| Resource Allocation Technique Using Load Matrix Method in Wireless Cellular Systems |
| S.Prabhakar1, Banda Sreenivas2, D.Karunakar Reddy3 and S. Ramesh Babu4 |
| Volume : 2 volume number : 2 pdf |
| Detection Techniques of Selective Forwarding Attacks in Wireless Sensor Networks : A Survey |
| Preeti Sharma1,Monika Saluja1 and Krishan Kumar Saluja2 |
| Volume : 2 volume number : 2 pdf |
| Trust Oriented Security Framework for Ad Hoc Network |
| Amandeep Verma1 and Manpreet Singh Gujra2 |
| Volume : 2 volume number : 2 pdf |
| Dynamic Network Anomaly Intrusion Detection Using Modified SOM |
| Aneetha.A.S., Revathi.S and Bose.S |
| Volume : 2 volume number : 2 pdf |
| Ingress Filtering at Edge Network to Protect VPN Service from DOS Attack |
| S.Saraswathi and P.Yogesh |
| Volume : 2 volume number : 2 pdf |
| QoS Issues In Underwater Sensor Networks |
| Vivekanand Jha, Preeti Gupta and Urvashi Ahuja |
| Volume : 2 volume number : 2 pdf |
| Analytical Study of Hexapod MIRNAs using Phylogenetic Methods |
| A.K. Mishra and H.Chandrasekharan |
| Volume : 2 volume number : 2 pdf |
| Information Security Through Image Watermarking Using Least Significant Bit Algorithm |
| Puneet Kr Sharma and Rajni |
| Volume : 2 volume number : 2 pdf |
| An Emerging Trend of Feature Extraction Method in Video Processing |
| R.Revathi and M.Hemalatha |
| Volume : 2 volume number : 2 pdf |
| A Modified Directional Weighted Cascaded-Mask Median Filter for Removal of Random Impulse Noise |
| J.K. Mandal and Aparna Sarkar |
| Volume : 2 volume number : 2 pdf |
| Steganography Using Adaptive Pixel Value Differencing(APVD) of Gray Images Through Exclusion of Overflow/Underflow |
| J. K. Mandal and Debashis Das, |
| Volume : 2 volume number : 2 pdf |
| Energy Optimisation Schemes for Wireless Sensor Network |
| Vivekanand Jha, Elisha Chauhan, Harshpreet Kaur and Neeharika Taneja |
| Volume : 2 volume number : 2 pdf |
| A Survey on Tamil Handwritten Character Recognition using OCR Techniques |
| M. Antony Robert Raj and S.Abirami |
| Volume : 2 volume number : 2 pdf |
| Object-Oriented Database Model for Effective Mining of Advanced Engineering Materials Data Sets |
| Doreswamy, Manohar M G and Hemanth K S, |
| Volume : 2 volume number : 2 pdf |
| Impact of Error Filters on Shares in Halftone Visual Cryptography |
| Sunil Agrawal and Anshul Sharma |
| Volume : 2 volume number : 2 pdf |
| Combining Jpeg Steganography and Substitution Encryption for Secure Data Communication |
| Shamim Ahmed Laskar and Kattamanchi Hemachandran |
| Volume : 2 volume number : 2 pdf |
| Digital Image Steganalysis for Computer Forensic Investigation |
| Nanhay Singh, Bhoopesh Singh Bhati and R. S. Raw |
| Volume : 2 volume number : 2 pdf |
| Monogenic Scale Space Based Region Covariance Matrix Descriptor for Face Recognition |
| M. Sharmila Kumari1, B H Shekar2 and G Thippeswamy3 |
| Volume : 2 volume number : 2 pdf |
| Visual Attention Based Keyframes Extraction and Video Summarization |
| P.Geetha, S.Thiruchadai Pandeeswari and SonyMohanan |
| Volume : 2 volume number : 2 pdf |
| Simulator for Energy Efficient Clustering in Mobile Ad Hoc Networks |
| Amit Kumar, Dhirendra Srivastav and Suchismita Chinara |
| Volume : 2 volume number : 2 pdf |
| A Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc Networks |
| Jayashree V. Shiral and Bhushan N. Mahajan |
| Volume : 2 volume number : 2 pdf |
| Forensic Computing Models: Technical Overview |
| Gulshan Shrivastava, Kavita Sharma and Akansha Dwivedi |
| Volume : 2 volume number : 2 pdf |
