Category Archives: NCITSF – 2014 (Volume 2 – Issue 11)

Quality Assured Publisher
Serving Researchers Since 2012
IJERT-MRP IJERT-MRP

Analysis of Multi-Objective Programming Using Goal Programming Methodology

View Abstract & full text pdf of Analysis of Multi-Objective Programming Using Goal Programming Methodology

🌏
International Scholarly Publisher
Serving Researchers Since 2012
IJERT-MRP IJERT-MRP

Improving Navigability of user through Re/ink Webpages using Transformation Method

View Abstract & full text pdf of Improving Navigability of user through Re/ink Webpages using Transformation Method

🔒
Authentic Engineering Platform
Serving Researchers Since 2012
IJERT-MRP IJERT-MRP

Energy Efficient Location Tracking by the Combination of GPS and WiFi Technology

View Abstract & full text pdf of Energy Efficient Location Tracking by the Combination of GPS and WiFi Technology

🏆
Premier Academic Publisher
Serving Researchers Since 2012
IJERT-MRP IJERT-MRP

The Comparative study of DynamoliB NoSQL database service

View Abstract & full text pdf of The Comparative study of DynamoliB NoSQL database service

🌏
International Scientific Platform
Serving Researchers Since 2012
IJERT-MRP IJERT-MRP

Multi Key XOR Cipher with Parity Check (MX-PC)

View Abstract & full text pdf of Multi Key XOR Cipher with Parity Check (MX-PC)

Global Engineering Publisher
Serving Researchers Since 2012
IJERT-MRP IJERT-MRP

Implementation of acoustic echo cancellation system onTMS3206713DSK

View Abstract & full text pdf of Implementation of acoustic echo cancellation system onTMS3206713DSK

🌏
International Scientific Platform
Serving Researchers Since 2012
IJERT-MRP IJERT-MRP

PERFORMANCE ANALYSIS OF OPTICAL CDMA NETWORK FOR MULTIMEDIA APPLICATIONS USING HARDLIMITERS

View Abstract & full text pdf of PERFORMANCE ANALYSIS OF OPTICAL CDMA NETWORK FOR MULTIMEDIA APPLICATIONS USING HARDLIMITERS

🌏
Trusted Engineering Publisher
Serving Researchers Since 2012
IJERT-MRP IJERT-MRP

Thwarting Spoofing Attacks Using RARE Model

View Abstract & full text pdf of Thwarting Spoofing Attacks Using RARE Model

🌏
Trusted Academic Publisher
Serving Researchers Since 2012
IJERT-MRP IJERT-MRP

PROVIDING SECURITY TO PERSONAL HEALTH RECORD IN CLOUD COMPUTING USING A BSTRACT BASED ENCRYPTION

View Abstract & full text pdf of PROVIDING SECURITY TO PERSONAL HEALTH RECORD IN CLOUD COMPUTING USING A BSTRACT BASED ENCRYPTION

🔒
Trusted Engineering Publisher
Serving Researchers Since 2012
IJERT-MRP IJERT-MRP

Congestion management in transmission tines using demand response and FA CTS devices

View Abstract & full text pdf of Congestion management in transmission tines using demand response and FA CTS devices