Security Solutions against Computer Networks Threats |
Fatemeh Soleimani Roozbahani, Reihaneh Azad |
Vol 7, No 1 (2015), Pagination: 2576-2581
|
ABSTRACT |
PDF
|
|
Abstract Views: 185 |
PDF Views: 3
|
Routing Optimization with Load Balancing:An Energy Efficient Approach |
S. Prabhavathi, A. Subramanyam, A. Ananda Rao |
Vol 7, No 1 (2015), Pagination: 2582-2592
|
ABSTRACT |
PDF
|
|
Abstract Views: 182 |
PDF Views: 2
|
Managing Instantly Dense Hot Spot Regions in Wireless Cellular Communication Networks |
Vikas Solanki, M. Qasim Rafiq |
Vol 7, No 1 (2015), Pagination: 2593-2605
|
ABSTRACT |
PDF
|
|
Abstract Views: 188 |
PDF Views: 2
|
Significant Data Hiding through Discrete Wavelet Transformation Approach |
Premal B. Nirpal, Ganesh M. Magar |
Vol 7, No 1 (2015), Pagination: 2606-2610
|
ABSTRACT |
PDF
|
|
Abstract Views: 189 |
PDF Views: 2
|
An Adaptive Cluster Based Routing Protocol for WSN |
G. H. Raghunandan, R. Navyashree, S. Jagadish, Arshiya Farheen |
Vol 7, No 1 (2015), Pagination: 2611-2615
|
ABSTRACT |
PDF
|
|
Abstract Views: 211 |
PDF Views: 2
|
The Use of Monte Carlo Simulation in Quantitative Risk Assessment of IT Projects |
Sanaz Nikghadam Hojjati, Nasibeh Rahbar Noudehi |
Vol 7, No 1 (2015), Pagination: 2616-2621
|
ABSTRACT |
PDF
|
|
Abstract Views: 191 |
PDF Views: 2
|
Monitoring in IOT Enabled Devices |
Udit Gupta |
Vol 7, No 1 (2015), Pagination: 2622-2625
|
ABSTRACT |
PDF
|
|
Abstract Views: 195 |
PDF Views: 4
|
Classification of Cloud Types for Rainfall Forecasting |
Niyati Salot, Priya R. Swaminarayan |
Vol 7, No 1 (2015), Pagination: 2626-2629
|
ABSTRACT |
PDF
|
|
Abstract Views: 220 |
PDF Views: 4
|
Distributed Computing:An Overview |
Md. Firoj Ali, Rafiqul Zaman Khan |
Vol 7, No 1 (2015), Pagination: 2630-2635
|
ABSTRACT |
PDF
|
|
Abstract Views: 214 |
PDF Views: 3
|
Secure Management of Logs in Internet of Things |
Udit Gupta |
Vol 7, No 1 (2015), Pagination: 2636-2639
|
ABSTRACT |
PDF
|
|
Abstract Views: 186 |
PDF Views: 3
|