{"id":308,"date":"2016-02-13T07:59:33","date_gmt":"2016-02-13T07:59:33","guid":{"rendered":"http:\/\/ijrdase.com\/ijrdase\/?page_id=308"},"modified":"2017-01-06T05:45:43","modified_gmt":"2017-01-06T05:45:43","slug":"2016-2","status":"publish","type":"page","link":"https:\/\/ijrdase.com\/ijrdase\/2016-2\/","title":{"rendered":"2016"},"content":{"rendered":"<div class=\"panel-group magee-accordion accordion-simple  style2\" role=\"tablist\" aria-multiselectable=\"true\" id=\"accordion-69ea274f5f9a4\"><div class=\"panel panel-default\">\n                                                    <div class=\"panel-heading\" role=\"tab\" id=\"headingcollapseaccordion-69ea274f5f9a4-1\">\n                                                        <a class=\"accordion-toggle collapsed\" data-toggle=\"collapse\" data-parent=\"#accordion-69ea274f5f9a4\" href=\"#collapseaccordion-69ea274f5f9a4-1\" aria-expanded=\"false\" aria-controls=\"collapseaccordion-69ea274f5f9a4-1\">\n                                                            <h4 class=\"panel-title\">\n                                                                <i class=\"fa \"><\/i> Volume 9, Issue 1, January 2016\n                                                            <\/h4>\n                                                        <\/a>\n                                                    <\/div>\n                                                    <div id=\"collapseaccordion-69ea274f5f9a4-1\" class=\"panel-collapse collapse \" role=\"tabpanel\" aria-labelledby=\"headingcollapseaccordion-69ea274f5f9a4-1\" aria-expanded=\"false\">\n                                                        <div class=\"panel-body\">\n                                                          \n<ol>\n<li><a href=\"http:\/\/ijrdase.com\/ijrdase\/wp-content\/uploads\/2016\/02\/Software-Cost-Estimation-Techniques-\u2013-A-Review-of-Literature-Dheeraj-Kapoor-R.K.-Gupta.pdf\" target=\"_blank\">Software Cost Estimation Techniques \u2013 A Review of Literature, Dheeraj Kapoor, R.K. Gupta<\/a><\/li>\n<li><a href=\"http:\/\/ijrdase.com\/ijrdase\/wp-content\/uploads\/2016\/02\/Software-Cost-Estimation-using-Artificial-Intelligence-Technique-Dheeraj-Kapoor-R.-K.-Gupta.pdf\" target=\"_blank\">Software Cost Estimation using Artificial Intelligence Technique, Dheeraj Kapoor, R. K. Gupta<\/a><\/li>\n<li><a href=\"http:\/\/ijrdase.com\/ijrdase\/wp-content\/uploads\/2016\/02\/A-Review-on-Artificial-intelligence-Approach-on-Prediction-of-Software-Defects.pdf\" target=\"_blank\">A Review on Artificial intelligence Approach on Prediction of Software Defects, Poornima Gupta, Priya Sahai<\/a><\/li>\n<li><a href=\"http:\/\/ijrdase.com\/ijrdase\/wp-content\/uploads\/2016\/02\/A-Review-on-Methodologies-for-detection-of-Epilepsy-using-EEG-Signals-Praveen-Kumar-Singh-Uday-Singh.pdf\" target=\"_blank\">A Review on Methodologies for detection of Epilepsy using EEG Signals, Praveen Kumar Singh, Uday Singh<\/a><\/li>\n<li><a href=\"http:\/\/ijrdase.com\/ijrdase\/wp-content\/uploads\/2016\/02\/Virtual-Investigation-of-Grouping-of-on-Premise-and-Cloud-ERP.pdf\" target=\"_blank\">Virtual Investigation of Grouping of on Premise and Cloud ERP, Kavya Dwivedi, \u00a0Madhulika Sharma<\/a><\/li>\n<li><a href=\"http:\/\/ijrdase.com\/ijrdase\/wp-content\/uploads\/2016\/03\/Three-Tank-Interacting-System-Level-Control-using-Modern-AI-Techniques-Mohd.