Distributed Conditional Multicast Access for IP TV in High-Speed Wireless Networks (Destination Specific Multicast)

Author(s): Jan Fesl | Richard Klee | Marie Dolezalova
Volume: 2
Issue: 6
Year: 2013





Data Minder using Steganography : Technology of Data Encryption

Author(s): Bhushan Walke | Riddhi Naik | Dhara Desai
Volume: 2
Issue: 6
Year: 2013





A Survey on Algorithms for Optimal Path Search in Dynamic Networks

Author(s): Neeraj Navlakha | Manisha J. Nene
Volume: 2
Issue: 6
Year: 2013





Assessing the Organizations’ Disaster Recovery Preparedness : A Study of SMEs in Zimbabwe

Author(s): Khanyisa Malufu
Volume: 2
Issue: 6
Year: 2013





Review of Various Algorithms Used in Hybrid Cryptography

Author(s): Veerpal Kaur | Aman Singh
Volume: 2
Issue: 6
Year: 2013





Data Warehouse Creation for Preparing an Electricity Statistics Dashboard

Author(s): Shivani Khedikar | Purva Kirolikar | Supriya Thombre
Volume: 2
Issue: 6
Year: 2013





A Review on Metamorphic Cryptography for Video Files

Author(s): Dhananjay M. Dumbere | Nitin J. Janwe
Volume: 2
Issue: 6
Year: 2013





A Survey on Schedule-Based MAC Protocols for Wireless Sensor Networks

Author(s): Abul Kalam Azad | M. Humayun Kabir | Md. Bellal Hossain
Volume: 2
Issue: 6
Year: 2013





JPEG versus GIF Images in forms of LSB Steganography

Author(s): ELTYEB E. ABED ELGABAR | FAKHRELDEEN A. MOHAMMED
Volume: 2
Issue: 6
Year: 2013





A Review on the Various Recent Steganography Techniques

Author(s): Sandeep Singh | Aman Singh
Volume: 2
Issue: 6
Year: 2013





Improvised Security for RDF using Random Salt and Levels with Bi-Directional Translation to Relational Database

Author(s): Siva Srinivasa Rao Mothukuri | Sai Ganesh Repaka
Volume: 2
Issue: 6
Year: 2013





Taxonomy of Dummy Generation Techniques for Preserving Location Privacy

Author(s): Priti Jagwani | Ranjan Kumar
Volume: 2
Issue: 6
Year: 2013





Analytical Modeling of Social Network Growth Using Multilayer Network Projection

Author(s): Kambiz Behfar | Ekaterina Turkina | Patrick Cohendet | Animesh Animesh
Volume: 2
Issue: 6
Year: 2013





The Adoption of Information and Communications Technology in the Administration of Health Insurance Schemes in Ghana

Author(s): Jeffrey Mingle | Michael Dzigbordi Dzandu
Volume: 2
Issue: 6
Year: 2013





Back Propagation Neural Network Based Gender Classification Technique Based on Facial Features

Author(s): Ms. Anushri Jaswante | Dr. Asif Ullah Khan | Dr. Bhupesh Gour
Volume: 2
Issue: 6
Year: 2013





DPMAP for Abrupt Manuscript Clustering with Attribute Partition

Author(s): K.Nithya | G.PadmaPriya
Volume: 2
Issue: 6
Year: 2013





A Survey on Privacy Enhancement in Cloud Computing using Identity Management

Author(s): M. Janaki | Dr.M.Ganaga Durga
Volume: 2
Issue: 6
Year: 2013





Designing of a Tool for String Matching using Regular Expressions

Author(s): Panthadeep Bhattacharjee | Hussain Ahmed Choudhury | Nasima Aktar Laskar
Volume: 2
Issue: 6
Year: 2013





Activity Modeling in Smart Home using High Utility Pattern Mining over Data Streams

Author(s): Menaka Gandhi . J | Gayathri K . S
Volume: 2
Issue: 3
Year: 2013





The Adaptive Optimized Routing Protocol for Vehicular Ad-hoc Networks

Author(s): Kunal Vikas Patil | M.R. Dhage
Volume: 2
Issue: 3
Year: 2013





Role of Assembling Invariant Moments and SVM in Fingerprint Recognition

Author(s): Supriya Wable | Chaitali Laulkar
Volume: 2
Issue: 3
Year: 2013





Improved Multimodal Biometric Watermarking in Authentication Systems Based on DCT and Phase Congruency Model

Author(s): Bairagi Nath Behera | V.K. Govindan
Volume: 2
Issue: 3
Year: 2013





An Approach to Develop Embedded System For Web Based Monitoring & Controlling of Renewable Energy Sources

Author(s): Akansha S. Fating | T.H. Nagrare
Volume: 2
Issue: 3
Year: 2013





An Overview of the Research on Texture Based Plant Leaf Classification

Author(s): Vishakha Metre | Jayshree Ghorpade
Volume: 2
Issue: 3
Year: 2013





Evolution of Gi-Fi Technology over other Technologies

Author(s): Jyoti Tewari | Swati Arya
Volume: 2
Issue: 3
Year: 2013





Artificial Intelligence:Simulated Embodied Agents

Author(s): Astha Jain | Payal Jain | Jitendra Singh
Volume: 2
Issue: 3
Year: 2013





