Issue | Title | |
Vol 3, No 13 (2011) | An Improved LEACH Protocol with Fuzzy Logic Technique | Abstract |
J. Rathi, G. Rajendran | ||
Vol 8, No 1 (2016) | An Improved Technique of Mobile BEEM Protocol by using Token Bucket Algorithm to Enhance the Performance of Wireless Sensor | Abstract |
Harpreet Kaur, Neetu Gupta | ||
Vol 4, No 4 (2012) | An Improving Security of Randomized Arithmetic Code with RPB Techniques | Abstract |
Nirmal J. Mangaly, Iwin Joseph Thanakumar | ||
Vol 6, No 3 (2014) | An Instantaneous Power Saving Method in Ship Detection with Wireless Sensor Network | Abstract |
R. Ravichandran, N. Meena | ||
Vol 10, No 2 (2018) | An Investigation Analysis of PV-System Using Solar Reconfigurable Converter Fed BLDC Motor | Abstract |
S. Kowsalya, M. Rajalakshmi, P. Selvaraj, S. Soundarrajan, D. Shanmugavel | ||
Vol 1, No 3 (2009) | An Investigation of 2 n Direction Geographical Traceback Using Simulation of IP Traceback Strategies | Abstract |
S. Karthik, V. P. Arunachalam, T. Ravichandran | ||
Vol 4, No 14 (2012) | An Optimal Service Pricing for a Cloud Resource Management Techniques in Economic Grid Environments | Abstract |
A. Vijaya, P. Selvi | ||
Vol 3, No 11 (2011) | An Optimal Wake–up Scheduling Algorithm for Minimizing Energy Consumption While Limiting Maximum Delay in Mesh Sensor Network | Abstract |
P. Karthikeyan | ||
Vol 6, No 2 (2014) | An Optimized and Secured VPN with Web Service | Abstract |
A. Balasubramanian, A. Hemanth Kumar, R. Prasanna Venkatesan | ||
Vol 2, No 11 (2010) | An Optimized Global Synchronization on SDDCN | Abstract |
T. Santha, M. Sharanya | ||
Vol 5, No 7 (2013) | An Overview of IEEE 802.11ac:Gigabit Wireless LAN | Abstract |
Prajakta Sandeep Jadhav | ||
Vol 3, No 1 (2011) | An Overview of Strategy Based Approaches in Combating Intrusion and Threats | Abstract |
C. Manusankar, K. Ayyappadas, T. Rajendran, S Karthik | ||
Vol 7, No 8 (2015) | Analysis and Impacts on Dynamic Load Balancing Techniques in Networks | Abstract |
N. Baskar, A. D. Bharath | ||
Vol 5, No 8 (2013) | Analysis and Implementation of Optimized Image Encryption Algorithm Using Bhramgupta-Bhaskara Equation | Abstract |
Sanjay Chaudhari, Deepak Dembla | ||
Vol 1, No 4 (2009) | Analysis of Air Core Index Guided Photonic Crystal Fiber | Abstract |
S. Revathi, N. Amutha Prabha, S. K. Sudheer, P. Prabu | ||
Vol 2, No 4 (2010) | Analysis of Delay Performance Techniques on Multi-Hop Wireless Networks | Abstract |
R. Vediyappan, S. Prabhu, M. Gowthaman, C. S. Dhanabalan, Senthil Murugan | ||
Vol 3, No 11 (2011) | Analysis of Flow Correlation Attacks in Anonymity Networks against Passive Logging Attacks | Abstract |
S. G. Shahidha Taj | ||
Vol 6, No 6 (2014) | Analysis of MANET for Different Mobility Models Using Four Ray Propagation Model | Abstract |
N. S. Samshette, A. D. Bhoi, R. D. Kharadkar | ||
Vol 4, No 12 (2012) | Analysis of Multi Dimensional Codes for OCDMA System | Abstract |
Shilpa Jindal, N. Gupta | ||
Vol 8, No 4 (2016) | Analysis of Quantum Key Distribution in LTE-A Network | Abstract |
N. Elamathi, S. Suganya | ||
Vol 7, No 7 (2015) | Analysis of Vertical Handover Based on RSS and QOS Parameter | Abstract |
Yamini Saini, Suresh Kumar, Deepak Sharma | ||
Vol 4, No 12 (2012) | Analysis of WPA in 802.11 Wireless Networks for Security | Abstract |
R. Dhaya, S. Vimal, R. Kanthavel | ||
Vol 5, No 12 (2013) | Analytical Study for Helicopter-Satellite Communications Systems | Abstract |
Emad. A. Elaty, Abd-Elnaby Mohammed, Sami A. El-Doli, Fathi E. Abd El-Samie | ||
Vol 9, No 3 (2017) | Android Based Home Security System Using Bluetooth | Abstract |
J. Jeevitha, P. Beaulah Soundarabai | ||
Vol 3, No 12 (2011) | Anomaly Detection Using Feed Forward and Radial Basis Function Neural Network | Abstract |
D. Amutha Guka | ||
226 - 250 of 922 Items | First Previous 5 6 7 8 9 10 11 12 13 14 Next Last |
Browse Title Index
Scroll