UBIQUITOUS HEALTHCARE MONITORING SYSTEM USING INTEGRATED TRIAXIAL ACCELEROMETER, SPO2 AND LOCATION SENSORS

Author(s): Ogunduyile O.O | Zuva K | Randle O.A | Zuva T
Volume: 4
Issue: 2
Year: 2013





A novel integrated approach for handling anomalies in RFID data

Author(s): A.Anny Leema, | Hemalatha.M
Volume: 4
Issue: 2
Year: 2013





A Framework for enabling Service migration in Ubiquitous Computing

Author(s): Irene Antony Tharayil | Rajasree M. S.
Volume: 4
Issue: 1
Year: 2013





Acceleration Detection of Large (Probably) Prime Numbers

Author(s): Dragan Vidakovic | Olivera Nikolic | Dusko Parezanovic
Volume: 4
Issue: 1
Year: 2013





A Secure Web Application: E-Tracking System

Author(s): Vina M. Lomte | D. R. Ingle | B. B. Meshram
Volume: 3
Issue: 4
Year: 2012





Validation of Context Based Service Discovery Protocol for Ubiquitous Applications

Author(s): Anandi Giridharan | Pallapa Venkataram
Volume: 3
Issue: 4
Year: 2012





Attacks on Web Based Software and Modelling Defence Mechanisms

Author(s): D.R. Ingle | B. B. Meshram
Volume: 3
Issue: 3
Year: 2012





Cryptanalysis of Pasargad, A Distance Bounding Protocol Based on RFID System

Author(s): Mahdi Azizi | Abdolrasol Mirgadri | Nasour Bagheri
Volume: 3
Issue: 3
Year: 2012





Intrusion Detection and Prevention of Node Replication Attacks in Wireless Body Area Sensor Network

Author(s): Anandkumar K.M | Jayakumar C | Arun Kumar P | Sushma M | Vikraman R
Volume: 3
Issue: 3
Year: 2012





A Group-based Method for Context-Aware Service Discovery in Pervasive Computing Environment

Author(s): Marzieh Ilka | Ahmad Faraah | Mahdi Niamanesh
Volume: 3
Issue: 2
Year: 2012





Content Based Video Retrieval Systems

Author(s): B V Patel | B B Meshram
Volume: 3
Issue: 2
Year: 2012





Secure Device Pairing: A Usability Study

Author(s): Yasir Arfat Malkani | Ayaz Keerio | Lachhman Das Dhomeja
Volume: 3
Issue: 2
Year: 2012





A Novel and Cost Effective Approach to Public Vehicle Tracking System

Author(s): Deepak Mishra | Apurv Vasal | Puneet Tandon
Volume: 3
Issue: 1
Year: 2012





A Proposed Architecture for Continuous Web Monitoring Through Online Crawling of Blogs

Author(s): Mehdi Naghavi | Mohsen Sharifi
Volume: 3
Issue: 1
Year: 2012





Cryptanalysis and Enhancement of Two Low Cost RFID Authentication Protocols

Author(s): Hoda Jannati | Abolfazl Falahati
Volume: 3
Issue: 1
Year: 2012





Real Time Hand Gesture Recognition System for Dynamic Applications

Author(s): Siddharth S. Rautaray | Anupam Agrawal
Volume: 3
Issue: 1
Year: 2012





Security Flows and Improvement of a Recent Ultra Light-Weight RFID Protocol

Author(s): Mehrdad Kianersi | Mahmoud Gardeshi
Volume: 2
Issue: 4
Year: 2011





Evaluation of Data Fusion in Radars Network and Determination of Optimum Algorithm

Author(s): Ali Naseri | Omid Azmoon
Volume: 2
Issue: 4
Year: 2011





Cloud Based Application Development for Accessing Restaurant Information on Mobile Device using LBS

Author(s): Keerthi S. Shetty | Sanjay Singh
Volume: 2
Issue: 4
Year: 2011





Transparent Caching of Virtual Stubs for Improved Performance in Ubiquitous Environments

Author(s): Lachhman Das Dhomeja | Yasir Arfat Malkani | Asad Ali Shaikh | Ayaz Keerio
Volume: 2
Issue: 4
Year: 2011





Cryptanalysis of Sulma, An Ultralightweight Mutual Authentication Protocol for Low-Cost RFID Tags

Author(s): Mahdi Azizi | Nasour Bagheri
Volume: 2
Issue: 4
Year: 2011





EFFICIENT ALGORITHMS TO ENHANCE RECOVERY SCHEMA IN LINK STATE PROTOCOLS

Author(s): Radwan S. Abujassar | Mohammed Ghanbari
Volume: 2
Issue: 3
Year: 2011





A NEW SYSTEM ARCHITECTURE FOR PERVASIVE COMPUTING

Author(s): Anis ISMAIL | Abd El Salam AL HAJJAR | Ziad Ismail
Volume: 2
Issue: 3
Year: 2011





Providing a Distance Bounding Protocol Named Pasargad in order to Defend against Relay Attacks on RFID-Based Electronic Voting System

Author(s): Mohammad Arjmand | Mahmoud Gardeshi | Reza Taheri zohur | Mohammad Kazemi
Volume: 2
Issue: 3
Year: 2011





SAVINGS IN LOCATION MANAGEMENT COSTS LEVERAGING USER STATISTICS

Author(s): E. Martin | R. Bajcsy
Volume: 2
Issue: 3
Year: 2011





SYSTEM SUPPORT FOR MANAGING INVALID BINDINGS

Author(s): Lachhman Das Dhomeja | Yasir Arfat Malkani | Azhar Ali Shah | Khalil Khoumbati
Volume: 2
Issue: 3
Year: 2011





