Category Archives: Volume 02, Issue 01 (January 2013)

🏆
Authentic Engineering Platform
Serving Researchers Since 2012
IJERT-MRP IJERT-MRP

Mobile Applications: Delivery Technologies In Multimedia Cloud Computing

View Abstract & full text pdf of Mobile Applications: Delivery Technologies In Multimedia Cloud Computing

🌏
Global Publishing Platform
Serving Researchers Since 2012
IJERT-MRP IJERT-MRP

Green Learning: Appraising Power Consumption for WBL Environment

View Abstract & full text pdf of Green Learning: Appraising Power Consumption for WBL Environment

🏆
International Research Press
Serving Researchers Since 2012
IJERT-MRP IJERT-MRP

Keylogger Use for Security of A Personal Computer

View Abstract & full text pdf of Keylogger Use for Security of A Personal Computer

Trusted Scholarly Publisher
Serving Researchers Since 2012
IJERT-MRP IJERT-MRP

Tracking of Unauthorized Access Using Face Recognition

View Abstract & full text pdf of Tracking of Unauthorized Access Using Face Recognition

🔒
Premier Academic Publisher
Serving Researchers Since 2012
IJERT-MRP IJERT-MRP

An Improvement in K-means Clustering Algorithm

View Abstract & full text pdf of An Improvement in K-means Clustering Algorithm

🌏
International Academic Publisher
Serving Researchers Since 2012
IJERT-MRP IJERT-MRP

Analysis of Scramjet Engine With And Without Strut

View Abstract & full text pdf of Analysis of Scramjet Engine With And Without Strut

Authentic Engineering Platform
Serving Researchers Since 2012
IJERT-MRP IJERT-MRP

A Proactive Spectrum Approach for Cognitive Radio Ad-Hoc Networks

View Abstract & full text pdf of A Proactive Spectrum Approach for Cognitive Radio Ad-Hoc Networks

🔒
International Knowledge Platform
Serving Researchers Since 2012
IJERT-MRP IJERT-MRP

Hand Gesture Recognition using SIFT

View Abstract & full text pdf of Hand Gesture Recognition using SIFT

International Research Press
Serving Researchers Since 2012
IJERT-MRP IJERT-MRP

Apprising in Secured Manner to Anonymous and Confidential Databases

View Abstract & full text pdf of Apprising in Secured Manner to Anonymous and Confidential Databases