Humanistic Approach in Mobile Adhoc Network : HAMANET |
Md. Amir Khusru Akhtar1 and G. Sahoo2, 1 Cambridge Institute of Technology, India and 2 Birla Institute of Technology, India |
Volume : 3 volume number : 6 pdf |
Fake Face Database and Preprocessing |
Aruni Singh, Sanjay Kumar Singh and Shrikant Tiwari, IIT(BHU), India |
Volume : 3 volume number : 6 pdf |
Node Failure Time Analysis for Maximum Stability vs Minimum Distance Spanning Tree Based Data Gathering in Mobile Sensor Networks |
Natarajan Meghanathan1 and Philip Mumford2, 1 Jackson State University, USA and 2 Air Force Research Lab/RYWC, USA |
Volume : 3 volume number : 6 pdf |
Knowledge Base Compound Approach Against Phishing Attacks Using Some Parsing Techniques |
Gaurav Kumar Tak1, Gaurav Ojha2 and Udit Kumar2, 1 Lovely Professional University, India and 2 Indian Institute of Information Technology and Management, India |
Volume : 3 volume number : 6 pdf |
Affect of Parallel Computing on Multicore Processors |
V R Rao Konkimalla and Niraj Upadhayaya, JB Institute of Engineering Technology, India |
Volume : 3 volume number : 6 pdf |
Framework for Tagging Software in Web Application |
Karan Gupta and Anita Goel, University of Delhi, India |
Volume : 3 volume number : 6 pdf |
A RAMP Code for Fine-Grained Access Control |
Kannan Karthik, Indian Institute of Technology - Guwahati, India |
Volume : 3 volume number : 6 pdf |
Fusion Based Multimodal Authentication in Biometrics Using Context-Sensitive Exponent Associative Memory Model : A Novel Approach |
P. E. S. N. Krishna Prasad, Pavan Kumar K, M. V. Ramakrishna and B. D. C. N. Prasad, Prasad V. Potluri Siddhartha Institute of Technology, India |
Volume : 3 volume number : 6 pdf |
Combined Mining Approach to Generate Patterns for Complex Data |
Sumit Kumar1, Sweety2 and Manish Kumar2, 1IVY Comptech Pvt. Ltd, India and 2IIIT-Allahabad, India |
Volume : 3 volume number : 6 pdf |
Real Time Database Compression Optimization Using Iterative Length Compression Algorithm |
Muthukumar Murugesan1 and T Ravichandran2, 1Karpagam University, India and 2Hindusthan Institute of Technology, India |
Volume : 3 volume number : 6 pdf |
Wireless Sensor Networks - Architecture, Security Requirements, Security Threats and its Countermeasures |
Ranjit Panigrahi, Kalpana Sharma and M.K. Ghose, SMIT, India |
Volume : 3 volume number : 6 pdf |
Mapping of Traditional Software Development Methods to Agile Methodology |
Rashmi Popli, Anita and Naresh Chauhan, YMCA University of Science & Technology, India |
Volume : 3 volume number : 6 pdf |
A Model for Aligning Software Projects Requirements with Project Team Members Requirements |
Robert Hans, Tshwane University of Technology, South Africa |
Volume : 3 volume number : 6 pdf |
A Hybrid Approach for Ensuring Security in Data Communication |
Shailender Gupta1, Bharat Bhushan1, Surbhi Singhania1 and Jeetesh Gulani2, 1YMCA University of Science and Technology, India and 2Indian Institute of Technology-Kharagpur, India |
Volume : 3 volume number : 6 pdf |
On Average Case Analysis Through Statistical Bounds : Linking Theory to Practice |
Niraj Kumar Singh, Soubhik Chakraborty and Dheeresh Kumar Mallick, BIT Mesra, India |
Volume : 3 volume number : 6 pdf |
Semantic Web Services - Discovery, Selection and Composition Techniques |
Sowmya Kamath S and Ananthanarayana V.S, National Institute of Technology, India |
Volume : 3 volume number : 6 pdf |
Classification of Tamil Poetry Using Context Free Grammar Using Tamil Grammar Rules |
Subasree Venkatsubhramaniyen, Subha Rashmi and Rajeswari Sridhar, Anna University, India |
Volume : 3 volume number : 6 pdf |
Study of VANET Routing Protocols for End to End Delay |
Sunilkumar M. Bhagat and Vijay Wadhai, MIT Academy of Engineering, India |
Volume : 3 volume number : 6 pdf |