Approaches in RSA Cryptosystem Using Artificial Neural Network |
Siamak Haghipour, Babak Sokouti |
Vol 2, No 1 (2009), Pagination: 11-17
|
ABSTRACT |
PDF
|
|
Abstract Views: 237 |
PDF Views: 3
|
Wireless Mesh Networks-Reliability and Flexibility |
K. Rama Krishnaiah, B. Ramesh Babu, T. Pavan Kumar, K. Rajasekhara Rao |
Vol 2, No 1 (2009), Pagination: 23-29
|
ABSTRACT |
PDF
|
|
Abstract Views: 257 |
PDF Views: 2
|
Artificial Neural Network Based Hybrid Algorithmic Structure for Solving Linear Programming Problems |
L. R. Arvind Babu, B. Palaniappan |
Vol 2, No 1 (2009), Pagination: 31-36
|
ABSTRACT |
PDF
|
|
Abstract Views: 244 |
PDF Views: 0
|
A Survey of MANET Reactive Routing Protocols Under Different Mobility Models |
M. K. Jeya Kumar, R. S. Rajesh |
Vol 2, No 1 (2009), Pagination: 37-44
|
ABSTRACT |
PDF
|
|
Abstract Views: 266 |
PDF Views: 2
|
Optimized Binary Merge Coding for Lossless Image Compression |
N. Subhash Chandra, M. Bala Raju, S. Mahaboob Basha, A. Govardhan |
Vol 2, No 1 (2009), Pagination: 45-49
|
ABSTRACT |
PDF
|
|
Abstract Views: 237 |
PDF Views: 0
|
Study Recycling of Plastic and Crts From Electronic Waste |
Preeti Jain, Mukata Rani Bhawsar, Jitendra Bhawsar |
Vol 2, No 1 (2009), Pagination: 51-56
|
ABSTRACT |
PDF
|
|
Abstract Views: 233 |
PDF Views: 4
|
Content-Based Image Retrival in the World Wide Web |
P. N. R. L. Chandra Sekhar, D. Rajya Lakshmi, J. A. Chandulal, Mandava V. Basaveswara Rao |
Vol 2, No 1 (2009), Pagination: 57-61
|
ABSTRACT |
PDF
|
|
Abstract Views: 263 |
PDF Views: 2
|
Techniques of Wireless Intrusion Detection System:T-WIDZ |
Rajshekhar M. Patil, Mamitha R. Patil, K. V. Ramakrishnan |
Vol 2, No 1 (2009), Pagination: 69-74
|
ABSTRACT |
PDF
|
|
Abstract Views: 257 |
PDF Views: 2
|
Study and Model Formulation for Curved Surface Using Computational Fluid Dynamics (CFD) |
R. E. Shelke, L. B. Bhuyar |
Vol 2, No 1 (2009), Pagination: 75-79
|
ABSTRACT |
PDF
|
|
Abstract Views: 266 |
PDF Views: 1
|
A Neuro-Finite Element Analysis of Partial Differential Equations of Solid Mechanics |
Sangeeta Yadav, K. K. Pathak, Rajesh Shrivastava |
Vol 2, No 1 (2009), Pagination: 81-86
|
ABSTRACT |
PDF
|
|
Abstract Views: 244 |
PDF Views: 3
|
A Security Analysis of GSM Security Using ECC Technique |
Tarun Kumar |
Vol 2, No 1 (2009), Pagination: 87-94
|
ABSTRACT |
PDF
|
|
Abstract Views: 240 |
PDF Views: 2
|
Decision Tree Approach for Predicting Customers Credit Risk |
K. Venkat Rao, T. Jyothirmayi, M. V. Basaveswara Rao |
Vol 2, No 1 (2009), Pagination: 95-99
|
ABSTRACT |
PDF
|
|
Abstract Views: 238 |
PDF Views: 3
|