Table of Contents
Vol 2, No 11 (2010)
Open Access
Subscription Access
Articles
Deploying Modified Hash Based Message Authentication Code HMAC in MATLAB Using GUI Controls | ||
B. Sridevi, S. Rajaram | ||
Vol 2, No 11 (2010), Pagination: 437-443 | ||
ABSTRACT | PDF | Abstract Views: 265 | PDF Views: 3 |
A New Approach to Telugu Text Steganography by Shifting Inherent Vowel Signs | ||
Sravani Alameti, Sake Pothalaiah, K. Ashok Babu | ||
Vol 2, No 11 (2010), Pagination: 444-448 | ||
ABSTRACT | PDF | Abstract Views: 233 | PDF Views: 4 |
UDP Based Analysis of Ad Hoc on-Demand Distance Vector Protocol in MANET | ||
Annapurna Singh, Mishra Shailendra | ||
Vol 2, No 11 (2010), Pagination: 449-452 | ||
ABSTRACT | PDF | Abstract Views: 219 | PDF Views: 1 |
Design and Optimization of Multi-Band 3.1-4.8GHz VCO for UWB Communication System | ||
D. Ben Issa, M. Samet, A. Kachouri | ||
Vol 2, No 11 (2010), Pagination: 453-460 | ||
ABSTRACT | PDF | Abstract Views: 203 | PDF Views: 1 |
Performance Evaluation of MNEWQUE over Conventional AQM Schemes | ||
S. Sheeja, K. Kavitha | ||
Vol 2, No 11 (2010), Pagination: 461-465 | ||
ABSTRACT | PDF | Abstract Views: 203 | PDF Views: 1 |
Comparison of ARQ and Adaptive FEC Error Control Techniques in Wireless Sensor Networks | ||
M. R. Ebenezar Jebarani, T. Jayanthy | ||
Vol 2, No 11 (2010), Pagination: 466-470 | ||
ABSTRACT | PDF | Abstract Views: 300 | PDF Views: 3 |
An Optimized Global Synchronization on SDDCN | ||
T. Santha, M. Sharanya | ||
Vol 2, No 11 (2010), Pagination: 471-475 | ||
ABSTRACT | PDF | Abstract Views: 230 | PDF Views: 1 |
Providing Usage of Electronic Resources and Internet Services Offered By Tamil Nadu the Self Finance Engineering Colleges:With Special Reference to Villupuram District | ||
V. Ramesh Babu, M. Nagarajan | ||
Vol 2, No 11 (2010), Pagination: 476-480 | ||
ABSTRACT | PDF | Abstract Views: 229 | PDF Views: 3 |
A Paper on Simulation Model for Evaluating the Performance of ATM Network | ||
Neha, Neeru Malhotra | ||
Vol 2, No 11 (2010), Pagination: 481-486 | ||
ABSTRACT | PDF | Abstract Views: 240 | PDF Views: 3 |
A Novel Approach for Detecting and Preventing Cross Site Scripting and HTTP Parameter Pollution Using Reverse Proxy | ||
K. Syama Sundara Rao, V. Saritha, G. Lalitha Kumari, Y. Surekha | ||
Vol 2, No 11 (2010), Pagination: 487-491 | ||
ABSTRACT | PDF | Abstract Views: 232 | PDF Views: 3 |
Study and Investigation of Performance of Reactive and Proactive Protocols of MANET on the Basis of CBR and TCP Traffic Pattern | ||
Vikas Singla, Parveen Kakkar, Dinesh Kumar | ||
Vol 2, No 11 (2010), Pagination: 492-499 | ||
ABSTRACT | PDF | Abstract Views: 211 | PDF Views: 7 |
Implementation and Investigation of AES, DES and Triple DES to Secure MPLS Network | ||
K. Gurpreet, K. Dinesh | ||
Vol 2, No 11 (2010), Pagination: 500-506 | ||
ABSTRACT | PDF | Abstract Views: 215 | PDF Views: 1 |
Security-Enhanced Dynamic Routing with Cryptographic Techniques | ||
V. Soumya, M. A. Jabbar, T. Nagalakshmi | ||
Vol 2, No 11 (2010), Pagination: 507-512 | ||
ABSTRACT | PDF | Abstract Views: 226 | PDF Views: 3 |