-Uvais.pdf\" target=\"_blank\">Three Tank Interacting System Level Control using Modern AI Techniques, Mohd. Uvais<\/a><\/li>\n<li><a href=\"http:\/\/ijrdase.com\/ijrdase\/wp-content\/uploads\/2016\/03\/Predicting-Material-Removal-Rate-using-an-Artificial-Intelligence-Approach-Shraddha-Singh-Aamir.pdf\" target=\"_blank\">Predicting Material Removal Rate using an Artificial Intelligence Approach, Shraddha Singh, Aamir<\/a><\/li>\n<li><a href=\"http:\/\/ijrdase.com\/ijrdase\/wp-content\/uploads\/2016\/03\/Visionary-Role-in-Human-Resource-Quality-Management-System-\u2013-A-Conceptual-Design-Dheerendra-Singh.pdf\" target=\"_blank\">Visionary Role in Human Resource Quality Management System \u2013 A Conceptual Design, Dheerendra Singh<\/a><\/li>\n<li><a href=\"http:\/\/ijrdase.com\/ijrdase\/wp-content\/uploads\/2016\/03\/Modeling-Effect-of-Electromagnetic-Interference-on-Cardiovascular-System-Anil-Sirswal-Dr.-Mk-Deewan.pdf\" target=\"_blank\">Modeling Effect of Electromagnetic Interference on Cardiovascular System, Anil Sirswal, Dr. Mk Deewan<\/a><\/li>\n<\/ol>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t  <div class=\"clear\"><\/div>\n                                                        <\/div>\n                                                    <\/div>\n                                                <\/div> <div class=\"panel panel-default\">\n                                                    <div class=\"panel-heading\" role=\"tab\" id=\"headingcollapseaccordion-69ea274f5f9a4-2\">\n                                                        <a class=\"accordion-toggle collapsed\" data-toggle=\"collapse\" data-parent=\"#accordion-69ea274f5f9a4\" href=\"#collapseaccordion-69ea274f5f9a4-2\" aria-expanded=\"false\" aria-controls=\"collapseaccordion-69ea274f5f9a4-2\">\n                                                            <h4 class=\"panel-title\">\n                                                                <i class=\"fa \"><\/i> Volume 9, Issue 2, March 2016\n                                                            <\/h4>\n                                                        <\/a>\n                                                    <\/div>\n                                                    <div id=\"collapseaccordion-69ea274f5f9a4-2\" class=\"panel-collapse collapse \" role=\"tabpanel\" aria-labelledby=\"headingcollapseaccordion-69ea274f5f9a4-2\" aria-expanded=\"false\">\n                                                        <div class=\"panel-body\">\n                                                          \n<ol>\n<li><a href=\"http:\/\/ijrdase.com\/ijrdase\/wp-content\/uploads\/2016\/03\/Relative-study-of-different-Page-Ranking-Algorithm-Huma-Mehtab-shahid-Siddiqui.pdf\" target=\"_blank\">Relative study of different Page Ranking Algorithm, Huma Mehtab, shahid Siddiqu<\/a>i<\/li>\n<li><a href=\"http:\/\/ijrdase.com\/ijrdase\/wp-content\/uploads\/2016\/04\/Synchronization-Index-based-Epilepsy-Diagnosis-from-EEG-Data-by-Recurrence-based-Soft-Computing-Model-Praveen-Kumar-Singh-Uday-Singh.pdf\" target=\"_blank\">Synchronization Index based Epilepsy Diagnosis from EEG Data by Recurrence based Soft Computing Model, Praveen Kumar Singh, Uday Singh<\/a><\/li>\n<li><a