Issue | Title | |
Vol 12, No 2 (2020) | Study on Implementation of Smart City Using IOT | Abstract |
S. Arpitha, A. Kavya, S. Keerthana, G. Likitha, S. Likitha, P. Maltesh, B. Nethravathi | ||
Vol 9, No 4 (2017) | Study on Intrusion Detection System | Abstract |
Animesh Kairi | ||
Vol 2, No 10 (2010) | Study the Quality of Service of Scheduling Algorithms with UDP in IP Networks | Abstract |
P. Sankar, C. Chellamuthu | ||
Vol 7, No 4 (2015) | Survey of Microstrip Patch Antennas for Ultrawideband Applications | Abstract |
Nishant Aggarwal, Jyoteesh Malhotra | ||
Vol 3, No 15 (2011) | Survey of Routing Protocols and Attacks for Mobile Ad Hoc Networks | Abstract |
L. S. Jayashree, I. Kala | ||
Vol 1, No 1 (2009) | Survey on Data Replication in Grid Environment | Abstract |
K. Sashi, Antony Selvadoss Thanamani | ||
Vol 4, No 7 (2012) | Survey on Mobile Cloud Media Computing Applications | Abstract |
S. Durga | ||
Vol 5, No 1 (2013) | Survey on Network Security in WI-FI Technology | Abstract |
S. Kannadhasan, R. Suresh | ||
Vol 5, No 3 (2013) | Survey on Research Issues in Wireless Mesh Networks | Abstract |
J. B. Shajilin Loret, K. Vijayalakshmi | ||
Vol 4, No 12 (2012) | Survey on User Authentication for Cloud Computing | Abstract |
I. Arulmani, L. Arockiam, N. Veeraragavan | ||
Vol 8, No 3 (2016) | Survey Paper on Monitoring and Managing of IaaS Environment in Cloud Computing Platform | Abstract |
Sayali R. Walve | ||
Vol 6, No 5 (2014) | SVM Based Network Traffic Classification Using Correlation Information | Abstract |
R. S. Anu Gowsalya, S. Miruna Joe Amali | ||
Vol 3, No 5 (2011) | Synchronization in Chaotic Communication | Abstract |
R. Raja Kumar, A. Sampath, P. Indumathi | ||
Vol 5, No 6 (2013) | System Lifetime Enhancement Relaying Framework in Heterogeneous Wireless Ad Hoc Networks | Abstract |
Zainab Khan, Mohammad Sarwar Raeen | ||
Vol 2, No 12 (2010) | TAB-Ticketing and Blinding for Realizing Anonymity and Traceability in Wireless Mesh Networks | Abstract |
P. Saranya Devi, S. Shanmuga Preetha, S. Athilakshmi | ||
Vol 2, No 3 (2010) | Techniques to Reduce Routing Overhead in AODV | Abstract |
Manpreet Kaur, Jagpreet Singh, Harpreet Kaur | ||
Vol 4, No 12 (2012) | Textual Encryption using Conventional Encryption Algorithm | Abstract |
M. Madhavi, B. Vijay Kumar, V. S. Giridhar Akula | ||
Vol 4, No 9 (2012) | The Design of a Group Communication System for Distributed and Complex Systems | Abstract |
F. Lassoued, R. Bouallegue | ||
Vol 11, No 5 (2019) | The Effects of Information and Communications Technology on Job Stress, Work-Life Balance and Job Satisfaction | Abstract |
Denielle I. Cruz, Elicia Marie A. Kalalang, Sophia Louise V. Yulo, Roma C. Paje | ||
Vol 1, No 2 (2009) | The Hybrid Architecture for the Secure Exchange of Data in E-Governance Applications | Abstract |
P. Sumathi, M. Punithavalli | ||
Vol 3, No 14 (2011) | The Mobile Based Remote Networking and Monitoring the Remote System in Dynamic Position | Abstract |
G. Pary, S. Sridhar | ||
Vol 1, No 7 (2009) | The Network Security Assessment Instrument to Reduce Software Security Risk | Abstract |
N. Prasanna Balaji, U. Sreenivasulu, Ganji pramod | ||
Vol 4, No 3 (2012) | The Performance of Turbo Codes on a Rayleigh Fading Channel for Wireless Communication Systems | Abstract |
B. Gangadevi, B. Gowridevi, S. V. Arul Shiju, K. A. Anoop, J. Yamuna | ||
Vol 3, No 12 (2011) | The Right to Information Act and it’s Impact on India’s Politics and Administration | Abstract |
Joshua O. Miluwi, Hina Rashid | ||
Vol 4, No 8 (2012) | The Role of E-Commerce-A Competitive Advantage in Marketing of Products | Abstract |
J. Sridevi, K. Senthilkumar | ||
851 - 875 of 922 Items | First Previous 30 31 32 33 34 35 36 37 Next Last |
Browse Title Index
Scroll