Search
Products meeting the search criteria
AUTOMATION OF SMART WASTE MANAGEMENT USING IoT TO SUPPORT SWACHH BHARAT ABHIYAN A PRACTICAL APPROACH
Swachh Bharat Abhiyaan” is a national campaign by the Government of India, covering 4,041 statutory..
Improved 8-Point Approximate DCT for Image and Video Compression Requiring Only 14 Additions
Modern cryptography is heavily based on mathematical theory and computer science practice and the cr..
VANET-Based Secure and Privacy-Preserving Navigation
A navigation scheme that utilizes the road information collected by a vehicular ad hoc network (VANE..
1.2 V 10-bit 75 MS/s Pipelined ADC With Phase-Dependent Gain-Transition CDS
Nowadays the research works going on the pipelined ADC for power reduction and predictive error rate..
A CBR-based Approach to ITIL-based Service Desk
Incident Management and Problem Management are two main activities of ITIL service operation framewo..
A Cloud-Based System for Protecting Source Location Privacy against Hot-Spot Locating.
A Wireless sensor network (WSN) consists of a large number of sensing devices, called sensor nodes, ..
A Colpitts CMOS Quadrature VCO Using Direct Connection of Substrates for Coupling
To improve the phase noise, various experiments are done to modify the coupling networks. The coupli..
A Distributed Multi-Channel MAC Protocol for Ad Hoc Wireless Networks
The term ad hoc networking typically refers to a system of network elements that combine to form a n..
A graph based algorithm to minimize total wire length in vlsi channel routing
The important problem in VLSI layout design is minimization of total wire length. Minimization of wi..
A Hierarchical Packet Forwarding Mechanism for Energy Harvesting Wireless Sensor Networks
In wireless sensor networks (WSNs), long lifetime requirement of different applications and limited ..
A hybrid policy for fault tolerant load balancing in grid computing environments
Due to the emergence of grid computing over the Internet, there is a need for a hybrid load balancin..
A new Approach of Detecting Internet Worm
Internet worm means separate malware computer programs that repeated itself and in order to spread o..
A New Multi-path Routing Methodology Based on Logit Type Assignment
In networking, Lots of routing mechanisms in the Internet network have been based on single-shortest..
A Novel VLSI DHT Algorithm for a Highly Modular and Parallel Architecture
A new very large scale integration (VLSI) algorithmic rule for a 2N length discrete hartley transfor..
A QoS-Oriented Distributed Routing Protocol for Hybrid Wireless Networks
Wireless Sensor Networks (WSNs) in delay and reliability critical environments is highly desired due..