EDITORIAL COMMENTARY | ||
The Malady of Technology in Our Lives: Is Anyone Listening? | p. 3 | |
M Jagadesh Kumar DOI:10.4103/0256-4602.107333 | ||
[HTML Full text] [PDF] [Mobile Full text] [EPub] [Sword Plugin for Repository]Beta | ||
ARTICLES | ||
Intelligence in Wireless Networks with Cognitive Radio Networks! | p. 6 | |
Satwant Kaur DOI:10.4103/0256-4602.107334 | ||
[ABSTRACT] [HTML Full text] [PDF] [Mobile Full text] [EPub] [Sword Plugin for Repository]Beta | ||
Review and Performance Analysis on Routing and Wavelength Assignment Approaches for Optical Networks | p. 12 | |
Bijoy Chand Chatterjee, Nityananda Sarma, Partha Pratim Sahu DOI:10.4103/0256-4602.107335 | ||
[ABSTRACT] [HTML Full text] [PDF] [Mobile Full text] [EPub] [Sword Plugin for Repository]Beta | ||
Algorithm and Architecture for Adaptive Motion Estimation in Video Processing | p. 24 | |
Anand Paul, K Bharanitharan, JiaJi Wu DOI:10.4103/0256-4602.107336 | ||
[ABSTRACT] [HTML Full text] [PDF] [Mobile Full text] [EPub] [Sword Plugin for Repository]Beta | ||
An Analytical Model of Triple RESURF Device with Linear P-layer Doping Profile | p. 31 | |
Tingting Hua, Yufeng Guo, Ying Yu, Gene Sheu, Jiafei Yao DOI:10.4103/0256-4602.107337 | ||
[ABSTRACT] [HTML Full text] [PDF] [Mobile Full text] [EPub] [Sword Plugin for Repository]Beta | ||
A Survey of Shadow Volume Algorithms in Computer Graphics | p. 38 | |
Hoshang Kolivand, Mohd Shahrizal Sunar DOI:10.4103/0256-4602.107338 | ||
[ABSTRACT] [HTML Full text] [PDF] [Mobile Full text] [EPub] [Sword Plugin for Repository]Beta | ||
Facial Expression Recognition Using Local Transitional Pattern on Gabor Filtered Facial Images | p. 47 | |
Tanveer Ahsan, Taskeed Jabid, Ui-Pil Chong DOI:10.4103/0256-4602.107339 | ||
[ABSTRACT] [HTML Full text] [PDF] [Mobile Full text] [EPub] [Sword Plugin for Repository]Beta | ||
An Efficient Distributed Programming Model for Mining Useful Patterns in Big Datasets | p. 53 | |
Md. Rezaul Karim, Chowdhury Farhan Ahmed, Byeong-Soo Jeong, Ho-Jin Choi DOI:10.4103/0256-4602.107340 | ||
[ABSTRACT] [HTML Full text] [PDF] [Mobile Full text] [EPub] [Sword Plugin for Repository]Beta | ||
Survey of Internet Protocol Version 6 Link Local Communication Security Vulnerability and Mitigation Methods | p. 64 | |
Supriyanto , Iznan Husainy Hasbullah, Raja Kumar Murugesan, Sureswaran Ramadass DOI:10.4103/0256-4602.107341 | ||
[ABSTRACT] [HTML Full text] [PDF] [Mobile Full text] [EPub] [Sword Plugin for Repository]Beta | ||
Review of Sense Amplifiers for Static Random Access Memory | p. 72 | |
Jiafeng Zhu, Na Bai, Jianhui Wu DOI:10.4103/0256-4602.107343 | ||
[ABSTRACT] [HTML Full text] [PDF] [Mobile Full text] [EPub] [Sword Plugin for Reposito |
Monday, March 25, 2013
IETE Technical Review-January-February 2013 Volume 30 | Issue 1 Page Nos. 3-82
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment