ER Publications

Thomson Researcherid Journals | UGC Approved Journals | Online & Print Journals | Refereed Journals | Peer Reviewed Journals
UGC Approved Journals. Publish Research Papers & Books with proper ISSN and ISBN in International Indexed Journals/Conferences in 24 hrs and low cost..

Search Download

Downloads :-


Simulation of a three phase differential relay for transformer protection

Noha Abed-AL-Bary AL-Jawady, (IRAQ), Vol. 3, Issue 2, February, 2014

Pipeline ADC using Switched Capacitor Sharing Technique with 2.5 V, 10-bit

Ankit Jain, Vol. 3, Issue 2, February, 2014

Energy Management System for a FCHV based on Linear Programming

Dima A. Fares, Riad Chedid, Ferdinand Panik, (LEBANON), Vol. 3, Issue 2, February, 2014

Comparison of network security tools- Firewall, Intrusion Detection System and Honeypot

Tejvir Kaur, Vimmi Malhotra, Dr. Dheerendra Singh, Vol. 3, Issue 2, February, 2014

Performance comparison of firefly algorithm in Global Routing Optimization

Abhinandan Khan, Pallabi Bhattacharya, Subir Kumar Sarkar, Vol. 3, Issue 2, February, 2014

Systematic investigation of the effect of oxidation on the structure of Single-Walled Carbon Nanotubes (SWNTs)

Shahir Hussain, Sakshi Sharma, Vol. 3, Issue 2, February, 2014

Sensor Network for Different Applications: Review

Itisha Gupta, Romika Yadav, Garima, Vol. 3, Issue 2, February, 2014

A Survey: QoS of MANET through cryptography and routing protocol enhancement

Er. Vishal Singh, Er. Ashish Kumar Saxena, Vol. 3, Issue 2, February, 2014

Temperature effects on urea granules process to produce paddy fertilizer using top spray fluidized bed granulator

O. Rostam, Sivaraos, RadzaiMd Said, (MALAYSIA), Vol. 3, Issue 2, February, 2014

Power and delay efficient Full Adder Design for various technology

Vicky Kanoji, Anjana R, Vol. 3, Issue 2, February, 2014

A Review on Microgrid: Architecture, Model and Existing Ventures in India

Mehtab Fatima, Alpna Srivastava, Vol. 3, Issue 2, February, 2014

A Secure Image Communication Scheme based on combination of Compression, Cryptographyand Steganography

Bhavya Ahuja, S. K. Muttoo, Deepika Aggarwal, Vol. 3, Issue 2, February, 2014

Power Quality Improvement of a grid interconnected photovoltaic system by using Shunt Active Power Filter

K. Prasada Rao, J.B.V. Subrahmanyam, P. Balakishan, Vol. 3, Issue 2, February, 2014

Radiographic Assessment of Alveolar Bone Thickness by Two Plains Radiography (Pre-clinical study)

Nazar Ghanem Jameel, Osama M. Ibrahim, (IRAQ), Vol. 3, Issue 2, February, 2014

Automatic Generation Control of Hydro-Thermal Plant by Using Thyristor

Kirti Nagpal, Tanushree Kaul, Vol. 3, Issue 2, February, 2014

Implementation of IPV6 in Ad-Hoc Networks

Himanshu Saxena, Vol. 3, Issue 2, February, 2014

An efficient resource management through Green Computing

Madhu Sharma1, Tanushree Sharma, Vol. 3, Issue 2, February, 2014

Analysis of effect of varying quantization level on the image communication scheme based on combination of compression, cryptography and steganography

Bhavya Ahuja, S.K. Muttoo, Deepika Aggarwal, Vol. 3, Issue 2, February, 2014

Effective Advertising and IT Measures with special reference to anti-smoking advertising

Madhu Sharma, Vol. 3, Issue 2, February, 2014

Language Model Issues in Web Spam Detection

K. Priya Karunakaran, Seema Kolkur, Vol. 3, Issue 2, February, 2014

Controlling energy consumption in Imaging departments: The case of Rafic Hariri University Hospital

Mona Aridi, Bassam Hussein, Mohammad Hajj Hassan, Vol. 3, Issue 2, February, 2014