Academic Journals Database
Disseminating quality controlled scientific knowledge

Search Articles for "Computer Network"

ADD TO MY LIST
 
Enhancing Hash Function Selection Techniques Based on Message Contents

Author(s): Ali Saeed | Muhammad Khalil Shahid
Application of Erlang Formulae in Next Generation Networks

Author(s): Erik Chromy | Tibor Misuth | Adam Weber
Cluster-based Data Gathering in Long-Strip Wireless Sensor Networks

Author(s): FANG, W. | LI, S. | LIANG, X. | LI, Z.
NETWORK NEUTRALITY SURVEY

Author(s): Anuj Pathania | Puneet Kalra
DIFFERENT SECURITY MECHANISMS FOR DIFFERENT TYPE OF SECURITY LAPSES IN WMN- A REVIEW

Author(s): Narender Singh | Kuldeep Vats | Jasvinder | Lovish Jaiswal
Link Reliability in WDM Optical Network

Author(s): Chinmayananda Panda | Dr. Surya Narayan Patro | Pradosh Kumar Gantayat
A Micro-Mobility Management Scheme for Handover and Roaming

Author(s): Debabala Swain | Siba Prasada Panigrahi | Prasanta Kumar Patra
New Proposed Classic Cluster Layer Architecture for Mobile Adhoc Network (cclam)

Author(s): Kuldeep Sharma | Nikhil Khandelwal | Sanjeev Kumar Singh
Applying Social Network Analysis to Analyze a Web-Based Community

Author(s): Mohammed Al-Taie | Mohammed Al-Taie
E-Learning Methodologies and Tools

Author(s): Oye, N.D. | Mazleena Salleh | N. A. Iahad
Hybrid Feature Extraction Technique for Face Recognition

Author(s): Sangeeta N. Kakarwal | Ratnadeep R. Deshmukh
Novel Techniques for Fair Rate Control in Wireless Mesh Networks

Author(s): Mohiuddin Ahmed | K.M.Arifur Rahman
Low-Overhead and High-Performance Fault-Tolerant Architecture for Application-Specific Network-on-Chip

Author(s): Fathollah Karimi Koupaei | Ahmad Khademzadeh | Majid Janidarmian
L(0, 1)-Labelling of Cactus Graphs

Author(s): Anita Pal | Madhumangal Pal | Nasreen Khan
Developing Fault-Tolerant Heuristic Routing Algorithm Using Ant Colonies in Mesh Networks

Author(s): Alireza Shams Shafigh | Hekmat Mohammadzadeh | Alireza Soleimany | Shahriyar Lotfi
L(0, 1)-Labelling of Cactus Graphs

Author(s): Anita Pal | Madhumangal Pal | Nasreen Khan
Developing Fault-Tolerant Heuristic Routing Algorithm Using Ant Colonies in Mesh Networks

Author(s): Alireza Shams Shafigh | Hekmat Mohammadzadeh | Alireza Soleimany | Shahriyar Lotfi
Energy Saving in Wireless Sensor Networks

Author(s): Zahra Rezaei | Shima Mobininejad
Classification of paddy Variries using Image processing

Author(s): S. F. Lilhare | N G Bawane
Lossy Image Compression using Discrete Cosine Transform

Author(s): Pravin B. Pokle | N. G. Bawane
Energy Efficient Management for mobile AD Hod Networks AD HOC NETWORKS

Author(s): Abhishek Agrawal | Rajendra Lambodari
System Communication based On Wi-Fi Technology Using 802.11x

Author(s): N. P. Giradkar | C. D. Raut
802.11 MAC Protocol Improvement Technique

Author(s): Vipin Shankarrao Bhure
A Survey on Cross Layer Security

Author(s): Sandeep Sharma | Rajesh Mishra | Karan Singh
Energy Conservation of WSN using Routing Protocol

Author(s): Nitin V. Lonbale | Sunil Gupta | Rajesh S. Bhute
Wireless Networking

Author(s): Dhiraj Thote | Harsha Tembhekar | Nitin Chakole | Kalpana Pandey
Routing Protocols for V2V communications used in Urban VANET to improve ITS

Author(s): Dongre Manoj M | Bawane N G | Jawade Nilima R
Femtocells Technology

Author(s): Abhishek A. Baseshankar | Sapna S. Khapre
IEEE 802.15.4 Makes Ubitiquitous Networking a Reality

