Table of Contents
Vol 2, No 3 (2010)
Articles
Mobile Machine for E-Payment Scheme | ||
Sattar J. Aboud | ||
Vol 2, No 3 (2010), Pagination: 646-649 | ||
ABSTRACT | PDF | Abstract Views: 197 | PDF Views: 0 |
ZLERP:Zone and Link Expiry Based Routing Protocol for MANETs | ||
S. S. Manvi, M. S. Kakkasageri, Savitha Paliwal, Rekha Patil | ||
Vol 2, No 3 (2010), Pagination: 650-655 | ||
ABSTRACT | PDF | Abstract Views: 227 | PDF Views: 0 |
A Multi-Purpose Semi-Fragile Watermarking Scheme for Digital Images | ||
K. R. Chetan | ||
Vol 2, No 3 (2010), Pagination: 656-665 | ||
ABSTRACT | PDF | Abstract Views: 253 | PDF Views: 0 |
Designing of Index-Guiding Photonic Crystal Fibre by Finite Element Method Simulation | ||
S. S. Mishra, Vinod K. Singh | ||
Vol 2, No 3 (2010), Pagination: 666-670 | ||
ABSTRACT | PDF | Abstract Views: 228 | PDF Views: 0 |
Secure and Faster Clustering Environment for Advanced Image Compression | ||
D. Kesavaraja, R. Balasubramanian, D. Jeyabharathi, D. Sasireka | ||
Vol 2, No 3 (2010), Pagination: 671-678 | ||
ABSTRACT | PDF | Abstract Views: 194 | PDF Views: 0 |
QoS for Real Rime Transmission on MANET | ||
Chandra Mouli Venkata Srinivas Akana, K. Sundeep Kumar, C. Divakar, Phani Sirisha Katikireddy | ||
Vol 2, No 3 (2010), Pagination: 679-685 | ||
ABSTRACT | PDF | Abstract Views: 202 | PDF Views: 0 |
Effective Network Intrusion Detection Using Classifiers Decision Trees and Decision Rules | ||
G. Meera Gandhi, Kumaravel Appavoo, S. K. Srivatsa | ||
Vol 2, No 3 (2010), Pagination: 686-692 | ||
ABSTRACT | PDF | Abstract Views: 210 | PDF Views: 0 |
An Efficient Congestion Avoidance Scheme for Mobile Healthcare Wireless Sensor Networks | ||
R. Gunasundari, R. Arthi, S. Priya | ||
Vol 2, No 3 (2010), Pagination: 693-698 | ||
ABSTRACT | PDF | Abstract Views: 220 | PDF Views: 0 |
Registration and Aggregate Cache Routing for Ad Hoc Network | ||
Abdul Samad, Gaurav Sinha, Mahraj Khalid, Mohammed Niyamathullah | ||
Vol 2, No 3 (2010), Pagination: 699-706 | ||
ABSTRACT | PDF | Abstract Views: 220 | PDF Views: 0 |
Analysis of Security Protocols in Wireless Sensor Network | ||
Ritu Sharma, Yogesh Chaba, Yudhvir Singh | ||
Vol 2, No 3 (2010), Pagination: 707-713 | ||
ABSTRACT | PDF | Abstract Views: 212 | PDF Views: 0 |
Evaluation of Feature Selection Methods for Predictive Modeling Using Neural Networks in Credits Scoring | ||
B. K. Raghavendra, Jay B. Simha | ||
Vol 2, No 3 (2010), Pagination: 714-718 | ||
ABSTRACT | PDF | Abstract Views: 205 | PDF Views: 0 |
Defending Denial of Service:State Overload Attacks | ||
S. S. Nagamuthu Krishnan, V. Saravanan | ||
Vol 2, No 3 (2010), Pagination: 719-722 | ||
ABSTRACT | PDF | Abstract Views: 205 | PDF Views: 0 |