Table of Contents
Articles
| Steganography Using Genetic Algorithm Along with Visual Cryptography for Mobile Environment Applications |
PDF
|
| S. Jagadeesan | 269-272 |
| Design and Performance Analysis of 2x5Gbps Bidirectional WDM-PON System |
PDF
|
| Khushboo Arora, Himali Sarangal, Diksha Duggal | 273-276 |
| Analysis of Spectrum Sharing in Cognitive Radio Network |
PDF
|
| Subhasree Bhattacharjee | 277-280 |
| Joint Physical-Application Layer Security for Connectionless Multimedia Delivery |
PDF
|
| C. Navamani, R. Savanthini, A. Mohan, M. Vanitha | 281-284 |
| A Survey: Security Threats/Attacks in Cognitive Radio Network |
PDF
|
| Hadeer Alaa, Waleed Saad, Mona Shokair, Said El-Halfawy | 285-290 |
| Comparative Study of Spectrum Sensing for Cognitive Radio System Using Energy Detection and Matched Filter Detection Techniques |
PDF
|
| Mohamed Saad Zghloul, Eman Fathy | 291-295 |
| Generation of Narrow Beams from Thinned Circular Antenna Array with Dipole Elements using BAT Algorithm |
PDF
|
| U. Ratna Kumari, P. Mallikarjuna Rao, G.S.N. Raju | 296-300 |
This work is licensed under a Creative Commons Attribution 3.0 License.
ISSN: 0974 – 9640