Academic Journals Database
Disseminating quality controlled scientific knowledge

Search Articles for "network"

ADD TO MY LIST
 
Improved modelling of atmospheric ammonia over Denmark using the coupled modelling system DAMOS

Author(s): C. Geels | H. V. Andersen | C. Ambelas Skjøth | J. H. Christensen | T. Ellermann | P. Løfstrøm | S. Gyldenkærne | J. Brandt | K. M. Hansen | L. M. Frohn | O. Hertel
Energy Saving in Wireless Sensor Networks

Author(s): Zahra Rezaei | Shima Mobininejad
Dynamic Real Time Distributed Sensor Network Based Database Management System Using XML, JAVA and PHP Technologies

Author(s): D. Sudharsan | J. Adinarayana | S. Ninomiya | M. Hirafuji | T. Kiura
A Global Mobility Management Scheme for Reducing Overall Handover Latency in IP based VANETs

Author(s): Muhammad Nawaz Khan | Ishtiaq Wahid | Gulzar Mehmood
Accurate location estimation of moving object In Wireless Sensor network

Author(s): Vijay Bhaskar Semwal | Vinay Bhaskar Semwal | Meenakshi Sati | Shirshu Verma
Clasification Of Arrhythmic ECG Data Using Machine Learning Techniques

Author(s): Abhinav Vishwa | Mohit K. Lal | Sharad Dixit | Pritish Vardwa
Introduction to Devices Orchestration in Internet of Things Using SBPMN

Author(s): Alejandro González García | Manuel Álvarez Álvarez | Jordán Pascual Espada | Oscar Sanjuán Martínez | Juan Manuel Cueva Lovelle | Cristina Pelayo G-Bustelo
An Approach for IRIS Plant Classification Using Neural Network

Author(s): Madhusmita Swain | Sanjit Kumar Dash | Sweta Dash | Ayeskanta Mohapatra
Classification of paddy Variries using Image processing

Author(s): S. F. Lilhare | N G Bawane
Lossy Image Compression using Discrete Cosine Transform

Author(s): Pravin B. Pokle | N. G. Bawane
Energy Efficient Management for mobile AD Hod Networks AD HOC NETWORKS

Author(s): Abhishek Agrawal | Rajendra Lambodari
System Communication based On Wi-Fi Technology Using 802.11x

Author(s): N. P. Giradkar | C. D. Raut
802.11 MAC Protocol Improvement Technique

Author(s): Vipin Shankarrao Bhure
A Survey on Cross Layer Security

Author(s): Sandeep Sharma | Rajesh Mishra | Karan Singh
Energy Conservation of WSN using Routing Protocol

Author(s): Nitin V. Lonbale | Sunil Gupta | Rajesh S. Bhute
Wireless Networking

Author(s): Dhiraj Thote | Harsha Tembhekar | Nitin Chakole | Kalpana Pandey
Routing Protocols for V2V communications used in Urban VANET to improve ITS

Author(s): Dongre Manoj M | Bawane N G | Jawade Nilima R
Femtocells Technology

Author(s): Abhishek A. Baseshankar | Sapna S. Khapre
IEEE 802.15.4 Makes Ubitiquitous Networking a Reality

Author(s): Nikhil. N. Kant | V. N. Bhonge | Niraj. N. Kant
Performance Improvement of ANN Classifiers using PSO

Author(s): Jayshri D.Dhande | D.R.Dandekar | S.L.Badjate
Preliminary Detection of Respiratory Disorders for Rural Children using Modified Stethoscope

Author(s): Sibghatullah I. Khan | Naresh. P. Jawarkar | Vasif Ahmed
InfiniBand: A New Era in Networking

Author(s): Vivek D. Deshmukh
A Study of Digital Forensic: Process and Tools

Author(s): Sandhya Dahake | Shubhangi Daware
Compression Techniques for Remote Visualization on Mobile Platforms

Author(s): U. S. Junghare | V. M. Thakare | S S. Sherekar | R. V. Dharaskar
QOS Improvement by Load Balancing using Nodal and Neighboring Load in Multipath Routing

Author(s): Jawade Nilima R | Bawane N G | Dongre Manoj M
Security issues in Cloud Computing

Author(s): Kalyani D. Kadam | Sonia K. Gajre | R. L. Paikrao
Techniques for Traffic Sign Classification using Machine Learning- A Survey

