Vol 2, No 11 (2010)

Table of Contents

Vol 2, No 11 (2010)

Open Access Open Access  Restricted Access Subscription Access

Articles

Deploying Modified Hash Based Message Authentication Code HMAC in MATLAB Using GUI Controls
B. Sridevi, S. Rajaram
 Vol 2, No 11 (2010), Pagination: 437-443
ABSTRACT |  PDF     Abstract Views: 265  |  PDF Views: 3
A New Approach to Telugu Text Steganography by Shifting Inherent Vowel Signs
Sravani Alameti, Sake Pothalaiah, K. Ashok Babu
 Vol 2, No 11 (2010), Pagination: 444-448
ABSTRACT |  PDF     Abstract Views: 233  |  PDF Views: 4
UDP Based Analysis of Ad Hoc on-Demand Distance Vector Protocol in MANET
Annapurna Singh, Mishra Shailendra
 Vol 2, No 11 (2010), Pagination: 449-452
ABSTRACT |  PDF     Abstract Views: 219  |  PDF Views: 1
Design and Optimization of Multi-Band 3.1-4.8GHz VCO for UWB Communication System
D. Ben Issa, M. Samet, A. Kachouri
 Vol 2, No 11 (2010), Pagination: 453-460
ABSTRACT |  PDF     Abstract Views: 203  |  PDF Views: 1
Performance Evaluation of MNEWQUE over Conventional AQM Schemes
S. Sheeja, K. Kavitha
 Vol 2, No 11 (2010), Pagination: 461-465
ABSTRACT |  PDF     Abstract Views: 203  |  PDF Views: 1
Comparison of ARQ and Adaptive FEC Error Control Techniques in Wireless Sensor Networks
M. R. Ebenezar Jebarani, T. Jayanthy
 Vol 2, No 11 (2010), Pagination: 466-470
ABSTRACT |  PDF     Abstract Views: 300  |  PDF Views: 3
An Optimized Global Synchronization on SDDCN
T. Santha, M. Sharanya
 Vol 2, No 11 (2010), Pagination: 471-475
ABSTRACT |  PDF     Abstract Views: 230  |  PDF Views: 1
Providing Usage of Electronic Resources and Internet Services Offered By Tamil Nadu the Self Finance Engineering Colleges:With Special Reference to Villupuram District
V. Ramesh Babu, M. Nagarajan
 Vol 2, No 11 (2010), Pagination: 476-480
ABSTRACT |  PDF     Abstract Views: 229  |  PDF Views: 3
A Paper on Simulation Model for Evaluating the Performance of ATM Network
Neha, Neeru Malhotra
 Vol 2, No 11 (2010), Pagination: 481-486
ABSTRACT |  PDF     Abstract Views: 240  |  PDF Views: 3
A Novel Approach for Detecting and Preventing Cross Site Scripting and HTTP Parameter Pollution Using Reverse Proxy
K. Syama Sundara Rao, V. Saritha, G. Lalitha Kumari, Y. Surekha
 Vol 2, No 11 (2010), Pagination: 487-491
ABSTRACT |  PDF     Abstract Views: 232  |  PDF Views: 3
Study and Investigation of Performance of Reactive and Proactive Protocols of MANET on the Basis of CBR and TCP Traffic Pattern
Vikas Singla, Parveen Kakkar, Dinesh Kumar
 Vol 2, No 11 (2010), Pagination: 492-499
ABSTRACT |  PDF     Abstract Views: 211  |  PDF Views: 7
Implementation and Investigation of AES, DES and Triple DES to Secure MPLS Network
K. Gurpreet, K. Dinesh
 Vol 2, No 11 (2010), Pagination: 500-506
ABSTRACT |  PDF     Abstract Views: 215  |  PDF Views: 1
Security-Enhanced Dynamic Routing with Cryptographic Techniques
V. Soumya, M. A. Jabbar, T. Nagalakshmi
 Vol 2, No 11 (2010), Pagination: 507-512
ABSTRACT |  PDF     Abstract Views: 226  |  PDF Views: 3