Vol. 3 No. 02 (2014)

Published: 2014-02-28

Articles

  • An Optimized Localization Algorithm against Node Replication Attacks in Wireless Sensor Networks

    R.M.Sinthiya, J.Vijipriya
    43
    40
  • An Immune Inspired Behavior-based MultiAgent Model for Detecting Network Clients’ Misbehavior

    Elnaz B. Noeparast, Reza Ravanmehr, Ramin Nasiri
    52
    39
  • RECEIVER SYNCHRONIZATION FOR DAB WITH TRANSMISSION MODE III

    Baliwan Preeti
    44
    131
  • Network Security: Virtual Private Network

    Sonika, Monika, Sonal
    44
    51
  • An Adapted Group Method of Data Handling for Abrupt Data Analysis

    Vikas Lamba, Sunita Lamba
    61
    40
  • EFFICIENT DATA MINING FOR MINING CLASSIFICATION USING NEURAL NETWORK

    Mrs.Maruthaveni.R, Mrs.Renuka Devi.S.V
    46
    38
  • Physical Security: A Biometric Approach

    Preeti, Rajni
    46
    39
  • Computer Viruses and Challenges for Anti-virus Industry

    Deepak Kumar, Narender Kumar, Aditya K
    64
    172
  • Network Intrusion Detection Using Hybrid Simplified Swarm Optimization and Random Forest Algorithm on Nsl-Kdd Dataset

    S. Revathi , Dr. A. Malathi
    54
    35
  • Review On: Object Detection and Tracking To Implement Human- Machine Interaction

    Neha Nirantar , Prajakta Panse , Omkar Rahane , Saurabh Satralkar , Prof.Payal Kulkarni
    46
    38
  • Security issues in Voice over IP: A Review

    Rajni , Preeti , Ritu Baniwal
    49
    50
  • Detection and Prevention of Black Hole Attack To Improve Network Performance By Using Fidelity and ECARP Algorithms

    Pankaj Solanki, Deepak Shuhkla
    46
    40
  • Compressive Strength of Concrete containing Fly Ash, Copper Slag, Silica Fume and Fibres - Prediction

    N. Sakthieswaran, K. Ganesan
    47
    44
  • CACHING DATA THROUGH PULL BASED APPROCHES IN WIRELESS NETWORKS

    S. Mahalakshmi, Dr. M. Kamarajan
    44
    34
  • A Survey on Visible Light Communication

    Jacqueline J.George, Mohammed Hayder Mustafa, Nada Mahjoub Osman, Nuha Hashim Ahmed, Da’ad Mohammed Hamed
    68
    60
  • Design of an efficient Weighted Trust Evaluation System for Wireless Sensor Networks

    D.Ramya, Mr.P.Basith
    46
    37
  • A New BBBC based LEACH Algorithm for Energy Efficient Routing in WSN

    Archana, Sukhjinder kaur
    44
    34
  • Authentication of System using Text, Image and Audio

    Vikash Kumar Agarwal, Bhaskra Nand, Lalitendu khandagiri
    54
    46
  • A Review of Various Trust Management Models for Cloud Computing Storage Systems

    Mr. Anup R. Nimje, Prof. V.T.Gaikwad, Prof. H.N.Datir
    43
    31
  • ATM Technology Prospects: A Review

    Deepak Kumar, Aditya Kumar, Neha Choudhary
    47
    44
  • Secure and efficient application of MANET using Identity Based cryptography combined with Visual cryptography technique

    R. K. Sharma, Neeraj Kishore, Parijat Das
    39
    28
  • EFFICIENT USER REVOCATION FOR DYNAMIC GROUPS IN THE CLOUD

    Kanya Devi J, Kanimozhi S
    41
    30
  • Shape Analysis of the Quintic Trigonometric Bèzier curve with two shape parameter

    Mridula Dube, Bharti Yadav
    48
    33
  • Flash Drive Communication Using Embedded System

    Singh Harpreet , Kaur Kamaldeep
    49
    71
  • Bagged Ensemble Classifiers for Sentiment Classification of Movie Reviews

    M. Govindarajan
    48
    27
  • Virtual Touch Screen Using Microsoft Kinect

    Ekta Parwani, Apeksha Pawar, Chirag Ajwani, Prof.Govind Pole
    66
    84
  • Improving Security Authentication of IEEE 802.16 WiMax with New Public key algorithm

    Prakash Kuppuswamy, Sikandhar Shah
    59
    34
  • Energy Efficient Routing in MANET: A Survey

    Shruti Verma, Pushpa Singh
    42
    40
  • An Ethernet Based Monitoring and Controlling Of Home Appliances Using Rabbit Processor

    Patil Ketan C , Patil Rohan A , Musale Shrikant K , Prof. D.B. Rane
    47
    36
  • Cloud Computing Security using Federated Key Management

    Dr. Atulbhai Patel, Kalpit Soni
    43
    35
  • ENHANCING UNSUPERVISED APPROACH FOR PERSON NAME BIPOLARIZATION

    Sathya D, Kaladevi P
    44
    34
  • A Efficient Approach Used for Identifying Distraction of statue Image

    C.Kanimozhi, Dr.A.Gnanabaskaran
    37
    38
  • Virtual Network Computing- A Technique to Control Android Phones Remotely

    Priyadarshani Raskar, Sejal Patel, Pragati Badhe, Prof. Archana Lomte
    46
    31
  • DATA REPORTING OF TRACING EVENTS BY EVENT DRIVEN INCIDENCE MATRIX

    S.Keerthana, Mr.P.Sathishkumar M.E
    39
    33
  • Mobile Network Area Selection and Analysis of 3G GSM Network Site

    Ms.Neetu Sharma, Ms. Neelkamal Chaudhary
    42
    34
  • ZONE BASED ANALYSIS OF ZRP UNDER VARYING MOBILITY AND TRANSMISSION RANGE IN MANETs

    Anil Manohar Dogra, Rajvir singh
    40
    38