Resource Allocation Technique Using Load Matrix Method in Wireless Cellular Systems |
S.Prabhakar1, Banda Sreenivas2, D.Karunakar Reddy3 and S. Ramesh Babu4 |
Volume : 2 volume number : 2 pdf |
Detection Techniques of Selective Forwarding Attacks in Wireless Sensor Networks : A Survey |
Preeti Sharma1,Monika Saluja1 and Krishan Kumar Saluja2 |
Volume : 2 volume number : 2 pdf |
Trust Oriented Security Framework for Ad Hoc Network |
Amandeep Verma1 and Manpreet Singh Gujra2 |
Volume : 2 volume number : 2 pdf |
Dynamic Network Anomaly Intrusion Detection Using Modified SOM |
Aneetha.A.S., Revathi.S and Bose.S |
Volume : 2 volume number : 2 pdf |
Ingress Filtering at Edge Network to Protect VPN Service from DOS Attack |
S.Saraswathi and P.Yogesh |
Volume : 2 volume number : 2 pdf |
QoS Issues In Underwater Sensor Networks |
Vivekanand Jha, Preeti Gupta and Urvashi Ahuja |
Volume : 2 volume number : 2 pdf |
Analytical Study of Hexapod MIRNAs using Phylogenetic Methods |
A.K. Mishra and H.Chandrasekharan |
Volume : 2 volume number : 2 pdf |
Information Security Through Image Watermarking Using Least Significant Bit Algorithm |
Puneet Kr Sharma and Rajni |
Volume : 2 volume number : 2 pdf |
An Emerging Trend of Feature Extraction Method in Video Processing |
R.Revathi and M.Hemalatha |
Volume : 2 volume number : 2 pdf |
A Modified Directional Weighted Cascaded-Mask Median Filter for Removal of Random Impulse Noise |
J.K. Mandal and Aparna Sarkar |
Volume : 2 volume number : 2 pdf |
Steganography Using Adaptive Pixel Value Differencing(APVD) of Gray Images Through Exclusion of Overflow/Underflow |
J. K. Mandal and Debashis Das, |
Volume : 2 volume number : 2 pdf |
Energy Optimisation Schemes for Wireless Sensor Network |
Vivekanand Jha, Elisha Chauhan, Harshpreet Kaur and Neeharika Taneja |
Volume : 2 volume number : 2 pdf |
A Survey on Tamil Handwritten Character Recognition using OCR Techniques |
M. Antony Robert Raj and S.Abirami |
Volume : 2 volume number : 2 pdf |
Object-Oriented Database Model for Effective Mining of Advanced Engineering Materials Data Sets |
Doreswamy, Manohar M G and Hemanth K S, |
Volume : 2 volume number : 2 pdf |
Impact of Error Filters on Shares in Halftone Visual Cryptography |
Sunil Agrawal and Anshul Sharma |
Volume : 2 volume number : 2 pdf |
Combining Jpeg Steganography and Substitution Encryption for Secure Data Communication |
Shamim Ahmed Laskar and Kattamanchi Hemachandran |
Volume : 2 volume number : 2 pdf |
Digital Image Steganalysis for Computer Forensic Investigation |
Nanhay Singh, Bhoopesh Singh Bhati and R. S. Raw |
Volume : 2 volume number : 2 pdf |
Monogenic Scale Space Based Region Covariance Matrix Descriptor for Face Recognition |
M. Sharmila Kumari1, B H Shekar2 and G Thippeswamy3 |
Volume : 2 volume number : 2 pdf |
Visual Attention Based Keyframes Extraction and Video Summarization |
P.Geetha, S.Thiruchadai Pandeeswari and SonyMohanan |
Volume : 2 volume number : 2 pdf |
Simulator for Energy Efficient Clustering in Mobile Ad Hoc Networks |
Amit Kumar, Dhirendra Srivastav and Suchismita Chinara |
Volume : 2 volume number : 2 pdf |
A Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc Networks |
Jayashree V. Shiral and Bhushan N. Mahajan |
Volume : 2 volume number : 2 pdf |
Forensic Computing Models: Technical Overview |
Gulshan Shrivastava, Kavita Sharma and Akansha Dwivedi |
Volume : 2 volume number : 2 pdf |
