Table of Contents
Vol 5, No 12 (2013)
![Open Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltext_open_medium.gif)
![Restricted Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltext_restricted_medium.gif)
Articles
Design and Simulation of Ternary Logic Gates | ||
A. P. Dhande, Satish S. Narkhede, Shridhar S. Dudam | ||
Vol 5, No 12 (2013), Pagination: 442-446 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 292 | PDF Views: 1 |
Modelling and Simulation of High Step up DC to AC Converter for Microsource Application | ||
R. Sowmya, S. Rama Reddy | ||
Vol 5, No 12 (2013), Pagination: 447-450 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 199 | PDF Views: 3 |
Optimized Power Utilization in Smart Hall Using Programmable Logic Controller (Plc) System | ||
R. Rakesh, S. Dhanaseelaraj, U. Saravanakumar | ||
Vol 5, No 12 (2013), Pagination: 451-453 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 177 | PDF Views: 4 |
Robust Bad Data Analysis Using Phasor Measurements Units in Power System State Estimation | ||
S. Nagy, Y. Rihan, I. Salama, A. Adail | ||
Vol 5, No 12 (2013), Pagination: 454-458 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 199 | PDF Views: 3 |
Security in Cloud Computing and Social Networking | ||
C. Senbagavalli, A. Kirubha | ||
Vol 5, No 12 (2013), Pagination: 459-465 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 205 | PDF Views: 3 |
Mobile Relay Configuration in Data-Intensive Wireless Sensor Networks | ||
S. Mohanapriya, G. Pandiyan | ||
Vol 5, No 12 (2013), Pagination: 466-478 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 180 | PDF Views: 1 |
An Analysis of Packet Hiding Methods | ||
L. Sheeba, V. S. Meenakshi | ||
Vol 5, No 12 (2013), Pagination: 479-483 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 197 | PDF Views: 2 |