Author(s): Nikhil. N. Kant | V. N. Bhonge | Niraj. N. Kant
Performance Improvement of ANN Classifiers using PSO

Author(s): Jayshri D.Dhande | D.R.Dandekar | S.L.Badjate
Preliminary Detection of Respiratory Disorders for Rural Children using Modified Stethoscope

Author(s): Sibghatullah I. Khan | Naresh. P. Jawarkar | Vasif Ahmed
InfiniBand: A New Era in Networking

Author(s): Vivek D. Deshmukh
A Study of Digital Forensic: Process and Tools

Author(s): Sandhya Dahake | Shubhangi Daware
Compression Techniques for Remote Visualization on Mobile Platforms

Author(s): U. S. Junghare | V. M. Thakare | S S. Sherekar | R. V. Dharaskar
QOS Improvement by Load Balancing using Nodal and Neighboring Load in Multipath Routing

Author(s): Jawade Nilima R | Bawane N G | Dongre Manoj M
Security issues in Cloud Computing

Author(s): Kalyani D. Kadam | Sonia K. Gajre | R. L. Paikrao
Techniques for Traffic Sign Classification using Machine Learning- A Survey

Author(s): Meeta Kumar | JayshreeGhorpade | V. Y.Kulkarni
New generatition of Networking with OSPF

Author(s): Pratik N. Katolkar | Sneha R. Burnase
A Cooperative Mac For Energy Efficient Relying

Author(s): Darshana N. Tambe | Priya N. Tambe
Review of Cloud Computing Architecture for Social Computing

Author(s): Vaishali D. Dhale | A. R. Mahajan
Efficient Single Rate based Multicast Congestion Control

Author(s): Sunil Kumar | Karan Singh
Integration of GSM With IPv6

Author(s): Samir N. Ajani
Approach for Switching Automatic Protection using Mobile Signal

Author(s): Kanchan V. Gawande | Jayant Y. Hande
Estimation of Resource Usage in Peer to Peer Network

Author(s): Amol P. Bhagat | Pravin Malve | Jayant Mehare
Efficient Approximate Query Processing In P2P Network

Author(s): Amol P. Bhagat | P. P. Pawade | V. T. Gaikwad
Reliability Analysis of Multi Path Multistage Interconnection Networks

Author(s): Sudarson Jena | G.Sri Sowmya | P.Radhika | P.Venkat Reddy
J.H.Nirmal

Author(s): Suparva Patnaik | Mukesh Zaveri
Generic Network Intrusion Prevention System

Author(s): Kamini Nalavade | B.B.Meshram
Classification of EEG using PCA, ICA and Neural Network

Author(s): Kavita Mahajan | M. R. Vargantwar | Sangita M. Rajput
Mobility Management in Wireless Body Area Network for Patient Monitoring System

Author(s): Vijay M. Birari | Vijay M.Wadhai | J. B. Helonde
State Of Art Survey of Network Traffic Classification

Author(s): Sheetal S. Shinde | Sandeep P. Abhang
A Proposed System for Network Intrusion Detection System Using Data Mining

Author(s): Gidiya Priyanka V. | Ushir Kishori N | Mirza Shoeb A | Ikhankar Sagar D | Khivsara Bhavana A
Speech Compression using ADPCM

Author(s): KT Talele | S. T. Gandhe
New Strategy for detecting Intrusion by using c4.5 algorithm

Author(s): Radhakrishna Naik | Vivek Kshirsagar | B S Sonawane
Implementation of Clustering Algorithm for Vital Signals in WMRHM Framework

Author(s): Dipti D. Patil | Dnyaneshwar A.Rokade | Vijay M. Wadhai
Vertical Handoff technique for Heterogeneous Wireless Network

Author(s): Pradeep Mane | Viddhulata Shamrao Mohite | Sanjay Jadhav
Quality of Service Using PSO Algorithm

Author(s): S.M. ELseuofi
Botnet-A Network Threat

Author(s): Sonal P.Patil | Swatantra Kumar
Derivation of Response-time Model for Share-driven Scheduled TDMA Network

Author(s): Yogesh R. Sagane | S.Mukhopadhay | Manoj Kumar
Handwritten Character Recognition System using Chain code and Correlation Coefficient

Author(s): Ravi Sheth | N C Chauhan | Mahesh M Goyani | Kinjal A Mehta
Hopfield Neural Network for Change Detection in Multitemporal Images

