Table of Contents
Articles
| An Enhanced Speech Based Vmail for Visually Impaired People |
PDF
|
| C. Leena, P. Dhivya, S. Hemalatha, M. Keerthana | 1-5 |
| Removal of Malicious Nodes Launching Blackhole Attack in MANETs |
PDF
|
| V. Ramya, S. Mylsamy | 6-10 |
| Energy Aware Span Routing Protocol in Mobile Ad Hoc Networks |
PDF
|
| S. Santhi Priya, H. Muthu Krishnan | 11-16 |
| On-Demand Clustering Routing Protocol in Ant-Based Algorithm Using WCDS for MANET |
PDF
|
| S. Preethi, K. Logeswaran | 17-22 |
| Detection of Malicious Nodes in MANETs using Analytical Model |
PDF
|
| G. Srinidhi, K. Sentamilselvan | 23-28 |
| Detection and Defense Scheme against Selfish Nodes in MAC-Layer |
PDF
|
| V. Shanmathi, C. Poongodi | 29-34 |
| Opportunistic Cluster Based Broadcasting Using Selective Reliable Broadcast in VANET |
PDF
|
| B. Vidhya, M. Ramalingam | 35-40 |
| Fire-Alarming Application Model for the Internet of Things |
PDF
|
| Dina Darwish | 41-52 |
| A Critical Review on the Implementation of MIMO with CSIT and CSIR |
PDF
|
| Dr Seetaiah Kilaru, B. Rohith Kumar, S. Jaipal Reddy, Ch. Revanth, M. Sai Greeshma | 53-57 |
This work is licensed under a Creative Commons Attribution 3.0 License.
ISSN: 0974 – 9640