A Survey of Network-Based Security Attacks |
Koffka Khan, Wayne Goodridge |
Vol 10, No 5 (2019), Pagination: 3981-3989
|
ABSTRACT |
PDF
|
|
Abstract Views: 235 |
PDF Views: 0
|
Data Security through Node-Disjoint on Demand Multipath Routing in MANETs |
Y. Vasudeva Reddy, M. Nagendra |
Vol 10, No 5 (2019), Pagination: 3990-3998
|
ABSTRACT |
PDF
|
|
Abstract Views: 230 |
PDF Views: 0
|
Randomization of Node Scheme with Optimization in Wireless Sensor Network |
Varsha, Manju Bala, Manoj Kumar |
Vol 10, No 5 (2019), Pagination: 3999-4006
|
ABSTRACT |
PDF
|
|
Abstract Views: 257 |
PDF Views: 0
|
A Roadmap to Mitigation Techniques:Bedrock for Atmospheric Turbulence |
Krina Patel, Dippal Israni, Dweepna Garg |
Vol 10, No 5 (2019), Pagination: 4007-4012
|
ABSTRACT |
PDF
|
|
Abstract Views: 234 |
PDF Views: 0
|
Energy Efficient Scheduling Algorithm for Cloud Computing Systems Based on Prediction Model |
G. Prasad Babu, A. K. Tiwari |
Vol 10, No 5 (2019), Pagination: 4013-4018
|
ABSTRACT |
PDF
|
|
Abstract Views: 236 |
PDF Views: 0
|
Performance of Evaluation for AES with ECC in Cloud Environment |
Harikrishna Bommala, S. Kiran, M. Pujitha, R. Pradeep Kumar Reddy |
Vol 10, No 5 (2019), Pagination: 4019-4025
|
ABSTRACT |
PDF
|
|
Abstract Views: 248 |
PDF Views: 0
|
Efficient Energy Consumption in Ad Hoc Network using AOMDV-FF |
H. Prabavathi, K. Kavitha, G. Sribarkavi |
Vol 10, No 5 (2019), Pagination: 4026-4029
|
ABSTRACT |
PDF
|
|
Abstract Views: 219 |
PDF Views: 0
|
Application of Graph Theory in Online Network Services to Determine the Shortest Journey |
B. Logeshwary Natarajan, M. K. Balaji |
Vol 10, No 5 (2019), Pagination: 4030-4034
|
ABSTRACT |
PDF
|
|
Abstract Views: 269 |
PDF Views: 0
|
Variants of the Constrained Bottleneck LAN Edge Link in Household Networks |
Koffka Khan, Wayne Goodridge |
Vol 10, No 5 (2019), Pagination: 4035-4044
|
ABSTRACT |
PDF
|
|
Abstract Views: 212 |
PDF Views: 0
|