

Table of Contents
Articles
Crosstalk Due to XPM under the Impact of Higher Order Dispersion Parameters in SCM-WDM Link |
PDF
![]() |
Vishal Sharma, Jagvir Kaur, Amarpal Singh | 183-189 |
Knowledge Discovery Framework for Community Web Directories |
PDF
![]() |
Upendar Para, Podila Kondala Rao, Manasa Manasa | 190-195 |
Adaptive Content based Secured Access of Data in Cloud Environment |
PDF
![]() |
D. Daniel, M. Karthic, M. Prakash, R. Suresh Kumar | 196-200 |
Prototyping and Detection of Concealing Worm |
PDF
![]() |
RaviTeja Gaddam, K. Ruth Mary Poornima | 201-209 |
A Novel Approach for Secure Processing of Service Request with Security Manager in Cloud |
PDF
![]() |
J. Vikram, S. Agilesh, V. Guhan, B. Manikandan | 210-214 |
Investigation of Fiber Based Schemes for Realization of All Optical Gates |
PDF
![]() |
Kadam Bhambri, Dr. Neena Gupta | 215-220 |
PCI Configuration based Data Security Architecture and Co-Design Techniques |
PDF
![]() |
Dilip Thomas, Dr.K.S.M. Panicker | 221-229 |
An Adaptive CSMA/TDMA Hybrid-Mac for Wireless Sensor Networks |
PDF
![]() |
S. Koteswara Rao, Dr.M. Sailaja, Dr. T. Madhu, P. Ramesh | 230-234 |
An Improving Security of Randomized Arithmetic Code with RPB Techniques |
PDF
![]() |
Nirmal J. Mangaly, Iwin Joseph Thanakumar | 235-237 |
An Enhanced TCP Congestion Control Algorithm for Wired/Wireless Networks |
PDF
![]() |
Nikita H. Bhalara, Vijay B. Baru | 238-242 |
New Encryption Standard and Particular Case of GOST Algorithm |
PDF
![]() |
Chandra Sekhar Maganty, K. Sai Prasanthi, K. Sai Sruthi | 243-247 |
Privacy Conscious Screening Framework for Frequently Moving Objects |
PDF
![]() |
S. Ganesh, V.S. Dhanyasree | 248-253 |

This work is licensed under a Creative Commons Attribution 3.0 License.
ISSN: 0974 – 9616