Vol. 3 No. 02 (2014)

Published: 2014-02-28

Articles

  • An Optimized Localization Algorithm against Node Replication Attacks in Wireless Sensor Networks

    R.M.Sinthiya, J.Vijipriya
    177
    221
  • An Immune Inspired Behavior-based MultiAgent Model for Detecting Network Clients’ Misbehavior

    Elnaz B. Noeparast, Reza Ravanmehr, Ramin Nasiri
    157
    216
  • RECEIVER SYNCHRONIZATION FOR DAB WITH TRANSMISSION MODE III

    Baliwan Preeti
    229
    320
  • Network Security: Virtual Private Network

    Sonika, Monika, Sonal
    207
    229
  • An Adapted Group Method of Data Handling for Abrupt Data Analysis

    Vikas Lamba, Sunita Lamba
    202
    214
  • EFFICIENT DATA MINING FOR MINING CLASSIFICATION USING NEURAL NETWORK

    Mrs.Maruthaveni.R, Mrs.Renuka Devi.S.V
    254
    232
  • Physical Security: A Biometric Approach

    Preeti, Rajni
    167
    215
  • Computer Viruses and Challenges for Anti-virus Industry

    Deepak Kumar, Narender Kumar, Aditya K
    193
    435
  • Network Intrusion Detection Using Hybrid Simplified Swarm Optimization and Random Forest Algorithm on Nsl-Kdd Dataset

    S. Revathi , Dr. A. Malathi
    192
    218
  • Review On: Object Detection and Tracking To Implement Human- Machine Interaction

    Neha Nirantar , Prajakta Panse , Omkar Rahane , Saurabh Satralkar , Prof.Payal Kulkarni
    190
    192
  • Security issues in Voice over IP: A Review

    Rajni , Preeti , Ritu Baniwal
    155
    223
  • Detection and Prevention of Black Hole Attack To Improve Network Performance By Using Fidelity and ECARP Algorithms

    Pankaj Solanki, Deepak Shuhkla
    211
    215
  • Compressive Strength of Concrete containing Fly Ash, Copper Slag, Silica Fume and Fibres - Prediction

    N. Sakthieswaran, K. Ganesan
    158
    225
  • CACHING DATA THROUGH PULL BASED APPROCHES IN WIRELESS NETWORKS

    S. Mahalakshmi, Dr. M. Kamarajan
    191
    212
  • A Survey on Visible Light Communication

    Jacqueline J.George, Mohammed Hayder Mustafa, Nada Mahjoub Osman, Nuha Hashim Ahmed, Da’ad Mohammed Hamed
    196
    226
  • Design of an efficient Weighted Trust Evaluation System for Wireless Sensor Networks

    D.Ramya, Mr.P.Basith
    161
    205
  • A New BBBC based LEACH Algorithm for Energy Efficient Routing in WSN

    Archana, Sukhjinder kaur
    182
    204
  • Authentication of System using Text, Image and Audio

    Vikash Kumar Agarwal, Bhaskra Nand, Lalitendu khandagiri
    191
    212
  • A Review of Various Trust Management Models for Cloud Computing Storage Systems

    Mr. Anup R. Nimje, Prof. V.T.Gaikwad, Prof. H.N.Datir
    187
    192
  • ATM Technology Prospects: A Review

    Deepak Kumar, Aditya Kumar, Neha Choudhary
    219
    198
  • Secure and efficient application of MANET using Identity Based cryptography combined with Visual cryptography technique

    R. K. Sharma, Neeraj Kishore, Parijat Das
    201
    174
  • EFFICIENT USER REVOCATION FOR DYNAMIC GROUPS IN THE CLOUD

    Kanya Devi J, Kanimozhi S
    202
    200
  • Shape Analysis of the Quintic Trigonometric Bèzier curve with two shape parameter

    Mridula Dube, Bharti Yadav
    180
    208
  • Flash Drive Communication Using Embedded System

    Singh Harpreet , Kaur Kamaldeep
    163
    250
  • Bagged Ensemble Classifiers for Sentiment Classification of Movie Reviews

    M. Govindarajan
    199
    190
  • Virtual Touch Screen Using Microsoft Kinect

    Ekta Parwani, Apeksha Pawar, Chirag Ajwani, Prof.Govind Pole
    215
    254
  • Improving Security Authentication of IEEE 802.16 WiMax with New Public key algorithm

    Prakash Kuppuswamy, Sikandhar Shah
    201
    201
  • Energy Efficient Routing in MANET: A Survey

    Shruti Verma, Pushpa Singh
    158
    200
  • An Ethernet Based Monitoring and Controlling Of Home Appliances Using Rabbit Processor

    Patil Ketan C , Patil Rohan A , Musale Shrikant K , Prof. D.B. Rane
    163
    203
  • Cloud Computing Security using Federated Key Management

    Dr. Atulbhai Patel, Kalpit Soni
    208
    200
  • ENHANCING UNSUPERVISED APPROACH FOR PERSON NAME BIPOLARIZATION

    Sathya D, Kaladevi P
    182
    197
  • A Efficient Approach Used for Identifying Distraction of statue Image

    C.Kanimozhi, Dr.A.Gnanabaskaran
    215
    207
  • Virtual Network Computing- A Technique to Control Android Phones Remotely

    Priyadarshani Raskar, Sejal Patel, Pragati Badhe, Prof. Archana Lomte
    185
    202
  • DATA REPORTING OF TRACING EVENTS BY EVENT DRIVEN INCIDENCE MATRIX

    S.Keerthana, Mr.P.Sathishkumar M.E
    164
    203
  • Mobile Network Area Selection and Analysis of 3G GSM Network Site

    Ms.Neetu Sharma, Ms. Neelkamal Chaudhary
    170
    216
  • ZONE BASED ANALYSIS OF ZRP UNDER VARYING MOBILITY AND TRANSMISSION RANGE IN MANETs

    Anil Manohar Dogra, Rajvir singh
    210
    200