. Parvinder Singh


View Article

Ternary Quadratic Equation and Harmonic Progression in Rationals

Authors: M.A.Gopalan,S.Vidhyalakshmi, N.Thiruniraiselvi


View Article

An Improved Voltage Level Balancing Method for Nine Level Diode Clamped Inverter

Authors: S Narmadha,S. Venketasen


View Article

Adaptive Neuro Fuzzy Inference System with Self Turning for Permanent Magnet Synchronus Motor

Authors: R.Ushanandhini,R.Gandhi


View Article

Simulation for High Speed Brushless Dc Motor Operating In a Low and High Speed Range Using A Novel Drive Method

Authors: N.Nithyanantham,S.Vijayakumar


View Article

Model Predictive Control of Matrixconverter Fed Induction Generator for Wind Turbine

Authors: K.Naveen Babu,K.Padmanaba


View Article

A Modified Apod Pulse Width Modulation Technique of Multilevel Cascaded Inverter Design

Authors: K.Sangeetha,P.T.Supriya


View Article

Power Loss Analysis of Single Switch Isolated Dc- Dc Converter Using ZVS and ZCS Techniques

Authors: M.Meenakhi,R.Gandhi,R.Siva Kumar


View Article

Maximum Power Point Tracking Based Efficient Multi-Stage Grid-Connected Photovoltaic System

Authors: R.Priyanga,S.Vijayakumar


View Article

Increasing Lifetime of Sensor Nodes using Load Balancing Algorithm in Wireless Sensor Networks

Authors: Ragavi V,Dr.T.Abirami


View Article

Trust Management in Distributed Cloud Environment

Authors: V.JaganRaja,P.Sathish Kumar,Dr.V.Venkatachalam


View Article

Critical issues in Cloud Computing services & its Solutions

Authors: Satinder Kaur,Simmi Bagga,Hardeep Singh


View Article

Studies on Impact Toughness of Austempered Ductile Iron

Authors: Rakesh Raghavendra.D,Dr.Sethuram


View Article

Emergency Message Dissemination by Clustered Broadcasting Using Selective Reliable Broadcast in Vanets

Authors: B.Vidhya,M.Ramalingam


View Article

Study on Time Space Management in Work Zone from Jagir Ammapalayam to Seelanaickenpatti in NH7

Authors: Venkatesh.G,S.Sakthivel


View Article

Calculation of Performance Evaluation, Reliability, Throughput using Co-operative Medium Access Control Protocol in Wireless Networks

Authors: R.Rajan


View Article

Comparative Study of Distributed Algorithm and Scalable Distributed Algorithm

Authors: R.Rajan


View Article

Analyzing and Categorizing Virtual Private Networks to Overcome Security Issues

Authors: Suresh C


View Article

Security of Data Based on Color and Armstrong Number

Authors: Puja Maruti Lad,Yallawa Shivaji Vhankade,Ashwini Jagannath Khandagale,Prajakta Ram Bhalerao


View Article

Ontology Based Automatic Generation of Domain Module from Electronics Books

Authors: Dr.M.Newlin Rajkumar,K.R.Seena,S.Mohan Kumar,V.Dhurka


View Article

Data Deduplication in Client Side Using Hash Technique

Authors: P. Nirmala,S. Murugan@Prakasam,M. Janaki Raman,R. S. Arun Murugan,C. B. Lallit Kumar


View Article

Improving Performance of Map Reduce in Heterogeneous Environments

Authors: K.Suganthi,S.Madhavi


View Article

Prototype Based K - Means Clustering Technique Using Matlab Application

Authors: J.Ramyabharathi, N.Vijayalakshmi, S.Omprakash


View Article

Using Advanced RFID for Tollplaza Collection without Manpower

Authors: S. Vasantha Kumar,N. Prakash,R. Ranjitha,S.P. Santhoshkumar


View Article

Automatic Detection of Road Traffic Signs Bassed On Text Extraction

Authors: S.P.Audline Beena,A.Mathan Gopi,T.V.Aarthy,B.Indhu,B.Pavithra


View Article

Patient Self-Controllable Healthcare Monitoring System Using Android Smart Phone

Authors: G.Sandrakarunya,P.Mariselvi,M.Krishnapriya


View Article

Dielectric Theory and Its Properties

Authors: Sukhdeep Kaur,Manjit Sandhu,Jaipreet Kaur


View Article

Localization of IP Spoofer Inception using PathBack Scatter Suspension Set

Authors: Roopa M,Prema C


View Article

Delegate and Verify Pool Based Policy IBE Using Composite Cryptosystem

Authors: Sujatha T,Sujatha T


View Article