Published: 2014-02-28

An Optimized Localization Algorithm against Node Replication Attacks in Wireless Sensor Networks

R.M.Sinthiya, J.Vijipriya

Abstract 34  | PDF

An Immune Inspired Behavior-based MultiAgent Model for Detecting Network Clients’ Misbehavior

Elnaz B. Noeparast, Reza Ravanmehr, Ramin Nasiri

Abstract 36  | PDF

RECEIVER SYNCHRONIZATION FOR DAB WITH TRANSMISSION MODE III

Baliwan Preeti

Abstract 35  | PDF

Network Security: Virtual Private Network

Sonika, Monika, Sonal

Abstract 35  | PDF

An Adapted Group Method of Data Handling for Abrupt Data Analysis

Vikas Lamba, Sunita Lamba

Abstract 52  | PDF

EFFICIENT DATA MINING FOR MINING CLASSIFICATION USING NEURAL NETWORK

Mrs.Maruthaveni.R, Mrs.Renuka Devi.S.V

Abstract 37  | PDF

Physical Security: A Biometric Approach

Preeti, Rajni

Abstract 36  | PDF

Computer Viruses and Challenges for Anti-virus Industry

Deepak Kumar, Narender Kumar, Aditya K

Abstract 51  | PDF

Network Intrusion Detection Using Hybrid Simplified Swarm Optimization and Random Forest Algorithm on Nsl-Kdd Dataset

S. Revathi , Dr. A. Malathi

Abstract 45  | PDF

Review On: Object Detection and Tracking To Implement Human- Machine Interaction

Neha Nirantar , Prajakta Panse , Omkar Rahane , Saurabh Satralkar , Prof.Payal Kulkarni

Abstract 37  | PDF

Security issues in Voice over IP: A Review

Rajni , Preeti , Ritu Baniwal

Abstract 40  | PDF

Detection and Prevention of Black Hole Attack To Improve Network Performance By Using Fidelity and ECARP Algorithms

Pankaj Solanki, Deepak Shuhkla

Abstract 35  | PDF

Compressive Strength of Concrete containing Fly Ash, Copper Slag, Silica Fume and Fibres - Prediction

N. Sakthieswaran, K. Ganesan

Abstract 38  | PDF

CACHING DATA THROUGH PULL BASED APPROCHES IN WIRELESS NETWORKS

S. Mahalakshmi, Dr. M. Kamarajan

Abstract 35  | PDF

A Survey on Visible Light Communication

Jacqueline J.George, Mohammed Hayder Mustafa, Nada Mahjoub Osman, Nuha Hashim Ahmed, Da’ad Mohammed Hamed

Abstract 58  | PDF

Design of an efficient Weighted Trust Evaluation System for Wireless Sensor Networks

D.Ramya, Mr.P.Basith

Abstract 38  | PDF

A New BBBC based LEACH Algorithm for Energy Efficient Routing in WSN

Archana, Sukhjinder kaur

Abstract 35  | PDF

Authentication of System using Text, Image and Audio

Vikash Kumar Agarwal, Bhaskra Nand, Lalitendu khandagiri

Abstract 44  | PDF

A Review of Various Trust Management Models for Cloud Computing Storage Systems

Mr. Anup R. Nimje, Prof. V.T.Gaikwad, Prof. H.N.Datir

Abstract 36  | PDF

ATM Technology Prospects: A Review

Deepak Kumar, Aditya Kumar, Neha Choudhary

Abstract 37  | PDF

Secure and efficient application of MANET using Identity Based cryptography combined with Visual cryptography technique

R. K. Sharma, Neeraj Kishore, Parijat Das

Abstract 30  | PDF

EFFICIENT USER REVOCATION FOR DYNAMIC GROUPS IN THE CLOUD

Kanya Devi J, Kanimozhi S

Abstract 32  | PDF

Shape Analysis of the Quintic Trigonometric Bèzier curve with two shape parameter

Mridula Dube, Bharti Yadav

Abstract 39  | PDF

Flash Drive Communication Using Embedded System

Singh Harpreet , Kaur Kamaldeep

Abstract 36  | PDF

Bagged Ensemble Classifiers for Sentiment Classification of Movie Reviews

M. Govindarajan

Abstract 39  | PDF

Virtual Touch Screen Using Microsoft Kinect

Ekta Parwani, Apeksha Pawar, Chirag Ajwani, Prof.Govind Pole

Abstract 47  | PDF

Improving Security Authentication of IEEE 802.16 WiMax with New Public key algorithm

Prakash Kuppuswamy, Sikandhar Shah

Abstract 47  | PDF

Energy Efficient Routing in MANET: A Survey

Shruti Verma, Pushpa Singh

Abstract 33  | PDF

An Ethernet Based Monitoring and Controlling Of Home Appliances Using Rabbit Processor

Patil Ketan C , Patil Rohan A , Musale Shrikant K , Prof. D.B. Rane

Abstract 37  | PDF

Cloud Computing Security using Federated Key Management

Dr. Atulbhai Patel, Kalpit Soni

Abstract 35  | PDF

ENHANCING UNSUPERVISED APPROACH FOR PERSON NAME BIPOLARIZATION

Sathya D, Kaladevi P

Abstract 36  | PDF

A Efficient Approach Used for Identifying Distraction of statue Image

C.Kanimozhi, Dr.A.Gnanabaskaran

Abstract 29  | PDF

Virtual Network Computing- A Technique to Control Android Phones Remotely

Priyadarshani Raskar, Sejal Patel, Pragati Badhe, Prof. Archana Lomte

Abstract 37  | PDF

DATA REPORTING OF TRACING EVENTS BY EVENT DRIVEN INCIDENCE MATRIX

S.Keerthana, Mr.P.Sathishkumar M.E

Abstract 30  | PDF

Mobile Network Area Selection and Analysis of 3G GSM Network Site

Ms.Neetu Sharma, Ms. Neelkamal Chaudhary

Abstract 34  | PDF

ZONE BASED ANALYSIS OF ZRP UNDER VARYING MOBILITY AND TRANSMISSION RANGE IN MANETs

Anil Manohar Dogra, Rajvir singh

Abstract 31  | PDF