Current Issue (Month October 2014)

Search Your Paper search_ic24

IJIRT Search Xplore - Search by Paper id, Published paper id, Paper Name, Author Name and Paper Title

search_ic15Search Your Paper Details.

All Published Paper Digital Library. Search Through below Search Option.

  • Year: October 2014
  • Volume: 1
  • Issue: 5
  • PageNo: 402-404

Mythology – Source of Strength in That Long Silence

  • Authors: Prasanna Udipikar
  • Year: October 2014
  • Volume: 1
  • Issue: 5
  • PageNo: 131-136

VISCO-ELASTIC FLUID FLOW OVER A NON-LINEARLY STRETCHING SURFACE

  • Authors: Dr.Sayed Anis Fatima Hameed
  • Year: October 2014
  • Volume: 1
  • Issue: 5
  • PageNo: 1211-1214

A Study of Globally Shared-Medium On-Chip Interconnect

  • Authors: Bukya Balaji
  • Year: October 2014
  • Volume: 1
  • Issue: 5
  • PageNo: 1206-1210

RELATIONS AND FUNCTIONS

  • Authors: ANCY OOMMEN, CHANCHAL PAL
  • Year: October 2014
  • Volume: 1
  • Issue: 5
  • PageNo: 1197-1205

Implementation of I2C-DMA & SPI-DMA Interface

  • Authors: Abhishek Singh, Anjali Kataria
  • Year: October 2014
  • Volume: 1
  • Issue: 5
  • PageNo: 1194-1196

DEADLOCK DETECTION AND PREVENTION

  • Authors: Manish Gahlot, Jatin Dadhwal
  • Year: October 2014
  • Volume: 1
  • Issue: 5
  • PageNo: 1191-1193

SOFTWARE PROJECT MANAGEMENT

  • Authors: Manish Gahlot, Jatin Dadhwal
  • Year: October 2014
  • Volume: 1
  • Issue: 5
  • PageNo: 1170-1190

Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes

  • Authors: M.Madhusudhan, N.SubbaReddy, G Kiran Kumar
  • Year: October 2014
  • Volume: 1
  • Issue: 5
  • PageNo: 1167-1169

Operating Systems Security  A Review

  • Authors: Ipsita Vashista, Harsha Suri, Disha Papneja
  • Year: October 2014
  • Volume: 1
  • Issue: 5
  • PageNo: 1163-1166

ENCRYPTION TECHNIQUES

  • Authors: DEEPAK VERMA, DEEPAK VERMA
  • Year: October 2014
  • Volume: 1
  • Issue: 5
  • PageNo: 1158-1162

Optical Fiber Communication System Performance Using MZI Switching

  • Authors: Anuj Kumar, Abhijeet Ashish, Anil Kumar
  • Year: October 2014
  • Volume: 1
  • Issue: 5
  • PageNo: 1156-1157

Integrated Services Digital Network

  • Authors: Anuj Kumar, Ashutosh sharma, Anil Kumar
  • Year: October 2014
  • Volume: 1
  • Issue: 5
  • PageNo: 1152-1155

PROJECTIVE GEOMETRY

  • Authors: KartikRai, Ayush Sharma, MohitTanwar
  • Year: October 2014
  • Volume: 1
  • Issue: 5
  • PageNo: 0-0

NETWORK SECURITY

  • Authors: PRIYA KUMARI ,NEHA AGRAWAL
  • Year: October 2014
  • Volume: 1
  • Issue: 5
  • PageNo: 1150-1151

MICROSOFT FOUNDATION CLASSES

  • Authors: PRIYA KUMARI ,NEHA AGRAWAL
  • Year: October 2014
  • Volume: 1
  • Issue: 5
  • PageNo: 1146-1149

Operating System Virtualization

  • Authors: PRIYA KUMARI ,NEHA AGRAWAL
  • Year: October 2014
  • Volume: 1
  • Issue: 5
  • PageNo: 1142-1145

AN EXPLORATORY ANALYSIS OF EMAIL PROCESSING STRATEGIES

  • Authors: PRIYA KUMARI ,NEHA AGRAWAL
  • Year: October 2014
  • Volume: 1
  • Issue: 5
  • PageNo: 1137-1141

SIGNIFICANCE OF CODE OPTIMISATION

  • Authors: PRIYA KUMARI ,NEHA AGRAWAL
  • Year: October 2014
  • Volume: 1
  • Issue: 5
  • PageNo: 1131-1136

VIRTUAL CRIME SCENE RECONSTRUCTION WITH INTEGRATED ANIMATED CHARACTERS

  • Authors: Lubna Siddiqui,Kanika Jindal
  • Year: October 2014
  • Volume: 1
  • Issue: 5
  • PageNo: 1127-1130

RISK MANAGEMENT

  • Authors: Sheena Batra, Rakesh Sondal
  • Year: October 2014
  • Volume: 1
  • Issue: 5
  • PageNo: 1121-1126

Java Remote Method Invocation (RMI)

  • Authors: Sheena Batra, Rakesh Sondal
  • Year: October 2014
  • Volume: 1
  • Issue: 5
  • PageNo: 1118-1120

Introduction to JADE

  • Authors: Ravi Ojha, Rahul Jha
  • Year: October 2014
  • Volume: 1
  • Issue: 5
  • PageNo: 1116-1117

Why use Multimedia Databases

  • Authors: Ravi Ojha, Rahul Jha
  • Year: October 2014
  • Volume: 1
  • Issue: 5
  • PageNo: 1113-1115

