A Survey on Authentication in Cloud Computing For Data Storage Security
Published by: Mohammed Ubada
Full DetailsSkew Minimization with Low Power for Wide Voltage Range Using Coarse Grain Technique
Published by: Moonisha S. N, Anitha .R, Nikila .G, Murali Parthasarathy .K, Nandhini .M
Full DetailsTrend Analysis of Precipitation Data and its Spatio-temporal assessment in West Flowing River Basin of Kutch, Saurashtra and Marwar (WFR-KSM) Basin, India
Published by: Ila Agnihotri, Dr. M. P. Punia, Dr. J. R. Sharma
Full DetailsPartial Replacement of Fine Aggregate with GGBS
Published by: Yogesh Biyani, Jyoti R. Mali, Piyush Bagul, Pradip Pandhare, Hemant Bafna, Mandar Joshi
Full DetailsNumerical Analysis of Aerofoil Section of Blade Of axial Flow Fan at Different Angle Of Attack
Published by: Anil Yadav, Meghna Pathak, Dr. P. K Sharma
Full DetailsImage Fusion based on Integration of Wavelet and Curvelet Fusion Methods
Published by: Barkha Panda, Prabhakar Sharma
Full Details