Safety Measures in Wireless Information Networks

Author(s): K.V.N.R. Sai Krishna | CH. Krishnamohan
Volume: 2
Issue: 9
Year: 2013





NEXT GENERATION MOBILE COMPUTING

Author(s): N. LAKSHMI PRASANNA | DR. R. V. KRISHNAIAH
Volume: 2
Issue: 9
Year: 2013





Performance Base Static Analysis of Malware on Android

Author(s): Khyati Rami | Vinod Desai
Volume: 2
Issue: 9
Year: 2013





Prototype of Vehicle Security Alert System on Proton Iswara 1.3

Author(s): N. A. Ali | A. S. Ja’afar | A. Salleh | M. A. M. Razali | M.Z.A.A Aziz | N. M. Z. Hashim
Volume: 2
Issue: 9
Year: 2013





A Review of the Vulnerabilities of Web Applications

Author(s): Ravneet Kaur Sidhu
Volume: 2
Issue: 9
Year: 2013





Design and Implementation of Rijndael Encryption Algorithm Based on FPGA

Author(s): K. Soumya | G. Shyam Kishore
Volume: 2
Issue: 9
Year: 2013





A Survey of Time Synchronization Protocols for Wireless Sensor Networks

Author(s): Baljinder Kaur | Amandeep Kaur
Volume: 2
Issue: 9
Year: 2013





HYBRID ENSEMBLE GENE SELECTION ALGORITHM FOR IDENTIFYING BIOMARKERS FROM BREAST CANCER GENE EXPRESSION PROFILES

Author(s): DR. S. ARUNA | DR. L.V. NANDAKISHORE
Volume: 2
Issue: 9
Year: 2013





DELAY – Disruption Tolerant Network (DTN), its Network Characteristics and Core Applications

Author(s): Vaishali.S.Raj | Dr. R. Manicka Chezian
Volume: 2
Issue: 9
Year: 2013





Outsourced Comparison Seek on Metric Information Resources

Author(s): M. Praveen | S. Dorababu
Volume: 2
Issue: 9
Year: 2013





Home Electrical Appliances Smart System

Author(s): S. H. Husin | A. A. Ngahdiman | N. M. Z. Hashim | Y. Yusop | A.S Ja’afar
Volume: 2
Issue: 9
Year: 2013





Design and Performance Analysis of Various Adders using Verilog

Author(s): Maroju SaiKumar | Dr. P. Samundiswary
Volume: 2
Issue: 9
Year: 2013





Performance Evaluation of AODV and DSR Routing Protocols with PCM and GSM Voice Encoding Schemes

Author(s): Osamah Yaseen Fadhil
Volume: 2
Issue: 9
Year: 2013





Impact of Uncertainty Factors in Cost Estimation – Substantiation through Normal Distribution Curve

Author(s): G. Rajkumar | Dr. K. Alagarsamy
Volume: 2
Issue: 9
Year: 2013





A New Technique for Test Case Prioritization

Author(s): Amandeep Kaur | Sheena Singh
Volume: 2
Issue: 9
Year: 2013





Analysis of Attribute Set-Based Encryption Solution for Access Control in Cloud Computing

Author(s): P. Sravanthi | N. Uday Bhaskar | P. Swapna | Nagaraju
Volume: 2
Issue: 9
Year: 2013





Zforce Touchscreen Technology

Author(s): A. ANUSHA REDDY | DR. R. V. KRISHNAIAH
Volume: 2
Issue: 9
Year: 2013





CONTRAIL – ARCHITECTURE FOR MOBILE DATA SHARING APPLICATIONS

Author(s): Lavanya.K | Devipriya.C | Saradha.S | Sangeetha Priya.M
Volume: 2
Issue: 9
Year: 2013





Comparison of Previous Result with New Model for the Improvement of Gain in Raman Amplifier

Author(s): Jyoti Dhir | Vivek Gupta
Volume: 2
Issue: 9
Year: 2013





TRACKING AND ACTIVITY RECOGNITION THROUGH CAMERA NETWORKS

Author(s): P. Ravali | D. Sampath Kumar
Volume: 2
Issue: 9
Year: 2013





Cloud Security for Computing Secure Cloud Bursting, Brokerage and Aggregation Using Cryptography

Author(s): Neeraj Shrivastava | Rahul Yadav
Volume: 2
Issue: 9
Year: 2013





A Comprehensive Study on Fast Image Dehazing Techniques

Author(s): Elisée A KPONOU | Zhengning Wang | Liping Li
Volume: 2
Issue: 9
Year: 2013





Lifetime Maximization in Sensor Networks for Rare-Event Detection using Optimal Sleep Scheduling

Author(s): M. Sindhuja | N. Kokila
Volume: 2
Issue: 9
Year: 2013





Safety Dimensions of Session Initiation Protocol

Author(s): K.V.N.R. Sai Krishna
Volume: 2
Issue: 8
Year: 2013





Design of Improved Web Crawler By Analysing Irrelevant Result

Author(s): Prashant Dahiwale | Dr. M.M. Raghuwanshi | Dr. Latesh Malik
Volume: 2
Issue: 8
Year: 2013





Privacy Protected Query Processing on Spatial Networks

Author(s): K. SASIKALA | REKA.R | SASIKALA.K
Volume: 2
Issue: 8
Year: 2013





Backfilling Strategies for Computational Grid System Load Balancing

Author(s): Prakash Kumar | Pradeep Kumar | Vikas Kumar
Volume: 2
Issue: 8
Year: 2013





