Vol 6, No 3 (2014)

Table of Contents

Vol 6, No 3 (2014)

Articles

An Exploration of Grid Computing to be Utilized in Teaching and Research at TU
Mohammed A. M. Ibrahim
 Vol 6, No 3 (2014), Pagination: 2291-2299
ABSTRACT |  PDF Abstract Views: 166  |  PDF Views: 2
Implementation of Remote Health Monitoring in Medical Rural Clinics for Web Telemedicine System
Hafez Fouad
 Vol 6, No 3 (2014), Pagination: 2300-2307
ABSTRACT |  PDF Abstract Views: 161  |  PDF Views: 2
Checkpointing and Rollback Recovery Algorithms for Fault Tolerance in MANETs:A Review
Sushant Patial, Jawahar Thakur
 Vol 6, No 3 (2014), Pagination: 2308-2313
ABSTRACT |  PDF Abstract Views: 168  |  PDF Views: 2
The Study and Analysis of Effect of Multi-Antenna Techniques on LTE network with Different Bandwidth Configurations in the Downlink
H. K. Mohana, N. M. Mohankumar, Swetha, J. T. Devaraju
 Vol 6, No 3 (2014), Pagination: 2314-2318
ABSTRACT |  PDF Abstract Views: 152  |  PDF Views: 2
Information-Flow Analysis of Design Breaks Up
Rajendra Kumar, Anil Kumar, Namrata Dhanda
 Vol 6, No 3 (2014), Pagination: 2319-2328
ABSTRACT |  PDF Abstract Views: 167  |  PDF Views: 5
Diagnosis of Rectal Cancer through Images
K. Sivakami Sundari, P. Vanaselvi, T. S. Vishakai
 Vol 6, No 3 (2014), Pagination: 2329-2333
ABSTRACT |  PDF Abstract Views: 162  |  PDF Views: 2
String Identifier in Multiple Medical Databases
Simona-Roxana Dumitrescu, Dan Popescu
 Vol 6, No 3 (2014), Pagination: 2334-2337
ABSTRACT |  PDF Abstract Views: 157  |  PDF Views: 2
A Framework for Multicloud Environment Services
C. S. Pillai
 Vol 6, No 3 (2014), Pagination: 2338-2341
ABSTRACT |  PDF Abstract Views: 302  |  PDF Views: 2
Network Monitoring and Traffic Reduction Using Multi-Agent Technology
M. Subramanian
 Vol 6, No 3 (2014), Pagination: 2342-2346
ABSTRACT |  PDF Abstract Views: 150  |  PDF Views: 3
Open Flow Security Threat Detection and Defense Services
Wanqing You, Kai Qian, Xi He, Ying Qian
 Vol 6, No 3 (2014), Pagination: 2347-2351
ABSTRACT |  PDF Abstract Views: 165  |  PDF Views: 5
Performance Comparison of Cluster Based and Threshold Based Algorithms for Detection and Prevention of Cooperative Black Hole Attack in MANETs
P. S. Hiremath, T. Anuradha
 Vol 6, No 3 (2014), Pagination: 2352-2358
ABSTRACT |  PDF Abstract Views: 163  |  PDF Views: 4