

Table of Contents
Articles
Fault Tree Analysis for Safety Critical Network Infrastructure |
PDF
![]() |
P. Vaishnavi, Rajesh Prasanna | 450-454 |
Modeling RTT Using Box-Jenkins Model |
PDF
![]() |
A. Jeyasekar, S.V. Kasmir Raja | 455-460 |
Advance Defense Modeling for SCADA Systems |
PDF
![]() |
Suma Christal Mary, Renjini Jose | 461-465 |
Congestion Avoidance in WSN with Multiple Mobile Sink Using Energy Based Routing |
PDF
![]() |
Litty Koshy | 466-470 |
Workflow Scheduling Using Heuristics Based Ant Colony Optimization |
PDF
![]() |
N. Pughazendi, J. Elayaraja | 471-475 |
VPN: The Stride of Technology for Future Ready Business |
PDF
![]() |
Swarnangini Sinha, Vibha Thakur | 476-480 |
Implementation of VoIP Using Session Initiation Protocol |
PDF
![]() |
G. Appala Naidu, P. Chandrasekhar, K. Srinivas, Anwar Basha Pattan | 481-485 |
Ant Based Route Optimization for FTP Protocol |
PDF
![]() |
Suvarna Joshi, Snehal Neharkar, Poonam Baviskar, Pramila Gaidhani, Varsha Koli | 486-490 |
Minimum Energy Consumption Channel Allocation Scheme in LR-WPAN |
PDF
![]() |
P. Kaushik, J. Singhai | 491-496 |
Single Polysilicon Nano-Wire Piezoresistors for MEMS Pressure Sensor |
PDF
![]() |
S. Maflin Shaby, A. Vimala Juliet | 497-501 |
Performance Analysis of Pseudo-Orthogonal Codes at 10 Gbps for 16 Users in Free Space |
PDF
![]() |
Dr. Neena Gupta, Divya Dhawan, Preety Singla | 502-506 |
MAC Layer Based Insubordination Mechanism for Differentiating and Penalizing/Rewarding Opportunist Nodes in 802.11 WLAN Network |
PDF
![]() |
Piyush Kumar Shukla, Sanjay Silakari, Sarita Singh Bhadauria | 507-509 |
Intrusion Detection System for Protection against Packet Dropping Attack on Distributed Information System in any Organization |
PDF
![]() |
K.P Singh, Yogesh Chaba, Gaurav Lodha, Yudhvir Singh | 510-513 |

This work is licensed under a Creative Commons Attribution 3.0 License.
ISSN: 0974 – 9616