ISSN: 0975–3397 |
Article # |
Article Title & Authors (Volume 4 Number 02 Feb 2012) |
Page |
1. |
Cheapest Paths in Multi-Interface Networks A Distributed Approach Harish Muthuveeran Shanmugam, Anjana Prasad
Abstract | PDF |
114-152 |
2. |
Developing a Mobile Adaptive Test (MAT) in an M-Learning Environment for Android Based 3G Mobile Devices Shanmugapriya M, Dr.Tamilarasi A
Abstract | PDF |
153-161 |
3. |
Cluster level optimization of residual energy consumption in wireless sensor networks for lifetime enhancement Lalit Saraswat, Dr. Sachin Kumar
Abstract | PDF |
162-165 |
4. |
Intelligent Farm Expert Multi Agent System Mrs. Anita Gutta, Dr. Priti Srinivas Sajja
Abstract | PDF |
166-175 |
5. |
Fast Method for Two-dimensional Renyi’s Entropy-based Thresholding Adiljan Yimit, Yoshihiro HAGIHARA, Tasuku MIYOSHI, Yukari HAGIHARA, Qinargul Yimit
Abstract | PDF |
176-183 |
6. |
Review of Impulse Noise Reduction Techniques Manohar Annappa Koli
Abstract | PDF |
184-196 |
7. |
Robust Algorithm for Impulse Noise Detection Manohar Annappa Koli
Abstract | PDF |
197-203 |
8. |
Fault Detection of Reachability Testing with Game Theoretic Approach S. Preetha and Dr.M. Punithavalli
Abstract | PDF |
204-208 |
9. |
APPLYING DYNAMIC DEPENDENCY INJECTION TOWARDS TEST CASE REDUCTION ON DISTRUBUTED SPATIAL DATA MANAGEMENT Dr.Vivekanandan, Keerthilakshmi Gopal
Abstract | PDF |
209-217 |
10. |
Harnessing Genetic Algorithm for Vertex Cover Problem Harsh Bhasin, Geetanjli Ahuja
Abstract | PDF |
218-223 |
11. |
Rapid and Proactive Approach on Exploration of Database Vulnerabilities S. Ramachandran, A. Ramachandran
Abstract | PDF |
224-234 |
12. |
SECURING WMN USING HONEYPOT TECHNIQUE Priyanka Gupta, Paramjeet Rawat, Suraj Malik
Abstract | PDF |
235-238 |
13. |
Performability Measures Of Multiple Path Multiprocessor Interconnection Networks Dr. Sudarson Jena, G.Sri Sowmya, P.Radhika
Abstract | PDF |
239-247 |
14. |
Performance Evaluation of Reactive, Proactive and Hybrid Routing Protocols in MANET Manijeh Keshtgary and Vahide Babaiyan
Abstract | PDF |
248-254 |
15. |
Task Scheduling Algorithm to Reduce the Number of Processors using Merge Conditions Tae-Young Choe
Abstract | PDF |
255-266 |
16. |
On Some Security Issues in Pervasive Computing - Light Weight Cryptography Rukma Rekha N, PrasadBabu M.S
Abstract | PDF |
267-273 |
17. |
Cooperative Communications: A New Trend in the Wireless World Gordhan Das Menghwar, Akhtar Ali Jalbani, Mukhtiar Memon, Mansoor Hyder
Abstract | PDF |
274-280 |
18. |
OUTDOOR PROPAGATION MODELS A LITERATURE REVIEW Sumit Joshi
Abstract | PDF |
281-291 |
19. |
AN EFFICIENT APPROACH FOR ROUTING IN WIRELESS AD HOC NETWORK USING ARTIFICIAL INTELLIGENCE Vishal Sharma, Amitoj Soni, Sodhi Gunjit Singh, Takshi Gupta
Abstract | PDF |
292-299 |
20. |
Modeling of the Systems of Piloting In Training Institutions A. ATMANI, M. ABID, H. LASRI, B.BENSASSI
Abstract | PDF |
300-306 |
21. |
A PATTERN RECOGNITION LEXI SEARCH APPROACH TO TRAVELLING SALESMAN PROBLEM WITH ADDITIONAL CONSTRAINTS
Dr. K. CHENDRA SEKHAR, Dr.U.BALAKRISHNA, Dr. E. PURUSHOTHAM, C.SURESH BABU, Dr. M. SUNDARA MURTHY
Abstract | PDF |
307-320 |
22. |
A Bit Level Session Based Encryption Technique to Enhance Information Security
Manas Paul, Jyotsna Kumar Mandal
Abstract | PDF |
321-330 |
To view the PDF use Adobe Acrobat 6.0 or more |