Author(s): Sneha Bishnoi | Vijay Gaikwad | Saurabh Asegaonkar
Desing and Implementation of Distributed Security using Onion Routing

Author(s): Ashish T. Bhole | Savita H. Lambole
Enhanced Novel Security Scheme for Wireless Adhoc Networks: ENSS

Author(s): Prasad Patil | Rinku Shah | Kajal Jewani
Performance Analysis of Routing Protocol With Mobility Constraint

Author(s): Sangeeta Kurundkar | Sangeeta Joshi | L.M.Waghmare
Nodes Credit based Direct Diffusion for wireless sensor networks

Author(s): Archana Patel | Surendra Verma | Roshani Patel
Image Compression Using Neural Network

Author(s): Sangeeta Mishra | Sudhir Savarkar
Optimized Heterogeneous Wireless Network with Scoring Methods

Author(s): Ravindra R.Agrawal | Amarsinh Vidhate
Artificial Neural Network Application in Logic System

Author(s): Siddharth Saxena | Jigar Singh | Maharanapratap Singh | Divya Sharma
Dynamic Gesture Recognition for Gaming Interface

Author(s): C Govindrajan | Deepak P U | Akshay Thosar
Security Enhancement Algorithms for Data Transmission for Next Generation Networks

Author(s): Vikas Kaul | S K Narayankhedkar | S Achrekar | S Agarwal
Desain dan Implementasi Web Proxy dan VPN Akses (Studi Kasus di Undip)

Author(s): Adian Fatchur Rochim | Andrian Satria Martiyanto
Undergraduate Program in Network Engineering and Security – A Feasibility Study

Author(s): Fahed Awad | Omar Banimelhem | Eyad Taqieddin | Raed Bani-Hani
Survey of MAC Layer Protocols for vehicular Ad Hoc Network

Author(s): Vimal Bibhu | Dhirendra Kumar Singh
Path Congestion Control in Centralized Autonomous System

Author(s): Jaspreet Kaur Bagga | Kshitij Pathak | Narendra S. Chaudhari
Analyzing Methodologies of Irregular NoC Topology Synthesis

Author(s): Naveen Choudhary | Dharm Singh | Surbhi Jain
A New Security Protocol for Mobile Ad Hoc Networks

Author(s): K. Sahadevaiah | Prasad Reddy P.V.G.D. | G. Narsimha
Spatial and Frequency Domain for Grey level Digital Images

Author(s): Dharm Singh | Naveen Choudhary | Madhuri Agrawal
An Approach to Increase Bandwidth Utilization under Suspected Flood Attack

Author(s): Raman Singh | Harish Kumar | R.K. Singla
Honeysand: An Open Source Tools based Sandbox Environment for Bot Analysis and Botnet Tracking

Author(s): Saurabh Chamotra | Rakesh Kumar Sehgal | Raj Kamal
Social Impact of Internet Access: A Survey

Author(s): Poonam Dhaka | Sandeep Upadhyay | Drashti Dave
Performance Evaluation of Traffic Permutations for Mesh On-Chip Networks

Author(s): Naveen Choudhary | Dharm Singh | Abhilasha Sharma
Imperialist Approach to Cluster Head Selection in WSN

Author(s): S. M. Hosseinirad | S.K. Basu
Analysis and Simulation of UDP-based application for Wireless Network

Author(s): Lal Chand Bishnoi | Dharm Singh | Shailendra Mishra
Simulation Study of Black Hole and Jellyfish attack on MANET Using NS3

Author(s): Nidhi Purohit | Richa Sinha | Hiteishi Diwanji
Impact of Node Density on Scalable Routing Protocol in Wireless Mesh Networks

Author(s): Sanjeev Jain | Vinay Kumar | Sudarshan Tiwari
Performance of Routing Protocols in MANETs with Node Density and Mobility using Omni and Directional Antenna

Author(s): Vinay Kumar | Sanjeev Jain Motilal Nehru National | Sudarshan Tiwari
Enhanced Expanding Ring Search Algorithm for AODV

Author(s): Purvi N. Ramanuj | Hiteishi M. Diwanji
Comparative Analysis of Energy Efficient Routing Protocol for Wireless Sensor Network

Author(s): Munish Bhardwaj | Surender Soni | Dinesh Kumar Kotary
Why do you need a reservation system?      Save time & money - Smart Internet Solutions