

Table of Contents
Articles
Secure Communication for Reversible Data Hiding in Encrypted Images by Reserving Room before Encryption Technique |
PDF
![]() |
A. Balakumar, R. Senthilkumar | 123-125 |
Enhancing Intrusion Detection using CRF and Layered Approach for Discussion Forum Web Application |
PDF
![]() |
Ketaki Mohan Patil, A.B. Chougule | 126-132 |
Effectiveness of Kd- Tree in Ray Tracing of Dynamic Point Clouds |
PDF
![]() |
Aishwarya Shekhar, Trapti Sharma, Devesh Kumar Srivastava | 133-137 |
Survey of Microstrip Patch Antennas for Ultrawideband Applications |
PDF
![]() |
Nishant Aggarwal, Jyoteesh Malhotra | 138-142 |
Securing API Using API Gateway |
PDF
![]() |
Arpita Gangrade, Bhawna Nigam | 143-146 |
Proposed Spectrum Handoff Algorithm in Cognitive Radio Networks Using Fuzzy Logic Control |
PDF
![]() |
Shimaa Ali, Mona Shokair, Moawad I. Dessouky, Nagy Messiha, Hala S. El-sayed | 147-154 |
Optimizing Power Consumption in Cloud Using Task Consolidation |
PDF
![]() |
Reenu Deswal, Sambit Kumar Mishra, Bibhudutta Sahoo | 155-162 |
Performance Analysis of Dual-Hop Relaying Networks with Nth Best-Path Selection over Rayleigh Fading Channel |
PDF
![]() |
M. Nivedha, S. Sukanya, S. Arunmozhi | 163-168 |

This work is licensed under a Creative Commons Attribution 3.0 License.
ISSN: 0974 – 9616