Volume 4, Issue 2, April 2017

Sr. Title / Author(s) Abstract Full PDF
1. Link Isolate for Trust Based Suspect ON-OFF Attack
Author(s): Manisha Shrivastava, Abhishek Pandey, TIET, Jabalpur pp 05-09
2. Review Paper on P2P Network Security from Sybill Attack in Various Application
Author(s): Shobhna Tantwoy, Abhishek Pandey, TIET, Jabalpur pp 10-15
3. Review– Study of Manganese Metal Toxicity in Water and Methods of Removal
Author(s): Hemlata Bundela Awasthi, Deepika Garg | TIET, Jabalpur  pp 16-22
4. VLSI Implementation and Optimization of UDP/IP Stack in FPGA
Author(s): Abhishek Sahu, Prajyant Pathak, LNCT, Jabalpur  pp 23-27
5. A Survey of Clustering Algorithms
Author(s):Ruchita Tiwari, Anupam Choudhary, Sapna Choudhary | SRGI, Jabalpur| pp 28-32
6. Performance Evaluation of the AES Algorithm
Author(s):Pragya Mishra, Prajyant Pathak | LNCT, Jabalpur | pp 33-37
7. A Review of Apriori with Association Rule Mining
Author(s):Vivek Tiwari, Anupam Choudhary, Sapna Choudhary | SRGI, Jabalpur| pp 38-47
8. VLSI Implementation of UDP/IP Protocol
Author(s): Ashish Rai, Mohit Khilwani | TIET, Jabalpur | pp 48-52
9. Performance Analysis of Different Low Power Consumption Full Adders
Author(s): Somya Singh, Shyam Akashe | ITM University, Gwalior| pp 53-59
10. The Design of Low Power CMOS based Booth Multiplier
Author(s): Ajay P Thakare | SCET, Amravati (Maharashtra) pp 60-63
11. Optimised Wireless Communication System using Interleaved Encoder with QAM and PSK
Author(s): Vinita Yadav Sindhia, Prajyant Pathak | LNCT, Jabalpur pp 64-68
12. Design Consideration and Selection of Hydro Power Plant Turbine
Author(s): Manoj Kumar Shukla | Kalaniketan, Jabalpur pp 69-73

Home | Editorial Board | Aim & Scope | Author Guidlines | Contact us
Copyright © 2014, All Rights Reserved