Vol 4, No 4 (2013)

Table of Contents

Vol 4, No 4 (2013)

Articles

An Anonymous Secure Routing Using OLSR Protocol
Osiers Gyamfuah Grace, John Rajan
 Vol 4, No 4 (2013), Pagination: 1645-1651
ABSTRACT |  PDF Abstract Views: 124  |  PDF Views: 2
Security Threats in Wireless Sensor Networks in Each Layer
Anitha S. Sastry, Shazia Sulthana, S. Vagdevi
 Vol 4, No 4 (2013), Pagination: 1657-1661
ABSTRACT |  PDF Abstract Views: 120  |  PDF Views: 2
Design and Implementation of AMRP for Multi hop wireless Mobile ad hoc Networks
R. Balakrishna, K. S. Rajesh
 Vol 4, No 4 (2013), Pagination: 1662-1666
ABSTRACT |  PDF Abstract Views: 132  |  PDF Views: 2
Categorization and Rating the Privacy Maintaining Data Mining Proficiencies by Applying a Data Change-Based Model
Dheeraj Agarwal, Jitendra Nath Srivastava
 Vol 4, No 4 (2013), Pagination: 1667-1673
ABSTRACT |  PDF Abstract Views: 137  |  PDF Views: 2
Deriving Differential Unit Test Cases from System Test Cases
V. Ramesh, R. Ananthakumar, S. Kannu Durai
 Vol 4, No 4 (2013), Pagination: 1674-1679
ABSTRACT |  PDF Abstract Views: 119  |  PDF Views: 3
Improving the Student’s Performance Using Educational Data Mining
K. Shanmuga Priya, A. V. Senthil Kumar
 Vol 4, No 4 (2013), Pagination: 1680-1685
ABSTRACT |  PDF Abstract Views: 119  |  PDF Views: 3
Ant Colony Optimization Based Routing in Wireless Sensor Networks
K. Syed Ali Fathima, K. Sindhanaiselvan
 Vol 4, No 4 (2013), Pagination: 1686-1689
ABSTRACT |  PDF Abstract Views: 135  |  PDF Views: 3
Steganography: A Security Model for Open Communication
K. Chandra Sekhar, M. Chandra Sekhar, K. Chokkanathan
 Vol 4, No 4 (2013), Pagination: 1690-1694
ABSTRACT |  PDF Abstract Views: 142  |  PDF Views: 4
Examination of Impact of Flooding attack on MANET and to accentuate on Performance Degradation
K. Bhuvaneshwari, A. Francis Saviour Devaraj
 Vol 4, No 4 (2013), Pagination: 1695-1699
ABSTRACT |  PDF Abstract Views: 132  |  PDF Views: 3