Table of Contents
Articles
| Secure Communication for Reversible Data Hiding in Encrypted Images by Reserving Room before Encryption Technique |
PDF
|
| A. Balakumar, R. Senthilkumar | 123-125 |
| Enhancing Intrusion Detection using CRF and Layered Approach for Discussion Forum Web Application |
PDF
|
| Ketaki Mohan Patil, A.B. Chougule | 126-132 |
| Effectiveness of Kd- Tree in Ray Tracing of Dynamic Point Clouds |
PDF
|
| Aishwarya Shekhar, Trapti Sharma, Devesh Kumar Srivastava | 133-137 |
| Survey of Microstrip Patch Antennas for Ultrawideband Applications |
PDF
|
| Nishant Aggarwal, Jyoteesh Malhotra | 138-142 |
| Securing API Using API Gateway |
PDF
|
| Arpita Gangrade, Bhawna Nigam | 143-146 |
| Proposed Spectrum Handoff Algorithm in Cognitive Radio Networks Using Fuzzy Logic Control |
PDF
|
| Shimaa Ali, Mona Shokair, Moawad I. Dessouky, Nagy Messiha, Hala S. El-sayed | 147-154 |
| Optimizing Power Consumption in Cloud Using Task Consolidation |
PDF
|
| Reenu Deswal, Sambit Kumar Mishra, Bibhudutta Sahoo | 155-162 |
| Performance Analysis of Dual-Hop Relaying Networks with Nth Best-Path Selection over Rayleigh Fading Channel |
PDF
|
| M. Nivedha, S. Sukanya, S. Arunmozhi | 163-168 |
This work is licensed under a Creative Commons Attribution 3.0 License.
ISSN: 0974 – 9616