Open Access
Subscription or Fee Access
Table of Contents
Articles
Fault Tree Analysis for Safety Critical Network Infrastructure | |
P. Vaishnavi, Rajesh Prasanna | 450-454 |
Modeling RTT Using Box-Jenkins Model | |
A. Jeyasekar, S.V. Kasmir Raja | 455-460 |
Advance Defense Modeling for SCADA Systems | |
Suma Christal Mary, Renjini Jose | 461-465 |
Congestion Avoidance in WSN with Multiple Mobile Sink Using Energy Based Routing | |
Litty Koshy | 466-470 |
Workflow Scheduling Using Heuristics Based Ant Colony Optimization | |
N. Pughazendi, J. Elayaraja | 471-475 |
VPN: The Stride of Technology for Future Ready Business | |
Swarnangini Sinha, Vibha Thakur | 476-480 |
Implementation of VoIP Using Session Initiation Protocol | |
G. Appala Naidu, P. Chandrasekhar, K. Srinivas, Anwar Basha Pattan | 481-485 |
Ant Based Route Optimization for FTP Protocol | |
Suvarna Joshi, Snehal Neharkar, Poonam Baviskar, Pramila Gaidhani, Varsha Koli | 486-490 |
Minimum Energy Consumption Channel Allocation Scheme in LR-WPAN | |
P. Kaushik, J. Singhai | 491-496 |
Single Polysilicon Nano-Wire Piezoresistors for MEMS Pressure Sensor | |
S. Maflin Shaby, A. Vimala Juliet | 497-501 |
Performance Analysis of Pseudo-Orthogonal Codes at 10 Gbps for 16 Users in Free Space | |
Dr. Neena Gupta, Divya Dhawan, Preety Singla | 502-506 |
MAC Layer Based Insubordination Mechanism for Differentiating and Penalizing/Rewarding Opportunist Nodes in 802.11 WLAN Network | |
Piyush Kumar Shukla, Sanjay Silakari, Sarita Singh Bhadauria | 507-509 |
Intrusion Detection System for Protection against Packet Dropping Attack on Distributed Information System in any Organization | |
K.P Singh, Yogesh Chaba, Gaurav Lodha, Yudhvir Singh | 510-513 |
This work is licensed under a Creative Commons Attribution 3.0 License.
ISSN: 0974 – 9616