Contribution to Securing Communications on VOIP

Author(s): Tahina Ezéchiel Rakotondraina | Ndaohialy Manda-vy Ravonimanantsoa | Andry Auguste Randriamitantsoa
Volume: 2
Issue: 3
Year: 2013





Performance Improvement Using Contention Window Adaptation in IEEE 802.11 WLANs

Author(s): Swapnil S Tale | Jyoti Kulkarni
Volume: 2
Issue: 3
Year: 2013





Simulation of Un-Symmetrical 2-Phase Induction Motor

Author(s): S. F. Bandhekar | S. N. Dhurvey | P. P. Ashtankar
Volume: 2
Issue: 3
Year: 2013





Efficient Algorithms for Materialized View Selection in Data Warehousing Environment

Author(s): Ashish Mohod | Manoj Chaudhari
Volume: 2
Issue: 3
Year: 2013





Digital Data Security and Copyright Protection Using Cellular Automata

Author(s): M.Khlaif | M.Talb
Volume: 2
Issue: 3
Year: 2013





An Unsupervised Pattern Clustering Approach for Identifying Abnormal User Behaviors in Smart Home

Author(s): Sukanya P | Gayathri K S
Volume: 2
Issue: 3
Year: 2013





Impact of Server Virtualization on Real Business World

Author(s): Kapil Saxena
Volume: 2
Issue: 3
Year: 2013





3D Reconstruction of Coronary Arteries from Angiographic Images: A Survey

Author(s): Mahima Goyal | Jian Yang | Arun PrakashAgrawal
Volume: 2
Issue: 3
Year: 2013





Compensatory Fuzzy Min-Max Neural Network for Object Recognition

Author(s): Paras A. Tolia
Volume: 2
Issue: 3
Year: 2013





Using Unobtrusive Techniques for Detecting Leakage of Data

Author(s): Shailaja B. Jadhav | Prachi Joshi
Volume: 2
Issue: 3
Year: 2013





A New Checkpoint Approach for Fault Tolerance in Grid Computing

Author(s): Gokuldev S | Valarmathi M
Volume: 2
Issue: 3
Year: 2013





An Adaptive Expert System for an Educational Institute

Author(s): Renuka Agrawal | Jyoti Singh
Volume: 2
Issue: 3
Year: 2013





Algorithm and Approaches to Handle Large Data - A Survey

Author(s): Chanchal Yadav | Shuliang Wang | Manoj Kumar
Volume: 2
Issue: 3
Year: 2013





Performance of IEEE 802.15.4 in WSN for Monitoring Real Time Air Pollution Parameters

Author(s): Darshana N. Tambe | Nekita A. Chavhan
Volume: 2
Issue: 3
Year: 2013





Mining Weather Data Using Rattle

Author(s): Venkata Abhishek Bavirisetty | Avinash Ankireddy | Prasad Seemakurthi | K.V.N. Rajesh
Volume: 2
Issue: 3
Year: 2013





Security Threats in Prepaid Mobile

Author(s): Arshiya Begum | Mohammed Tanveer Ali
Volume: 2
Issue: 2
Year: 2013





Collision Avoidance Using Inter-Vehicle Ad-hoc Communication

Author(s): Mahesh Panjwani | Humera Syed | Sumera Qazi
Volume: 2
Issue: 2
Year: 2013





The Trikey-board - Introduction to and analysis of a new design of touch-sensitive virtual keyboard

Author(s): Sunil Joshi
Volume: 2
Issue: 2
Year: 2013





Protection of Privacy in Visual Cryptography Scheme Using Error Diffusion Technique

Author(s): Mr.A.Duraisamy | Mr.M.Sathiyamoorthy | Mr.S.Chandrasekar
Volume: 2
Issue: 2
Year: 2013





Energy-Efficient Cloud Computing: A Vision, Introduction, and Open Challenges

Author(s): Ms.Jayshri Damodar Pagare | Dr.Nitin A Koli
Volume: 2
Issue: 2
Year: 2013





Wireless Networks Security Using Dispersive Routing Mechanism

Author(s): Vulupala Sridhar Reddy | M. Venkateswara Rao
Volume: 2
Issue: 2
Year: 2013





An Approach to Authenticate user’s Mobile device and to Preserve Privacy towards Location Proof(A2MP2LP)

Author(s): Senthilguru S | Blessed Prince P
Volume: 2
Issue: 2
Year: 2013





Noise Suppression in Tele-Lectures using Bi-Modal Feature Extraction

Author(s): E.S.Selvakumar | S.Shanmuga Priya
Volume: 2
Issue: 2
Year: 2013





Evaluating the Performance of FQM Framework for Supporting Multimedia Applications in MANET

Author(s): Mohammed Saghir
Volume: 2
Issue: 2
Year: 2013




