RACMS - 2015 (Volume 3 - Issue 33)

Docking Exploration of Human Estrogen Receptor to Decipher Phytochemicals as Tumor Suppressors
| Total Downloads : 5
Authors : Chitra Jeyaraj Pandian, Vinodhini Jayaraj, Soffiya James, Mareeswari Nagarajan, J. Chitra,
An Overview of Bluetooth?Wireless Technology
| Total Downloads : 2
Authors : Ms. Indumathy. T
The Cycle non Split Domination Number of Fuzzy Graphs
| Total Downloads : 5
Authors : C. Y. Ponnappan, P. Surulinathan, S. Basheer Ahamed
Decomposition of Supra M-Continuous Mappings
| Total Downloads : 5
Authors : M. Sathya Bama, O. Ravi
gm-Closed and gm-Open Maps in Fuzzy Topological Spaces
| Total Downloads : 5
Authors : M. Jeyaraman, J. Rajalakshmi, R. Muthuraj
New Types of Fuzzy Topological Maps
| Total Downloads : 4
Authors : M. Jeyaraman, J. Rajalakshmi, R. Muthuraj
A Method to Solve Multi Criteria Decision Making Problems based on Fuzzy Numbers
| Total Downloads : 6
Authors : P. Bharathi
Flow Distribution Network with Triangular Intuitionistic Fuzzy Number as EDGE Weight
| Total Downloads : 5
Authors : B. Rajesh, S. Ismail Mohideen, J. Prassanna
A Customized Approach for Risk Evaluation and Prediction based on Data Mining Technique
| Total Downloads : 5
Authors : K. Kala
Improved Method for Nearest Neighbor Search using Keywords
| Total Downloads : 4
Authors : B. Saravanan
Performance Analysis of Shortest Path Routing Problem using Heuristic Algorithms
| Total Downloads : 5
Authors : R. Somasundara Manikandan
On ??-Generalized Closed Sets in Generalized Topological Spaces
| Total Downloads : 2
Authors : M. Jeyaraman, S. Chinthamani Vasthirani
SIFLOW: A Data Centric Routing Protocol in Wireless Sensor-ActuatorNetworks
| Total Downloads : 5
Authors : D. Lissy, D. Suja Mary
Applying Distortion Measure and Classification of Data Mining to Image Compression
| Total Downloads : 4
Authors : S. Radhika, Edith Maria Delilah
Secured My Personal Health Record Sharing and Data Translation via Virtual Machines in the Cloud
| Total Downloads : 4
Authors : M. Surja
A Comparative Study of Application of Classification Algorithms on KDDCup Dataset to Detect Intrusions using WEKA Tool
| Total Downloads : 5
Authors : S. Venkata lakshmi, Dr. T. Edwin Prabakaran
A Threshold Signature: Secure Data Sharing for Dynamic Groups in the Cloud
| Total Downloads : 4
Authors : B. Suganya, Dr. K. Vimala Devi
A Study of Security Challenges in Mobile Ad hoc Networks
| Total Downloads : 4
Authors : G. Shanthi, Dr. M. Ganaga Durga
Various Attacks and Countermeasures in Mobile Ad Hoc Networks: A Survey
| Total Downloads : 7
Authors : R. Anandha Jothi, AL. Jeeva and V. Palanisamy
Modern Tamil Word Formation Rules in NLP
| Total Downloads : 4
Authors : Dr. K. Nirmala, M. K. Kalpana
 
 

Crossref - DOI Prefix: 10.17577

IJERT Indexing Databases

IJERT Indexing Databases

Submit Manuscript online


Journal of Engineering Call for Papers 2018


ISSN for IJERT Digital Library

ISSN: 2278-0181

ISO 3297:2007


Join as Reviewer


Creative Commons License
 


Newsletter Subscribe

© 2018 International Journal of Engineering Research & Technology - IJERT.ORG. All Rights Reserved.