Hybrid Heuristic-Based Artificial Immune System for Task Scheduling |
Masoomeh sanei and Nasrollah Moghaddam Charkari, Tarbiat Modares University, Iran |
Volume : 2 volume number : 6 pdf |
Profile Data Deploying Strategy for Efficient Cooperative Reasoning on Ontology |
Soomi Yang, The University of Suwon, Gyeonggido, Korea |
Volume : 2 volume number : 6 pdf |
Management and Placement of Replicas in a Hierarchical Data Grid |
Ghalem Belalem and Bakhta Meroufel, University of Oran , Algeria |
Volume : 2 volume number : 6 pdf |
Distributed Evolutionary Computation: A New Technique for Solving Large Number of Equations |
Moslema Jahan, M. M. A Hashem and Gazi Abdullah Shahriar, Khulna University of Engineering and Technology, Bangladesh |
Volume : 2 volume number : 6 pdf |
Detecting Malicious Activities in ZigBee Networks using Cognitive Radio |
Tulin Mangir, Lelass Sarakbi and Harvy Younan, California State University, USA |
Volume : 2 volume number : 6 pdf |
Real-Time Scheduling Strategy for Wireless Sensor Networks O.S |
Kayvan Atefi1, Mohammad Sadeghi1 and Arash Atefi2, 1UiTM, Malaysia, 2Oloom Tahghighat University, Iran |
Volume : 2 volume number : 6 pdf |
A Dynamic Replica Placement Algorithm to Enhance Multiple Failures Capability in Distributed System |
Sanjay Bansal, Sanjeev Sharma and Ishita Trivedi, Rajiv Gandhi Prodhyogiki Vishwavidya, India |
Volume : 2 volume number : 6 pdf |
Nimble@Itcecnogrid Vs Alchemi.Net: A Performance Comparison |
Vijay Dhir1 ,Rattan K Datta2 and Maitreyee Dutta3, 1SBBSIET,India, 2MET,India and 3NITTTR,India |
Volume : 2 volume number : 6 pdf |
Reducing papr of ofdm based wireless systems using companding with convolutional codes |
Pawan Sharma1 and Seema Verma2, 1Bhagwan Parshuram Institute of Technology, India and 2Banasthali University, India |
Volume : 2 volume number : 6 pdf |
Experimental Analysis of UDP Performance in Mobile Ad Hoc Networks with Different Routing Protocols and varying payload |
Bikash Chandra Singh1, Tapan Kumar Godder1 , Md. Sipon Miah1 and H. M. Abdul Awal2, 1Islamic University, Bangladesh and 2Sonali Bank Limited, Bangladesh |
Volume : 2 volume number : 6 pdf |
Secured Content Distribution Network Using Optimized Rsa |
Liji Merlin Kurian and Saiju Punnoose, EPCET, Bangalore |
Volume : 2 volume number : 6 pdf |
Tailoring Of Flattened Dispersion In Triangular-Lattice Photonic Crystal Fiber |
Sandhir Kumar Singh1, D. K. Singh2 and P. Mahto3, 1NETGI, India, 2BIT Sindri, India and 3VBU Hazaribag, India |
Volume : 2 volume number : 6 pdf |
Automatic Road Extraction from Satellite Images Using Extended Kalman Filtering and Efficient Particle Filtering |
Jenita Subash, Cambridge Institute of technology, India |
Volume : 2 volume number : 6 pdf |
Comparison of Radio Resource Management in GSM |
Alam N. Shaikh1 and S. K. Bodhe2 , 1NMIMS, India and 2Bosh Technologies, India |
Volume : 2 volume number : 6 pdf |
Performance analysis of aodv, dsdv and dsr in manets |
Akshai Aggarwal1, Savita Gandhi1 and Nirbhay Chaubey2, 1Gujarat Technological University, India and 2Institute of Science and Technology for Advanced Studies and Research, India |
Volume : 2 volume number : 6 pdf |
Wing+ Web-Application Development Framework |
Ahmad Golchin1 and Ahmad Baraani2, 1Sheikhbahaie University, Iran and 2University of Isfahan, Iran |
Volume : 2 volume number : 6 pdf |
In-building radio propagation at 900 mhz in multi storied building |
Deepak Gupta1 and Sunil Joshi2, 1V.B. Polytechnic College, India and 2CTE, MPUAT, India |
Volume : 2 volume number : 6 pdf |
Application of Hidden Markov Model in Credit Card Fraud Detection |
V. Bhusari and S. Patil, College of Engineering, Bharati Vidyapeeth, India |
Volume : 2 volume number : 6 pdf |
Weak Estimation-Based Algorithm Fault-Tolerant Routing Wireless Sensor Networks |
Reza Godazand Mohammad Reza KaghazGaran, 1Islamic Azad University, Iran |
Volume : 2 volume number : 6 pdf |
Revisiting the notion of Origin-Destination Traffic Matrix of the Hosts that are attached to a Switched Local Area Network( |
Monday Eyinagho1, Samue1, Falaki2 and Anthony Atayero1, 1Covenant University, Nigeria and 2Federal University of Technology, Nigeria |
Volume : 2 volume number : 6 pdf |
A Single Photon Source Model Based On Quantum Dot And Microcavity |
Moez ATTIA and Rihab CHATTA, Engineering School of Communication of Tunis, Tunisia |
Volume : 2 volume number : 6 pdf |
MC CDMA Papr Reduction Techniques Using Discrete Transforms And Companding |
B.Sarala1 and D.S.Venkateswarulu2, 1M V S R Engineering College, India and 2HMDA, India |
Volume : 2 volume number : 6 pdf |
UMTS-WiMAX Vertical Handover in Next Generation Wireless Networks |
Nada Alamri and Nadine Akkari, King Abdulaziz University, KSA |
Volume : 2 volume number : 6 pdf |
Secure routing in wsn |
Rachid Haboub and Mohammed Ouzzif, ENSEM - ESTC - UH2C, Morocco |
Volume : 2 volume number : 6 pdf |
The Reduction of FWM effects using Duobinary Modulation in a Two-Channel D-WDM System |
Laxman Tawade and Balasaheb Deokate, Pune University, India |
Volume : 2 volume number : 6 pdf |
Mobile Ad Hoc Networks: A detailed Survey of QoS Routing Protocols |
Sanjeev Gangwar1 and Krishan Kumar2, 1VBS Purvanchal University Jaunpur, India and 2Gurukula Kangri Vishwavidyalaya, India |
Volume : 2 volume number : 6 pdf |
An Approach for Object Finding using Mobile Robots based on ACO |
Amita.P. Meshram and Smita .R. Kapse, Y.C.C.E, India |
Volume : 2 volume number : 6 pdf |
Modeling of a secure mechanism in routing protocol of manets: application of theory of games |
Karim KONATE and Abdourahime GAYE, University Cheikh Anta DIOP, Dakar |
Volume : 2 volume number : 6 pdf |
Channel Estimation for MIMO MC-CDMA Systems |
K.Sureshkumar1, R.Rajalakshmi1, A.Vetrikanimozhi2, 1CK College of Engineering and Technology, India and 2IFET College of Engineering, India |
Volume : 2 volume number : 6 pdf |