A Time Index Based Approach for Cache Sharing in Mobile Adhoc Networks |
Lilly Sheeba S and Yogesh P |
Volume : 1 volume number : 2 pdf |
Non-Intrusive Remote Monitoring of Services in a Data Centre |
Hemanta Kumar Kalita, Manoj K. Nambiar, and Amol Khanapurkar |
Volume : 1 volume number : 2 pdf |
An Expanded Bluetooth Network - A Solution to the Short Range Bluetooth Communication |
Preetha K G |
Volume : 1 volume number : 2 pdf |
A Novel Feature Set for Recognition of Similar Shaped Handwritten Hindi Characters Using Machine Learning |
Sheetal Dabra, Sunil Agrawal and Rama Krishna Challa |
Volume : 1 volume number : 2 pdf |
Knowledge Based Analysis of Various Statistical Tools in Detecting Breast Cancer |
S. Aruna, S.P. Rajagopalan and L.V. Nandakishore |
Volume : 1 volume number : 2 pdf |
Dynamic Voltage Scaling for Power Consumption Reduction in Real-Time Mixed Task Model |
Arya Lekshmi Mohan and Anju.S.Pillai |
Volume : 1 volume number : 2 pdf |
Predicting Performance of Web Services Using SMTQA |
Ch Ram Mohan Reddy, D Evangelin Geetha, KG Srinivasa, T V Suresh Kumar and K Rajani Kanth |
Volume : 1 volume number : 2 pdf |
Assured Neighbor Based Counter Protocol on Mac-Layer Providing Security in Mobile Adhoc Networks |
Gulshan Kumar and Mritunjay Rai |
Volume : 1 volume number : 2 pdf |
HPC-MAQ : A Parallel Short-Read Reference Assembler |
Veeram Venkata Siva Prasad and Gunisetti Loshma |
Volume : 1 volume number : 2 pdf |
Migration of an OLTP System From Oracle to MYSQL and Comparative Performance Evaluation |
Mohit Nanda and Amol Khanapurkar |
Volume : 1 volume number : 2 pdf |
A Well Known Tool Based Graphical Authentication Technique |
Sreelatha Malempati and Shashi Mogalla |
Volume : 1 volume number : 2 pdf |
Global Frontrunner Routing Algorithm (GFRA) for V2V Communication in VANETS |
A.Robertsingh and Suganya A |
Volume : 1 volume number : 2 pdf |
A Distributed Dynamic Channel Allocation in Cellular Communication |
Dipti Varpe and Girish Mundada |
Volume : 1 volume number : 2 pdf |
Esterel Implementation and Validation of Cruise Controller |
Jagannath Aghav and Ashwin Tumma |
Volume : 1 volume number : 2 pdf |
Enhancement and Analysis of Chaotic Image Encryption Algorithms |
R.Raja Kumar, A.Sampath and P.Indumathi |
Volume : 1 volume number : 2 pdf |
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform |
S.Ramakrishnan, T.Gopalakrishnan and K.Balasamy |
Volume : 1 volume number : 2 pdf |
Chaos Image Encryption using Pixel shuffling |
Manjunath Prasad and K.L.Sudha |
Volume : 1 volume number : 2 pdf |
RTOS Based Secure Shortest Path Routing Algorithm in Mobile Adhoc Networks |
R. Ramesh and S. Gayathri |
Volume : 1 volume number : 2 pdf |
Reversible Wavelet and Spectral Transforms for Lossless Compression of Color Images |
G Uma Rani and G Indumathi |
Volume : 1 volume number : 2 pdf |
Evaluation of Proactive, Reactive and Hybrid Adhoc Routing Protocol for IEEE 802.11 MAC and 802.11 DCF in VANET Using QUALNET |
Manish Sharma and Gurpadam Singh |
Volume : 1 volume number : 2 pdf |
A Novel Approach of Classification Techniques for CLIR |
Archana.M and Sumithra Devi K.A |
Volume : 1 volume number : 2 pdf |
Dependable Privacy Requirements by Agile Modeled Layered Security Architectures - Web Services Case Study |
M.Upendra Kumar, D.Sravan Kumar, B.Padmaja Rani, K.Venkateswar Rao and A.V.Krishna Prasad |
Volume : 1 volume number : 2 pdf |
An Uncompressed Image Encryption Algorithm Based on DNA Sequences |
Shima Ramesh Maniyath and Supriya M |
Volume : 1 volume number : 2 pdf |
Devacaptcha - A Framework to Prevent BOT Attacks |
Sushma Yalamanchili and Kameswara Rao |
Volume : 1 volume number : 2 pdf |
Computer Intrusion Detection by Two Objective Fuzzy Genetic Algorithm |
Madhuri Agravat and Udai Pratap Rao |
Volume : 1 volume number : 2 pdf |
Speech Classification Using Zernike Moments |
Manisha Pacharne and Vidyavati S Nayak |
Volume : 1 volume number : 2 pdf |
Enhancement of Optimized Linked State Routing Protocol for Energy Conservation |
Mayur Tokekar and Radhika D. Joshi |
Volume : 1 volume number : 2 pdf |
Variable Range Energy Efficient Location Aided Routing for MANET |
Nivedita N. Joshi and Radhika D. Joshi |
Volume : 1 volume number : 2 pdf |
Efficiency of Decision Trees in Predicting Student's Academic Performance |
S. Anupama Kumar and Dr. Vijayalakshmi M.N |
Volume : 1 volume number : 2 pdf |
Lane Change Detection and Tracking for a Safe-Lane Approach in Real Time Vision Based Navigation Systems |
Gayathiri Somasundaram, Kavitha and K.I.Ramachandran |
Volume : 1 volume number : 2 pdf |
Intelligent Information Retrieval Within Digital Library Using Domain Ontology |
Thinn Mya Mya Swe |
Volume : 1 volume number : 2 pdf |
Implementation of User Interface for Microprocessor Trainer |
TinMarKyi |
Volume : 1 volume number : 2 pdf |
Full Communication in a Wireless Sensor Network by Merging Blocks of a Key Predistribution using Reed Solomon Code |
Aritra Dhar and Pinaki Sarkar |
Volume : 1 volume number : 2 pdf |
CISCO System's Strategic Use of the Internet and Business Applications |
Abdurrahman Celebi and Raju Vijaya |
Volume : 1 volume number : 2 pdf |
Employing Neocognitron Neural Network Base Ensemble Classifiers To Enhance Efficiency of Classification In Handwritten Digit Datasets |
Neera Saxena, Qasima Abbas Kazmi, Chandra Pal and O.P. Vyas |
Volume : 1 volume number : 2 pdf |
Review on Models for Generalized Predictive Controller |
Ganesh. U. L, M. Krishna, S. A. Hariprasad and Sravani Krishna Rau |
Volume : 1 volume number : 2 pdf |