Is Your Paper Best..? Lets Check Here: Go

NCRACE-2014 Issues

No. Article(Paper) Title Author(s) Subject Access Downloads
1WAVELET BASED FORENSIC METHOD FOR COPY-MOVE FORGERY DETECTIONR.REETANCRACE-2014 CONFERENCEView1543
2A NOVEL METHOD FOR GLAUCOMA DETECTION THROUGH DISC AND CUP EXTRACTIONN.SHALININCRACE-2014 CONFERENCEView1548
3PACKET ENCRYPTION AND SCHEDULING TO ENHANCE SECURITY AND QOS IN NETWORKM. SWATHYNCRACE-2014 CONFERENCEView1328
4AN EFFICIENT ROUTING APPROACH FOR REDUCING DEAD LOCK IN MOBILE ADHOC NETWORKSV . ABILASHANCRACE-2014 CONFERENCEView909
5ROLE BASED ACCESS POLICIES FOR CONTROLLED INFORMATION SHARING IN EMERGENCY SITUATIONSP.UMA MAHESWARINCRACE-2014 CONFERENCEView1085
6REDUCING THE ENERGY CONSUMPTION OF THE NETWORK BY FINDING THE SHORTEST PATH USING HYBRID ROUTING ALGORITHM IN DSDV PROTOCOLB.THENRALNCRACE-2014 CONFERENCEView1307
7A VLSI FRAMEWORK FOR PARALLEL LONG-PERIOD RANDOM NUMBER GENERATOR BASED ON THE RESEEDING METHODS.MUKILESWARINCRACE-2014 CONFERENCEView1464
8PATIENT MONITORING SYSTEM USING EMBEDDED MODULE FOR BIOMEDICAL ENGINEERINGC.PRAGASHNCRACE-2014 CONFERENCEView1684
9ADVANCED DOOR LEVEL SECURITY SYSTEM FOR THEFT DETECTIONB.KAMATCHINCRACE-2014 CONFERENCEView2961
10WCET ANALYSIS ON REAL TIME EMBEDDED SYSTEMS FOR MEMORY CONSTRAINSBALACHANDAR JAYAPALANNCRACE-2014 CONFERENCEView1310
11INTELLIGENCE INFORMATION SYSTEM FOR TRAIN LOCATION USING GPS & GSMSINGARAM.MNCRACE-2014 CONFERENCEView2171
12OPTIMAL SELECTION OF WAVELET FAMILIES FOR SPECK IMAGE CODEC SCHEMED.REGANNCRACE-2014 CONFERENCEView1135
13SECURITY AWARE SCHEDULERD.SANTHOSH KUMARI NCRACE-2014 CONFERENCEView878
14ENHANCING CLOUD SECURITY USING SEDASN.SWETHANCRACE-2014 CONFERENCEView1148
15ENHANCED CELL-EDGE PERFORMANCE WITH TRANSMIT POWER-SHAPING AND MULTIPOINT, MULTIFLOW TECHNIQUESSIVASANKARAN.SKNCRACE-2014 CONFERENCEView1016
16BER ANALYSIS FOR Q-OFDMA SPATIAL MULTIPLEXING USING OSTBC AND SPATIAL MULTIPLEXINGSURESH NNCRACE-2014 CONFERENCEView1248
17EDAC FOR MEMORY PROTECTION IN ARM PROCESSORMS.SRIJA NADENDLA, MRS. A. RUHAN BEVINCRACE-2014 CONFERENCEView2178
18NEXT GENERATION AUTO THEFT PREVENTION OF A VEHICLEM.K.TARUNNCRACE-2014 CONFERENCEView2301
19ENHANCING AOMDV ROUTING PROTOCOL BASED ON NEW ROUTING METRICS USING CROSS LAYER APPROACHV.VINOTH KUMARNCRACE-2014 CONFERENCEView1084
20BEE COLONY OPTIMIZATION FOR SELECTIVE HARMONIC ELIMINATION PWM IN MULTILEVEL INVERTERSV.PRATHIMANCRACE-2014 CONFERENCEView1774
21ANALYSIS OF MIMO-OFDM SYSTEM FOR ULTRA WIDE BAND (UWB) COMMUNICATIONSN.GOMATHINCRACE-2014 CONFERENCEView1510
22AN EFFICIENT ROUTING ALGORITHM FOR MANETN.SELVAKUMARNCRACE-2014 CONFERENCEView1613
23PREVENTION OF DEADLOCK USING DMP IN WSNR. PREETHINCRACE-2014 CONFERENCEView1269
24ENERGY LOAD BALANCED CLUSTERED NETWORKS INCREASES CONNECTIVITY OF WIRELESS NETWORKSV.SANGEETHA NCRACE-2014 CONFERENCEView901
25PERFORMANCE ANALYSIS ON TECHNIQUES IN IMAGE SUPER RESOLUTIONM.APPADURAINCRACE-2014 CONFERENCEView1027
26A WIND SOLAR HYBRID SYSTEM USING SOLID STATE TRANSFORMER (SST) FOR REACTIVE POWER COMPENSATIONM.GOPINATH1SNCRACE-2014 CONFERENCEView3646
27PROBABILISTIC REBROADCAST BASED ON NEIGHBOR COVERAGE IN MANETSV.MON1SHA, D.DURAI KUMARNCRACE-2014 CONFERENCEView1026