Open Access
Subscription or Fee Access
Table of Contents
Articles
An Enhanced Speech Based Vmail for Visually Impaired People | |
C. Leena, P. Dhivya, S. Hemalatha, M. Keerthana | 1-5 |
Removal of Malicious Nodes Launching Blackhole Attack in MANETs | |
V. Ramya, S. Mylsamy | 6-10 |
Energy Aware Span Routing Protocol in Mobile Ad Hoc Networks | |
S. Santhi Priya, H. Muthu Krishnan | 11-16 |
On-Demand Clustering Routing Protocol in Ant-Based Algorithm Using WCDS for MANET | |
S. Preethi, K. Logeswaran | 17-22 |
Detection of Malicious Nodes in MANETs using Analytical Model | |
G. Srinidhi, K. Sentamilselvan | 23-28 |
Detection and Defense Scheme against Selfish Nodes in MAC-Layer | |
V. Shanmathi, C. Poongodi | 29-34 |
Opportunistic Cluster Based Broadcasting Using Selective Reliable Broadcast in VANET | |
B. Vidhya, M. Ramalingam | 35-40 |
Fire-Alarming Application Model for the Internet of Things | |
Dina Darwish | 41-52 |
A Critical Review on the Implementation of MIMO with CSIT and CSIR | |
Dr Seetaiah Kilaru, B. Rohith Kumar, S. Jaipal Reddy, Ch. Revanth, M. Sai Greeshma | 53-57 |
This work is licensed under a Creative Commons Attribution 3.0 License.
ISSN: 0974 – 9640