Issue | Title | |
Vol 4, No 5 (2012) | Multimedia Access Community for Unstructured P2P Networks | Abstract |
M. Manikandaprabu, R. Gnanakumaran, R. Gopinath | ||
Vol 4, No 10 (2012): Regular Issue | Multimedia Conferencing and Data Collaboration Using Java Media Framework | Abstract |
Radhika Pai, Nutan Kamat, Sonali Naik, Soniya Chari, Rachel Dhanaraj | ||
Vol 6, No 8 (2014) | Multi-Party Electronic Payment System using ECCMA Algorithm | Abstract |
A. Udhayakumar, Dr.K. Ravikumar | ||
Vol 8, No 3 (2016) | Multi-Stage Secret Sharing Schemes Based on Asmuth’s Bloom Sequence | Abstract |
Appala Naidu Tentu, V. Kamakshi Prasad, V. Ch. Venkaiah | ||
Vol 2, No 7 (2010) | N Level Unicode Position Character Length Cipher for Securing Smart Card | Abstract |
Dr. P. Vijayakumar, M. Palanivelu, M. Latha Karthigaa, N. Balachandar, M. Karthi | ||
Vol 3, No 1 (2011) | Need for Enhanced Standards in Information Security, Cryptography | Abstract |
K. Anupama | ||
Vol 3, No 5 (2011) | Network Based Virtual Compilation – C/C++ and JAVA | Abstract |
Shiv Sutar, Umesh Mergu, Swapnil Thale | ||
Vol 3, No 14 (2011) | Network Centric Warfare- Concepts and Challenges | Abstract |
D. Anand, Ch. Raja, Dr.E.G. Rajan | ||
Vol 4, No 3 (2012) | Network Congestion Management for Improved Network Performance | Abstract |
P. Josephine Arul Priya, P. Jaikumar Aravaanan | ||
Vol 8, No 3 (2016) | Network Intrusion Detection by Finding Correlation between Multiple Features using K-means Algorithm & Multivariate Correlation Analysis | Abstract |
Prasad Kolhe, Siddharth Bhosale, Sagar Lathe, Shubham Mane, Rashmi Bhattad | ||
Vol 3, No 15 (2011) | Network Management Systems Simulation | Abstract |
Dr. G.S. Nagaraja, Tabrez Zahoor | ||
Vol 3, No 9 (2011) | Network Monitoring Using Genetic Algorithm | Abstract |
Amit Savyanavar, Mayank Manish, Raunak Agarwal, Devanshu Gupta, Saral Jain | ||
Vol 1, No 8 (2009) | Network Performance Enhancement using New Active Queue Management | Abstract |
S. Malarvizhi, Dr. M. Madeshwaran | ||
Vol 5, No 4 (2013) | Network Reconfiguration of Distribution System Using Harmony Search Algorithm | Abstract |
T.D. Sudhakar | ||
Vol 9, No 9 (2017) | Network Security and Cryptography Techniques | Abstract |
N. Valarmathy, P. Vishnupriya | ||
Vol 3, No 10 (2011) | Network Security in Mobile AD-HOC Network (MANET) | Abstract |
R. Vassoudhevan, R. Sivagami, Z. Saffna Sarmilla, R. Divya | ||
Vol 4, No 13 (2012) | Network Security Management in Wireless Networks through 3-Round Zero Knowledge Proof | Abstract |
K. Vamsiram, I. Bala Venkateswarlu | ||
Vol 4, No 11 (2012) | Network Structure Based Routing Techniques in Wireless Sensor Networks: A Comprehensive Survey | Abstract |
Sunil Kumar Kaushik, Ruchi Aggarwal, Gourav Bathla, Pushkar Raj | ||
Vol 7, No 1 (2015) | Network Throughput Improvement using Dijkstra’s and Floyd Warshall Algorithm | Abstract |
A. Priyanka Patil, S.P. Gaikwad | ||
Vol 3, No 1 (2011) | Neural Networks Based QoS Scheduling in WiMAX | Abstract |
D. David Neels Pon Kumar, K. Murugesan, S. Raghavan, M. Suganthi | ||
Vol 3, No 14 (2011) | New Authentication Mechanism with Home Agent in Next Generation Mobile Internet Protocol - Version6 (MIPv6) | Abstract |
D. Sathish | ||
Vol 4, No 6 (2012) | New Data Encryption Standard Algorithm | Abstract |
C.V. Anchugam | ||
Vol 4, No 4 (2012) | New Encryption Standard and Particular Case of GOST Algorithm | Abstract |
Chandra Sekhar Maganty, K. Sai Prasanthi, K. Sai Sruthi | ||
Vol 3, No 11 (2011) | Novel Approach for Hiding Secret Data in Image Using Cryptic Steganography | Abstract |
R. Bala | ||
Vol 2, No 10 (2010) | Novel Approach for Medical Image Compression using Efficient Hybrid Image Coder | Abstract |
S. Manimurugan, Dr.K. Porkumaran | ||
651 - 675 of 963 Items | << < 22 23 24 25 26 27 28 29 30 31 > >> |
ISSN: 0974 – 9616