Author(s): Meeta Kumar | JayshreeGhorpade | V. Y.Kulkarni
New generatition of Networking with OSPF

Author(s): Pratik N. Katolkar | Sneha R. Burnase
A Cooperative Mac For Energy Efficient Relying

Author(s): Darshana N. Tambe | Priya N. Tambe
Review of Cloud Computing Architecture for Social Computing

Author(s): Vaishali D. Dhale | A. R. Mahajan
Efficient Single Rate based Multicast Congestion Control

Author(s): Sunil Kumar | Karan Singh
Integration of GSM With IPv6

Author(s): Samir N. Ajani
Approach for Switching Automatic Protection using Mobile Signal

Author(s): Kanchan V. Gawande | Jayant Y. Hande
Estimation of Resource Usage in Peer to Peer Network

Author(s): Amol P. Bhagat | Pravin Malve | Jayant Mehare
Efficient Approximate Query Processing In P2P Network

Author(s): Amol P. Bhagat | P. P. Pawade | V. T. Gaikwad
Reliability Analysis of Multi Path Multistage Interconnection Networks

Author(s): Sudarson Jena | G.Sri Sowmya | P.Radhika | P.Venkat Reddy
J.H.Nirmal

Author(s): Suparva Patnaik | Mukesh Zaveri
Generic Network Intrusion Prevention System

Author(s): Kamini Nalavade | B.B.Meshram
Classification of EEG using PCA, ICA and Neural Network

Author(s): Kavita Mahajan | M. R. Vargantwar | Sangita M. Rajput
Mobility Management in Wireless Body Area Network for Patient Monitoring System

Author(s): Vijay M. Birari | Vijay M.Wadhai | J. B. Helonde
State Of Art Survey of Network Traffic Classification

Author(s): Sheetal S. Shinde | Sandeep P. Abhang
A Proposed System for Network Intrusion Detection System Using Data Mining

Author(s): Gidiya Priyanka V. | Ushir Kishori N | Mirza Shoeb A | Ikhankar Sagar D | Khivsara Bhavana A
Speech Compression using ADPCM

Author(s): KT Talele | S. T. Gandhe
New Strategy for detecting Intrusion by using c4.5 algorithm

Author(s): Radhakrishna Naik | Vivek Kshirsagar | B S Sonawane
Implementation of Clustering Algorithm for Vital Signals in WMRHM Framework

Author(s): Dipti D. Patil | Dnyaneshwar A.Rokade | Vijay M. Wadhai
Vertical Handoff technique for Heterogeneous Wireless Network

Author(s): Pradeep Mane | Viddhulata Shamrao Mohite | Sanjay Jadhav
Quality of Service Using PSO Algorithm

Author(s): S.M. ELseuofi
Botnet-A Network Threat

Author(s): Sonal P.Patil | Swatantra Kumar
Derivation of Response-time Model for Share-driven Scheduled TDMA Network

Author(s): Yogesh R. Sagane | S.Mukhopadhay | Manoj Kumar
Handwritten Character Recognition System using Chain code and Correlation Coefficient

Author(s): Ravi Sheth | N C Chauhan | Mahesh M Goyani | Kinjal A Mehta
Hopfield Neural Network for Change Detection in Multitemporal Images

Author(s): Sneha Bishnoi | Vijay Gaikwad | Saurabh Asegaonkar
Desing and Implementation of Distributed Security using Onion Routing

Author(s): Ashish T. Bhole | Savita H. Lambole
Enhanced Novel Security Scheme for Wireless Adhoc Networks: ENSS

Author(s): Prasad Patil | Rinku Shah | Kajal Jewani
Performance Analysis of Routing Protocol With Mobility Constraint

Author(s): Sangeeta Kurundkar | Sangeeta Joshi | L.M.Waghmare
Nodes Credit based Direct Diffusion for wireless sensor networks

Author(s): Archana Patel | Surendra Verma | Roshani Patel
Image Compression Using Neural Network

Author(s): Sangeeta Mishra | Sudhir Savarkar
Optimized Heterogeneous Wireless Network with Scoring Methods

Author(s): Ravindra R.Agrawal | Amarsinh Vidhate
Artificial Neural Network Application in Logic System

Author(s): Siddharth Saxena | Jigar Singh | Maharanapratap Singh | Divya Sharma
Dynamic Gesture Recognition for Gaming Interface

