Vol 5, No 1 (2013)

Table of Contents

Vol 5, No 1 (2013)

Articles

Energy Efficient Mobile Operating Systems
Muhammad Waseem
 Vol 5, No 1 (2013), Pagination: 1812-1817
ABSTRACT |  PDF Abstract Views: 128  |  PDF Views: 6
Performance Evaluation of Fractionally Spaced Constant Modulus Algorithm (FSCMA) in Relation to CMA (Constant Modulus Algorithm) Method for Blind Equalization of Wireless Signals
J. K. R. Sastry, T. Rambabu, P. Rajesh Kumar
 Vol 5, No 1 (2013), Pagination: 1818-1824
ABSTRACT |  PDF Abstract Views: 125  |  PDF Views: 5
Heterogeneous LEACH Protocol for Wireless Sensor Networks
Nishi Sharma, Vandna Verma
 Vol 5, No 1 (2013), Pagination: 1825-1829
ABSTRACT |  PDF Abstract Views: 109  |  PDF Views: 2
A Novel Approach for Iris Recognition using DWT and PCA
M. Manjunath, K. B. Raja
 Vol 5, No 1 (2013), Pagination: 1830-1836
ABSTRACT |  PDF Abstract Views: 137  |  PDF Views: 4
GSIS: A Secure and Timed-Efficient Stream Loss-Tolerant Authentication Protocol For Vehicular Communications
R. Suganya, K. Ravikumar
 Vol 5, No 1 (2013), Pagination: 1837-1841
ABSTRACT |  PDF Abstract Views: 118  |  PDF Views: 2
Modified Agglomerative Clustering for Web Users Navigation Behavior
T. Mekala, P. Nandhini
 Vol 5, No 1 (2013), Pagination: 1842-1845
ABSTRACT |  PDF Abstract Views: 128  |  PDF Views: 2
Study of Encryption and Decryption of Wave File in Image Formats
Rahul R. Upadhyay
 Vol 5, No 1 (2013), Pagination: 1847-1852
ABSTRACT |  PDF Abstract Views: 104  |  PDF Views: 1
Remote Access using Remote Frame Buffer Protocol based on Virtual Network Computing Architecture in Mobile Cloud
Maddali M. V. M. Kumar
 Vol 5, No 1 (2013), Pagination: 1853-1857
ABSTRACT |  PDF Abstract Views: 110  |  PDF Views: 2
An Assessment of Worm Hole Attack over Mobile Ad-Hoc Network as Serious Threats
Vikas Kumar Upadhyay, Rajesh Shukla
 Vol 5, No 1 (2013), Pagination: 1858-1866
ABSTRACT |  PDF Abstract Views: 126  |  PDF Views: 2