Detection of Application Layer DDOS Attacks Using Information Theory Based Metrics |
S. Renuka Devi and P. Yogesh |
Volume : 2 volume number : 2 pdf |
A Novel Approach for Feature Extraction and Selection on MRI Images for Brain Tumor Classification |
V.P.Gladis Pushpa Rathi and S.Palani |
Volume : 2 volume number : 2 pdf |
Efficient Utilization of Channels Using Dynamic Guard Channel Allocation with Channel Borrowing Strategy in Handoffs |
Alagu S and Meyyappan T |
Volume : 2 volume number : 2 pdf |
Performance analysis of clustering based image segmentation and optimization methods |
Jaskirat kaur, Sunil Agrawal and Renu Vig |
Volume : 2 volume number : 2 pdf |
Tuning Of Cost-231 hata Model for Radio Wave Propagation Predictions |
Chhaya Dalela1, M V S N Prasad2 and P K Dalela3 |
Volume : 2 volume number : 2 pdf |
Neural Network Approach for Eye Detection |
Vijayalaxmi, P.Sudhakara Rao and S Sreehari |
Volume : 2 volume number : 2 pdf |
Current Trends and Future Aspects in Cross-Layer Design for the Wireless Networks |
Sandeep Sharma, Rajesh Mishra and Karan Singh |
Volume : 2 volume number : 2 pdf |
Analysis of Watermarking Techniques for Medical Images Preserving ROI |
Sonika C. Rathi and Vandana S. Inamdar |
Volume : 2 volume number : 2 pdf |
A novel Ant Colony Algorithm for multicast routing in wireless ad hoc networks |
Sunita Prasad1, Zaheeruddin2 and D.K.Lobiyal3 |
Volume : 2 volume number : 2 pdf |
An Comparison with Property Based Resource Attestation to Secure Cloud Environment |
Ravindra K. Gupta1, Rajat Pali2, Shailendra Singh3, Gajendra Singh2 and Ashutosh k. Dubey4 |
Volume : 2 volume number : 2 pdf |
An Efficient Approach for Data Gathering and Sharing with Inter Node Communication in Mobile-Sink |
Ravindra K. Gupta1, Shashank Saxena2, Shailendra Singh3, Gajendra Singh3 and Ashutosh k. Dubey4 |
Volume : 2 volume number : 2 pdf |
SubGraD- An Approach for Subgraph Detection |
Akshara Pande1, Vivekanand Pant2 and S. Nigam1 |
Volume : 2 volume number : 2 pdf |
CloudPass - a passport system based on Cloud Computing and Near Field Communication |
Adethya Sudarsanan |
Volume : 2 volume number : 2 pdf |
Analysis of Bayes, Neural Network and Tree Classifier of Classification Technique in Data Mining using WEKA |
Yugal kumar1 and G. Sahoo2 |
Volume : 2 volume number : 2 pdf |
Emotion Detection from Text |
Shiv Naresh Shivhare and Saritha Khethawat |
Volume : 2 volume number : 2 pdf |
Exploring the Current Trends and Future Prospects in Terrorist Network Mining |
Nisha Chaurasia, Mradul Dhakar, Astha Chharia, Akhilesh Tiwari and R. K. Gupta |
Volume : 2 volume number : 2 pdf |
A Hybrid Clustering Algorithm for Data Mining |
Ravindra Jain, Devi Ahilya Vishwavidyalaya |
Volume : 2 volume number : 2 pdf |
Analysis of XSS attack Mitigation techniques based on Platforms and Browsers |
Ravi Kanth Kotha, Gaurav Prasad and Dinesh Naik |
Volume : 2 volume number : 2 pdf |
Generation and Optimization of Test cases for Object-Oriented Software Using State Chart Diagram |
Ranjita Kumari Swain1, Prafulla Kumar Behera2 and Durga Prasad Mohapatra3 |
Volume : 2 volume number : 2 pdf |
A Novel Approach for Exception Handling in SOA |
Prachet Bhuyan1, Tapas Kumar Choudhury1 and Durga Prasad Mahapatra2 |
Volume : 2 volume number : 2 pdf |
FPGA Implementation of Pipelined CORDIC Sine Cosine Digital Wave Generator |
Navdeep Prashar and Balwinder Singh |
Volume : 2 volume number : 2 pdf |