Microscopic Feature Extraction Method |
Muhammad Sharif, Mudassar Raza, Sajjad Mohsin, Jamal Hussain Shah |
Vol 4, No 5 (2013), Pagination: 1700-1703
|
ABSTRACT |
PDF
|
|
Abstract Views: 162 |
PDF Views: 0
|
LAN Modeling in Rural Areas Based on Variable Metrics Using Fuzzy Logic |
Ak. Ashakumar Singh |
Vol 4, No 5 (2013), Pagination: 1704-1709
|
ABSTRACT |
PDF
|
|
Abstract Views: 149 |
PDF Views: 0
|
An Algorithm for Optimized Time, Cost, and Reliability in a Distributed Computing System |
Pankaj Saxena, Kapil Govil |
Vol 4, No 5 (2013), Pagination: 1710-1718
|
ABSTRACT |
PDF
|
|
Abstract Views: 170 |
PDF Views: 6
|
A Real Time Intrusion Aggregation And Prevention Technique |
Fouzia Sultana, Stephens Charles, A. Govardhan |
Vol 4, No 5 (2013), Pagination: 1719-1724
|
ABSTRACT |
PDF
|
|
Abstract Views: 166 |
PDF Views: 0
|
PRNG based Symmetric Stream Cipher |
J. K. M. Sadique Uz Zaman |
Vol 4, No 5 (2013), Pagination: 1725-1730
|
ABSTRACT |
PDF
|
|
Abstract Views: 165 |
PDF Views: 0
|
Improved Person Identification System using Face Biometric Detection |
A. Dhanalakshmi, B. Srinivasan |
Vol 4, No 5 (2013), Pagination: 1731-1736
|
ABSTRACT |
PDF
|
|
Abstract Views: 169 |
PDF Views: 5
|
Analysis of Multipath Manet Routing Protocols under Variable Range Transmission Power |
V. Lalitha, R. S. Rajesh |
Vol 4, No 5 (2013), Pagination: 1737-1743
|
ABSTRACT |
PDF
|
|
Abstract Views: 167 |
PDF Views: 2
|
A Review of Fuzzy Based QoS Web Service Discovery |
R. Buvanesvari, V. Prasath, H. Sanofar Nisha |
Vol 4, No 5 (2013), Pagination: 1752-1759
|
ABSTRACT |
PDF
|
|
Abstract Views: 167 |
PDF Views: 0
|
Comparison of Different Methods to identify wormhole attacks in MANETS |
S. Seethalakshmi, K. Chitra Manikandan |
Vol 4, No 5 (2013), Pagination: 1760-1765
|
ABSTRACT |
PDF
|
|
Abstract Views: 169 |
PDF Views: 4
|