Risk Management in Software Development

  • Authors: Rashmi Arora, Tarika Bhutani, Ronak Juneja
  • Year: October 2014
  • Volume: 1
  • Issue: 5
  • PageNo: 1110-1112

Let us communicate

  • Authors: Rashmi Arora, Tarika Bhutani, Ronak Juneja
  • Year: October 2014
  • Volume: 1
  • Issue: 5
  • PageNo: 1106-1109

Nature of a lexicon in compiler design

  • Authors: Rashmi Arora, Tarika Bhutani, Ronak Juneja
  • Year: October 2014
  • Volume: 1
  • Issue: 5
  • PageNo: 1090-1096

GLOBAL NAVIGATION SATELLITE SYSTEMS

  • Authors: DEEPAK VERMA, HARDIK BHARDWAJ
  • Year: October 2014
  • Volume: 1
  • Issue: 5
  • PageNo: 1084-1089

Java Servlets and Applets

  • Authors: DEEPAK VERMA, HARDIK BHARDWAJ
  • Year: October 2014
  • Volume: 1
  • Issue: 5
  • PageNo: 1081-1083

TRANSFORMATION

  • Authors: VARUN SALUJA, VANITA
  • Year: October 2014
  • Volume: 1
  • Issue: 5
  • PageNo: 1077-1080

Security In Computer Network

  • Authors: VARUN SALUJA, VANITA
  • Year: October 2014
  • Volume: 1
  • Issue: 5
  • PageNo: 1072-1076

OVERVIEW OF UNIX OS

  • Authors: VARUN SALUJA, VANITA
  • Year: October 2014
  • Volume: 1
  • Issue: 5
  • PageNo: 1069-1071

Direct memory access and 8237 DMA controller

  • Authors: VARUN SALUJA, VANITA
  • Year: October 2014
  • Volume: 1
  • Issue: 5
  • PageNo: 1067-1068

SINGLE DOCUMENT BASED

  • Authors: VARUN SALUJA, VANITA
  • Year: October 2014
  • Volume: 1
  • Issue: 5
  • PageNo: 1063-1066

COMPUTER ANIMATION

  • Authors: Simmy Agarwal, Rekha
  • Year: October 2014
  • Volume: 1
  • Issue: 5
  • PageNo: 1060-1062

VIRTUAL MACHINE

  • Authors: Simmy Agarwal, Rekha
  • Year: October 2014
  • Volume: 1
  • Issue: 5
  • PageNo: 1056-1059

MULTI CORE PROCESSOR

  • Authors: Simmy Agarwal, Rekha
  • Year: October 2014
  • Volume: 1
  • Issue: 5
  • PageNo: 1054-1055

INTERNET PROTOCOL (IPV6)

  • Authors: Simmy Agarwal, Rekha
  • Year: October 2014
  • Volume: 1
  • Issue: 5
  • PageNo: 1050-1053

OVERVIEW OF COMPILERS

  • Authors: Simmy Agarwal, Rekha
  • Year: October 2014
  • Volume: 1
  • Issue: 5
  • PageNo: 1048-1049

DIALOG BASED

  • Authors: Simmy Agarwal, Rekha
  • Year: October 2014
  • Volume: 1
  • Issue: 5
  • PageNo: 0-0

EXAMINATION OF SOFTWARE QUALITY MODELS FOR ORGANIZATIONS

  • Authors: DEEPAK VERMA, HARDIK BHARDWAJ
  • Year: October 2014
  • Volume: 1
  • Issue: 5
  • PageNo: 1039-1043

DATA MINING TECHNIQUES

  • Authors: DEEPAK VERMA, HARDIK BHARDWAJ
  • Year: October 2014
  • Volume: 1
  • Issue: 5
  • PageNo: 1034-1038

ASYNCHRONOUS TRANSFER MODE

  • Authors: DEEPAK VERMA, HARDIK BHARDWAJ
  • Year: October 2014
  • Volume: 1
  • Issue: 5
  • PageNo: 1029-1033

A SURVEY

  • Authors: Divya S Sharma, Raj Hakani
  • Year: October 2014
  • Volume: 1
  • Issue: 5
  • PageNo: 1023-1028

A SURVEY ON FREQUENT ITEMSET MINING TECHNIQUES USING GPU

  • Authors: Ayushi M Patel, Dharmesh Bhalodiya
  • Year: October 2014
  • Volume: 1
  • Issue: 5
  • PageNo: 1015-1022

Web Development Methodology

  • Authors: Harsha Suri, Disha Papneja, Ipsita Vashishta
  • Year: October 2014
  • Volume: 1
  • Issue: 5
  • PageNo: 1013-1014

DATA CENTER NETWORKING

  • Authors: Vivek Gusain, Varsha Chauhan
  • Year: October 2014
  • Volume: 1
  • Issue: 5
  • PageNo: 1101-1105

Graphical Kernel System (GKS)

  • Authors: Ravi Sangwan, Pankaj Gupta
  • Year: October 2014
  • Volume: 1
  • Issue: 5
  • PageNo: 1101-1105

Graphical Kernel System (GKS)

  • Authors: Ravi Sangwan, Pankaj Gupta
  • Year: October 2014
  • Volume: 1
  • Issue: 5
  • PageNo: 1097-1100

AWK Utility

  • Authors: Ravi Sangwan, Pankaj Gupta