Current Issue
Vol. 3 No. 07 (2014)
Published:
2017-12-29
Articles
-
A light weight PLGP based method for mitigating vampire attacks in Wireless Sensor Networks
Abstract : 68PDF : 55 -
Performance Evaluation Of Fuzzy Based DWT Approach To Enhance CT Image Using Image Fusion
Abstract : 54PDF : 43 -
Detection of Crash Transient Failure during Job Scheduling using Replication Technique
Abstract : 57PDF : 47 -
A New Technique Called Annotation Used To Categories The Content Of Web Pages
Abstract : 40PDF : 36 -
Numerical Solutions of Ordinary Differential Equations Using Mathematica
Abstract : 54PDF : 296 -
Optimizing the Ad-hoc applications in Vehicular Network using Max-Min Ant system
Abstract : 43PDF : 33 -
A Reactive Hierarchical Trust Management Scheme for Wireless Sensor Networks
Abstract : 52PDF : 37 -
A Multiple Queue Management Scheme to Optimize the Job Sequencing in Cloud Computing
Abstract : 47PDF : 44 -
A Generosity Model to Study Data Center Performance and QoS in IaaS Cloud Computing Systems
Abstract : 41PDF : 28 -
Design and Development of Micro Vertical Axis Wind Turbine for Rural Application
Abstract : 60PDF : 121 -
A New Color Image Compression Based on Fractal and Discrete Cosine Transform
Abstract : 48PDF : 45 -
Implementation of Database Synchronization Technique between Client and Server
Abstract : 58PDF : 35 -
Content Based Video Retrieval by Genre Recognition Using Tree Pruning Technique
Abstract : 39PDF : 28 -
Feature Subset Selection Algorithm for Elevated Dimensional Data By using Fast Cluster
Abstract : 48PDF : 31 -
HPBDMS: High Performance Big Data Management System on Massive & Complex Data
Abstract : 39PDF : 40 -
Dimension and Complexity Study for Alzheimer’s disease Feature Extraction
Abstract : 42PDF : 34 -
Protecting Sensitive Information in Relational Databases By Using Null Value Theory
Abstract : 44PDF : 33 -
PCA Based Classification of Relational and Identical Features of Remote Sensing Images
Abstract : 41PDF : 51 -
A Study of Quantum Cryptographic Architectures and It’s An Efficient Implementations
Abstract : 50PDF : 33 -
Wireless Equipment for Localization Using an Unmanned Mini-Helicopter-Based Airborne
Abstract : 50PDF : 43 -
Three-Port Full-Bridge Converters with Varied Voltage Input for Solar Power Systems
Abstract : 52PDF : 30 -
A Novel Approach for Data Hiding by integrating Steganography & Extended Visual Cryptography
Abstract : 45PDF : 30 -
Comparative approach on load balancing algorithm by partitioning of public cloud
Abstract : 40PDF : 30 -
Comparative Study of Automated Testing Tools: Selenium and Quick Test Professional
Abstract : 46PDF : 31 -
Defense against Shoulder Surfing Attack for Recognition Based Graphical Password
Abstract : 51PDF : 31 -
Discover and Verifying Authentication of Nearest Nodes in Mobile Ad hoc Networks
Abstract : 37PDF : 36