Volume-5 Issue-1, June 2015
- Version
- Download 25
- File Size 4.00 KB
- Create Date June 30, 2015
- .
Volume-5 Issue-1, June 2015, ISSN: 2278-3075 (Online)
Published By: Blue Eyes Intelligence Engineering & Sciences Publication (BEIESP)
Analysis and Construction of the Multicoil Induction Cookers
A.K.M. Al Shaikhli2, Amanoeel Thomas Mika2
Design and Performance of Frequency Domain Equalization for IEEE 802.11a Physical Layer in SUI Channels
Alhamzah Taher Mohammed
Nonlinear Interpolation in Hedge Algebras Associating Genetic Algorithm to Solve the Bell-Shaped Function Approximation Problems
Nguyen Tien Duy1, Nghiem Van Tinh2, Nguyen Tuan Anh3
Investigation on Waste Plastic Fibre Reinforced Concrete using Manufactured Sand as Fine Aggregate
Ravikumar. A. G1, Manjunath M2
Calculation Specifics for the Customized Contact Lenses
Adrian Titi Pascu1, Daniel Băcescu2, Constantin Anton Micu3
Network Services Application to Controlling and Develop Institute Computer LABs
Majzoob Kamal Aldein Omer
Numerical Solution of Generalised Burgers-Huxley Equation Using Nodal Integral Method
Kushal Dinkar Badgujar1, Suneet Singh2
Advantages of Mechanical Concrete Road Over Conventional Road
Abhijeet Chakrey1, Priya Pawar2
An Assessment on Turning Restriction of Vehicle at Intersections in an Arterial Road
Khandaker Samin Atif1, Saurav Barua2, Md. Firoz Mahmood3
A Country Based Model Towards Phishing Detection Enhancement
Abdullah M. Alnajim
Design of Congestion Control Protocol for WMSN
Supriya Pansare1, C. V. Kulkarni2
Hybrid Instruction in Teacher Education Programs of State Universities and Colleges in Region III
Leodivina P. Tagama
Detection and Localization of Video Copy-Move Forgery in Temporal and Spatial Domain
Mili Rosline Mathews1, Sreelekha Sreedharan2
A High Selectivity and Small Sized Double Fold Microstrip Hairpin Line Bandpass Filter for L-Band RF/Wireless Communication Systems
Jagdish Shivhare1, B. V. R. Reddy2
Machine Learning Approach to Detect Tampering in H.264 Video
Remya R. S1, Anupama Pradeep2