Issue | Title | |
Vol 6, No 6 (2014) | Analysis of MANET for Different Mobility Models using Four Ray Propagation Model | Abstract |
N. S. Samshette, A. D. Bhoi, Dr. R. D. Kharadkar | ||
Vol 4, No 12 (2012) | Analysis of Multi Dimensional Codes for OCDMA System | Abstract |
Shilpa Jindal, Dr.N. Gupta | ||
Vol 8, No 4 (2016) | Analysis of Quantum Key Distribution in LTE-A Network | Abstract |
N. Elamathi, S. Suganya | ||
Vol 7, No 7 (2015) | Analysis of Vertical Handover Based on RSS and QOS Parameter | Abstract |
Yamini Saini, Dr. Suresh Kumar, Deepak Sharma | ||
Vol 4, No 12 (2012) | Analysis of WPA in 802.11 Wireless Networks for Security | Abstract |
R. Dhaya, S. Vimal, Dr.R. Kanthavel | ||
Vol 5, No 12 (2013) | Analytical Study for Helicopter-Satellite Communications Systems | Abstract |
Emad. A. Elaty, Mohammed Abd-Elnaby, Sami A. El-Doli, Fathi E. Abd El-Samie | ||
Vol 9, No 3 (2017) | Android based Home Security System Using Bluetooth | Abstract |
J. Jeevitha, P. Beaulah Soundarabai | ||
Vol 3, No 12 (2011) | Anomaly Detection Using Feed Forward and Radial Basis Function Neural Network | Abstract |
D. Amutha Guka | ||
Vol 4, No 11 (2012) | Anomaly Detection using Spatio-Temporal Measures | Abstract |
Syed Azahad, R. Lakshmi Tulasi | ||
Vol 10, No 5 (2018) | Anonymous Is My Name -A Survey Paper on DarkWeb | Abstract |
B. R. Kavya, G. R. Vaishnavi, N. Sushmitha | ||
Vol 3, No 13 (2011) | Ant Agent Semantic Query Routing in Peer to Peer Networks | Abstract |
U.V. Arivazhagu, Dr.S. Srinivasan | ||
Vol 3, No 7 (2011) | Ant Based Route Optimization for FTP Protocol | Abstract |
Suvarna Joshi, Snehal Neharkar, Poonam Baviskar, Pramila Gaidhani, Varsha Koli | ||
Vol 4, No 15 (2012) | Ant Net Based Efficient Load Balance using ASA Routing Metric | Abstract |
K. Jeya Sudha, M. Santhiya | ||
Vol 2, No 8 (2010) | AODV-TP and Wormhole Attack Detection in MANET | Abstract |
Yogendra Kumar Jain, Bhavana Gupta | ||
Vol 2, No 8 (2010) | Application of Hybrid ARQ to Controller Area Networks | Abstract |
Ashish M. Ekatpure, Meenal R. Majge | ||
Vol 4, No 15 (2012) | Application of Logistic Equations for Generation of Symmetric Keys in Cryptography | Abstract |
C. Jeyamala, S. Selvameena, R. Subhasri, T.S.R. Rajanika | ||
Vol 3, No 8 (2011) | Application of Markovian in Point to Point Networks with Multiple Controllers Using Nash Equilibrium | Abstract |
K. Sivaselvan, Dr.C. Vijayalakshmi | ||
Vol 7, No 7 (2015) | Architectural Analysis for Improving Security using LBS with ATAM | Abstract |
Almas Begum, V. Cyrilraj | ||
Vol 7, No 6 (2015) | Authenticated Anonymous Secure Routing for Mobile Adhoc Networks | Abstract |
K. Geetha Nandhini, A. Anu Priya, C. Kiruthika, B. Deepa | ||
Vol 5, No 3 (2013) | Authenticating Ranked Keyword Search and Supporting Score Dynamics | Abstract |
S.P. Ramya, G. Alaiyarasi | ||
Vol 3, No 12 (2011) | Authentication Scheme for Multi-Server Environment | Abstract |
R. Ganesan, Dr. A. Arul Lawrence Selvakumar | ||
Vol 11, No 2 (2019) | Automatic Fault Detection in Transmission Lines using GSM Technology | Abstract |
S. Kamaleshwari, T. Nandhakumar, A. Selvakumar | ||
Vol 3, No 6 (2011) | Automatic River Pollutant Monitoring & Flood Detection Using Sensor Web | Abstract |
G. Srinivasan, L. Prabahar, B. Muthukrishnavinayagam | ||
Vol 11, No 1 (2019) | Balanced Routes for Efficiency in the Information Centric Networks | Abstract |
M. Hoseini, Sh. Jamali | ||
Vol 4, No 10 (2012): Special Issue | Base Station Coordinately Scheduled Transmission in A Downlink OFDMA Networks | Abstract |
E. Logambal, V. Vasantha | ||
251 - 275 of 963 Items | << < 6 7 8 9 10 11 12 13 14 15 > >> |
ISSN: 0974 – 9616