# | Article Title |
1 |
Efficient Business Process Reengineering with Crowdsourcing Authors : Hanieh Javadi Khasraghi, Mohammad Jafar Tarokh |
2 |
Comparison of Propagation Models for GSM 1800 and WCDMA Systems in Selected Urban Areas of Nigeria Authors : N. T. Surajudeen Bakinde, N. Faruk, A. A. Ayeni, M. Y. Muhammad, M. I Gumel |
3 |
FPGA based DWT-IDWT implementation of OFDM on UWB Systems Authors : Naagesh S. Bhat |
4 |
Analysis of Detection and Prevention of Various SQL Injection Attacks on Web Applications Authors : Nanhay Singh, Khushal Singh, Ram Shringar Raw |
5 |
Comparative Data On Docking Algorithms: Keeping the Update in the Field Knowledge Authors : Hioual K.S, Chikhi A, Bensegueni A,Merzoug A, Boucherit H |
6 |
A Novel Approach to Navigation of a Robot using a Memorizing Algorithm Authors : Kelvin D'Souza, Steffi Joseph, Ashley Jose, Sushant Chavan, Yogesh Gholap |
7 |
Performance Evaluation in Distributed System using Dynamic Load Balancing Authors : Rutuja Jadhav, Snehal Kamlapur, I Priyadarshini |
8 |
Study and analysis of quality of service in different image based steganography using Pixel Mapping Method (PMM) Authors : Souvik Bhattacharyya |
9 |
On Proficiency of HEED Protocol with Heterogeneity for Wireless Sensor Networks with BS and Nodes Mobility Authors : Manju Bala, Lalit Awasthi |