Vol 7, No 1 (2015)

Table of Contents

Vol 7, No 1 (2015)

Articles

Security Solutions against Computer Networks Threats
Fatemeh Soleimani Roozbahani, Reihaneh Azad
 Vol 7, No 1 (2015), Pagination: 2576-2581
ABSTRACT |  PDF Abstract Views: 185  |  PDF Views: 3
Routing Optimization with Load Balancing:An Energy Efficient Approach
S. Prabhavathi, A. Subramanyam, A. Ananda Rao
 Vol 7, No 1 (2015), Pagination: 2582-2592
ABSTRACT |  PDF Abstract Views: 182  |  PDF Views: 2
Managing Instantly Dense Hot Spot Regions in Wireless Cellular Communication Networks
Vikas Solanki, M. Qasim Rafiq
 Vol 7, No 1 (2015), Pagination: 2593-2605
ABSTRACT |  PDF Abstract Views: 188  |  PDF Views: 2
Significant Data Hiding through Discrete Wavelet Transformation Approach
Premal B. Nirpal, Ganesh M. Magar
 Vol 7, No 1 (2015), Pagination: 2606-2610
ABSTRACT |  PDF Abstract Views: 189  |  PDF Views: 2
An Adaptive Cluster Based Routing Protocol for WSN
G. H. Raghunandan, R. Navyashree, S. Jagadish, Arshiya Farheen
 Vol 7, No 1 (2015), Pagination: 2611-2615
ABSTRACT |  PDF Abstract Views: 211  |  PDF Views: 2
The Use of Monte Carlo Simulation in Quantitative Risk Assessment of IT Projects
Sanaz Nikghadam Hojjati, Nasibeh Rahbar Noudehi
 Vol 7, No 1 (2015), Pagination: 2616-2621
ABSTRACT |  PDF Abstract Views: 191  |  PDF Views: 2
Monitoring in IOT Enabled Devices
Udit Gupta
 Vol 7, No 1 (2015), Pagination: 2622-2625
ABSTRACT |  PDF Abstract Views: 195  |  PDF Views: 4
Classification of Cloud Types for Rainfall Forecasting
Niyati Salot, Priya R. Swaminarayan
 Vol 7, No 1 (2015), Pagination: 2626-2629
ABSTRACT |  PDF Abstract Views: 220  |  PDF Views: 4
Distributed Computing:An Overview
Md. Firoj Ali, Rafiqul Zaman Khan
 Vol 7, No 1 (2015), Pagination: 2630-2635
ABSTRACT |  PDF Abstract Views: 214  |  PDF Views: 3
Secure Management of Logs in Internet of Things
Udit Gupta
 Vol 7, No 1 (2015), Pagination: 2636-2639
ABSTRACT |  PDF Abstract Views: 186  |  PDF Views: 3