| A Method of Detecting Sql Injection Attack to Secure Web Applications |
| Sruthy Manmadhan and Manesh T, Adi Shankara Institute of Engineering & Technology, India |
| Volume : 3 volume number : 6 pdf |
| A Beaconing Approach with Key Exchange in Vehicular Ad Hoc Networks |
| Mohammed ERRITALI, Oussama Mohamed Reda and Bouabid El Ouahidi, Mohamed V University - Faculty of Sciences Rabat, Morocco |
| Volume : 3 volume number : 6 pdf |
| MECB-AODV: A Modified Energy Constrained Based Protocol for Mobile Ad hoc Networks |
| Akhilesh Tripathi and Rakesh Kumar, Madan Mohan Malaviya Engineering College, India |
| Volume : 3 volume number : 6 pdf |
| Gsm Based Embedded System for Remote Laboratory Safety Monitoring and Alerting |
| V.Ramya, B. Palaniappan and V.Sumathi, Annamalai University, India |
| Volume : 3 volume number : 6 pdf |
| Evaluation of Data Processing Using MapReduce Framework in Cloud and Stand - Alone Computing |
| Samira Daneshyar and Ahmed Patel, Universiti Kebangsaan Malaysia, Malaysia |
| Volume : 3 volume number : 6 pdf |
| Wireless Sensor Network in Niger Delta Oil and Gas Field Monitoring: The Security Challenges and Countermeasures |
| Fidelis C. Obodoeze, Hyacinth C. Inyiama and V.E. Idigo, Nnamdi Azikiwe University, Nigeria |
| Volume : 3 volume number : 6 pdf |
| Implementation of Network Community Profile using Local Spectral algorithm and its application in Community Networking |
| Vaibhav VPrakash, Sri Jayachamarajendra College of Engineering, India |
| Volume : 3 volume number : 6 pdf |
| QOS Enhanced Hybrid Multipath Routing Protocol for Mobile Adhoc Networks |
| P.Rama Devi1 and D.Srinivasa Rao2, 1Abhinav Hitech College of Engineering, Hyderabad and 2JNTU CE, Hyderabad |
| Volume : 3 volume number : 6 pdf |
| Fast Parallel Sorting Algorithms on GPUs |
| Bilal Jan, Bartolomeo Montrucchio, Carlo Ragusa, Fiaz Gul Khan and Omar Khan, Politecnico di Torino, Italy |
| Volume : 3 volume number : 6 pdf |
| An Efficient Security Approach Using PGE and Parity Coding |
| Ch. Rupa1, P. S Avadhani2 and E. SrinivasReddy3, 1VVIT, India, 2Andhra University, India and 3Nagarjuna University, India |
| Volume : 3 volume number : 6 pdf |
| Performance Assessment of Communication Network in WAMS |
| Kiran Gajrani1, Krishan Gopal Sharma2 and Annapurna Bhargava1, 1Rajasthan Technical University, India and 2Government Engineering College, India |
| Volume : 3 volume number : 6 pdf |
| Enhancement of TCP Performance with the Help of Snoop Protocol in Wired CUM Wireless Network |
| Maninder Kaur and and Parminder Singh, CEC Landran, India |
| Volume : 3 volume number : 6 pdf |
| Mining Association Rule for Horizontally Partitioned Databases Using CK Secure Sum Technique |
| Jayanti Danasana, Raghvendra Kumar and Debadutta Dey, KIIT University, India |
| Volume : 3 volume number : 6 pdf |
| Adaptation of the Method of Estimation and Motion Compensation in the Transmission of the Video Sequence in Jpeg 2000 |
| Abdou Khadre Diop, Khaly Tall, Idy Diop and Sidi Mohamed Farssi, Cheikh Anta Diop university, Senegal |
| Volume : 3 volume number : 6 pdf |