href=\"http:\/\/ijrdase.com\/ijrdase\/wp-content\/uploads\/2016\/04\/A-Review-on-Mobile-Ad-Hoc-Networks-Routing-Protocols-with-Wormhole-Intrusion-Detection-Algorithm-Neha-Verma-Yashi-Singh.pdf\" target=\"_blank\">A Review on Mobile Ad-Hoc Networks Routing Protocols with Wormhole Intrusion Detection Algorithm, Neha Verma, Yashi Singh<\/a><\/li>\n<li><a href=\"http:\/\/ijrdase.com\/ijrdase\/wp-content\/uploads\/2016\/04\/A-Review-on-the-Wireless-Sensor-Network-Time-Synchronization-Solution-Strategies-Related-Issues-and-Challenges-Sweta-Srivastava-Pallavi-Gupta.pdf\" target=\"_blank\">A Review on the Wireless Sensor Network Time Synchronization Solution Strategies Related Issues and Challenges, Sweta Srivastava, Pallavi Gupta<\/a><\/li>\n<li><a href=\"http:\/\/ijrdase.com\/ijrdase\/wp-content\/uploads\/2016\/04\/A-Real-Time-Approach-for-Secure-Text-Transmission-by-using-Video-Cryptography-Rashmi-Sharma-Saima-Beg-Archana-Yadav.pdf\" target=\"_blank\">A Real Time Approach for Secure Text Transmission by using Video Cryptography, Rashmi Sharma, Saima Beg, Archana Yadav<\/a><\/li>\n<li><a href=\"http:\/\/ijrdase.com\/ijrdase\/wp-content\/uploads\/2016\/04\/Artificial-intelligence-Technique-Application-based-Review-for-Intruder-Detection-System-in-MANET-Mahvish-Jabeen-Anuradha-Sharma.pdf\">Artificial intelligence Technique Application based Review for Intruder Detection System in MANET, Mahvish Jabeen, Anuradha Sharma<\/a><\/li>\n<li><a href=\"http:\/\/ijrdase.com\/ijrdase\/wp-content\/uploads\/2016\/04\/Survey-on-Feature-Based-Prediction-in-Biomedical-Application-by-Advanced-Data-Mining-Technique-Naila-Anuradha-Sharma.pdf\" target=\"_blank\">Survey on Feature Based Prediction in Biomedical Application by Advanced Data Mining Technique, Naila, Anuradha Sharma<\/a><\/li>\n<li><a href=\"http:\/\/ijrdase.com\/ijrdase\/wp-content\/uploads\/2016\/04\/Image-Processing-Technique-for-The-Enhancement-of-Brain-Tumor-Pattern-Alka-Pandey-Saima-Beg-Archana-Yadav.pdf\" target=\"_blank\">Image Processing Technique for The Enhancement of Brain Tumor Pattern , Alka Pandey, Saima Beg, Archana Yadav<\/a><\/li>\n<li><a href=\"http:\/\/ijrdase.com\/ijrdase\/wp-content\/uploads\/2016\/04\/Novel-GPS-activation-strategy-for-Minimization-of-Localization-Error-with-improved-Energy-Efficiency-in-Wireless-Sensor-Networks-Mohd.-Alam-Ashiwini-Kumar.pdf\" target=\"_blank\">Novel GPS activation strategy for Minimization of Localization Error with improved Energy Efficiency in Wireless Sensor Networks, Mohd. Alam, Ashiwini Kumar<\/a><\/li>\n<li><a href=\"http:\/\/ijrdase.com\/ijrdase\/wp-content\/uploads\/2016\/04\/Exterior-Bound-Allotted-Advanced-Node-Distribution-for-Energy-Efficient-Clustering-EBAN-DEEC-Protocol-in-WSN-Saddam-Hussain-Vinay-Kumar-Srivastava.pdf\" target=\"_blank\">Exterior Bound Allotted Advanced Node Distribution for Energy Efficient Clustering (EBAN DEEC) Protocol \u00a0in WSN, Saddam Hussain, Vinay Kumar Srivastava<\/a><\/li>\n<\/ol>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t  <div class=\"clear\"><\/div>\n                                                        <\/div>\n                                                    <\/div>\n                                                <\/div><div class=\"panel panel-default\">\n                                                    <div