Low Power Flip-Flop Design for Low Swing LC Resonant Clock Distribution Networks

Author(s): Ms. Rihana P A | Mr. R Ramar Kalangiyam
Volume: 2
Issue: 8
Year: 2013





SECURITY TECHNIQUES FOR MULTI TENANCY APPLICATIONS IN CLOUD

Author(s): C.C. Kalyan Srinivas | S.Sajida | Lokesh
Volume: 2
Issue: 8
Year: 2013





Evolution of Mobile Wireless Communication Networks-1G to 5G as well as Future Prospective of Next Generation Communication Network

Author(s): Pankaj Sharma
Volume: 2
Issue: 8
Year: 2013





Automated Libraries: What we expect from Digital Libraries

Author(s): Gulbasar | Prof. Saoud Sarwar
Volume: 2
Issue: 8
Year: 2013





Depiction of Routing Protocols in Mobile Adhoc Networks: Behaviour Analysis

Author(s): Veeralakshmi M | Dr. R Pugazendi
Volume: 2
Issue: 8
Year: 2013





ADOPTION OF AUTOMATED TELLER MACHINE IN NIGERIAN BANKS: USE ENHANCEMENTS AND LIMITATIONS

Author(s): DAWODU BAMIDELE FRIDAY | OSONDU MARY C
Volume: 2
Issue: 8
Year: 2013





CCLAEEO: CLUSTERING BASED CROSSLAYER AIDED ENERGY-EFFICIENT OPPORTUNISTIC ROUTING SCHEME IN MOBILE AD HOC NETWORKS

Author(s): M. Kalaivani | G. KesavaRaj
Volume: 2
Issue: 8
Year: 2013





Intelligent Heart Disease Prediction Model Using Classification Algorithms

Author(s): Pramod Kumar Yadav | K.L.Jaiswal | Shamsher Bahadur Patel | D. P.Shukla
Volume: 2
Issue: 8
Year: 2013





AIM OF PROTECTED ROUTING MESSAGE AUTHENTICATION PROTOCOL FOR VEHICULAR AD HOC NETWORKS

Author(s): R. UmaSaraswathi | N. Kavitha | G. KesavaRaj
Volume: 2
Issue: 8
Year: 2013





SMART ASSOCIATION CONTROL IN WIRELESS FIDELITY USING FBA

Author(s): Devipriya A | Prashanth M | Parameshachari B D | Muruganantham C | H S Divakara Murthy | Arun Jose
Volume: 2
Issue: 8
Year: 2013





Analysis of Attribute Association Rule from Large Medical Datasets towards Heart Disease Prediction

Author(s): D. P. Shukla | Shamsher Bahadur Patel | Ashish Kumar Sen | Pramod Kumar Yadav
Volume: 2
Issue: 8
Year: 2013





Low Complexity Multiple Active Transmit Antenna For High Transmit Rate

Author(s): Aparna S | Nithin S S | Parameshachari B D | Muruganatham C | Prof. H S DivakaraMurthy
Volume: 2
Issue: 8
Year: 2013





ANOMALY INTRUSION DETECTION SYSTEM USING NEURAL NETWORK

Author(s): Ms. Vrushali D Mane | Ms. Abhilasha Sayar | Prof. Sunil Pawar
Volume: 2
Issue: 8
Year: 2013





Steganographic Method for Data Hiding In Audio Signals with LSB & DCT

Author(s): Linu Babu | Jais John S | Parameshachari B D | Muruganantham C | H S DivakaraMurthy
Volume: 2
Issue: 8
Year: 2013





Parallel Encryption Technique Combined With Secure Single Sign-On Mechanism for Distributed Computer Networks

Author(s): R. Suganya | A.K. Sathiya Bama
Volume: 2
Issue: 8
Year: 2013





Policy Enforcing and Revoking Mechanism on Trusted Ad Hoc Networks

Author(s): Sujatha J | Manoj Challa
Volume: 2
Issue: 8
Year: 2013





Overview of Security Threats in WSN

Author(s): Ms. Poonam Barua | Mr. Sanjeev Indora
Volume: 2
Issue: 7
Year: 2013





A Survey on Security Issues in Wireless Sensor Network

Author(s): H.N. Pratihari
Volume: 2
Issue: 7
Year: 2013





A Survey of Image Segmentation Algorithms Based On Fuzzy Clustering

Author(s): R. Ravindraiah | K. Tejaswini
Volume: 2
Issue: 7
Year: 2013





TPM as a Middleware for Enterprise Data Security

Author(s): Abhishek Patel | Prabhat Dansena
Volume: 2
Issue: 7
Year: 2013





Technical Advances in Fall Detection System – A Review

Author(s): Raveendra Hegde | Dr. B G Sudarshan | Dr. S C Prasanna Kumar | Dr. Hariprasad S A | Dr. B S Satyanarayana
Volume: 2
Issue: 7
Year: 2013





Ensuring QOS in WiMAX Networks

Author(s): S. Gandhimathi | A. Srivishnuparaneetharan | M. Madhushudhanan
Volume: 2
Issue: 7
Year: 2013





An Efficient Resource Management and Scheduling Technique for Fault Tolerance in Grid Computing

Author(s): Deeptanoy Ghosh | Ramandeep Singh | Jimmy Laishram
Volume: 2
Issue: 7
Year: 2013




