Impact Factor 4.62 | IC Value 53.03 | Submit Paper Online | Email Us editor@ijtre.com

Search Paper:


No Paper Title Author Name Download
1 TOWARD SECRECY CONSERVING AND CONNIVANCE RESISTANCE IN A LOCATION PROOF UPDATING SYSTEM Shilpa S.M Download
2 GESTURE CONTROLLED ROBOT FOR MILITARY PURPOSE Mithileysh Sathiyanarayanan Download
3 GENERATION OF IMAGES FROM MONOCULAR IMAGE FOR STEREOVISION Priyanka K.B Download
4 PARAMETRIC OPTIMIZATION OF SUBMERGED ARC WELDING ON STAINLESS STEEL-304 Mr. Pratik Umrigar Download
5 3D MODEL RECONSTRUCTION USING MULTIPLE PLANES FROM SINGLE 2D IMAGE Spurthi V Download
6 ANALOG CIRCUIT OPTIMIZATION WITH GENETIC ALGORITHM Ranjith. S Download
7 FACE DEPENDENT VIDEO SUMMARIZATION Namitha A R Download
8 PATH PLANNING FOR A ROBOT WITH SINGLE CAMERA Latha D U Download
9 A STUDY OF MENTAL HEALTH OF WORKING AND NON-WORKING WOMEN WITH REGARDS TO AREA OF RESIDENCE Ashabahen C. Tadvi Download
10 PERFORMANCE EVALUATION AND PARAMETRIC OPTIMIZATION OF HOT MACHINING PROCESS ON EN-8 MATERIAL K.A.Patel Download
11 PREDICTION THE DISEASE ANALYSIS USING DATA MINING Manju Saini Download
12 INDIRECT FIELD ORIENTED SPEED CONTROL OF AN INDUCTION MOTOR DRIVE BY USING PSO ALGORITHM J. Adeline Sneha Download
13 PARAMETRICAL ANALYSIS OF A PULSED LASER SYSTEM Shashank Soi Download
14 ANALYSIS OF PHOTONIC BAND STRUCTURE IN ONE DIMENSIONAL PHOTONIC CRYSTALS CONTAINING SINGLE NEGATIVE MATERIALS USING PWE AND FDTD METHOD Vasudha Malhotra Download
15 LOW-POWER HIGH-SPEED SAMPLE AND HOLD CIRCUIT BASED ON SWITCHED CAPACITOR Harsh Thekdi Download
16 TRACKING OF SELFISH ATTACKS IN COGNITIVE RADIO AD-HOC NETWORKS USING COOPON Suhas Damodaran Download
17 ENHANCED SIGNATURE BASED AUTHENTICATION SCHEME FOR DISPENSED NETWORKS Naik D.C Download
18 TERRIER TOOL EXPERIMENTS: ROMAN, DEVANAGARI, MIXED SCRIPTS IN INFORMATION RETRIEVAL Honey Patel Download
19 RETRACTION OF CERTIFICATE WITH CLAIMING ABILITY FOR MANETS Rajesh. K.M Download
20 MULTILEVEL IMAGE FUSION ALGORITHM WITH COMPARATIVE ANALYSIS OF WAVELET AND CURVELET TRANSFORM Anup Yadav Download
21 DETECTION OF BAD SMELLS IN SOURCE CODE ACCORDING TO THEIR OBJECT ORIENTED METRICS Anshu Rani Download
22 IDENTITY AND LOCATION HIDING EFFICIENT ROUTING PROTOCOL IN WIRELESS NETWORKS Sandeep Batageri Download
23 STREAM TUBE MODEL ANALYSIS USING HAWT & BETZ CRITERIA JUSTIFICATION Rohit Senger Download
24 RELIABLE DATA TRANSMISSION FOR CLUSTER BASED WIRELESS SENSOR NETWORKS Nikhil D.K Download
25 EXPERIMENTAL ANALYSIS OF PVD AND CVDAPPLIED COATED CUTTING TOOL INSERT BASEDON SURFACE ROUGHNESS ANDTOOL WEAR FOR TURNING OF EN9 STEEL G.K.Prajapati Download
