Research Article
Page no: 1 - 10
Ch Sumanlatha, P N L Malllia, J Mounika, U Prathyusha, M Lavanya, N Vijayalakshmi
Orthogonal Frequency Division Multiplexing (OFDM) is mainly designed to overcome the effects of multipath reception, by dividing the wideband channel into many narrowband sub-chann...
Research Article
Page no: 11 - 17
Anuj
Data aggregation is very crucial techniques in wireless sensor network. Because with the help of data aggregation we reduce the energy consumption by eliminating redundancy. When w...
Research Article
Page no: 18 - 24
Raghav Mittal
Plants in space are plants grown in outer space. In the context of human spaceflight, they can be used for food and refreshing the atmosphere. Plants can scrub carbon dioxide and r...
Research Article
Page no: 25 - 30
Anubhav Tewari
The potato is a starchy tuberous crop from the perennial nightshade Solanum tuberosum. The word "potato" may refer either to the plant itself or to the edible tuber. In the Andes, ...
Research Article
Page no: 31 - 35
Anubhav Tewari
Tea is an aromatic beverage commonly prepared by pouring hot or boiling water over cured leaves of the Camellia sinensis, an evergreen shrub native to Asia. After water, it is the ...
Research Article
Page no: 36 - 41
Apurv Goel
Today about four-fifth of India's need for electricity are met by fossil fuels which may supply the necessities of power for another 100 -150 years. 1. In India, the solar energy ...
Research Article
Page no: 42 - 45
Apurv Goel
In Existing systems, a user can access any website without any network blocking that creates the problem of network congestion. To reduce the problem of network congestion, a netwo...
Research Article
Page no: 46 - 66
Apurv Goel
“V2G and Load Equalization” acronym for vehicle to grid and load equalization, an unconventional method of load curve equalization by using electrical and connected hybrid elec...
Research Article
Page no: 67 - 98
Vanshika Goel, Sainyam Goel
India sub-continent is a rich source of diverse live germplasm and only very few countries have such a large number of breeds with wide genetic diversity. These vast genetic resour...
Research Article
Page no: 99 - 133
Vanshika Goel, Sainyam Goel
Microsatellite are short segment of DNA in which specific motifs of 1-6 bases is repeated upto 100 times or so (Tautz, 1993). The term microsatellite introduced by Litt and Lutty (...
Research Article
Page no: 134 - 161
Vanshika Goel, Sainyam Goel
Equidae (The taxonomic family of horses and horse-related animals) include the extant horses, donkeys, zebras and other extinct species recognized only from fossils. Equines are od...
Research Article
Page no: 162 - 196
Vanshika Goel, Sainyam Goel
The first animal to be domesticated before 6000 B.C. was sheep and goats followed by cattle (Bos) in lowlands of Mesopotamia gradually diverse animals would have come under human c...
Research Article
Page no: 197 - 208
Vanshika Goel, Sainyam Goel
No information is available on genetic characteristics of Indian Muscovy duck. Blood samples were collected from 52 Muscovy ducks from Manipur, Assam and West Bengal. DNA was isola...
Research Article
Page no: 209 - 303
Vanshika Goel, Sainyam Goel
Conservation of indigenous animal genetic resources tops the list of prime livestock development activities for India. The conservation programs, especially followed by farmers are...
Research Article
Page no: 304 - 313
Vanshika Goel, Sainyam Goel
Every organism has its own habitat, which may or may not different from other micro organisms. For isolation of micro organism from different places or things can explain the flora...
Research Article
Page no: 314 - 366
Vanshika Goel, Sainyam Goel
The common country hen, the desi, is as a rule the best mother for hatching. She is a good forager. Some of the Indian fowls resemble the Leghorn in size and shape, but have poor l...
Research Article
Page no: 367 - 382
Vasu Gupta
The reason for this venture is to pick up commonality with joined Electrical and Mechanical applications here and there known as Mechatronics. The venture will comprise of the outl...
Research Article
Page no: 383 - 389
Vasu Gupta
We display the inspiration, outline, execution, looks into and uses of Big Data for remote detecting. Enormous Data and its capability to enhance value and in addition drifting new...
Research Article
Page no: 390 - 395
Vasu Gupta
We display the inspiration, outline, execution, looks into and uses of Big Data for remote detecting. Enormous Data and its capability to enhance value and in addition drifting new...
Research Article
Page no: 396 - 429
Avnish Grover
Financial contagion is the harmful effect caused by one economy on the other. In today’s global market there is bound to exist some level of dependence of markets, but is that du...
Research Article
Page no: 430 - 444
Lavaneesh Sharma
Code clone is the technique in which developer produces an exact replica of an original product or software. Extending upon the previous statement, it is a technique which requires...
Research Article
Page no: 445 - 451
Gautam Anand
Data mining is an emerging technology that is used in each and every system. Education data mining is a beneficial discipline because the amount of data in education system is incr...
Research Article
Page no: 452 - 459
Saumya Gupta
Objectives/Methods: The growing prevalence of network attacks is an issue that can affect the availability, confidentiality, and integrity of critical information for companies. T...
Research Article
Page no: 460 - 472
Saumya Gupta
The centralized computing defines cloud computing as a centralized model that is responsible for providing the network access on-request basis to a shared pool of interconnected co...
Research Article
Page no: 473 - 475
Nitin Chhikara
The passage in the question is a dialogical exchange between Glaucon and Socrates, wherein they discuss a metaphor of a chained prisoner in the caves. These subjects can only see d...
Research Article
Page no: 476 - 480
Muskaan Juneja
This paper proposes a PicPass calculation to take care of the Key Exchange issue utilizing Symmetric and Asymmetric key cryptography. Diffie and Hellman proposed a calculation for ...
Research Article
Page no: 481 - 485
Namrata Deswal
The aim is to give a survey of examination regarding crime analysis in the society. It executes different information examination calculations that interface wrongdoing and its exa...