Volume-1 Issue-3, February 2013
- Version
- Download 27
- File Size 4.00 KB
- Create Date February 28, 2013
- .
Volume-1 Issue-3, February 2013, ISSN: 2319–6386 (Online)
Published By: Blue Eyes Intelligence Engineering and Sciences Publication
Power Quality Enhancement by Using Distributed Power-Flow Controller in Distribution Systems
Karthik Korvi1, Jisha Bhubesh2, R.Shirisha3
Perspective Study on Recoverable Concealed Data Aggregation in WSNs
John Major J1, Shajin Prince2
Comparison of Micro-Holes Produced By Micro-EDM with Laser Machining
Mohammed Sarvar Rasheed
To Analyze the Performance of Optical Burst Switched Networks for Energy Savings
Suresh Pandian V1, Arjun Kumar C. R2, Karpagarajesh G3
A Survey on K-mean Clustering and Particle Swarm Optimization
Pritesh Vora1, Bhavesh Oza2
Energy Efficient Routing Protocols for Mobile Ad-Hoc Networks
Rupali Mahajan1, Rupali Jagtap2
Buck–Boost-Type Unity Power Factor Rectifier with Extended Voltage Conversion Ratio
G. Ravindra Naik1, D. Bhavani2, T. Harikrishna Prasad3
Reliability Evaluation of Bulk Power Systems Incorporating UPFC
V. S. K. Sandeep1, M. Divya Charitha2 , G. Uday Bhanu3
DWT and PCA Based Image Enhancement with Gaussian Filter
R. Vani1, K. Soundara Rajan2
Green Approach to Corrosion Inhibition of Mild Steel Using Emilia Sonchifolia and Vitex Doniana In 2.5M HCl Medium
Iloamaeke I. M1, Onuegbu T. U2, Umeobika U. C3, Umedum N. L4
The Grapheme-Personification Synaesthesia at Indian Glance
K. Vijayasree1, T. Rajasekhar2
Implementation and Performance Evaluation of an Energy Constraint AODV Routing
Dinesh Kumar Dwivedi1, Akhilesh Kosta2, Akhilesh Yadav3
Survey of Resource and Job Management for Load Balancing In Grid Computing
Sakadasariya Achyut R
Survey on DDoS Attacks and its Detection & Defence Approaches
Nisha H. Bhandari
SLA Negotiation for Web Service Consumption Based on Analytic Hierarchy Process
R. Raju1, D. Dhivya2, R. Saranya3, S. I. Abbinaya4
Parallel Power Flow AC/DC Converter with High Input Power Factor and Tight Output Voltage Regulation for Universal Voltage Application
Dhudem Santhosh1, Jisha Bhubesh2, Khaja Rafiulla3
Attack Graph Generation and Threat Evaluation in Network Situation Awareness (NSA)
Patil Shalaka1, Ahir Minakshi2, Kale Dattatraya3