EFFICIENT SCHEDULING STRATEGY USING COMMUNICATION AWARE SCHEDULING FOR PARALLEL JOBS IN CLUSTERS

Author(s): A.Neela Madheswari | R.S.D.Wahida Banu
Volume: 4
Issue: 5
Year: 2013





Target Detection System (TDS) for Enhancing Security in Ad hoc Network

Author(s): Hoshiyar Singh Kanyal | S. Rahamatkar | B.K Sharma | Bhasker Sharma
Volume: 4
Issue: 5
Year: 2013





Design of Elliptic Curve Crypto Processor with Modified Karatsuba Multiplier and its Performance Analysis

Author(s): Y.A.Suryawanshi | Neha Trimbak Khadgi,
Volume: 4
Issue: 3
Year: 2013





A N I NTRODUCTION T O W IRELESS M OBILE S OCIAL N ETWORKING I N O PPORTUNISTIC C OMMUNICATION

Author(s): Navdeep Kaur,
Volume: 4
Issue: 3
Year: 2013





Highly Scalable, Parallel and Distributed Adaboost Algorithm Using Light Weight Threads and Web Services on A Network of Multi-Core Machines(

Author(s): Munther Abualkibash | Ahmed ElSayed | Ausif Mahmood
Volume: 4
Issue: 3
Year: 2013





A L IGHT - WEIGHT D ISTRIBUTED S YSTEM FOR THE P ROCESSING OF R EPLICATED C OUNTER - LIKE O BJECTS

Author(s): Joel M. Crichlow | Stephen J. Hartley | Michael Hosein
Volume: 4
Issue: 3
Year: 2013





Advanced delay reduction algorithm based on GPS with Load Balancing

Author(s): Vinay Kumar Shukla | Kavita Singh
Volume: 4
Issue: 3
Year: 2013





Breast Cancer Diagnosis Using Machine Learning Algorithms - A Survey

Author(s): B.M.Gayathri | C.P.Sumathi | T.Santhanam
Volume: 4
Issue: 3
Year: 2013





Scalable Distributed Job Processing with Dynamic Load Balancing

Author(s): Srinivasrao Putti | V P C Rao | A. Govardhan | Ambika Prasad Mohanty
Volume: 4
Issue: 3
Year: 2013





Kalman Filter Based Congestion Controller

Author(s): Mehdi Mohtashamzadeh
Volume: 4
Issue: 3
Year: 2013





Survey on QoeQos Correlation Models Formultimedia Services

Author(s): Mohammed Alreshoodi | John Woods
Volume: 4
Issue: 3
Year: 2013





A Cluster based Technique for Securing Routing Protocol AODV against Black-hole Attack in MANET

Author(s): Sonam Yadav | Kanika Lakhani
Volume: 4
Issue: 2
Year: 2013





GPU Accelerated Automated Feature Extraction From Satellite Images

Author(s): K. Phani Tejaswi | D. Shanmukha Rao | Thara Nair | A. V. V. Prasad
Volume: 4
Issue: 2
Year: 2013





Current Studies On Intrusion Detection System, Genetic Algorithm And Fuzzy Logic

Author(s): Mostaque Md. Morshedur Hassan
Volume: 4
Issue: 2
Year: 2013





Validated Real Time Middle Ware For Distributed Cyber Physical Systems Using Hmm(

Author(s): Ankit Mundra | Bhagvan Krishna Gupta | Geetanjali Rathee | Meenu | Nitin Rakesh | Vipin Tyagi
Volume: 4
Issue: 2
Year: 2013





Eye-GUIDE (Eye-Gaze User Interface Design) Messaging for Physically-Impaired People

Author(s): Rommel Anacan | James Greggory Alcayde | Retchel Antegra | Leah Luna
Volume: 4
Issue: 1
Year: 2013





Study of the Sensitivity of the OFDM Wireless Systems to the Carrier Frequency Offset (CFO)

Author(s): Saeed Mohseni | Mohammad A. Matin
Volume: 4
Issue: 1
Year: 2013





A Review on Data Collection Method with Sink Node in Wireless Sensor Network

Author(s): Suchita R.Wankhade | Nekita A.Chavhan
Volume: 4
Issue: 1
Year: 2013





A Study on Path Loss Analysis for GSM Mobile Networks for Urban, Rural and Suburban Regions of Karnataka State

Author(s): N. Rakesh | Dr.S.K.Srivatsa
Volume: 4
Issue: 1
Year: 2013





WI-Alert : A Wireless Sensor Network Based Intrusion Alert Prototype for HEC

Author(s): Ruwini Edirisinghe | Dileeka Dias | Rakhitha Chandrasekara | Lanka Wijesinghe | Prasanga Siriwardena | Prasad Kumara Sampath
Volume: 4
Issue: 1
Year: 2013





A Performance Evaluation of A Parallel Biological Network Microcircuit in Neuron

Author(s): Salvatore Cuomo | Pasquale De Michele | Francesco Piccialli
Volume: 4
Issue: 1
Year: 2013





Joint network/channel decoding algorithm for wireless networks and proof simulation

Author(s): Youssef Zid | Sonia ZaibiAmmar | RidhaBouallègue
Volume: 4
Issue: 1
Year: 2013





A Beaconing Approach with Key Exchange in Vehicular Ad Hoc Networks

Author(s): Mohammed ERRITALI | Oussama Mohamed Reda | Bouabid El Ouahidi
Volume: 3
Issue: 6
Year: 2012





