Vol. 5 No. 10 (2016)
Published:
2017-12-30
Articles
-
-
-
Articles
A Novel approach to prevent launching of attacks in MANETS using Bait tracing setup
194 227 -
Articles
Comparative Analysis of Soft Computing Based Load Balancing Techniques in Cloud Environment: A Review
233 213 -
-
Articles
Optimized Secure Image Transmission approach Lossless Secret Image Recovery Based on Secret Fragmented Mosaic Images
235 265 -
-
-
-
-
Articles
An Enhanced Secure Image Cryptography based on RC6 and RSA to Minimize Entropy and Improve Correlation
195 233 -
-
-
-
-
-
-
-
Articles
Privacy Preserving in Data Mining to Protect Privileged information in Ad-hoc Network
210 229 -
-
-
-
-
-
Articles
Scheduling Virtual Machines across Data Centres in accordance to availability of Renewable Sources of Energy
226 235 -
-
Articles
Modelling and Design Analysis for Nonlinear 3D Dynamic Simulation of Triangular Microspring for MEMS based SAM
219 256 -
-
-
Articles
Enhancing the Security of Data Using DES Algorithm along with Substitution Technique
241 316 -
-
-
-
-
Articles
Pulsed Latches Methodology to Attain Reduced Power and Area Based On Shift Register
217 274 -
Articles
Optimized Test compression bandwidth management for Ultra-large-Scale System-on-Chip Architectures performing Scan Test Bandwidth Management
181 217 -
-
Articles
A Study on Performance Modelling and Analysis of Network on Chip under M-Port N-Tree Bursty Traffic
200 222 -
-
Articles
Stochastic Modeling for Analyzing Scalability Impact of Lottery Scheduling using Proportion Reformation
236 244 -
-
Articles
Implementation of Automatic Retina Exudates Segmentation Algorithm for Early Detection with Low Computational Time
122 193 -
-
-
Articles
An Enhanced Light-weight Proactive Source Routing Protocol using DIFT-BFHS for MANET
137 206 -
Articles
Offline Handwriting Character Recognition (for use of medical purpose) Using Neural Network
146 399 -
Articles
A Review on Prediction of User Action Interpretation for Online Content Optimization
152 187 -
-
-
-
Articles
Black Hole Attack Detection Using HlA with Optimized Link State Routing Protocol In Wanet
177 215 -
-
-
-
-
-
-
-
-
-
Articles
Critical Evaluation of Prince2 and Agile Project Management Methodologies for a complex project
1758 1893 -
-
Articles
Multilevel and Biometric-Graphical Secure Authentication System Using Pattern Matching and Gene Based Data Extraction
128 181 -
Articles
Trusted and Energy Efficient Routing Protocol for Heterogeneous Wireless Sensor Networks
172 203 -
-
-
Articles
Performance of Multi Server Validation and Key Association with User Protection in Network Security
165 214 -