Volume-10 Number-8 April 2014

S.No
Title/Author Name
Ref. No
 71

A Network Intrusions Detection System based on a Quantum Bio Inspired Algorithm 

- Omar S. Soliman , Aliaa Rasseml

 

IJETT-V10P271
 72

A Comparative Study of the Suitability of Dakuk, Kirkuk-Iraq and Tuz, Salahaddin-Iraq Coarse Aggregates for Construction Purposes 

- Shafak Noori H. Barzangi , Assist. Prof. Dr. Hamed M. Jassim , Sarmad Fadhil Abdullah , Shukri Saleh Mohamed

 

IJETT-V10P272
 73

Experimental Studies on Concrete Replacing Fine Aggregate with Blast Furnace Slags 

- J. Selwyn Babu , Dr. N. Mahendran

 

IJETT-V10P273
 74

A Strategic Review of Routing Protocols for Mobile Ad Hoc Networks 

- A. Samuel Chellathurai , E.George Dharma Prakash Raj

 

IJETT-V10P274
 75

A Review on some aspects of Black Hole Attack in MANET 

- Ashis Bhattercharjee , Subrata Paul

 

IJETT-V10P275
 76

A Review on Security of Fingerprint Template Using Fingerprint Mixing 

- Jayashree Sonar , Mr.S.O.Dahad

 

IJETT-V10P276
 77

Real Time Monitoring of Parameter Influencing Freshwater Fishes 

- Mr. Amar R. Shiral , Prof. A.S. Mali , Mr. Vasim Ustad

 

IJETT-V10P277
 78

Fast Fourier Transform Implementation on FPGA Using Soft-Core Processor NIOS II 

- Poonam S. Isasare , Mahesh T. Kolte

 

IJETT-V10P278
 79

Diagnosing the Intermittent Failures in a Vehicle& Intelligent Vehicle Control and Monitoring Using CAN and ARM 7

- SippeeBharadwaj , Mrs Anita R

 

IJETT-V10P279
 80

Contingency Ranking and Analysis Using Mipower

- Shahnawaaz Shaikh , Vijayalaxmi Lingaraddi

 

IJETT-V10P280