Issue | Title | |
Vol 3, No 3 (2011) | Impact of Varying Node Mobility on Performance of Mobile Ad hoc Networks | Abstract |
Sanjeev Kumar, Yogesh Chaba | ||
Vol 5, No 7 (2013) | Impairment-Aware Provisioning Algorithm in Optical Networks with Regeneration | Abstract |
S. Prabhavathi, V. Saminadan | ||
Vol 10, No 7 (2018) | Impasse Notifier | Abstract |
P. Chithiran, G. Dhanabalan, N. Mekala, R. Sumithra, K. Murugan | ||
Vol 5, No 8 (2013) | Implement to Increase the Safety of Railway Vehicles with Real Time Warning Facility | Abstract |
Tarun Dhar Diwan, Shikha Mishra, Shubhra Tiwari | ||
Vol 2, No 11 (2010) | Implementation and Investigation of AES, DES and Triple DES to Secure MPLS Network | Abstract |
K. Gurpreet, K. Dinesh | ||
Vol 11, No 4 (2019) | Implementation of DNA Cryptosystem using Public and Private Key Cryptography | Abstract |
Manoj Kumar Pandey, Preeti Tiwari | ||
Vol 5, No 8 (2013) | Implementation of EESCP Protocol in Mobile Adhoc Networks | Abstract |
P. Paruthi Ilam Vazhuthi, S. Parthiban, V. Thiyagarajan | ||
Vol 8, No 4 (2016) | Implementation of High Speed Secure Communication Between Multiple FPGA Systems Using RTOS | Abstract |
G. Snehalatha | ||
Vol 2, No 3 (2010) | Implementation of Hybrid ARQ | Abstract |
Meenal R. Majge, Achala M. Deshmukh | ||
Vol 4, No 14 (2012) | Implementation of Layer Cluster Based Routing (LCR) Using Ad Hoc On-Demand Multipath Distance Vector (AOMDV) | Abstract |
N. Nithya, R. Maruthaveni | ||
Vol 10, No 2 (2018) | Implementation of Optimised Power Sharing during Heavy Demands Energy Recording Cum Control System | Abstract |
S. Vivek, G. Saravanakumar | ||
Vol 8, No 5 (2016) | Implementation of Optimized Clustering using Genetic Algorithm in Wireless Sensor Network | Abstract |
P. Jenis, P. K. Poonguzhali, M. Jeeva Jebakani | ||
Vol 2, No 10 (2010) | Implementation of Performance Evaluation Methodologies for the Ad-Hoc on-Demand Distance Vector Routing Protocols | Abstract |
Andhe Dharani, Chandra Sekhar, Aniruddha Biswas | ||
Vol 8, No 7 (2016) | Implementation of Reliable Routing to Prevent Inter Hop Verification in Wireless Sensor Network Using Onion Protocol | Abstract |
G. Pradeepa, D. Nivedha, M. Nandini | ||
Vol 1, No 8 (2009) | Implementation of Security Package for Data Integrity with Various Hash Algorithms | Abstract |
B. Sridevi, N. SureshKumar | ||
Vol 2, No 8 (2010) | Implementation of Semisoft Handover in Multicarrier Broadband Systems for Low and High Data Rates | Abstract |
S. Balaji, N. V. Suneel Kumar, R. Santhakumar, T. Velmurugan, Tauseef Ahmed Shaik | ||
Vol 6, No 7 (2014) | Implementation of TCP/IP Using pSOS | Abstract |
M. Meena | ||
Vol 3, No 7 (2011) | Implementation of VoIP Using Session Initiation Protocol | Abstract |
G. Appala Naidu, P. Chandrasekhar, K. Srinivas, Anwar Basha Pattan | ||
Vol 1, No 3 (2009) | Implementation of WAP Gateway Technologies through Wireless Communication | Abstract |
K. Muruganadam, R. Rajesh | ||
Vol 3, No 5 (2011) | Implementation of XTEA in FPGA to Resolve the Attacks on TEA | Abstract |
M. Manjupriya, S. Senthil Kumar | ||
Vol 5, No 4 (2013) | Implementing ABSM Protocol for VANET | Abstract |
M. S. Bagavathiammal, P. Sivaraman | ||
Vol 4, No 8 (2012) | Implementing ACERL TCP in Wireless Environment using Adaptive Retransmission | Abstract |
Ashwini A. Jewalikar, Amar R. Buchade | ||
Vol 7, No 3 (2015) | Implementing the Information Security using Factors of Number | Abstract |
Gopinath Mukherjee, Pranam Paul | ||
Vol 7, No 2 (2015) | Implementing the Information Security Using Number System | Abstract |
Moinak Chowdhury, Pranam Paul | ||
Vol 4, No 3 (2012) | Implicit Password Authentication System | Abstract |
A. Pandian, J. Venkatasubramanian, K. Balaji | ||
501 - 525 of 922 Items | First Previous 16 17 18 19 20 21 22 23 24 25 Next Last |
Browse Title Index
Scroll