An Unlinkable and Unobservable Secure Routing with Symmetric Approach for MANETS Dr.V.Khanaa

Author(s): Dr.V.Khanaa | Dr.Krishna Mohanta
Volume: 02
Issue: 03
Year: 2013





Qi Open Wireless Charging Standard – A Wireless Technology for the Future

Author(s): P.Manivannan | S.Bharathiraja
Volume: 02
Issue: 03
Year: 2013





USING CLOUD COMPUTING TO PROVIDE DATA MINING SERVICES

Author(s): Naskar Ankita* , Mrs. Mishra Monika R
Volume: 02
Issue: 03
Year: 2013





Increasing no. of nodes for Dijkstra algorithm without degrading the performance

Author(s): Nikita Jaiswal | Rajesh Kumar Chakrawarti
Volume: 02
Issue: 03
Year: 2013





Secure And Authenticated Reversible Data Hiding In Encrypted Images

Author(s): Dr.V.Khanaa | Dr.Krishna Mohanta
Volume: 02
Issue: 03
Year: 2013





Performance Evaluation of MultipathAODV Routing Protocol

Author(s): Ms. Néeraj Rathore | prof. Umesh Barahdiya | prof.pawan jain
Volume: 02
Issue: 02
Year: 2013





An Effective Secure Environment Using Graphical Password Authentication Scheme

Author(s): K. Semmangaiselvi | T.Vamsidhar | KothaHariChandana | B. Krishna Priya | E. Nalina
Volume: 02
Issue: 02
Year: 2013





Minimizing Air Gap Length and Losses for Optimal Design Of Three Phase Induction Motor by Genetic Algorithm

Author(s): Surojit Sarkar | Satyajit Samaddar | Dr.Pradip Kumar Saha | Dr.Gautam Kumar Panda
Volume: 02
Issue: 02
Year: 2013





Reduced Link Failures Through Autonomous Reconfiguration System For Wireless Mesh Networks

Author(s): Jayanthi K | Venkatesh R.S | Subash C | Samynathan T
Volume: 02
Issue: 02
Year: 2013





EFFICIENCYIMPROVEMENT OF PELTON WHEEL ANDCROSSFLOW TURBINES IN MICRO-HYDRO POWER PLANTS: CASE STUDY

Author(s): Loice Gudukeya | Ignatio Madanhire
Volume: 02
Issue: 02
Year: 2013





COMPARATATIVE ANALYSIS OF CLOUD BACKUP IN ENTERPRISE AND SMALL MEDIUM BUSINESS

Author(s): Jain Shikha | Chauhan Neeru
Volume: 02
Issue: 02
Year: 2013





INTEGRATED BLOCK BASED METHOD USES UNIQUENESS MATRIX FOR EFFECTIVE WATERMARKING

Author(s): Rosline Nesa kumara. G | Dr. Maruthuperumal.S
Volume: 02
Issue: 02
Year: 2013





A NOVEL APPROACH ON IMAGE STEGANOGRAPHIC METHODS FOR OPTIMUM HIDING CAPACITY.

Author(s): Archana.S | A. Antony Judice
Volume: 02
Issue: 02
Year: 2013





ANALYSIS OF CLUSTER BASED ROUTING IN WIRELESS SENSOR NETWORKS

Author(s): K.Sundara Velrani
Volume: 02
Issue: 02
Year: 2013





Braille Calculator

Author(s): Yoshit V. Gidh | Mahesh S. Latey | Arpita roy, Kunal Shah | Savita Ingle
Volume: 02
Issue: 02
Year: 2013





An Efficient Contrast Enhancement of Medical X-Ray Images -Adaptive Region Growing Approach

Author(s): Dr. Krishna Mohanta | Dr.V.Khanaa
Volume: 02
Issue: 02
Year: 2013





Improvised Record Matching Scheme using Unsupervised Learning from Web Databases

Author(s): G.V.Rajya Lakshmi | Ch.Suhasini
Volume: 02
Issue: 02
Year: 2013





Hardware Implementation Of Advanced Cryptographic Hash Function On Fpgas

Author(s): Ms.Shukla Atuliika | Prof.Sharma Sumit | Prof.Ravi Mohan
Volume: 02
Issue: 01
Year: 2013





N-Nodeset Importance Representative based Outlier Detection for Categorical Data

Author(s): H.Venkateswara Reddy1, S.Viswanadha Raju2
Volume: 02
Issue: 01
Year: 2013





Emerging And Challenging Applications In Swarm Robotics

Author(s): Prof.N.Rama Devi1 | Dr.G.Uma | T.S.Praveena | M.Naga Jyothi
Volume: 02
Issue: 01
Year: 2013





By Dynamic Voltage Restorerfor Power Quality Improvement

Author(s): Subhro Paul | SujaySarkar | SurojitSarkar | Pradip Kumar Saha | Gautam Kumar Panda
Volume: 02
Issue: 01
Year: 2013





Comparative study of C, Objective C, C++ programming language

Author(s): Gaurav Jindal | Pooja Khurana | Tanu Goel
Volume: 02
Issue: 01
Year: 2013





Malware Attacks on Smart Phone, Its Limitation & Evolution to Detect New Techniques

Author(s): Miss Nita B. Thakkar | Miss Dhara N. Darji
Volume: 02
Issue: 01
Year: 2013





