Volume: 3 | Issue: 02

Published: 2014-02-28 00:00:00


An Optimized Localization Algorithm against Node Replication Attacks in Wireless Sensor Networks

R.M.Sinthiya, J.Vijipriya
International Journal of Engineering and Computer Science  |  Published: 28 February 2014
Full text PDF

An Immune Inspired Behavior-based MultiAgent Model for Detecting Network Clients’ Misbehavior

Elnaz B. Noeparast, Reza Ravanmehr, Ramin Nasiri
International Journal of Engineering and Computer Science  |  Published: 28 February 2014
Full text PDF

RECEIVER SYNCHRONIZATION FOR DAB WITH TRANSMISSION MODE III

Baliwan Preeti
International Journal of Engineering and Computer Science  |  Published: 28 February 2014
Full text PDF

Network Security: Virtual Private Network

Sonika, Monika, Sonal
International Journal of Engineering and Computer Science  |  Published: 28 February 2014
Full text PDF

An Adapted Group Method of Data Handling for Abrupt Data Analysis

Vikas Lamba, Sunita Lamba
International Journal of Engineering and Computer Science  |  Published: 28 February 2014
Full text PDF

EFFICIENT DATA MINING FOR MINING CLASSIFICATION USING NEURAL NETWORK

Mrs.Maruthaveni.R, Mrs.Renuka Devi.S.V
International Journal of Engineering and Computer Science  |  Published: 28 February 2014
Full text PDF

Physical Security: A Biometric Approach

Preeti, Rajni
International Journal of Engineering and Computer Science  |  Published: 28 February 2014
Full text PDF

Computer Viruses and Challenges for Anti-virus Industry

Deepak Kumar, Narender Kumar, Aditya K
International Journal of Engineering and Computer Science  |  Published: 28 February 2014
Full text PDF

Network Intrusion Detection Using Hybrid Simplified Swarm Optimization and Random Forest Algorithm on Nsl-Kdd Dataset

S. Revathi , Dr. A. Malathi
International Journal of Engineering and Computer Science  |  Published: 28 February 2014
Full text PDF

Review On: Object Detection and Tracking To Implement Human- Machine Interaction

Neha Nirantar , Prajakta Panse , Omkar Rahane , Saurabh Satralkar , Prof.Payal Kulkarni
International Journal of Engineering and Computer Science  |  Published: 28 February 2014
Full text PDF

Security issues in Voice over IP: A Review

Rajni , Preeti , Ritu Baniwal
International Journal of Engineering and Computer Science  |  Published: 28 February 2014
Full text PDF

Detection and Prevention of Black Hole Attack To Improve Network Performance By Using Fidelity and ECARP Algorithms

Pankaj Solanki, Deepak Shuhkla
International Journal of Engineering and Computer Science  |  Published: 28 February 2014
Full text PDF

Compressive Strength of Concrete containing Fly Ash, Copper Slag, Silica Fume and Fibres - Prediction

N. Sakthieswaran, K. Ganesan
International Journal of Engineering and Computer Science  |  Published: 28 February 2014
Full text PDF

CACHING DATA THROUGH PULL BASED APPROCHES IN WIRELESS NETWORKS

S. Mahalakshmi, Dr. M. Kamarajan
International Journal of Engineering and Computer Science  |  Published: 28 February 2014
Full text PDF

A Survey on Visible Light Communication

Jacqueline J.George, Mohammed Hayder Mustafa, Nada Mahjoub Osman, Nuha Hashim Ahmed, Da’ad Mohammed Hamed
International Journal of Engineering and Computer Science  |  Published: 28 February 2014
Full text PDF

Design of an efficient Weighted Trust Evaluation System for Wireless Sensor Networks

D.Ramya, Mr.P.Basith
International Journal of Engineering and Computer Science  |  Published: 28 February 2014
Full text PDF

A New BBBC based LEACH Algorithm for Energy Efficient Routing in WSN

Archana, Sukhjinder kaur
International Journal of Engineering and Computer Science  |  Published: 28 February 2014
Full text PDF

Authentication of System using Text, Image and Audio

Vikash Kumar Agarwal, Bhaskra Nand, Lalitendu khandagiri
International Journal of Engineering and Computer Science  |  Published: 28 February 2014
Full text PDF

