Vol 5, No 3 (2013)

Table of Contents

Vol 5, No 3 (2013)

Open Access Open Access  Restricted Access Subscription Access

Articles

A Domestic Robot for Security Systems by Video Surveillance using Zigbee Technology
M. Md. Athiqurraza Ahamed
 Vol 5, No 3 (2013), Pagination: 97-101
ABSTRACT |  PDF     Abstract Views: 359  |  PDF Views: 1
An Efficient Dynamic Cluster Head Table Design for Time Minimization using BVLI's Data Structures
A. Daison Raj, M. BalaAnand, C. Leena
 Vol 5, No 3 (2013), Pagination: 102-109
ABSTRACT |  PDF     Abstract Views: 270  |  PDF Views: 4
Radiation from Multiple Mobile Base Station Towers: Analysis and Mitigation Techniques
Jacob Abraham
 Vol 5, No 3 (2013), Pagination: 110-113
ABSTRACT |  PDF     Abstract Views: 222  |  PDF Views: 3
On the BER Evaluation for Wireless OFDM System over Multipath Fading Channels
Vishal Sharma, Jaspreet Singh
 Vol 5, No 3 (2013), Pagination: 114-118
ABSTRACT |  PDF     Abstract Views: 221  |  PDF Views: 3
Throughput Analysis of RCPT Coded HARQ for OFDM System
Dipali P. Dhamole, Achala M. Deshmukh
 Vol 5, No 3 (2013), Pagination: 119-122
ABSTRACT |  PDF     Abstract Views: 232  |  PDF Views: 3
Performance of Updated NLMS Algorithm in Rayleigh Channel
Manish D. Sawale, Ram N. Yadav
 Vol 5, No 3 (2013), Pagination: 123-127
ABSTRACT |  PDF     Abstract Views: 199  |  PDF Views: 1
A Survey of Network Layer attacks and Security Mechanisms and Solutions for Routing Protocols in MANET
Fouziah M. Hamza, Vijay Kumar Tripathi
 Vol 5, No 3 (2013), Pagination: 128-133
ABSTRACT |  PDF     Abstract Views: 243  |  PDF Views: 1
A Novel Approaches for Power Optimization Techniques using ENRICHED LEAR in Wireless Video Sensor Networks
V. V. Anirudh, M. Somasekar
 Vol 5, No 3 (2013), Pagination: 134-137
ABSTRACT |  PDF     Abstract Views: 234  |  PDF Views: 1
An Novel Key Cryptography for Signature Depreciation in Wireless Sensor Networks
P. Prema, J. Preethi
 Vol 5, No 3 (2013), Pagination: 138-141
ABSTRACT |  PDF     Abstract Views: 217  |  PDF Views: 3