Extraction of Electrical Power Transformer Parameters

Author(s): Eisa Bashier M. Tayeb1 | A. Taifour Ali2 | A. Taifour Ali2
Volume: 02
Issue: 01
Year: 2013





An Explanatory Study of the Parameters to Be Measured From EMG Signal

Author(s): Ruchika | Shalini Dhingra
Volume: 02
Issue: 01
Year: 2013





Extraction of Electrical Power Transformer Parameters

Author(s): Eisa Bashier M. Tayeb | Taifour Ali | Albager Alkhir H. Ali
Volume: 02
Issue: 01
Year: 2013





Iris Recognition based on Pupil using Canny edge detection and K-Means Algorithm

Author(s): Chinni. Jayachandra | H.Venkateswara Reddy
Volume: 02
Issue: 01
Year: 2013





Optimize Security solution for mobile agent security: A Review

Author(s): Sachin Upadhye | P.G.Khot
Volume: 02
Issue: 01
Year: 2013





A Survey on Cloud Database Management

Author(s): Ms.V.Srimathi | Ms.N.Sathyabhama | Ms.D.Hemalatha
Volume: 02
Issue: 01
Year: 2013





A Secure Address Allocation Scheme for Wireless Area Distributed Communication Network

Author(s): Er. Ravi Verma | Er. Manoj Kumar Khinchi | Rajesh Saini
Volume: 02
Issue: 01
Year: 2013





Analysis of Solar PV cell Performance with Changing Irradiance and Temperature

Author(s): Pradhan Arjyadhara | Ali S.M | Jena Chitralekha
Volume: 02
Issue: 01
Year: 2013





Similarity Analysis Of Images Using Content Based Image Retrieval System

Author(s): S.Pavani *, Shivani**, T.Venkat Narayana Rao ***, Deva Shekar ****
Volume: 02
Issue: 01
Year: 2013





Multiuser Channel Measurements For Wireless Localization

Author(s): Zahid Ali,
Volume: 02
Issue: 01
Year: 2013





Signal Scrambling Techniques for PAPR Reduction in OFDM Systems

Author(s): Maan Singh | Vijay Kumar
Volume: 02
Issue: 01
Year: 2013





Manufacturing capacity building baseline survey on Small to Medium Enterprises (SME’s) : A case study of Hire Engineering Co. in Zimbabwe

Author(s): Kumbi Mugwindiri | IgnatioMadanhire
Volume: 02
Issue: 01
Year: 2013





Symmetric Key Management: A new approach

Author(s): Santosh Deshpande1
Volume: 01
Issue: 03
Year: 2012





Comparative Analysis Of Wind Power Forecasting Using Artificial Neural Network (Ann)

Author(s): Mr.P.Gopi | Dr.S.Ganesh Vaidyanathan | Dr.H.Umma Habiba | Mrs.S.Kalyani4
Volume: 01
Issue: 03
Year: 2012





Automated Video Surveillance System With Sms Alert

Author(s): H.Venkateswara Reddy | B.Suresh Kumar
Volume: 01
Issue: 03
Year: 2012





Performance Evaluation of IEEE 802.16 Grids using scheduling Algorithms

Author(s): Krishna Mohantn | Dr.V.Khanaa
Volume: 01
Issue: 03
Year: 2012





Green Cloud Environmental Infrastructure

Author(s): Ms.V.Srimathi | Ms.D.Hemalatha | Mr.R.Balachander
Volume: 01
Issue: 03
Year: 2012





Control Strategy For Wind Energy And Hybrid Generating Systems Based On The Concept Of Power Electronics

Author(s): Gaurav Mishra , Ruchi Mishra
Volume: 01
Issue: 03
Year: 2012





Web service QoS Based Broker Architecture and Heuristic Algorithm applied for an Apartment Management system

Author(s): Prof.SushmaA Shirke | Prof.Sharayu Lokhande | Prof.Rushali Patil
Volume: 01
Issue: 03
Year: 2012





Effects Of The Cyclic Prefix In Siso And Miso Wimax Systems

Author(s): Mohammed H. M. Nerma* and Albedeir Y. G. Othman
Volume: 01
Issue: 03
Year: 2012





Hybrid Model For Intrusion Detection System

Author(s): Chapke Prajkta P. | Raut A. B.
Volume: 01
Issue: 03
Year: 2012





Inter-Carrier Interference Reduction Technique In Ofdm System Based On Self Cancellation Technique

Author(s): Mohammed H. M. Nerma*, Hassan Y. Ahmed**, Abdallah M. Monir*, Ali M. Mustafa*, and Munzir M. Omer*
Volume: 01
Issue: 03
Year: 2012





Maintainability of Software using Aspect Oriented Programming for Process quality Analysis

Author(s): Dr.V.Khanaa. Krishna Mohanta
Volume: 01
Issue: 03
Year: 2012





Ontology Mining For Personalized Web Information Gathering

Author(s): Miss. Deshmukh Rupali R. Prof. Keole R.R
Volume: 01
Issue: 03
Year: 2012





The New Era Of Browsing -Voice Browsing

Author(s): Khushbu , Manika Kapoor , Ayesha Tafsir
Volume: 01
Issue: 02
Year: 2012




