Issue | Title | |
Vol 10, No 4 (2018) | Review of Viterbi Decoder and Its Adequacy in Digital Communication | Abstract |
Atul Deep Soni, Sunil Malviya, Dr. Neelesh Gupta | ||
Vol 7, No 5 (2015) | Revival of Node Failure in Wireless Sensor Networks Using E3D Algorithm | Abstract |
K. Ganapathi, R. Kalaivani Sri | ||
Vol 2, No 10 (2010) | Ring Resonator Based Compact Bandpass Filters for UWB Applications | Abstract |
K. Thirumalaivasan, R. Nakkeeran | ||
Vol 7, No 6 (2015) | Risk Conscious Easing of Routing Attacks for Ad-hoc Networks | Abstract |
C. Dhanasekaran, Dr. R.S. Ponmagal | ||
Vol 5, No 7 (2013) | Robust Location Aware Wormhole Detection Technique for Wireless Sensor Network | Abstract |
Ajay Jangra, Bhavana . | ||
Vol 2, No 10 (2010) | Role of Multi Agents in Wireless Sensor Network for Event Detection | Abstract |
G. Sundari, P.E. Sankaranarayanan | ||
Vol 2, No 9 (2010) | Role of Probabilistic Packet Marking Mechanism in Large Scale IP Trace Backs | Abstract |
K. Venkatesh Sharma, A.Lakshmi kanth, M. Dheeraj | ||
Vol 3, No 6 (2011) | Route Maintenance in Dynamic Source Routing Using Link Breakage Prediction Algorithm for Mobile Ad-hoc Networks | Abstract |
S. Rajeswari, J. Janet | ||
Vol 3, No 14 (2011) | Routing - An Ultimate Optimization in Mobile Adhoc Network | Abstract |
K.M. Mohamed Sudheer, Dr.K.R. Shankar Kumar | ||
Vol 3, No 11 (2011) | Routing Protocols for Ad Hoc Mobile Wireless Networks: A Comparative Study | Abstract |
Vishnu Kumar Sharma, Dr. Sarita Singh Bhadauria | ||
Vol 5, No 6 (2013) | Rural Development via Communication (Wire Architecture) | Abstract |
R. Maheswari, Dr.T.V.U. Kirankumar, S. Kannappan | ||
Vol 4, No 8 (2012) | Saving Energy in Mobile Devices with WLAN and Bluetooth Interfaces using Cooperative Clustering Network | Abstract |
B. RasinaBegum, R. Karthikeyan | ||
Vol 6, No 7 (2014) | Secure and Robust Localization in Wireless Network Protection | Abstract |
S. Jagadeesan | ||
Vol 8, No 5 (2016) | Secure and Scalable Sensor Data Access Network with Delay Tolerance | Abstract |
P. Saranya, Dr. R. S. Ponmagal | ||
Vol 7, No 4 (2015) | Secure Data Share In Drop Box Using Key-Aggregate Cryptosystem | Abstract |
E. Elamathi, Dr. ArokyRaju, K. Ravikumar | ||
Vol 7, No 3 (2015) | Secure Data Storage in Cloud with Decentralized Access Control Scheme and Anonymous Authentication | Abstract |
S. RamaLakshmi, V. Suganya, B. Saranya, V. Srinivasan | ||
Vol 4, No 12 (2012) | Secure Data Transmission in Wireless Sensor Networks using Randomized Dispersive Paths | Abstract |
Dhirajkumar Shelke, Pushkar Sathe, Omkar Sabane, Vinod Sawant | ||
Vol 5, No 11 (2013) | Secure Data Transmission Using Cloud Computing | Abstract |
Trinath Naralasetty, K. Eswar | ||
Vol 7, No 7 (2015) | Secure Deduplication with Reliable Convergent Key Management in Hybrid Cloud | Abstract |
M. Gomathi Pradeepa, S. Geetha | ||
Vol 8, No 3 (2016) | Secure Group Sharing in Dynamic Public Cloud Environment | Abstract |
R. Santhosh, M. Veeramanikandan | ||
Vol 7, No 7 (2015) | Secure Image Steganography Combined with DES Encryption | Abstract |
K. Veeramanikandan, P. Manjamadevi, K. Latha | ||
Vol 6, No 9 (2014) | Secure Information Distribution in Cloud Computing | Abstract |
C. Leena, A. Daison Raj, M. BalaAnand | ||
Vol 4, No 5 (2012) | Secure Key Distribution for Large and Dynamic Multicast Groups | Abstract |
G. Murali, G. Gurivi Reddy, Y. Srinivasulu, N. Priyanka | ||
Vol 4, No 12 (2012) | Secure Keying in Peer Network using Secret Sharing Technique | Abstract |
Y.M. Rajashri, D.K. Nayana | ||
Vol 10, No 2 (2018) | Secure Routing in Wireless Ad-hoc Network using ARD Mechanism and Elliptic Curve Routing Algorithm | Abstract |
C. Chandra Prabha, Dr. S. Krishnaveni | ||
776 - 800 of 945 Items | << < 27 28 29 30 31 32 33 34 35 36 > >> |
ISSN: 0974 – 9640