Proposed Methodology for Securing Wireless LANs from Wormhole Attack |
A. K. Patel, Jaypalsinh A. Gohil, D. T. Meva |
Vol 1, No 6 (2010), Pagination: 342-346
|
ABSTRACT |
PDF
|
|
Abstract Views: 165 |
PDF Views: 0
|
Robust Image Transmission Over Noisy Channel Using Independent Component Analysis |
N. A. Deepak, Rajesh Shukla, D. Puttegowda |
Vol 1, No 6 (2010), Pagination: 347-352
|
ABSTRACT |
PDF
|
|
Abstract Views: 163 |
PDF Views: 0
|
Exploring Round Trip Time Fairness for Adaptive Layered Transmission Control Protocol |
V. Kavidha, V. Sadasivam |
Vol 1, No 6 (2010), Pagination: 353-358
|
ABSTRACT |
PDF
|
|
Abstract Views: 167 |
PDF Views: 0
|
Content-Based Color Image Retrieval Using Adaptive Lifting |
P. Manimegalai, K. Thanushkodi |
Vol 1, No 6 (2010), Pagination: 359-366
|
ABSTRACT |
PDF
|
|
Abstract Views: 166 |
PDF Views: 0
|
Data Hiding and Water Marking Security Based on Nested Lattices |
V. S. Giridhar Akula, P. Chandra Sekhar Reddy, N. Kalpa Latha, R. Sivam |
Vol 1, No 6 (2010), Pagination: 367-370
|
ABSTRACT |
PDF
|
|
Abstract Views: 176 |
PDF Views: 0
|
Efficient Bio Metric IRIS Recognition System Using Fuzzy Neural Network |
T. Karthikeyan |
Vol 1, No 6 (2010), Pagination: 371-376
|
ABSTRACT |
PDF
|
|
Abstract Views: 169 |
PDF Views: 0
|
Remote Administrative Suite for Unix-Based Servers |
G. Rama Koteswara Rao, G. Siva Nageswara Rao, B. V. Subba Rao |
Vol 1, No 6 (2010), Pagination: 377-381
|
ABSTRACT |
PDF
|
|
Abstract Views: 161 |
PDF Views: 0
|
Adaptive CHOKe:An Algorithm to Increase the Fairness in Internet Routers |
K. Chitra, G. Padamavathi |
Vol 1, No 6 (2010), Pagination: 382-386
|
ABSTRACT |
PDF
|
|
Abstract Views: 158 |
PDF Views: 0
|
Threshold Based Authorization Model for Authentication of a Node in Wireless Mesh Networks |
Divya Bansal, Sanjeev Sofat |
Vol 1, No 6 (2010), Pagination: 387-392
|
ABSTRACT |
PDF
|
|
Abstract Views: 158 |
PDF Views: 0
|
System Security Management in SNMP |
P. Deivendran, R. Dhanapal |
Vol 1, No 6 (2010), Pagination: 393-399
|
ABSTRACT |
PDF
|
|
Abstract Views: 158 |
PDF Views: 0
|
Implementation of Web Usage Mining Using APRIORI and FP Growth Algorithms |
B. Santhosh Kumar, K. V. Rukmani |
Vol 1, No 6 (2010), Pagination: 400-404
|
ABSTRACT |
PDF
|
|
Abstract Views: 159 |
PDF Views: 0
|
A Schematic Representation of User Model Transfer for Email Virus Detection |
M. Sreedhar Reddy, Manoj Alimilla, P. Viswanath Raghava |
Vol 1, No 6 (2010), Pagination: 405-410
|
ABSTRACT |
PDF
|
|
Abstract Views: 165 |
PDF Views: 0
|