Article # |
Article Title & Authors (Volume 5 Issue 2 February 2014) |
Page |
1. |
Major Technical Concerns in the Practical Realization of FO-OCDMA Networks
Laxman Verma, P.S. Mundra, Indu Bala
Abstract | PDF |
63-66 |
2. |
A Scenario of Brain Computer Interaction with Different types of Face Recognition Techniques
Dr. Dinesh Chandra Jain
Abstract | PDF |
67-70 |
3. |
Design and Comparative Analysis of CMOS Full Adder Cells Using Tanner EDA Tool
JATINDER KUMAR
Abstract | PDF |
71-79 |
4. |
Comparative evaluation of Recursive Dimensional Cutting Packet Classification, DimCut, with Analysis
Hediyeh AmirJahanshahi Sistani, Haridas Acharya
Abstract | PDF |
80-91 |
5. |
Ad hoc Network and its Security Essentials
Monika Kohli
Abstract | PDF |
92-96 |
6. |
Improved UP Growth Algorithm for Mining of High Utility Itemsets from Transactional Databases Based on Mapreduce Framework on Hadoop.
Vivek Jethe, Prof. Sachin Chavan, Prof. Manoj Patil
Abstract | PDF |
97-103 |
7. |
A Survey on Trust Management in Wireless Sensor Networks
Reshmi.V, Sajitha.M
Abstract | PDF |
104-109 |
8. |
Survey on Traffic Redundancy and Elimination Approach for Reducing Cloud Bandwidth and Costs
Suresh Chougala, Sharavana K
Abstract | PDF |
110-114 |
9. |
A Protocol for Reducing Routing Overhead in Mobile Ad Hoc Networks
Swarupkumar S. Suradkar, Anil R.Surve
Abstract | PDF |
115-117 |
10. |
Network Forensics an emerging approach to an network analysis.
Abhishek Srivastav, Irman Ali
Abstract | PDF |
118-123 |
11. |
Development of energy efficient routing protocol using Hop PEGASIS in Wireless Sensor Networks
Md Arif Ali, Abha Kiran Rajpoot
Abstract | PDF |
124-131 |
12. |
PEER TO PEER ASSOCIATION IN CONTENT DISTRIBUTION NETWORK
D.Amrita, A.Aruna
Abstract | PDF |
132-136 |
13. |
A Review of various statestical methods for Outlier Detection
Dhwani Dave, Tanvi Varma
Abstract | PDF |
137-140 |
14. |
Classification of Escherichia Coli Bacteria using Meta-Cognitive Neural Network
Padma.S, Arun Kumar.M
Abstract | PDF |
141-149 |
15. |
3D Password: A novel approach for more secure authentication
Ms.Swati Bilapatte, Prof. Sumit Bhattacharjee
Abstract | PDF |
150-156 |
16. |
Movement Evaluation Algorithm for video coding in Video Compression
G.Shoba, S.Kalaitchelvi, M.Rajeswari
Abstract | PDF |
157-159 |
17. |
COMPARATIVE ANALYSIS OF IMAGE DENOISING TECHNIQUES
Monika Pathak, Sukhdev Singh
Abstract | PDF |
160-167 |
18. |
Fusion of MRI and CT Images with Double Density Dual Tree Discrete Wavelet Transform
Dr.Latha Parthiban
Abstract | PDF |
168-172 |