S.No |
Articles |
Ref. No |
1 | Various Database Attacks and its Prevention Techniques - K.A.Varunkumar , M.Prabakaran , Ajay Kaurav , S.Sibi Chakkaravarthy , S.Thiyagarajan , Pokala Venkatesh |
IJETT-V9P302 |
2 | Comparison of Algorithms for Fetal ECG Extraction - Winnie Rachel Cherian , D.J.Jagannath , A.Immanuel Selvakumar |
IJETT-V9P304 |
3 | Performance of MANET: A Review - Swati Puri , Vishal Arora |
IJETT-V9P305 |
4 | Impact Analysis on the Performance of Zigbee Protocol Under Various Mobility Models - Parneet Dhillon , Dr. Harsh Sadawarti |
IJETT-V9P306 |
5 | A Survey on Leakage Power Reduction Techniques by Using Power Gating Methodology - Pramod Kumar. M.P , A.S. Augustine Fletcher |
IJETT-V9P308 |
6 | Implementation of Speech Recognition in Web Application for Sub Continental Language - Dilip Kumar , Abhishek Sachan , Malay Kumar |
IJETT-V9P309 |
7 | Extracting Large Data using Big Data Mining - Ms. Neha A. Kandalkar , Prof. Avinash Wadhe |
IJETT-V9P310 |