Table of Contents
Vol 1, No 6 (2010)
Articles
Proposed Methodology for Securing Wireless LANs from Wormhole Attack | ||
A. K. Patel, Jaypalsinh A. Gohil, D. T. Meva | ||
Vol 1, No 6 (2010), Pagination: 342-346 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 255 | PDF Views: 0 |
Robust Image Transmission Over Noisy Channel Using Independent Component Analysis | ||
N. A. Deepak, Rajesh Shukla, D. Puttegowda | ||
Vol 1, No 6 (2010), Pagination: 347-352 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 255 | PDF Views: 0 |
Exploring Round Trip Time Fairness for Adaptive Layered Transmission Control Protocol | ||
V. Kavidha, V. Sadasivam | ||
Vol 1, No 6 (2010), Pagination: 353-358 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 262 | PDF Views: 0 |
Content-Based Color Image Retrieval Using Adaptive Lifting | ||
P. Manimegalai, K. Thanushkodi | ||
Vol 1, No 6 (2010), Pagination: 359-366 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 264 | PDF Views: 0 |
Data Hiding and Water Marking Security Based on Nested Lattices | ||
V. S. Giridhar Akula, P. Chandra Sekhar Reddy, N. Kalpa Latha, R. Sivam | ||
Vol 1, No 6 (2010), Pagination: 367-370 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 259 | PDF Views: 0 |
Efficient Bio Metric IRIS Recognition System Using Fuzzy Neural Network | ||
T. Karthikeyan | ||
Vol 1, No 6 (2010), Pagination: 371-376 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 262 | PDF Views: 0 |
Remote Administrative Suite for Unix-Based Servers | ||
G. Rama Koteswara Rao, G. Siva Nageswara Rao, B. V. Subba Rao | ||
Vol 1, No 6 (2010), Pagination: 377-381 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 243 | PDF Views: 0 |
Adaptive CHOKe:An Algorithm to Increase the Fairness in Internet Routers | ||
K. Chitra, G. Padamavathi | ||
Vol 1, No 6 (2010), Pagination: 382-386 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 269 | PDF Views: 0 |
Threshold Based Authorization Model for Authentication of a Node in Wireless Mesh Networks | ||
Divya Bansal, Sanjeev Sofat | ||
Vol 1, No 6 (2010), Pagination: 387-392 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 250 | PDF Views: 0 |
System Security Management in SNMP | ||
P. Deivendran, R. Dhanapal | ||
Vol 1, No 6 (2010), Pagination: 393-399 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 247 | PDF Views: 0 |
Implementation of Web Usage Mining Using APRIORI and FP Growth Algorithms | ||
B. Santhosh Kumar, K. V. Rukmani | ||
Vol 1, No 6 (2010), Pagination: 400-404 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 251 | PDF Views: 0 |
A Schematic Representation of User Model Transfer for Email Virus Detection | ||
M. Sreedhar Reddy, Manoj Alimilla, P. Viswanath Raghava | ||
Vol 1, No 6 (2010), Pagination: 405-410 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 250 | PDF Views: 0 |