CONFERENCE DATE: Date: 26th June, 2016 Venue: Bengaluru, India |
Finding Error Rate and Improving Network Efficiency in WSN | |||||||||||
Page(s): | 1-4 | ||||||||||
Author | Sharada K A, Siddaraju | ||||||||||
|
Clustering of Email Based on Fuzzy Rule and Ontology Extraction | |||||||||||
Page(s): | 5-8 | ||||||||||
Author | Suma T, Kumara Swamy Y S | ||||||||||
|
Conjugate CFD With Heat Transfer Analysis of Turbine Rim | |||||||||||
Page(s): | 9-14 | ||||||||||
Author | Arjun Kumar .D, Sivasankara Reddy, K.S.Shashi Shekar | ||||||||||
|
Experimental Analysis of Solar Powered Thermoelectric Refrigerator | |||||||||||
Page(s): | 15-18 | ||||||||||
Author | Nishan Shetty, Lavesh Soni, Saagar Manjunath, Govind Rathi | ||||||||||
|
Cold Flow Analysis of Tangential Inflow of Air-Producer Gas Carburetor | |||||||||||
Page(s): | 19-21 | ||||||||||
Author | Arun A.S., G.S.Shiva Shankar | ||||||||||
|
Design and Analysis of Exhaust Diffuser of Gas Turbine Afterburner Using CFD | |||||||||||
Page(s): | 22-27 | ||||||||||
Author | Vinodkumar S Hiremath, S. Ganesa, R. Suresh | ||||||||||
|
CFD Analysis of Gas Turbine Combustor Primary Zone Using Different Axial Swirler Configurations | |||||||||||
Page(s): | 28-31 | ||||||||||
Author | Prasanna Gouda, K. Srinivasan, G. Sivaramakrishna, K.S. Shashishekar | ||||||||||
|
Smart Vehicle Prototype of Arduino Based Vehicle | |||||||||||
Page(s): | 32-35 | ||||||||||
Author | Megha M Acharya, Nikhita N, Priyanka Sateesh, Ravi Kumar M | ||||||||||
|
GA Based Search Optimization For Information Retrieval | |||||||||||
Page(s): | 36-40 | ||||||||||
Author | Aniket M. Akarte, Pradnya V. Kulkarni | ||||||||||
|
IRIS Detection Based on Principal Component Analysis With GSM Interface | |||||||||||
Page(s): | 41-48 | ||||||||||
Author | J Meghana, Kavyashree K, Naveen Kumar G, Supriya H S, C Gururaj | ||||||||||
|
Patient Personal Health Record System Using Attribute Based Access Control Technique | |||||||||||
Page(s): | 49-53 | ||||||||||
Author | Abhineet Dubey, Anand Rajavat | ||||||||||
|
An Expansible Approach to Maintain and Intensify Security in Cloud | |||||||||||
Page(s): | 54-57 | ||||||||||
Author | Vratika Tiwari, Chetan Chauhan, Anand Rajavat | ||||||||||
|