Detecting Malicious Node in MANET Using Trust Based Cross-Layer Security Protocol

Author(s): Rajaram.A | Dr. S. Palaniswami
Volume: 1
Issue: 2
Year: 2010





A New Hashing and Caching Approach for Minimizing Overall Location Management Cost in Next-Generation Wireless Networks

Author(s): Md. Mohsin Ali | Md. Kowsar Hossain | Md. Amjad Hossain
Volume: 1
Issue: 2
Year: 2010





Performance Analysis Of Guaranteed Packet Transfer In Coverage Area and Less Coverage Area For MANET

Author(s): Gomathi.S | Duraiswamy.K
Volume: 1
Issue: 2
Year: 2010





Four Walsh Transform Sectors Feature Vectors for Image Retrieval from Image Databases

Author(s): Kekre H.B | Dhirendra Mishra
Volume: 1
Issue: 2
Year: 2010





Selecting type of clusters that are most appropriate for capturing overlapping interests of different types of users in personalization tasks using Web Usage Mining

Author(s): Sanjay B. Thakare | Sangram Z. Gawali
Volume: 1
Issue: 2
Year: 2010





Article Removed as requested by Author
Author(s): Sankar.K | Krishnamoorthy.K
Volume: 1
Issue: 2
Year: 2010




Performance issues on AODV and AOMDV for MANETS

Author(s): Balakrishna.R | Rajeswar Rao.U | Geethanjali.N
Volume: 1
Issue: 2
Year: 2010





Design and Analysis of Enhanced HTTP Proxy Cashing Server

Author(s): Vimal Bibhu | Narendra Kumar | Mohammad Islam | Shashank Bhardwaj
Volume: 1
Issue: 2
Year: 2010





Performance Enhancement of MC-CDMA System through STTC based STBC Site Diversity

Author(s): Kumaratharan.N | Jayanthi.K | Dananjayan.P
Volume: 1
Issue: 2
Year: 2010





Enhancing K-means Clustering Algorithm with Improved Initial Center

Author(s): Madhu Yedla | Srinivasa Rao Pathakota | Srinivasa.T.M
Volume: 1
Issue: 2
Year: 2010





Method to Minimize the Clock Skew and Uniform Clock Distribution using Parallel Port in Pipe Line Based Multi Channel DMA Request Terminal for Frequency Measurement

Author(s): Suresh Kumar.N | RamaKotiReddy D.V | Harish.A | Amarnadh.S
Volume: 1
Issue: 2
Year: 2010





Principal Component Analysis Based Image Recognition

Author(s): ASHOK.J | DR.E.G.RAJAN
Volume: 1
Issue: 2
Year: 2010





Selection of Best Web Site by Applying COPRAS-G method

Author(s): Bindu Madhuri .Ch | Anand Chandulal.J | Padmaja.M
Volume: 1
Issue: 2
Year: 2010





Security Enhancement of First Mile Wireless Access with Optimal QoS through Anonymity in Convergence Network

Author(s): Shankar R | Dananjayan P
Volume: 1
Issue: 2
Year: 2010





Malicious Node Detection System for Mobile Ad hoc Networks

Author(s): Rajaram.A | Dr. S. Palaniswami
Volume: 1
Issue: 2
Year: 2010





Writer Identification and Recognition Using Radial Basis Function

Author(s): ASHOK.J | DR.E.G.RAJAN
Volume: 1
Issue: 2
Year: 2010





Analysis of Data and Traffic Management during Privacy Preservation in Secure Multiparty Computation

Author(s): Zulfa Shaikh | Tonu Sojatia | Mrs Pushpa Pathak | Mrs Shilpa Bhalerao
Volume: 01
Issue: 01
Year: 2010





Fault-Tolerance and Permutation Analysis of ASEN and its Variant

Author(s): Rinkle Rani Aggarwal | Dr. Lakhwinder Kaur
Volume: 01
Issue: 01
Year: 2010





A WEB BASED TOMATO CROP EXPERT INFORMATION SYSTEM BASED ON ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING ALGORITHMS

Author(s): Prasad Babu M.S | Ramana Murty .N.V | Narayana S.V.N.L
Volume: 01
Issue: 01
Year: 2010





Towards Novel And Efficient Security Architecture For Role- Based Access Control In Grid Computing

Author(s): Nithya.M | R.S.D.Wahida Banu
Volume: 01
Issue: 01
Year: 2010