class=\"panel-heading\" role=\"tab\" id=\"headingcollapseaccordion-69ea274f5f9a4-3\">\n                                                        <a class=\"accordion-toggle collapsed\" data-toggle=\"collapse\" data-parent=\"#accordion-69ea274f5f9a4\" href=\"#collapseaccordion-69ea274f5f9a4-3\" aria-expanded=\"false\" aria-controls=\"collapseaccordion-69ea274f5f9a4-3\">\n                                                            <h4 class=\"panel-title\">\n                                                                <i class=\"fa \"><\/i> Volume 10, Issue 1, May 2016\n                                                            <\/h4>\n                                                        <\/a>\n                                                    <\/div>\n                                                    <div id=\"collapseaccordion-69ea274f5f9a4-3\" class=\"panel-collapse collapse \" role=\"tabpanel\" aria-labelledby=\"headingcollapseaccordion-69ea274f5f9a4-3\" aria-expanded=\"false\">\n                                                        <div class=\"panel-body\">\n                                                          \n<ol>\n<li>Designing of Vending Machine Controller using VHDL with Expiry Date Feature, Shiv Kumar<\/li>\n<li><a href=\"http:\/\/ijrdase.com\/ijrdase\/wp-content\/uploads\/2016\/05\/Genetic-Algorithm-based-High-Quality-Image-Watermarking-using-Multi-Resolution-Wavelet-Transform-Smriti-Upadhyay-Kiran-Jain.pdf\" target=\"_blank\">Genetic Algorithm based High Quality Image Watermarking using Multi Resolution Wavelet Transform, Smriti Upadhyay, Kiran Jain<\/a><\/li>\n<li><a href=\"http:\/\/ijrdase.com\/ijrdase\/wp-content\/uploads\/2016\/05\/Network-Traffic-Analysis-and-Prediction-\u2013-A-Literature-Review-Huma-Parveen-Rishi-Srivastava.pdf\" target=\"_blank\">Network Traffic Analysis and Prediction \u2013 A Literature Review, Huma Parveen, Rishi Srivastava<\/a><\/li>\n<li><a href=\"http:\/\/ijrdase.com\/ijrdase\/wp-content\/uploads\/2016\/05\/A-Review-on-Access-Control-Schemes-Application-in-Cloud-Security-Environment-Modelling-Deepti-Priyadarshani.pdf\" target=\"_blank\">A Review on Access Control Schemes Application in Cloud Security Environment Modelling, Deepti Priyadarshani<\/a><\/li>\n<li><a href=\"http:\/\/ijrdase.com\/ijrdase\/wp-content\/uploads\/2016\/05\/PSO-Optimized-Improved-Fuzzy-Logic-based-MPPT-Algorithm-for-Fast-and-Stable-Control-Quality-Incorporated-Photo-Voltaic-System-Array-Abhishek-Gautam.pdf\" target=\"_blank\">PSO Optimized Improved Fuzzy Logic based MPPT Algorithm for Fast and Stable Control Quality Incorporated Photo Voltaic System Array, Abhishek Gautam<\/a><\/li>\n<li><a href=\"http:\/\/ijrdase.com\/ijrdase\/wp-content\/uploads\/2016\/05\/Arp-Security-using-Asymmetric-Key-and-Invite-Accept-Protocol-Pakaj-Verma-Dileep-Gupta.pdf\" target=\"_blank\">Arp Security using Asymmetric Key and Invite Accept Protocol, Pakaj Verma, Dileep Gupta<\/a><\/li>\n<li><a href=\"http:\/\/ijrdase.com\/ijrdase\/wp-content\/uploads\/2016\/05\/Modelling-and-Optimization-of-Wire-EDM-Process-using-Integrated-Approach-of-ANN-GA-Anurag-Pandey.pdf\" target=\"_blank\">Modelling and Optimization of Wire-EDM Process using Integrated Approach of ANN-GA, Anurag Pandey<\/a><\/li>\n<li><a href=\"http:\/\/ijrdase.com\/ijrdase\/wp-content\/uploads\/2016\/05\/Traffic-Congestion-Prediction-using-Soft-computing-Technique-Huma-Parveen-Rishi-Srivastava.pdf\" target=\"_blank\">Traffic