26 AN INTEGRATED TECHNIQUE DCT & SIFT FOR DETECTION OF IMAGE FORGERY Raval Vidhi Download
27 COMPARATIVE STUDY ON DIFFERENT CONTROL STRATEGIES USING SHUNT ACTIVE POWER FILTER FOR CURRENT HARMONICS MITIGATION Mr. Suvas Vora Download
28 DETECTING WORMHOLE ATTACK IN MOBILE AD-HOC NETWORKS Mr. Chaudhari Vishvash R Download
29 DATA SECURITY IN CLOUD COMPUTING USING DIGITAL SIGNATURE Dhaval Patel Download
30 ASSOCIATION RULE MINING USING IMPROVED FP-GROWTH ALGORITHM Palak Patel Download
31 ENHANCING STEGANOGRAPHY ALGORITHM FOR HIDING DATA USING COMPRESSED FILES Ashish C. Dhami Download
32 CROSS LAYER OPTIMIZATION BASED ON ENERGY AWARE ROUTING PROTOCOL FOR MANET Pratik M Zala Download
33 OPTIMIZATION IN PERFORMANCE AND SECURITY IN CLOUD STORAGE Mr. Patel Nildip C Download
34 PREVENTION OF INFORMATION LEAKAGE FROM INDEXING IN CLOUD Mr Hardik Patel Download
35 LOAD AWARE CONTENT DISTRIBUTION IN CLOUD Mr. Hardik R. Patel Download
36 ILLUMINATION INVARIANT FACE RECOGNITION SYSTEM Chande Anita Download
37 MOBILE DEVICE FORENSICS Dhaval kumar H. Joshi Download
38 PERFORMANCE ANALYSIS OF ELLIPTICAL CROSS SECTIONED BENDS OF HVAC DUCT FOR LESS PRESSURE DROP Santosh Kansal Download
39 AUXILIARY SWITCH CONTROL FOR BIDIRECTIONAL DC-DC CONVERTER Mr. K.Kaviarasu M.E. Download
40 PERFORMANCE EVALUATION OF BIT ERROR RATE IN WIMAX USING DIFFERENT MODULATION TECHNIQUES Er. Simardeep Kaur Download
41 EFFICIENT VLSI ARCHITECTURE USING DIT-FFT RADIX-2 AND SPLIT RADIX FFT ALGORITHM Rashmi M J Download
42 COARSE GRAINED JOB SCHEDULING WITH DYNAMIC STRATEGY IN GRID COMPUTING Pankti Dharwa Download
43 HOME SECURITY SYSTEM USING VOICE RECOGNITION Ashwini Sanjay Garud Download
44 A MODIFIED VERSION OF POLYBIUS CIPHER USING MAGIC SQUARE AND WESTERN MUSIC NOTES Moumita Maity Download
45 DYNAMIC LOADING ANALYSIS OF AUTOMOBILE COMPONENTS FOR INCREASING EFFICIENCY Hiren Natvarbhai Makwana Download
46 DESIGN OF A NEW CRYPTOGRAPHIC ALGORITHM USING HIGH-THROUGHPUT RM-PRNG Shazia Tazyeen Download
47 UNDERSTAND CUSTOMER BEHAVIOR USING SOCIAL MEDIA IN RECOMMENDATION SYSTEM Jaydeep A. Patel Download
48 DESIGN AND IMPLEMENTATION OF DUAL ACTIVE BRIDGE CONVERTER WITH INTEGRATION OF RENEWABLE ENERGY SOURCES FOR DC DISTRIBUTION SYSTEM K. Sakthivel Download
49 IMPLMENTING CONSISTENCY AND CONTENT MANAGEMENT IN WEB PERSONALIZATION BASED ON THE COMBINATION OF SEMANTIC WEB TECHNOLOGIES AND USAGE MINING TECHNIQUES Anita Choudhary Download
50 USE OF ONTOLOGY FOR WEB PERSONALIZATION BASED ON THE COMBINATION OF SEMANTIC WEB TECHNOLOGIES AND USAGE MINING TECHNIQUES Anita Choudhary Download