Current Issue
Vol. 2 No. 09 (2013)
Published:
2018-01-01
Articles
-
Development of Inventory Database System Using Radio Frequency Identification
Abstract : 43PDF : 44 -
Faulty Node Detection in Multirate anypath Routing Protocol in Multi-Hop Wireless Networks
Abstract : 46PDF : 41 -
Towards Automated design of Combinational Circuits Using Evolutionary Techniques
Abstract : 61PDF : 45 -
Iris Segmentation and Recognization Using Log Gabor Filter and Curvelet Transform
Abstract : 69PDF : 145 -
An Efficient Twisted Edwards-Form Elliptic Curve for Fast Secured Message Passing Interface
Abstract : 68PDF : 46 -
Recommendation Diversity using Optimization Techniques and Ranking Method
Abstract : 49PDF : 44 -
Risk aware and ALERT protocol for mitigating routing attacks in Mobile Ad hoc Networks
Abstract : 40PDF : 31 -
OBLIGING EVINCIBLE DATA CHATTELS FOR VERIFICATION IN DISTRIBUTED CLOUD APPLICATION
Abstract : 41PDF : 33 -
Graphical Password or Graphical User Authentication as Effective Password Provider
Abstract : 48PDF : 94 -
Prevention of Selective Jamming Attacks Using Swarm intelligence Packet-Hiding Methods
Abstract : 37PDF : 28 -
ANALYSIS OF VULNERABILITY IN INTERNET FIREWALL USING RULE BASED ALGORITHM
Abstract : 36PDF : 31 -
Detection of Flash Crowd Attack Based On Router Values Using Alarm Fixation
Abstract : 42PDF : 26 -
PREVENTION OF TRESPASSER ACCESSING IN NETWORKS USING TICKET GRANTING SERVICE
Abstract : 39PDF : 26 -
A Survey of Various Method to improve the throughput of Zigbee Cluster Tree Networ
Abstract : 35PDF : 34