Congestion Prediction using Adaptive Neuro-Fuzzy Inference System, Huma Parveen, Rishi Srivastava<\/a><\/li>\n<li><a href=\"http:\/\/ijrdase.com\/ijrdase\/wp-content\/uploads\/2016\/06\/An-Efficient-Algorithm-to-Detect-Wormhole-Attack-using-Cluster\u2013Based-Approach-in-MANET-Neha-Verma-Yashi-Singh.pdf\" target=\"_blank\">An Efficient Algorithm to Detect Wormhole Attack using Cluster\u2013Based Approach in MANET, Neha Verma, Yashi Singh<\/a><\/li>\n<li><a href=\"http:\/\/ijrdase.com\/ijrdase\/wp-content\/uploads\/2016\/06\/A-Method-for-Correcting-Synchronization-Error-using-Wavelet-Transformation-Sweta-Srivastava-Pallavi-Gupta.pdf\" target=\"_blank\">A Method for Correcting Synchronization Error using Wavelet Transformation, Sweta Srivastava, Pallavi Gupta<\/a><\/li>\n<li><a href=\"http:\/\/ijrdase.com\/ijrdase\/wp-content\/uploads\/2016\/06\/Improved-Q-LEACH-Arjita-Chobey-Pallavi-Gupta.pdf\" target=\"_blank\">Improved Q-LEACH, Arjita Chobey, Pallavi Gupta<\/a><\/li>\n<\/ol>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t  <div class=\"clear\"><\/div>\n                                                        <\/div>\n                                                    <\/div>\n                                                <\/div>\n<div class=\"panel panel-default\">\n                                                    <div class=\"panel-heading\" role=\"tab\" id=\"headingcollapseaccordion-69ea274f5f9a4-4\">\n                                                        <a class=\"accordion-toggle collapsed\" data-toggle=\"collapse\" data-parent=\"#accordion-69ea274f5f9a4\" href=\"#collapseaccordion-69ea274f5f9a4-4\" aria-expanded=\"false\" aria-controls=\"collapseaccordion-69ea274f5f9a4-4\">\n                                                            <h4 class=\"panel-title\">\n                                                                <i class=\"fa \"><\/i> Volume 10, Issue 2, May 2016\n                                                            <\/h4>\n                                                        <\/a>\n                                                    <\/div>\n                                                    <div id=\"collapseaccordion-69ea274f5f9a4-4\" class=\"panel-collapse collapse \" role=\"tabpanel\" aria-labelledby=\"headingcollapseaccordion-69ea274f5f9a4-4\" aria-expanded=\"false\">\n                                                        <div class=\"panel-body\">\n                                                          \n<ol>\n<li><a href=\"http:\/\/ijrdase.com\/ijrdase\/wp-content\/uploads\/2016\/07\/Implementation-Bidirectional-32-Bit-Switching-System-using-VHDL-Divya-Srivastava.pdf\" target=\"_blank\">Implementation Bidirectional 32-Bit Switching System using VHDL, Divya Srivastava<\/a><\/li>\n<li><a href=\"http:\/\/ijrdase.com\/ijrdase\/wp-content\/uploads\/2016\/07\/Review-on-Modern-Trends-in-Detection-of-Cognitive-Radio-Channel-Occupancy-by-Information-Theoretic-Criteria-Sushmita-Singh-Dr.