Archive

March 2014 (Volume 7)/ Issues 1

S.No Paper Title No. Pages Download
1 Enhanced Intelligent Discovery Mechanism to support Mobile Web Search Information Re..
S.Aarthi,N.Vijay
122-127 Click Here
2 EXTRACTING SECRET KEY FROM RECEIVED SIGNAL STRENGTH (RSS) MEASUREMENTS IN WIRELESS N..
R. Surya,S.V. Manikanthan
128-134 Click Here
3 HUMAN HEALTH MONITORING SYSTEM USING ANDROID MOBILE PHONE AND GPRS
Fiona.E.Josy,R. Allen Joseph
135-139 Click Here
4 INTERFERENCE ALIGNMENT TECHNIQUES FOR MIMO MULTICELL BASED ON RELAY INTERFERENCE BRO..
S.V.Manikanthan,D.Sugandhi
140-144 Click Here
5 Location Update Strategy For position based Routing In MANET’s
L.Selva Adaikala Germeni,K. Saminathan
145-148 Click Here
6 NOVEL PILOT ASSISTED SPECTRUM SENSING FOR OFDM SYSTEMS ON CLUSTERED DIFFERENTIAL ESD
S.V.Manikanthan,K.Pravina
149-153 Click Here
7 OUTLIER DETECTION THROUGH UNSUPERVISED APPROACH WITH holoentropy
N.Ganesa Moorthy,S.Nandhini Devi
154-158 Click Here
8 PERFORMANCE ANALYSIS OF QoS BASED DYNAMIC HANDOVER MECHANISM IN HIGH SPEED VEHICLES
S.Mayavady,D.Prabha
159-163 Click Here
9 Personal Identification Based on Retinal Blood Vessel Segmentation
Ramya.M,Sornalatha.M
164-168 Click Here
10 PRIVACY PROTECTION THROUGH UNOBSERVABLE SECURE ON-DEMAND ROUTING PROTOCOL FOR MANET
A.Arulmozhi,Narasimmalou
169-175 Click Here
11 Protection and Detection of Flood Attacks in Disruption Tolerant Networks
K.Aruna devi,R.Sasikala
176-180 Click Here
12 RENEWABLE ENERGY: EFFECTIVE USE OF SOLAR ENERGY BY INTELLIGENT BATTERY CHARGING TECHNIQUE
S.Sudharshanan,A.Anbalagan
181-188 Click Here
13 SECURING SPONTANEOUS WIRELESS ADHOC NETWORK CREATION WITH SECRET KEY TECHNIQUES
P.Siva sankar,K.Karpagalakshmi
189-194 Click Here
14 Socio-Technical Accordance Perspective For Software Implementation Correlation With ..
M.Gomathi,B.Bazeer Ahamed
195-200 Click Here
15 Time-Based Proxy-encryption for Secure Erasure Code Based Cloud Storage System
K.V.Mahalakshmi,S.Karthikeyan
201-206 Click Here
16 TRACING AND FILTERING INORGANIC TWEETS URLs IN TWITTER
K.V.Mahalakshmi, Padma M
207-210 Click Here
17 Zombie Based Attack Detection and Prevention in Web Applications
Saranya A,Kola Sujatha P,Kannan A
211-216 Click Here
18 Secure Transmission of Packets using EAACK in MANETs
K.Esther,K.Sathish,K.Balamurugan,A.Udhayakumar
217-224 Click Here
19 HARMFUL GAS DETECTION SYSTEM USING WIRELESS SENSOR NETWORKS
S.SUDHARSHANAN,C.BALASUNDAR
225-229 Click Here

Institutional Affiliates

Indexing Affiliates