Performance Analysis Of A Upnp/Dhcompliant Robotic Adapter For Collaborative Tasks Development |
Alejandro Alvarez Vazquez , Ignacio Gonzalez Alonso and M.P. Almudena Garcia Fuente, University of Oviedo, Spain |
Volume : 3 volume number : 1 pdf |
Common Control Channel Saturation Detection And Enhancement In Cognitive Radio Networks |
Seyed Morteza Mirhoseni Nezhadal, Reza Berangi and Mahmood Fathy, Iran University of Science & Technology, Iran |
Volume : 3 volume number : 1 pdf |
Effect Of Packet Delay Variation On Video/Voice Over Diffserv-Mpls In Ipv4/Ipv6 Networks |
Md. Tariq Aziz1, Mohammad Saiful Islam1, Md. Nazmul Islam khan3, and Adrian Popescu1, 1Blekinge Institute of Technology, Sweden and 2 Presidency University, Bangladesh |
Volume : 3 volume number : 1 pdf |
A Survey Of Tcp Reno, New Reno And Sack Over Mobile Ad-Hoc Network |
Md Nazmul Islam Khan1, Rashed Ahmed2 and Md. Tariq Aziz2, 1Presidency University, Bangladesh and 2Blekinge Institute of Technology, Sweden |
Volume : 3 volume number : 1 pdf |
The Multiplexing Of OFDM Signals On The Downlink In UTRAN-FDD |
Ouesse Mohamed El - Amine1, Ngom Agnes1, Bouallegue Ridha2, FARSSI Sidi Mohamed1 and Ouya Samuel1, 1 University of Dakar, Senegal and 2 University of Carthage, Tunisia |
Volume : 3 volume number : 1 pdf |
The Impact Of Propagation Environment And Traffic Load On The Performance Of Routing Protocols In Ad Hoc Networks |
A. Rhattoy1 and A. Zatni1, 1 Moulay Ismail University, Morocco and 2 Ibnou Zohr University, Morocco |
Volume : 3 volume number : 1 pdf |
Molecular Sensors In Information Fusion: Agents-Based Interface |
E.V.Krishnamurthy, Australian National University, Australia |
Volume : 3 volume number : 1 pdf |
Review Of Syn-Flooding Attack Detection Mechanism |
Mehdi Ebady Manna and Angela Amphawan, University Utara Malaysia, Malaysia |
Volume : 3 volume number : 1 pdf |
Cyber Threats In Social Networking Websites |
Wajeb Ghari and Maha Shaabi, Jazan University, Saudi Arabia |
Volume : 3 volume number : 1 pdf |
Bluetooth Security Threats And Solutions: A Survey |
Nateq Be-Nazir Ibn Minar1 and Mohammed Tarique2, 1American International University, Bangladesh and 2 Ajman University of Science and Technology, United Arab Emirates |
Volume : 3 volume number : 1 pdf |
Development of a Seed Analyzer using the Techniques of Computer Vision |
Sandeep Arya and Parveen Lehana, University of Jammu, India |
Volume : 3 volume number : 1 pdf |
A Study Of BNP Parallel Task Scheduling Algorithms Metric's For Distributed Database System |
Manik Sharma1, Gurdev Singh2 and Harsimran Kaur2, 1Sewa Devi S.D. College Tarn Taran, Punjab, India and 2 Adesh Institute of Engineering & Technology Faridkot, India |
Volume : 3 volume number : 1 pdf |
Parallel Processing of cluster by Map Reduce |
Madhavi Vaidya, Vivekanand College, India |
Volume : 3 volume number : 1 pdf |
Quality of service and reliability in optical network |
Jitendra Saxena and Aditya Goel, Maulana Azad National Institute of Technology, India |
Volume : 3 volume number : 1 pdf |
Implementation Of Low Power And Low Energy Synchronous Sapt Logic |
Chitambara Rao.K1,Nagendra.K2 and Sreenivasa Rao.Ijjada2, 1AITAM College of Engineering, India and 2 GITAM University, India |
Volume : 3 volume number : 1 pdf |