Mining Association Rule for Horizontally Partitioned Databases Using CK Secure Sum Technique

Author(s): Jayanti Danasana | Raghvendra Kumar | Debadutta Dey
Volume: 3
Issue: 6
Year: 2012





An Efficient Security Approach Using PGE and Parity Coding

Author(s): Ch. Rupa | P. S Avadhani | E. SrinivasReddy
Volume: 3
Issue: 6
Year: 2012





Adaptation of the Method of Estimation and Motion Compensation in the Transmission of the Video Sequence in Jpeg 2000

Author(s): Abdou Khadre Diop | Khaly Tall | Idy Diop | Sidi Mohamed Farssi
Volume: 3
Issue: 6
Year: 2012





Gsm Based Embedded System for Remote Laboratory Safety Monitoring and Alerting

Author(s): V.Ramya | B. Palaniappan | V.Sumathi
Volume: 3
Issue: 6
Year: 2012





Enhancement of TCP Performance with the Help of Snoop Protocol in Wired CUM Wireless Network

Author(s): Maninder Kaur | Parminder Singh
Volume: 3
Issue: 6
Year: 2012





Evaluation of Data Processing Using MapReduce Framework in Cloud and Stand - Alone Computing

Author(s): Samira Daneshyar | Ahmed Patel
Volume: 3
Issue: 6
Year: 2012





Performance Assessment of Communication Network in WAMS

Author(s): Kiran Gajrani | Krishan Gopal Sharma | Annapurna Bhargava
Volume: 3
Issue: 6
Year: 2012





Wireless Sensor Network in Niger Delta Oil and Gas Field Monitoring: The Security Challenges and Countermeasures

Author(s): Fidelis C. Obodoeze | Hyacinth C. Inyiama | V.E. Idigo
Volume: 3
Issue: 6
Year: 2012





Fast Parallel Sorting Algorithms on GPUs

Author(s): Bilal Jan | Bartolomeo Montrucchio | Carlo Ragusa | Omar Khan
Volume: 3
Issue: 6
Year: 2012





QOS Enhanced Hybrid Multipath Routing Protocol for Mobile Adhoc Networks

Author(s): P.Rama Devi | D.Srinivasa Rao
Volume: 3
Issue: 6
Year: 2012





A Method of Detecting Sql Injection Attack to Secure Web Applications

Author(s): Sruthy Manmadhan | Manesh T
Volume: 3
Issue: 6
Year: 2012





Implementation of Network Community Profile using Local Spectral algorithm and its application in Community Networking

Author(s): Vaibhav VPrakash
Volume: 3
Issue: 6
Year: 2012





MECB-AODV: A Modified Energy Constrained Based Protocol for Mobile Ad hoc Networks

Author(s): Akhilesh Tripathi | Rakesh Kumar
Volume: 3
Issue: 6
Year: 2012





Enhancing Highway Traffic Safety Through Intelligent Car

Author(s): Sudha Singh | S C Dutta | D K Singh | S K Singh
Volume: 3
Issue: 5
Year: 2012





Evaluation of Parameters for Improving Handoff Performance in Obile Wimax Networks

Author(s): Sharmistha Khan | Golam Rosul Khan | Ji Hyun Lee
Volume: 3
Issue: 5
Year: 2012





Scaling Up of E-Msr Codes Based Distributed Storage Systems with Fixed Number of Redundancy Nodes

Author(s): Haotian Zhao | Yinlong Xu | Liping Xiang
Volume: 3
Issue: 5
Year: 2012





Efficient Stagnation Avoidance for Manets with Local Repair Strategy Using ant Colony Optimization

Author(s): Sharvani G S | A G Ananth | T M Rangaswamy
Volume: 3
Issue: 5
Year: 2012





Generalized Affine Transformation Based on Circulant Matrices

Author(s): Adi Narayana Reddy K | Vishnuvardhan B | Durga Prasad K
Volume: 3
Issue: 5
Year: 2012





Cross-Layer Energy Optimization in Cooperative Cellular Systems

Author(s): M.Sushanth Babu | K.kishan Rao
Volume: 3
Issue: 5
Year: 2012





Role of Multi Agent System for Qos Guarantee in Cellular Networks

Author(s): Nupur Giri | Shrikant Bodhe
Volume: 3
Issue: 5
Year: 2012





Energy Efficient Topologies For Wireless Sensor Networks

Author(s): Gurwinder Kaur | Rachit Mohan Garg
Volume: 3
Issue: 5
Year: 2012





A Categorical Review of Recommender Systems

Author(s): RVVSV Prasad | V Valli Kumari
Volume: 3
Issue: 5
Year: 2012





An Improved Lower Bound of the Spark with Application

Author(s): Wajeb Gharibi
Volume: 3
Issue: 5
Year: 2012





Scrutiny New Framework in Integrated Distributed Reliable Systems

Author(s): Mehdi ZekriyapanahGashti
Volume: 3
Issue: 5
Year: 2012





Remote Patient Monitoring System

Author(s): Sherin Sebastian | Neethu Rachel Jacob | Yedu Manmadhan | Anand V. R. | M. J. Jayashree
Volume: 3
Issue: 5
Year: 2012





Performance Investigation of 802.11 MAC DCF

Author(s): Siddharth Dutt Choubey | Rohit Singh Thakur | ikram Jain
Volume: 3
Issue: 5
Year: 2012




