| Performance Analysis Of A Upnp/Dhcompliant Robotic Adapter For Collaborative Tasks Development |
| Alejandro Alvarez Vazquez , Ignacio Gonzalez Alonso and M.P. Almudena Garcia Fuente, University of Oviedo, Spain |
| Volume : 3 volume number : 1 pdf |
| Common Control Channel Saturation Detection And Enhancement In Cognitive Radio Networks |
| Seyed Morteza Mirhoseni Nezhadal, Reza Berangi and Mahmood Fathy, Iran University of Science & Technology, Iran |
| Volume : 3 volume number : 1 pdf |
| Effect Of Packet Delay Variation On Video/Voice Over Diffserv-Mpls In Ipv4/Ipv6 Networks |
| Md. Tariq Aziz1, Mohammad Saiful Islam1, Md. Nazmul Islam khan3, and Adrian Popescu1, 1Blekinge Institute of Technology, Sweden and 2 Presidency University, Bangladesh |
| Volume : 3 volume number : 1 pdf |
| A Survey Of Tcp Reno, New Reno And Sack Over Mobile Ad-Hoc Network |
| Md Nazmul Islam Khan1, Rashed Ahmed2 and Md. Tariq Aziz2, 1Presidency University, Bangladesh and 2Blekinge Institute of Technology, Sweden |
| Volume : 3 volume number : 1 pdf |
| The Multiplexing Of OFDM Signals On The Downlink In UTRAN-FDD |
| Ouesse Mohamed El - Amine1, Ngom Agnes1, Bouallegue Ridha2, FARSSI Sidi Mohamed1 and Ouya Samuel1, 1 University of Dakar, Senegal and 2 University of Carthage, Tunisia |
| Volume : 3 volume number : 1 pdf |
| The Impact Of Propagation Environment And Traffic Load On The Performance Of Routing Protocols In Ad Hoc Networks |
| A. Rhattoy1 and A. Zatni1, 1 Moulay Ismail University, Morocco and 2 Ibnou Zohr University, Morocco |
| Volume : 3 volume number : 1 pdf |
| Molecular Sensors In Information Fusion: Agents-Based Interface |
| E.V.Krishnamurthy, Australian National University, Australia |
| Volume : 3 volume number : 1 pdf |
| Review Of Syn-Flooding Attack Detection Mechanism |
| Mehdi Ebady Manna and Angela Amphawan, University Utara Malaysia, Malaysia |
| Volume : 3 volume number : 1 pdf |
| Cyber Threats In Social Networking Websites |
| Wajeb Ghari and Maha Shaabi, Jazan University, Saudi Arabia |
| Volume : 3 volume number : 1 pdf |
| Bluetooth Security Threats And Solutions: A Survey |
| Nateq Be-Nazir Ibn Minar1 and Mohammed Tarique2, 1American International University, Bangladesh and 2 Ajman University of Science and Technology, United Arab Emirates |
| Volume : 3 volume number : 1 pdf |
| Development of a Seed Analyzer using the Techniques of Computer Vision |
| Sandeep Arya and Parveen Lehana, University of Jammu, India |
| Volume : 3 volume number : 1 pdf |
| A Study Of BNP Parallel Task Scheduling Algorithms Metric's For Distributed Database System |
| Manik Sharma1, Gurdev Singh2 and Harsimran Kaur2, 1Sewa Devi S.D. College Tarn Taran, Punjab, India and 2 Adesh Institute of Engineering & Technology Faridkot, India |
| Volume : 3 volume number : 1 pdf |
| Parallel Processing of cluster by Map Reduce |
| Madhavi Vaidya, Vivekanand College, India |
| Volume : 3 volume number : 1 pdf |
| Quality of service and reliability in optical network |
| Jitendra Saxena and Aditya Goel, Maulana Azad National Institute of Technology, India |
| Volume : 3 volume number : 1 pdf |
| Implementation Of Low Power And Low Energy Synchronous Sapt Logic |
| Chitambara Rao.K1,Nagendra.K2 and Sreenivasa Rao.Ijjada2, 1AITAM College of Engineering, India and 2 GITAM University, India |
| Volume : 3 volume number : 1 pdf |