SULMA: A Secure Ultra Light-Weight Mutual Authentication Protocol for Lowcost RFID Tags

Author(s): Mehrdad Kianersi | Mahmoud Gardeshi | Mohammad Arjmand
Volume: 2
Issue: 2
Year: 2011





Data Storage on a RFID Tag for a Distributed System

Author(s): Sarita Pais | Judith Symonds
Volume: 2
Issue: 2
Year: 2011





Efficient and Secure Authentication and Key Agreement Protocol

Author(s): Ja’afer AL-Saraireh
Volume: 2
Issue: 2
Year: 2011





SESSAMO: Session Mobility for Video Streaming Applications

Author(s): Mohammed BOUTABIA | Luis Rojas CARDENAS | Hossam AFIFI
Volume: 2
Issue: 2
Year: 2011





CDTOM: A Context-driven Task-oriented Middleware for Pervasive Homecare Environment

Author(s): Hongbo Ni | Bessam Abdulrazak | Daqing Zhang | Shu Wu
Volume: 2
Issue: 1
Year: 2011





Information Selection and Delivery Algorithm for Delivering Advertisements Suitable for the Pedestrians Present at a Particular Site

Author(s): Koichi MATSUOKA | Nobuo KATOU | Shigeo DEJIMA | Kazumasa TAKAMI
Volume: 2
Issue: 1
Year: 2011





Practical Attacks on a RFID Authentication Protocol Conforming to EPC C-1 G-2 Standard

Author(s): MohammadHassan Habibi | Mahmud Gardeshi | Mahdi R. Alaghband
Volume: 2
Issue: 1
Year: 2011





EFFECTIVE LOAD BALANCING WITH POWER CONSERVATION IN RFID

Author(s): Vijayakumar.G.Dhas | Ramanathan Muthukaruppan | Konguvel Balakrishnan | Rajarajan Ganesan
Volume: 1
Issue: 4
Year: 2010





MOBILE BASED SECURE DIGITAL WALLET FOR PEER TO PEER PAYMENT SYSTEM

Author(s): Majid Taghiloo | Mohammad Ali Agheli | Mohammad Reza Rezaeinezhad
Volume: 1
Issue: 4
Year: 2010





WAP Based Seamless Roaming In Urban Environment with Wise Handoff Technique

Author(s): N.S.V.Shet | K.Chandrasekaran | K.C.Shet
Volume: 1
Issue: 4
Year: 2010





A Framework For Ubiquitous Geospatial Information Integration On Mobile Device Using Orchestration of Geoservices

Author(s): Arindam Dasgupta | S. K. Ghosh
Volume: 1
Issue: 3
Year: 2010





I-Interaction: An Intelligent In-Vehicle User Interaction Model

Author(s): Li Liu | Edward Dillon
Volume: 1
Issue: 3
Year: 2010





An Intelligent Driver Assistance System (I-DAS) for Vehicle Safety Modelling using Ontology Approach

Author(s): Saravanan Kannan | Arunkumar Thangavelu | RameshBabu Kalivaradhan
Volume: 1
Issue: 3
Year: 2010





Interaction With Tilting Gestures In Ubiquitous Environments

Author(s): Ayman Atia | Jiro Tanaka
Volume: 1
Issue: 3
Year: 2010





Security Enhancement With Optimal QOS Using EAP-AKA In Hybrid Coupled 3G-WLAN Convergence Network

Author(s): R. Shankar | Timothy Rajkumar.K | P.Dananjayan
Volume: 1
Issue: 3
Year: 2010





A Non-Cooperative Game Theoretical Approach For Power Control In Virtual MIMO Wireless Sensor Network

Author(s): R.Valli | P.Dananjayan
Volume: 1
Issue: 3
Year: 2010





Time Synchronization in Wireless Sensor Networks: A Survey

Author(s): Prakash Ranganathan | Kendall Nygard
Volume: 1
Issue: 2
Year: 2010





Modified Queue-Based Exponential Rule Scheduler for Improved QOS in OFDMA Systems

Author(s): C.Kalyana Chakravarthy | P.V.G.D. Prasad Reddy
Volume: 1
Issue: 2
Year: 2010





Fault Tolerant Distributed and Fixed Hierarchical Mobile IP

Author(s): Paramesh C. Upadhyay | Sudarshan Tiwari
Volume: 1
Issue: 2
Year: 2010





Overlapping Zone Partitioning Localisation Technique for RFID

Author(s): Kavi K. Khedo | Dassen Sathan | Roushdat Elaheebocus | Raja K. Subramanian | Soonil D.D.V. Rughooputh
Volume: 1
Issue: 2
Year: 2010





A Distributed System for MAD-COW Disease Monitoring and Tracking

Author(s): Lei Zhang | Alvin S. Lim | Hui Song | Xinliang Zheng
Volume: 1
Issue: 2
Year: 2010





Checkpointing with Synchronized Clocks in Distributed Systems

Author(s): S. Neogy | A. Sinha | P. K. Das
Volume: 1
Issue: 2
Year: 2010





24-Karat Protection: RFID and Retail Jewelry Marketing

Author(s): David C. Wyld
Volume: 1
Issue: 1
Year: 2010





Providing a Distance Bounding Protocol Named Pasargad in order to Defend against Relay Attacks on RFID-Based Electronic Voting System

Author(s): Mohammad Arjmand | Mahmoud Gardeshi | Reza Taheri zohur | Mohammad Kazemi
Volume: 02
Issue: 03
Year: 2011




