The Implication of External Constraints on User Experience (UX): Prioritizing User Experience Dimensions on Mobile Devices
Author(s): Joash Kiprotich Bii | Dr. Waweru Mwangi | Dr. Stephen Kimani
Volume: 2
Issue: 3
Year: 2013




Analysis of Web Usage Behavior using Pattern Analyzing Techniques in E-Learning system
Author(s): Ms.G.Dona Rashmi
Volume: 2
Issue: 3
Year: 2013




Energy Efficient Resource Sharing and Scheduling for Video over Wireless Networks
Author(s): P. Kalaiselvi | N. Mahendran
Volume: 2
Issue: 3
Year: 2013




A Novel Approach to Analyze and Predict Aircrash in Aviation
Author(s): N. Sivaram | T. Santha
Volume: 2
Issue: 3
Year: 2013




Design of Log Periodic Dipole Array Antenna Using One Side with Compare Two Dielectric Material Results
Author(s): Chaudhary Pankaj prabhubhai | Prof.Yagnesh.B. Shukla | Mrs.Hetal .M. Pathak
Volume: 2
Issue: 3
Year: 2013




DISTRIBUTED DENIAL OF SERVICE ATTACK PREVENTION USING CRITICAL LINK METHOD IN MANET
Author(s): Sitesh Kumar Sinha | Dr. R.K. Singh | Krishna kumar Pandey | Mukesh Kumar Sahu
Volume: 2
Issue: 3
Year: 2013




Enhancing Security Using Graphical Patterns Selection (ENSUGPS)
Author(s): Preethi. D | Priya. J | Saranraj. G
Volume: 2
Issue: 3
Year: 2013




An Insight Comparison of Serial Communication Protocols
Author(s): Gaurav Khurana | Umesh Goyal
Volume: 2
Issue: 3
Year: 2013




MAC Protocols researched for Wireless Sensor Networks
Author(s): Tarana Shaikh
Volume: 2
Issue: 3
Year: 2013




RADAR IMPLEMENTATION ON FOREST VEGETATIONS
Author(s): Mr.V.Bharathan Iyer | Mr.P. Venkatesan
Volume: 2
Issue: 3
Year: 2013




Mobile Web Analytics
Author(s): Ruchi Gupta | Kinjal Mehta | Kaushal Bhavsar | Dr. Hiren Joshi
Volume: 2
Issue: 3
Year: 2013




Optical Code Division Multiple Access Performance Signature Over Multimode Optical Fiber Transmission Systems
Author(s): Ahmed Nabih Zaki Rashed | Mohamed M. Zahra | Mohamed Yassin | Ismail A. Abd El-Aziz | Shreen A. El-Bheiry
Volume: 2
Issue: 3
Year: 2013




CLOUD AND INTELLIGENT BASED SCADA TECHNOLOGY
Author(s): Sunaina Sulthana Sk
Volume: 2
Issue: 3
Year: 2013




Network Intrusion detection by using Feature Reduction Technique
Author(s): Fiona Lowden Lawrence, Sanjay Kumar Sharma, Mahendra Singh Sisodia
Volume: 1
Issue: 1
Year: 2012




Anomaly Detection by Naive Bayes & RBF Network
Author(s): Dilip Kumar Ahirwar, Sumit Kumar Saxena, M. S. Sisodia
Volume: 1
Issue: 1
Year: 2012



