Issue | Title | |
Vol 5, No 1 (2013) | Performance of Wilkinson Power Divider with Microstrip Electromagnetic Bandgap | Abstract |
Naladala Keerthi, T. Venkata Rama Krishna, Tummala Ranga Babu | ||
Vol 3, No 11 (2011) | Performance Optimization for Mobile Environments | Abstract |
D. Vaishnavi, S. G. Santhi, K. Venkatachalapathy | ||
Vol 8, No 4 (2016) | Poisson Arrivals See Time Averages (PASTA) for Channel Modeling in Wireless Sensor Networks | Abstract |
Kranti M. Kamble, Achala Deshmukh | ||
Vol 6, No 5 (2014) | Power Conservation Target Tracking in Sensor Network Using Sleep Scheduling | Abstract |
S. Sathis Kumar, A. Suresh Kumar | ||
Vol 11, No 2 (2019) | Power Loss Reduction in Distribution Network by Using Particle Swarm Optimization | Abstract |
S. Sathies Kumar, M. Kalidasan, T. Guna Sekar, S. Dinesh Kumar | ||
Vol 11, No 2 (2019) | Power Quality Improvement and PV Power Injection by Using STATCOM with ANN and ANFIS | Abstract |
M. R. Mohanraj, J. Pavalam, P. Dhamayanthi, R. Kowsalya, G. Manikandan, K. M. Arunkumar | ||
Vol 1, No 5 (2009) | Pre-Fetching in Web Cache Cluster | Abstract |
J. S. Jayasudha | ||
Vol 5, No 3 (2013) | Preventing Denial of Service Attack in Multicast Authentication | Abstract |
S. Geerthik, T. P. Anish | ||
Vol 4, No 3 (2012) | Prevention of Sybil Attack using a Credential System in Anonymizing Networks | Abstract |
S. D. Chandhana, E. A. Mary Anita | ||
Vol 6, No 5 (2014) | Prevention of Wormhole and Blackhole Attacks by Detecting Wormhole Nodes Using Countermeasure with AHP | Abstract |
A. Ayisha Parveen, M. Saithun Bushra, M. Islabudeen | ||
Vol 10, No 8 (2018) | Privacy and Security in an Internet of Things | Abstract |
R. Chaithra, Dr. S. Senthil | ||
Vol 4, No 4 (2012) | Privacy Conscious Screening Framework for Frequently Moving Objects | Abstract |
S. Ganesh, V. S. Dhanyasree | ||
Vol 10, No 8 (2018) | Privacy Issues in Cloud Computing for Computer Forensics: An Analysis | Abstract |
Revathi Anil Kumar, M. Varun Kumar, R. Sreejith | ||
Vol 6, No 3 (2014) | Privacy Maintaining Location Supervising System for 3D Space in WSN | Abstract |
B. N. Jagdale, J. W. Bakal | ||
Vol 7, No 8 (2015) | Privacy Preserving and Data Security Using Anonymous Cloud and RSA | Abstract |
P. Kharat, A. Buchade | ||
Vol 3, No 6 (2011) | Privacy Protected Query Processing using Advanced Location Based Service | Abstract |
U. Nithyapriya, M. Kalimuthu | ||
Vol 6, No 5 (2014) | Privacy-Preserving in Public Auditing for Secure Cloud | Abstract |
G. Balamurugan, S. Alaudeen Basha, T. Parthiban | ||
Vol 8, No 2 (2016) | Proof of Data Integrity Using No-SQL Database in Cloud Storage:A Survey | Abstract |
Mahesh E. Pore, Amit B. Chougule | ||
Vol 7, No 4 (2015) | Proposed Spectrum Handoff Algorithm in Cognitive Radio Networks Using Fuzzy Logic Control | Abstract |
Shimaa Ali, Mona Shokair, Moawad I. Dessouky, Nagy Messiha, Hala S. El-Sayed | ||
Vol 8, No 5 (2016) | Protection against Network Infection, Modeling and Restraining Network Using Malware Propagation Technique | Abstract |
M. Sudha, Neelima Jhavar | ||
Vol 4, No 4 (2012) | Prototyping and Detection of Concealing Worm | Abstract |
Ravi Teja Gaddam, K. Ruth Mary Poornima | ||
Vol 2, No 10 (2010) | Providing Data Security through LED Technique in Wireless Sensor Networks | Abstract |
G. V. N. Prasad, K. Venkatesh Sharma, V. Prema Tulasi | ||
Vol 5, No 11 (2013) | Providing High Performance for Network Processing By Using DDR3 Based Look-Up Circuit | Abstract |
T. Jagadeesh, P. Ramana Reddy | ||
Vol 1, No 6 (2009) | Providing QOS for Mobile Ad-Hoc Network | Abstract |
A. Boomarani Malany, R. M. Chandrasekaran | ||
Vol 2, No 6 (2010) | Providing Security to Wireless Sensor Networks by Identifying and Preventing Malicious Node | Abstract |
A. Asha Joshia, I. Shahanaz Begumb | ||
701 - 725 of 922 Items | First Previous 24 25 26 27 28 29 30 31 32 33 Next Last |
Browse Title Index
Scroll