| An Innovative Kind Of Security Protocol Using Fusion Encryption In Virtual Private Networking |
| M.Sreedevi1 and R. Seshadri 2, 1 S.V.U.C.E, India and 2 S.V.U, India |
| Volume : 3 volume number : 1 pdf |
| A Novel Anti Phishing Framework Based On Visual Cryptography |
| Divya James1 and Mintu Philip2, 1 Indira Gandhi National Open University, India and 2 Rajagiri School of Engineering and Technology, India |
| Volume : 3 volume number : 1 pdf |
| Traffic And Security Using Randomized Dispersive Routes In Heterogeneous Sensor Network |
| P.Karunakaran1 and C.Venkatesh2 , 1 Erode Sengunthar Engineering College, India and 2 Erode Builder Educational Trust Institutions, India |
| Volume : 3 volume number : 1 pdf |
| Decentralized Load Balancing In Heterogeneous Systems Using Diffusion Approach |
| P.Neelakantan, SVCET, India |
| Volume : 3 volume number : 1 pdf |
| An Improved Performance Analysis Of Priority Scheduling Algorithm In Modified Ad Hoc Grid Layer |
| R. Bhaskaran1 and V.Parthasarathy2 , 1 PSNA College of Engg. and Technology and 2 Chettinad College of of Engg. and Technology, India |
| Volume : 3 volume number : 1 pdf |
| Energy Efficient, Scalable and Reliable MAC Protocol for Electromagnetic Communication among Nano Devices |
| V.Srikanth, Sindhu Chaluvadi, Sandeep, Vani and Venkatesh , K L University, India |
| Volume : 3 volume number : 1 pdf |
| Energy Efficient And Qos Aware Ant Colony Optimization (Eq-Aco) Routing Protocol For Wireless Sensor Networks |
| Devee Prasan.U1 and Murugappan. S2, 1Aditya Institute of Technology and Management, India and 2Annamalai University, India |
| Volume : 3 volume number : 1 pdf |
| User Profile Based Proportional Share Scheduling And Mac Protocol For Manets |
| Hannah Monisha . J1 and Rhymend Uthariaraj .V2 , 1 Indira Gandhi College of Arts and Science, India and 2 Anna University - Chennai, India |
| Volume : 3 volume number : 1 pdf |
| A Novel Security Framework Using Trust And Fuzzy Logic In Manet |
| Manoj V, Mohammed Aaqib, Raghavendiran N and Vijayan R, VIT University, India |
| Volume : 3 volume number : 1 pdf |
| Encryption Of Data Using Elliptic Curve Over Finite Fields |
| D. Sravana Kumar1 , CH. Suneetha2 and A. ChandrasekhAR2,1 SVLNS Government College, India and 2 GITAM University, India |
| Volume : 3 volume number : 1 pdf |
| Mobile-Assisted Language Learning |
| Tayebeh Mosavi Miangah1 and Amin Nezarat2,1Payame Noor University, Iran and 2Shiraz University, Iran |
| Volume : 3 volume number : 1 pdf |
| Performance Evaluation of Wi-Fi comparison with WiMAX Networks |
| M.Sreerama Murty, D.Veeraiah and A.Srinivas Rao, Sai Spurthi Institute of Technology, India |
| Volume : 3 volume number : 1 pdf |
| ANODR-ECC Key Management protocol with TELNET to secure Application and Network layer for Mobile Adhoc Networks |
| G.Padmavathi, P.Subashini and D.Devi Aruna, Avinashiligam University for Women, India |
| Volume : 3 volume number : 1 pdf |
| Scoring System Approach for Assessment of Critical Illness using Mobile Phones |
| Karupothula Madhavi Latha, Shiramshetty Gouthami and P.Ranjith Kumar, JNTUH - Jayamukhi Institute of Technological Sciences, India |
| Volume : 3 volume number : 1 pdf |
| Design of Wireless Electronic Stethoscope Based on Zigbee |
| Kadam Patil D.D and Shastri R.K, Vidya Pratishthan's CoE - Baramati, India |
| Volume : 3 volume number : 1 pdf |