| Hybrid Heuristic-Based Artificial Immune System for Task Scheduling |
| Masoomeh sanei and Nasrollah Moghaddam Charkari, Tarbiat Modares University, Iran |
| Volume : 2 volume number : 6 pdf |
| Profile Data Deploying Strategy for Efficient Cooperative Reasoning on Ontology |
| Soomi Yang, The University of Suwon, Gyeonggido, Korea |
| Volume : 2 volume number : 6 pdf |
| Management and Placement of Replicas in a Hierarchical Data Grid |
| Ghalem Belalem and Bakhta Meroufel, University of Oran , Algeria |
| Volume : 2 volume number : 6 pdf |
| Distributed Evolutionary Computation: A New Technique for Solving Large Number of Equations |
| Moslema Jahan, M. M. A Hashem and Gazi Abdullah Shahriar, Khulna University of Engineering and Technology, Bangladesh |
| Volume : 2 volume number : 6 pdf |
| Detecting Malicious Activities in ZigBee Networks using Cognitive Radio |
| Tulin Mangir, Lelass Sarakbi and Harvy Younan, California State University, USA |
| Volume : 2 volume number : 6 pdf |
| Real-Time Scheduling Strategy for Wireless Sensor Networks O.S |
| Kayvan Atefi1, Mohammad Sadeghi1 and Arash Atefi2, 1UiTM, Malaysia, 2Oloom Tahghighat University, Iran |
| Volume : 2 volume number : 6 pdf |
| A Dynamic Replica Placement Algorithm to Enhance Multiple Failures Capability in Distributed System |
| Sanjay Bansal, Sanjeev Sharma and Ishita Trivedi, Rajiv Gandhi Prodhyogiki Vishwavidya, India |
| Volume : 2 volume number : 6 pdf |
| Nimble@Itcecnogrid Vs Alchemi.Net: A Performance Comparison |
| Vijay Dhir1 ,Rattan K Datta2 and Maitreyee Dutta3, 1SBBSIET,India, 2MET,India and 3NITTTR,India |
| Volume : 2 volume number : 6 pdf |
| Reducing papr of ofdm based wireless systems using companding with convolutional codes |
| Pawan Sharma1 and Seema Verma2, 1Bhagwan Parshuram Institute of Technology, India and 2Banasthali University, India |
| Volume : 2 volume number : 6 pdf |
| Experimental Analysis of UDP Performance in Mobile Ad Hoc Networks with Different Routing Protocols and varying payload |
| Bikash Chandra Singh1, Tapan Kumar Godder1 , Md. Sipon Miah1 and H. M. Abdul Awal2, 1Islamic University, Bangladesh and 2Sonali Bank Limited, Bangladesh |
| Volume : 2 volume number : 6 pdf |
| Secured Content Distribution Network Using Optimized Rsa |
| Liji Merlin Kurian and Saiju Punnoose, EPCET, Bangalore |
| Volume : 2 volume number : 6 pdf |
| Tailoring Of Flattened Dispersion In Triangular-Lattice Photonic Crystal Fiber |
| Sandhir Kumar Singh1, D. K. Singh2 and P. Mahto3, 1NETGI, India, 2BIT Sindri, India and 3VBU Hazaribag, India |
| Volume : 2 volume number : 6 pdf |
| Automatic Road Extraction from Satellite Images Using Extended Kalman Filtering and Efficient Particle Filtering |
| Jenita Subash, Cambridge Institute of technology, India |
| Volume : 2 volume number : 6 pdf |
| Comparison of Radio Resource Management in GSM |
| Alam N. Shaikh1 and S. K. Bodhe2 , 1NMIMS, India and 2Bosh Technologies, India |
| Volume : 2 volume number : 6 pdf |
| Performance analysis of aodv, dsdv and dsr in manets |
| Akshai Aggarwal1, Savita Gandhi1 and Nirbhay Chaubey2, 1Gujarat Technological University, India and 2Institute of Science and Technology for Advanced Studies and Research, India |
| Volume : 2 volume number : 6 pdf |
| Wing+ Web-Application Development Framework |
| Ahmad Golchin1 and Ahmad Baraani2, 1Sheikhbahaie University, Iran and 2University of Isfahan, Iran |
| Volume : 2 volume number : 6 pdf |
| In-building radio propagation at 900 mhz in multi storied building |
| Deepak Gupta1 and Sunil Joshi2, 1V.B. Polytechnic College, India and 2CTE, MPUAT, India |
| Volume : 2 volume number : 6 pdf |
| Application of Hidden Markov Model in Credit Card Fraud Detection |
| V. Bhusari and S. Patil, College of Engineering, Bharati Vidyapeeth, India |
| Volume : 2 volume number : 6 pdf |
| Weak Estimation-Based Algorithm Fault-Tolerant Routing Wireless Sensor Networks |
| Reza Godazand Mohammad Reza KaghazGaran, 1Islamic Azad University, Iran |
| Volume : 2 volume number : 6 pdf |
| Revisiting the notion of Origin-Destination Traffic Matrix of the Hosts that are attached to a Switched Local Area Network( |
| Monday Eyinagho1, Samue1, Falaki2 and Anthony Atayero1, 1Covenant University, Nigeria and 2Federal University of Technology, Nigeria |
| Volume : 2 volume number : 6 pdf |
| A Single Photon Source Model Based On Quantum Dot And Microcavity |
| Moez ATTIA and Rihab CHATTA, Engineering School of Communication of Tunis, Tunisia |
| Volume : 2 volume number : 6 pdf |
| MC CDMA Papr Reduction Techniques Using Discrete Transforms And Companding |
| B.Sarala1 and D.S.Venkateswarulu2, 1M V S R Engineering College, India and 2HMDA, India |
| Volume : 2 volume number : 6 pdf |
| UMTS-WiMAX Vertical Handover in Next Generation Wireless Networks |
| Nada Alamri and Nadine Akkari, King Abdulaziz University, KSA |
| Volume : 2 volume number : 6 pdf |
| Secure routing in wsn |
| Rachid Haboub and Mohammed Ouzzif, ENSEM - ESTC - UH2C, Morocco |
| Volume : 2 volume number : 6 pdf |
| The Reduction of FWM effects using Duobinary Modulation in a Two-Channel D-WDM System |
| Laxman Tawade and Balasaheb Deokate, Pune University, India |
| Volume : 2 volume number : 6 pdf |
| Mobile Ad Hoc Networks: A detailed Survey of QoS Routing Protocols |
| Sanjeev Gangwar1 and Krishan Kumar2, 1VBS Purvanchal University Jaunpur, India and 2Gurukula Kangri Vishwavidyalaya, India |
| Volume : 2 volume number : 6 pdf |
| An Approach for Object Finding using Mobile Robots based on ACO |
| Amita.P. Meshram and Smita .R. Kapse, Y.C.C.E, India |
| Volume : 2 volume number : 6 pdf |
| Modeling of a secure mechanism in routing protocol of manets: application of theory of games |
| Karim KONATE and Abdourahime GAYE, University Cheikh Anta DIOP, Dakar |
| Volume : 2 volume number : 6 pdf |
| Channel Estimation for MIMO MC-CDMA Systems |
| K.Sureshkumar1, R.Rajalakshmi1, A.Vetrikanimozhi2, 1CK College of Engineering and Technology, India and 2IFET College of Engineering, India |
| Volume : 2 volume number : 6 pdf |