Energy Efficient Mobile Operating Systems |
Muhammad Waseem |
Vol 5, No 1 (2013), Pagination: 1812-1817
|
ABSTRACT |
PDF
|
|
Abstract Views: 207 |
PDF Views: 6
|
Heterogeneous LEACH Protocol for Wireless Sensor Networks |
Nishi Sharma, Vandna Verma |
Vol 5, No 1 (2013), Pagination: 1825-1829
|
ABSTRACT |
PDF
|
|
Abstract Views: 167 |
PDF Views: 2
|
A Novel Approach for Iris Recognition using DWT and PCA |
M. Manjunath, K. B. Raja |
Vol 5, No 1 (2013), Pagination: 1830-1836
|
ABSTRACT |
PDF
|
|
Abstract Views: 196 |
PDF Views: 4
|
Modified Agglomerative Clustering for Web Users Navigation Behavior |
T. Mekala, P. Nandhini |
Vol 5, No 1 (2013), Pagination: 1842-1845
|
ABSTRACT |
PDF
|
|
Abstract Views: 179 |
PDF Views: 2
|
Study of Encryption and Decryption of Wave File in Image Formats |
Rahul R. Upadhyay |
Vol 5, No 1 (2013), Pagination: 1847-1852
|
ABSTRACT |
PDF
|
|
Abstract Views: 163 |
PDF Views: 1
|
An Assessment of Worm Hole Attack over Mobile Ad-Hoc Network as Serious Threats |
Vikas Kumar Upadhyay, Rajesh Shukla |
Vol 5, No 1 (2013), Pagination: 1858-1866
|
ABSTRACT |
PDF
|
|
Abstract Views: 177 |
PDF Views: 2
|