-Narendra-Singh.pdf\" target=\"_blank\">Review on Modern Trends in Detection of Cognitive Radio Channel Occupancy by Information Theoretic Criteria, Sushmita Singh, Dr. Narendra Singh<\/a><\/li>\n<li><a href=\"http:\/\/ijrdase.com\/ijrdase\/wp-content\/uploads\/2016\/07\/Applications-and-Management-of-Wireless-Sensor-Networks-for-Energy-Efficient-Routing-Protocols-A-Review-Rashmi-Sonkar-Awdhesh-Kumar.pdf\" target=\"_blank\">Applications and Management of Wireless Sensor Networks for Energy Efficient Routing Protocols &#8211; A Review, Rashmi Sonkar, Awdhesh Kumar<\/a><\/li>\n<li><a href=\"http:\/\/ijrdase.com\/ijrdase\/wp-content\/uploads\/2016\/08\/A-Survey-on-Content-based-Image-Retrieval-Priya-Singh-.pdf\" target=\"_blank\">A Survey on Content based Image Retrieval, Priya Singh<\/a><\/li>\n<li><a href=\"http:\/\/ijrdase.com\/ijrdase\/wp-content\/uploads\/2016\/08\/Implementation-of-32-Bit-Fault-Tolerance-ALU-using-VHDL-for-Checking-bit-up-to-6-Bits-Shinjini-Yadav-A-k-singh.pdf\" target=\"_blank\">Implementation of 32-Bit Fault Tolerance ALU using VHDL for Checking bit up to 6 Bits, Shinjini Yadav, A k singh<\/a><\/li>\n<li><a href=\"http:\/\/ijrdase.com\/ijrdase\/wp-content\/uploads\/2016\/09\/Design-of-Floating-Point-Vedic-Multiplier-using-VHDL-Garima-Singh.pdf\" target=\"_blank\">Design of floating point vedic multiplier using vhdl, Garima singh<\/a><\/li>\n<li><a href=\"http:\/\/ijrdase.com\/ijrdase\/wp-content\/uploads\/2016\/09\/Image-Database-Search-by-Similarly-Index-Matching-of-HSV-Content-using-3D-Histogram-Priya-Singh.pdf\">Image Database Search by Similarly Index Matching of HSV Content using 3d Histogram, Priya Singh<\/a><\/li>\n<\/ol>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t  <div class=\"clear\"><\/div>\n                                                        <\/div>\n                                                    <\/div>\n                                                <\/div><div class=\"panel panel-default\">\n                                                    <div class=\"panel-heading\" role=\"tab\" id=\"headingcollapseaccordion-69ea274f5f9a4-5\">\n                                                        <a class=\"accordion-toggle collapsed\" data-toggle=\"collapse\" data-parent=\"#accordion-69ea274f5f9a4\" href=\"#collapseaccordion-69ea274f5f9a4-5\" aria-expanded=\"false\" aria-controls=\"collapseaccordion-69ea274f5f9a4-5\">\n                                                            <h4 class=\"panel-title\">\n                                                                <i class=\"fa \"><\/i> Volume 11, Issue 1, October 2016\n                                                            <\/h4>\n                                                        <\/a>\n                                                    <\/div>\n                                                    <div id=\"collapseaccordion-69ea274f5f9a4-5\" class=\"panel-collapse collapse \" role=\"tabpanel\" aria-labelledby=\"headingcollapseaccordion-69ea274f5f9a4-5\" aria-expanded=\"false\">\n                                                        <div class=\"panel-body\">\n                                                          \n<ol>\n<li><a href=\"http:\/\/ijrdase.com\/ijrdase\/wp-content\/uploads\/2016\/11\/Review-of-Related-Literature-\u2013-Survey-of-Other-Backward-Class-Women\u2019s-Education-Afshan-Rizvi.pdf\" target=\"_blank\">Review of Related Literature \u2013 Survey of Other Backward Class Women\u2019s Education<\/a><\/li>\n<li><a href=\"http:\/\/ijrdase.com\/ijrdase\/wp-content\/uploads\/2016\/11\/An-Automated-Software-Testing-Approach-using-Soft-Computing-Technique-Shweta-Srivastava-Masood-Ahmad.pdf\" target=\"_blank\">An