A Review of Various Trust Management Models for Cloud Computing Storage Systems

Mr. Anup R. Nimje, Prof. V.T.Gaikwad, Prof. H.N.Datir
International Journal of Engineering and Computer Science  |  Published: 28 February 2014
Full text PDF

ATM Technology Prospects: A Review

Deepak Kumar, Aditya Kumar, Neha Choudhary
International Journal of Engineering and Computer Science  |  Published: 28 February 2014
Full text PDF

Secure and efficient application of MANET using Identity Based cryptography combined with Visual cryptography technique

R. K. Sharma, Neeraj Kishore, Parijat Das
International Journal of Engineering and Computer Science  |  Published: 28 February 2014
Full text PDF

EFFICIENT USER REVOCATION FOR DYNAMIC GROUPS IN THE CLOUD

Kanya Devi J, Kanimozhi S
International Journal of Engineering and Computer Science  |  Published: 28 February 2014
Full text PDF

Shape Analysis of the Quintic Trigonometric Bèzier curve with two shape parameter

Mridula Dube, Bharti Yadav
International Journal of Engineering and Computer Science  |  Published: 28 February 2014
Full text PDF

Flash Drive Communication Using Embedded System

Singh Harpreet , Kaur Kamaldeep
International Journal of Engineering and Computer Science  |  Published: 28 February 2014
Full text PDF

Bagged Ensemble Classifiers for Sentiment Classification of Movie Reviews

M. Govindarajan
International Journal of Engineering and Computer Science  |  Published: 28 February 2014
Full text PDF

Virtual Touch Screen Using Microsoft Kinect

Ekta Parwani, Apeksha Pawar, Chirag Ajwani, Prof.Govind Pole
International Journal of Engineering and Computer Science  |  Published: 28 February 2014
Full text PDF

Improving Security Authentication of IEEE 802.16 WiMax with New Public key algorithm

Prakash Kuppuswamy, Sikandhar Shah
International Journal of Engineering and Computer Science  |  Published: 28 February 2014
Full text PDF

Energy Efficient Routing in MANET: A Survey

Shruti Verma, Pushpa Singh
International Journal of Engineering and Computer Science  |  Published: 28 February 2014
Full text PDF

An Ethernet Based Monitoring and Controlling Of Home Appliances Using Rabbit Processor

Patil Ketan C , Patil Rohan A , Musale Shrikant K , Prof. D.B. Rane
International Journal of Engineering and Computer Science  |  Published: 28 February 2014
Full text PDF

Cloud Computing Security using Federated Key Management

Dr. Atulbhai Patel, Kalpit Soni
International Journal of Engineering and Computer Science  |  Published: 28 February 2014
Full text PDF

ENHANCING UNSUPERVISED APPROACH FOR PERSON NAME BIPOLARIZATION

Sathya D, Kaladevi P
International Journal of Engineering and Computer Science  |  Published: 28 February 2014
Full text PDF

A Efficient Approach Used for Identifying Distraction of statue Image

C.Kanimozhi, Dr.A.Gnanabaskaran
International Journal of Engineering and Computer Science  |  Published: 28 February 2014
Full text PDF

Virtual Network Computing- A Technique to Control Android Phones Remotely

Priyadarshani Raskar, Sejal Patel, Pragati Badhe, Prof. Archana Lomte
International Journal of Engineering and Computer Science  |  Published: 28 February 2014
Full text PDF

DATA REPORTING OF TRACING EVENTS BY EVENT DRIVEN INCIDENCE MATRIX

S.Keerthana, Mr.P.Sathishkumar M.E
International Journal of Engineering and Computer Science  |  Published: 28 February 2014
Full text PDF

Mobile Network Area Selection and Analysis of 3G GSM Network Site

Ms.Neetu Sharma, Ms. Neelkamal Chaudhary
International Journal of Engineering and Computer Science  |  Published: 28 February 2014
Full text PDF

ZONE BASED ANALYSIS OF ZRP UNDER VARYING MOBILITY AND TRANSMISSION RANGE IN MANETs

Anil Manohar Dogra, Rajvir singh
International Journal of Engineering and Computer Science  |  Published: 28 February 2014
Full text PDF

← View all issues

Author Resources