| Issue | Title | |
| Vol 6, No 6 (2014) | Analysis of MANET for Different Mobility Models using Four Ray Propagation Model | Abstract |
| N. S. Samshette, A. D. Bhoi, Dr. R. D. Kharadkar | ||
| Vol 4, No 12 (2012) | Analysis of Multi Dimensional Codes for OCDMA System | Abstract |
| Shilpa Jindal, Dr.N. Gupta | ||
| Vol 8, No 4 (2016) | Analysis of Quantum Key Distribution in LTE-A Network | Abstract |
| N. Elamathi, S. Suganya | ||
| Vol 7, No 7 (2015) | Analysis of Vertical Handover Based on RSS and QOS Parameter | Abstract |
| Yamini Saini, Dr. Suresh Kumar, Deepak Sharma | ||
| Vol 4, No 12 (2012) | Analysis of WPA in 802.11 Wireless Networks for Security | Abstract |
| R. Dhaya, S. Vimal, Dr.R. Kanthavel | ||
| Vol 5, No 12 (2013) | Analytical Study for Helicopter-Satellite Communications Systems | Abstract |
| Emad. A. Elaty, Mohammed Abd-Elnaby, Sami A. El-Doli, Fathi E. Abd El-Samie | ||
| Vol 9, No 3 (2017) | Android based Home Security System Using Bluetooth | Abstract |
| J. Jeevitha, P. Beaulah Soundarabai | ||
| Vol 3, No 12 (2011) | Anomaly Detection Using Feed Forward and Radial Basis Function Neural Network | Abstract |
| D. Amutha Guka | ||
| Vol 4, No 11 (2012) | Anomaly Detection using Spatio-Temporal Measures | Abstract |
| Syed Azahad, R. Lakshmi Tulasi | ||
| Vol 10, No 5 (2018) | Anonymous Is My Name -A Survey Paper on DarkWeb | Abstract |
| B. R. Kavya, G. R. Vaishnavi, N. Sushmitha | ||
| Vol 3, No 13 (2011) | Ant Agent Semantic Query Routing in Peer to Peer Networks | Abstract |
| U.V. Arivazhagu, Dr.S. Srinivasan | ||
| Vol 3, No 7 (2011) | Ant Based Route Optimization for FTP Protocol | Abstract |
| Suvarna Joshi, Snehal Neharkar, Poonam Baviskar, Pramila Gaidhani, Varsha Koli | ||
| Vol 4, No 15 (2012) | Ant Net Based Efficient Load Balance using ASA Routing Metric | Abstract |
| K. Jeya Sudha, M. Santhiya | ||
| Vol 2, No 8 (2010) | AODV-TP and Wormhole Attack Detection in MANET | Abstract |
| Yogendra Kumar Jain, Bhavana Gupta | ||
| Vol 2, No 8 (2010) | Application of Hybrid ARQ to Controller Area Networks | Abstract |
| Ashish M. Ekatpure, Meenal R. Majge | ||
| Vol 4, No 15 (2012) | Application of Logistic Equations for Generation of Symmetric Keys in Cryptography | Abstract |
| C. Jeyamala, S. Selvameena, R. Subhasri, T.S.R. Rajanika | ||
| Vol 3, No 8 (2011) | Application of Markovian in Point to Point Networks with Multiple Controllers Using Nash Equilibrium | Abstract |
| K. Sivaselvan, Dr.C. Vijayalakshmi | ||
| Vol 7, No 7 (2015) | Architectural Analysis for Improving Security using LBS with ATAM | Abstract |
| Almas Begum, V. Cyrilraj | ||
| Vol 7, No 6 (2015) | Authenticated Anonymous Secure Routing for Mobile Adhoc Networks | Abstract |
| K. Geetha Nandhini, A. Anu Priya, C. Kiruthika, B. Deepa | ||
| Vol 5, No 3 (2013) | Authenticating Ranked Keyword Search and Supporting Score Dynamics | Abstract |
| S.P. Ramya, G. Alaiyarasi | ||
| Vol 3, No 12 (2011) | Authentication Scheme for Multi-Server Environment | Abstract |
| R. Ganesan, Dr. A. Arul Lawrence Selvakumar | ||
| Vol 11, No 2 (2019) | Automatic Fault Detection in Transmission Lines using GSM Technology | Abstract |
| S. Kamaleshwari, T. Nandhakumar, A. Selvakumar | ||
| Vol 3, No 6 (2011) | Automatic River Pollutant Monitoring & Flood Detection Using Sensor Web | Abstract |
| G. Srinivasan, L. Prabahar, B. Muthukrishnavinayagam | ||
| Vol 11, No 1 (2019) | Balanced Routes for Efficiency in the Information Centric Networks | Abstract |
| M. Hoseini, Sh. Jamali | ||
| Vol 4, No 10 (2012): Special Issue | Base Station Coordinately Scheduled Transmission in A Downlink OFDMA Networks | Abstract |
| E. Logambal, V. Vasantha | ||
| 251 - 275 of 963 Items | << < 6 7 8 9 10 11 12 13 14 15 > >> | |
ISSN: 0974 – 9616