Categories

Archives-September 2011

Full-Text AvailableAbstract Only

Show:
Sort By:
       61. An improved power quality using multi-pulse AC-DC converters in vector controlled induction motor drives
M.Karthika and K.P.Swaroop
Abstract | Pdf Category : Engineering    |   Sub Category : Electrical and Electronics
       62. An enhanced data summarization for privacy preservation in incremental data mining
V.Rajalakshmi and G.S.Ananthamala
Abstract | Pdf Category : Computing and Informatics    |   Sub Category : Information Technology
       63. Statistical classifier with barcode based feature vectors for numerals recognition
Shreedharamurthy S K and H.R.Sudarshana Reddy
Abstract | Pdf Category : Engineering    |   Sub Category : Electrical and Electronics
       64. An artificial neural network approach of load frequency control in a multi area interconnected power system
V.Shanmuga Sundaram and T.Jayabarathi
Abstract | Pdf Category : Engineering    |   Sub Category : Electrical and Electronics
       65. An image encryption algorithm using chaos
R.Raja Kumar, A.Sampath and P.Indumathi
Abstract | Pdf Category : Computing and Informatics    |   Sub Category : Computer Engineering
       66. An artificial neural network based method for beam position calculation in electron storage ring
Y.Tyagi and T.A. Puntambekar
Abstract | Pdf Category : Computing and Informatics    |   Sub Category : Computer Engineering
       67. Detection of micro-calcifications in mammogram images using probabilistic neural network
Nilofar Farzana and S Rathnakara
Abstract | Pdf Category : Computing and Informatics    |   Sub Category : Information Technology
       68. The security of elliptic curve cryptography over RSA cryptography
G. Jai Arul Jose and C. Sajeev
Abstract | Pdf Category : Computing and Informatics    |   Sub Category : Information Technology
       69. Linear and differential cryptanalysis of DES
C. Sajeev and C. Suyambulingom
Abstract | Pdf Category : Mathematical Sciences    |   Sub Category : Applied Mathematics
       70. Several types of defined attacks on cryptographic hash function
C. Krishna Kumar and G. Jai Arul Jose
Abstract | Pdf Category : Mathematical Sciences    |   Sub Category : Applied Mathematics