| Detection of Application Layer DDOS Attacks Using Information Theory Based Metrics |
| S. Renuka Devi and P. Yogesh |
| Volume : 2 volume number : 2 pdf |
| A Novel Approach for Feature Extraction and Selection on MRI Images for Brain Tumor Classification |
| V.P.Gladis Pushpa Rathi and S.Palani |
| Volume : 2 volume number : 2 pdf |
| Efficient Utilization of Channels Using Dynamic Guard Channel Allocation with Channel Borrowing Strategy in Handoffs |
| Alagu S and Meyyappan T |
| Volume : 2 volume number : 2 pdf |
| Performance analysis of clustering based image segmentation and optimization methods |
| Jaskirat kaur, Sunil Agrawal and Renu Vig |
| Volume : 2 volume number : 2 pdf |
| Tuning Of Cost-231 hata Model for Radio Wave Propagation Predictions |
| Chhaya Dalela1, M V S N Prasad2 and P K Dalela3 |
| Volume : 2 volume number : 2 pdf |
| Neural Network Approach for Eye Detection |
| Vijayalaxmi, P.Sudhakara Rao and S Sreehari |
| Volume : 2 volume number : 2 pdf |
| Current Trends and Future Aspects in Cross-Layer Design for the Wireless Networks |
| Sandeep Sharma, Rajesh Mishra and Karan Singh |
| Volume : 2 volume number : 2 pdf |
| Analysis of Watermarking Techniques for Medical Images Preserving ROI |
| Sonika C. Rathi and Vandana S. Inamdar |
| Volume : 2 volume number : 2 pdf |
| A novel Ant Colony Algorithm for multicast routing in wireless ad hoc networks |
| Sunita Prasad1, Zaheeruddin2 and D.K.Lobiyal3 |
| Volume : 2 volume number : 2 pdf |
| An Comparison with Property Based Resource Attestation to Secure Cloud Environment |
| Ravindra K. Gupta1, Rajat Pali2, Shailendra Singh3, Gajendra Singh2 and Ashutosh k. Dubey4 |
| Volume : 2 volume number : 2 pdf |
| An Efficient Approach for Data Gathering and Sharing with Inter Node Communication in Mobile-Sink |
| Ravindra K. Gupta1, Shashank Saxena2, Shailendra Singh3, Gajendra Singh3 and Ashutosh k. Dubey4 |
| Volume : 2 volume number : 2 pdf |
| SubGraD- An Approach for Subgraph Detection |
| Akshara Pande1, Vivekanand Pant2 and S. Nigam1 |
| Volume : 2 volume number : 2 pdf |
| CloudPass - a passport system based on Cloud Computing and Near Field Communication |
| Adethya Sudarsanan |
| Volume : 2 volume number : 2 pdf |
| Analysis of Bayes, Neural Network and Tree Classifier of Classification Technique in Data Mining using WEKA |
| Yugal kumar1 and G. Sahoo2 |
| Volume : 2 volume number : 2 pdf |
| Emotion Detection from Text |
| Shiv Naresh Shivhare and Saritha Khethawat |
| Volume : 2 volume number : 2 pdf |
| Exploring the Current Trends and Future Prospects in Terrorist Network Mining |
| Nisha Chaurasia, Mradul Dhakar, Astha Chharia, Akhilesh Tiwari and R. K. Gupta |
| Volume : 2 volume number : 2 pdf |
| A Hybrid Clustering Algorithm for Data Mining |
| Ravindra Jain, Devi Ahilya Vishwavidyalaya |
| Volume : 2 volume number : 2 pdf |
| Analysis of XSS attack Mitigation techniques based on Platforms and Browsers |
| Ravi Kanth Kotha, Gaurav Prasad and Dinesh Naik |
| Volume : 2 volume number : 2 pdf |
| Generation and Optimization of Test cases for Object-Oriented Software Using State Chart Diagram |
| Ranjita Kumari Swain1, Prafulla Kumar Behera2 and Durga Prasad Mohapatra3 |
| Volume : 2 volume number : 2 pdf |
| A Novel Approach for Exception Handling in SOA |
| Prachet Bhuyan1, Tapas Kumar Choudhury1 and Durga Prasad Mahapatra2 |
| Volume : 2 volume number : 2 pdf |
| FPGA Implementation of Pipelined CORDIC Sine Cosine Digital Wave Generator |
| Navdeep Prashar and Balwinder Singh |
| Volume : 2 volume number : 2 pdf |