An Innovative Kind Of Security Protocol Using Fusion Encryption In Virtual Private Networking |
M.Sreedevi1 and R. Seshadri 2, 1 S.V.U.C.E, India and 2 S.V.U, India |
Volume : 3 volume number : 1 pdf |
A Novel Anti Phishing Framework Based On Visual Cryptography |
Divya James1 and Mintu Philip2, 1 Indira Gandhi National Open University, India and 2 Rajagiri School of Engineering and Technology, India |
Volume : 3 volume number : 1 pdf |
Traffic And Security Using Randomized Dispersive Routes In Heterogeneous Sensor Network |
P.Karunakaran1 and C.Venkatesh2 , 1 Erode Sengunthar Engineering College, India and 2 Erode Builder Educational Trust Institutions, India |
Volume : 3 volume number : 1 pdf |
Decentralized Load Balancing In Heterogeneous Systems Using Diffusion Approach |
P.Neelakantan, SVCET, India |
Volume : 3 volume number : 1 pdf |
An Improved Performance Analysis Of Priority Scheduling Algorithm In Modified Ad Hoc Grid Layer |
R. Bhaskaran1 and V.Parthasarathy2 , 1 PSNA College of Engg. and Technology and 2 Chettinad College of of Engg. and Technology, India |
Volume : 3 volume number : 1 pdf |
Energy Efficient, Scalable and Reliable MAC Protocol for Electromagnetic Communication among Nano Devices |
V.Srikanth, Sindhu Chaluvadi, Sandeep, Vani and Venkatesh , K L University, India |
Volume : 3 volume number : 1 pdf |
Energy Efficient And Qos Aware Ant Colony Optimization (Eq-Aco) Routing Protocol For Wireless Sensor Networks |
Devee Prasan.U1 and Murugappan. S2, 1Aditya Institute of Technology and Management, India and 2Annamalai University, India |
Volume : 3 volume number : 1 pdf |
User Profile Based Proportional Share Scheduling And Mac Protocol For Manets |
Hannah Monisha . J1 and Rhymend Uthariaraj .V2 , 1 Indira Gandhi College of Arts and Science, India and 2 Anna University - Chennai, India |
Volume : 3 volume number : 1 pdf |
A Novel Security Framework Using Trust And Fuzzy Logic In Manet |
Manoj V, Mohammed Aaqib, Raghavendiran N and Vijayan R, VIT University, India |
Volume : 3 volume number : 1 pdf |
Encryption Of Data Using Elliptic Curve Over Finite Fields |
D. Sravana Kumar1 , CH. Suneetha2 and A. ChandrasekhAR2,1 SVLNS Government College, India and 2 GITAM University, India |
Volume : 3 volume number : 1 pdf |
Mobile-Assisted Language Learning |
Tayebeh Mosavi Miangah1 and Amin Nezarat2,1Payame Noor University, Iran and 2Shiraz University, Iran |
Volume : 3 volume number : 1 pdf |
Performance Evaluation of Wi-Fi comparison with WiMAX Networks |
M.Sreerama Murty, D.Veeraiah and A.Srinivas Rao, Sai Spurthi Institute of Technology, India |
Volume : 3 volume number : 1 pdf |
ANODR-ECC Key Management protocol with TELNET to secure Application and Network layer for Mobile Adhoc Networks |
G.Padmavathi, P.Subashini and D.Devi Aruna, Avinashiligam University for Women, India |
Volume : 3 volume number : 1 pdf |
Scoring System Approach for Assessment of Critical Illness using Mobile Phones |
Karupothula Madhavi Latha, Shiramshetty Gouthami and P.Ranjith Kumar, JNTUH - Jayamukhi Institute of Technological Sciences, India |
Volume : 3 volume number : 1 pdf |
Design of Wireless Electronic Stethoscope Based on Zigbee |
Kadam Patil D.D and Shastri R.K, Vidya Pratishthan's CoE - Baramati, India |
Volume : 3 volume number : 1 pdf |