A Model for Performance Enhancement of Steganography through Dynamic Key Cryptography |
Navneet Singh Sikarwar |
Vol 3, No 6 (2012), Pagination: 1395-1401
|
ABSTRACT |
PDF
|
|
Abstract Views: 247 |
PDF Views: 0
|
Hybrid Domain Based Face Recognition System |
J. Ravi, K. B. Raja |
Vol 3, No 6 (2012), Pagination: 1402-1408
|
ABSTRACT |
PDF
|
|
Abstract Views: 163 |
PDF Views: 2
|
FuGeIDS: Fuzzy Genetic paradigms in Intrusion Detection Systems |
Rajdeep Borgohain |
Vol 3, No 6 (2012), Pagination: 1409-1415
|
ABSTRACT |
PDF
|
|
Abstract Views: 155 |
PDF Views: 2
|
Analyzing Reactive Routing Protocols in Mobile Ad Hoc Networks |
Kamaljit I. Lakhtaria |
Vol 3, No 6 (2012), Pagination: 1416-1421
|
ABSTRACT |
PDF
|
|
Abstract Views: 176 |
PDF Views: 0
|
A Study of Web Usage Mining Research Tools |
Chhavi Rana |
Vol 3, No 6 (2012), Pagination: 1422-1429
|
ABSTRACT |
PDF
|
|
Abstract Views: 166 |
PDF Views: 0
|
Binary Decision Diagrams and Its Variable Ordering for Disjoint Network |
Manoj Singhal, Girish Sharma, R. K. Chauhan |
Vol 3, No 6 (2012), Pagination: 1430-1437
|
ABSTRACT |
PDF
|
|
Abstract Views: 168 |
PDF Views: 4
|
Performance Enhancement of MC-CDMA Systems through MAP based Multiuser Detection |
K. Rasadurai, J. Dhanancheziyan, K. Pushpakodi, N. Kumaratharan |
Vol 3, No 6 (2012), Pagination: 1438-1443
|
ABSTRACT |
PDF
|
|
Abstract Views: 175 |
PDF Views: 4
|
Cloud Computing Issues at Design and Implementation Levels - A Survey |
A. P. Nirmala, R. Sridaran |
Vol 3, No 6 (2012), Pagination: 1444-1449
|
ABSTRACT |
PDF
|
|
Abstract Views: 184 |
PDF Views: 3
|
Parallel Implementation of Genetic Algorithm using K-Means Clustering |
A. V. Senthil Kumar, S. Mythili |
Vol 3, No 6 (2012), Pagination: 1450-1455
|
ABSTRACT |
PDF
|
|
Abstract Views: 179 |
PDF Views: 6
|