Author(s): C Govindrajan | Deepak P U | Akshay Thosar
Security Enhancement Algorithms for Data Transmission for Next Generation Networks

Author(s): Vikas Kaul | S K Narayankhedkar | S Achrekar | S Agarwal
Copper oxide resistive switching memory for e-textile

Author(s): Jin-Woo Han | M. Meyyappan
Categorical Tensor Network States

Author(s): Jacob D. Biamonte | Stephen R. Clark | Dieter Jaksch
Desain dan Implementasi Web Proxy dan VPN Akses (Studi Kasus di Undip)

Author(s): Adian Fatchur Rochim | Andrian Satria Martiyanto
Undergraduate Program in Network Engineering and Security – A Feasibility Study

Author(s): Fahed Awad | Omar Banimelhem | Eyad Taqieddin | Raed Bani-Hani
Survey of MAC Layer Protocols for vehicular Ad Hoc Network

Author(s): Vimal Bibhu | Dhirendra Kumar Singh
Interfacing of Sensor Network to Communication Network for Disaster Management

Author(s): Sanjay Patel | O. P. Vyas | Hansa Mehra
An Approach for Secure Data Transmission in Private Cloud

Author(s): Anurag Porwal | Rohit Maheshwari | B.L.Pal | Gaurav Kakhani
Temperature Control System Using ANFIS

Author(s): T.P.Mote | Dr.S.D.Lokhande
Flux Balance Analysis of Melanogenesis Pathway

Author(s): Prashana Balaji V. | Anvita Gupta Malhotra | Khushhali Menaria
Path Congestion Control in Centralized Autonomous System

Author(s): Jaspreet Kaur Bagga | Kshitij Pathak | Narendra S. Chaudhari
Analyzing Methodologies of Irregular NoC Topology Synthesis

Author(s): Naveen Choudhary | Dharm Singh | Surbhi Jain
A New Security Protocol for Mobile Ad Hoc Networks

Author(s): K. Sahadevaiah | Prasad Reddy P.V.G.D. | G. Narsimha
Spatial and Frequency Domain for Grey level Digital Images

Author(s): Dharm Singh | Naveen Choudhary | Madhuri Agrawal
An Approach to Increase Bandwidth Utilization under Suspected Flood Attack

Author(s): Raman Singh | Harish Kumar | R.K. Singla
Honeysand: An Open Source Tools based Sandbox Environment for Bot Analysis and Botnet Tracking

Author(s): Saurabh Chamotra | Rakesh Kumar Sehgal | Raj Kamal
Social Impact of Internet Access: A Survey

Author(s): Poonam Dhaka | Sandeep Upadhyay | Drashti Dave
Performance Evaluation of Traffic Permutations for Mesh On-Chip Networks

Author(s): Naveen Choudhary | Dharm Singh | Abhilasha Sharma
Imperialist Approach to Cluster Head Selection in WSN

Author(s): S. M. Hosseinirad | S.K. Basu
Analysis and Simulation of UDP-based application for Wireless Network

Author(s): Lal Chand Bishnoi | Dharm Singh | Shailendra Mishra
Simulation Study of Black Hole and Jellyfish attack on MANET Using NS3

Author(s): Nidhi Purohit | Richa Sinha | Hiteishi Diwanji
Impact of Node Density on Scalable Routing Protocol in Wireless Mesh Networks

Author(s): Sanjeev Jain | Vinay Kumar | Sudarshan Tiwari
Performance of Routing Protocols in MANETs with Node Density and Mobility using Omni and Directional Antenna

Author(s): Vinay Kumar | Sanjeev Jain Motilal Nehru National | Sudarshan Tiwari
Enhanced Expanding Ring Search Algorithm for AODV

Author(s): Purvi N. Ramanuj | Hiteishi M. Diwanji
Comparative Analysis of Energy Efficient Routing Protocol for Wireless Sensor Network

Author(s): Munish Bhardwaj | Surender Soni | Dinesh Kumar Kotary
Sequential Pattern Mining: Survey and Current Research Challenges

Author(s): Chetna Chand | Amit Thakkar | Amit Ganatra
Facial Expression Recognition using Neural Network –An Overview

Author(s): Pushpaja V. Saudagare | D.S. Chaudhari
Analysis of Secure Mobile Agent System

Author(s): Rajesh Shrivastava | Pooja Mehta (Gahoi)
Affiliate Program      Why do you need a reservation system?