NCICCT - 2016 (Volume 4 - Issue 19)

Mitigating Attacks using Relay Routing for Wireless Sensor Networks
| Total Downloads : 6
Authors : K. Dhivya, R. Pradeepa
Simulation of Obstacle Avoidance for Mobile Robots using Vector Field Histogram in Player/Stage Platform
| Total Downloads : 7
Authors : T. Mohanraj, S. Prasanth, G. Kalaiarasan
Automated Heater Control and Monitoring using LabVIEW and NI ELVIS
| Total Downloads : 6
Authors : R. Jamuna, J. Bavithra, M. Anusha, T. Devashena
Segmentation and Classification of Lung Diseases
| Total Downloads : 6
Authors : Porkodi. J, Aswin Ram, Arun kannan
Physical Layer Wireless Security Shaped with Noisy Symbol Keys
| Total Downloads : 8
Authors : Vaishnavi.R, Sri Santhoshini.E
College Counselling Recommendation System using Android
| Total Downloads : 6
Authors : S. Doni Angel, R. Nandhinipriya
Efficient Process of Fixing Bug using Instance and Feature Selection
| Total Downloads : 6
Authors : A. Anbu Vidhya, M. Sowmya Rani
Industrial Collateral Damage Reduction using Mobility Robot based on Internet of Things
| Total Downloads : 7
Authors : Babu M, Girish Y, Karthik D, Sivarama Krishnan R, Janish Subhash Pandian P
A Conceptual Framework for Safe Guarding Soldiers Through Wireless Network
| Total Downloads : 6
Authors : S. K. Ramyaa, S. Sandhiya
Recovery of an Addicted Individual by Controlling Brain Waves
| Total Downloads : 6
Authors : R. Vishnu Priyaa, P. Saranya Devi
Wind Turbine Monitoring and Fault Diagnosis by Can Protocol
| Total Downloads : 7
Authors : V.Anandhi, M.Gowri, B.Kavinaya, G.Kiruthika, Mrs. P. S. Gomathi
Secure Transmission Against Packet Dropping Attack inWireless Network using CPHS
| Total Downloads : 6
Authors : K. Amuthapriya, P. Dhivyabharathi, M. Mohana
Smartphone based Student Mark Report Processing System with Voice Narration
| Total Downloads : 6
Authors : S. Soundharya, K. Leka Priyadharshini
Locating Flaw in Optical Fiber Cables using GPS, GSM and Fiber Optic Strain Sensor
| Total Downloads : 6
Authors : R. Parvadhavardhini, N. Harini, S. Catherina Dolly
Incessant and Transparent user Integrity for Protected Internet Services
| Total Downloads : 6
Authors : M. Dhanushya, S. Raghavi, T. Senthamizh Chudar, Mr. Elaiyaraja V
Automatic Writing Machine using Brain Sensor
| Total Downloads : 6
Authors : N. Harini, S. Catherina Dolly, R. Parvadhavardhini
Cipher Mail Server for Intranet
| Total Downloads : 10
Authors : Madhu Bala. J, Dharmaraj. R, Nandhini. P
A Novel Security Scheme for Preventing Data from Phishers for Netbanking
| Total Downloads : 10
Authors : Kodeeswari. K, Kavi Priya. M, Nisha Florance. B
Dispersion Compensation Analysis of Optical Communication Link using FBG
| Total Downloads : 6
Authors : Syed Akbar. S, Geraldin Silvia. R, Geethanjali. P
Non-Destructive Safety for Livestock and Humans using Arduino Uno
| Total Downloads : 6
Authors : S. Sasikala, Dr. R. Nagarajan

Crossref - DOI Prefix: 10.17577

IJERT Indexing Databases

IJERT Indexing Databases

Submit Manuscript online

Journal of Engineering Call for Papers 2018

ISSN for IJERT Digital Library

ISSN: 2278-0181

ISO 3297:2007

Join as Reviewer

Creative Commons License

Newsletter Subscribe

© 2018 International Journal of Engineering Research & Technology - IJERT.ORG. All Rights Reserved.