Automated Software Testing Approach using Soft Computing Technique, Shweta Srivastava, Masood Ahmad<\/a><\/li>\n<li><a href=\"http:\/\/ijrdase.com\/ijrdase\/wp-content\/uploads\/2016\/12\/Modeling-effects-of-the-electromagnetic-radiations-on-the-cardiovascular-system-Anil-Sirswal.pdf\" target=\"_blank\">Modeling effects of the electromagnetic radiations on the cardiovascular system, Anil Sirswal<\/a><\/li>\n<li><a href=\"http:\/\/ijrdase.com\/ijrdase\/wp-content\/uploads\/2016\/12\/Contemporary-development-in-Distance-centred-Cluster-Formation-system-For-Prolonging-Lifetime-Challenges-of-WSNs-A-Review-Swati-Gaur-Madhulika-Sharma.pdf\" target=\"_blank\">Contemporary development in Distance centred Cluster Formation system For Prolonging Lifetime Challenges of WSNs &#8211; A Review, Swati Gaur, Madhulika Sharma<\/a><\/li>\n<li><a href=\"http:\/\/ijrdase.com\/ijrdase\/wp-content\/uploads\/2016\/12\/Q-Leach-A-New-Routing-Protocol-for-WSN-Swati-Gaur-Madhulika-Sharma.pdf\" target=\"_blank\">Q-Leach A New Routing Protocol for WSN, Swati Gaur, Madhulika Sharma<\/a><\/li>\n<li><a href=\"http:\/\/ijrdase.com\/ijrdase\/wp-content\/uploads\/2016\/12\/Design-and-Simulation-Study-of-Solar-Photovoltaic-Array-using-Simulink-Model-Shubham-Mishra-Manish-Kumar-Madhav.pdf\" target=\"_blank\">Design and Simulation Study of Solar Photovoltaic Array using Simulink Model, Shubham Mishra, Manish Kumar Madhav<\/a><\/li>\n<li><a href=\"http:\/\/ijrdase.com\/ijrdase\/wp-content\/uploads\/2016\/12\/An-Adaptive-Neuro-Fuzzy-Approach-for-Groundwater-Level-Simulation-\u2013-A-Case-Study-of-Lucknow-District-Sangeeta-Mishra.pdf\" target=\"_blank\">An Adaptive Neuro Fuzzy Approach for Groundwater Level Simulation \u2013 A Case Study of Lucknow District, Sangeeta Mishra<\/a><\/li>\n<li><a href=\"http:\/\/ijrdase.com\/ijrdase\/wp-content\/uploads\/2017\/01\/An-Algorithm-To-Design-Resilient-Energy-Routing-Protocol-For-WSN-Rashmi-Sonkar.pdf\" target=\"_blank\">An Algorithm To Design Resilient Energy Routing Protocol For WSN, Rashmi Sonkar<\/a><\/li>\n<\/ol>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t  <div class=\"clear\"><\/div>\n                                                        <\/div>\n                                                    <\/div>\n                                                <\/div><\/div>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; &nbsp; &nbsp;<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-308","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/ijrdase.com\/ijrdase\/wp-json\/wp\/v2\/pages\/308","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ijrdase.com\/ijrdase\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ijrdase.com\/ijrdase\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ijrdase.com\/ijrdase\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/ijrdase.com\/ijrdase\/wp-json\/wp\/v2\/comments?post=308"}],"version-history":[{"count":44,"href":"https:\/\/ijrdase.com\/ijrdase\/wp-json\/wp\/v2\/pages\/308\/revisions"}],"predecessor-version":[{"id":426,"href":"https:\/\/ijrdase.com\/ijrdase\/wp-json\/wp\/v2\/pages\/308\/revisions\/426"}],"wp:attachment":[{"href":"https:\/\/ijrdase.com\/ijrdase\/wp-json\/wp\/v2\/media?parent=308"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}