![Open Access](https://www.ciitresearch.org/dl/lib/pkp/templates/images/icons/fulltext_open_medium.gif)
![Restricted Access](https://www.ciitresearch.org/dl/lib/pkp/templates/images/icons/fulltext_restricted_medium.gif)
Table of Contents
Articles
An Enhanced Speech Based Vmail for Visually Impaired People |
PDF
![]() |
C. Leena, P. Dhivya, S. Hemalatha, M. Keerthana | 1-5 |
Removal of Malicious Nodes Launching Blackhole Attack in MANETs |
PDF
![]() |
V. Ramya, S. Mylsamy | 6-10 |
Energy Aware Span Routing Protocol in Mobile Ad Hoc Networks |
PDF
![]() |
S. Santhi Priya, H. Muthu Krishnan | 11-16 |
On-Demand Clustering Routing Protocol in Ant-Based Algorithm Using WCDS for MANET |
PDF
![]() |
S. Preethi, K. Logeswaran | 17-22 |
Detection of Malicious Nodes in MANETs using Analytical Model |
PDF
![]() |
G. Srinidhi, K. Sentamilselvan | 23-28 |
Detection and Defense Scheme against Selfish Nodes in MAC-Layer |
PDF
![]() |
V. Shanmathi, C. Poongodi | 29-34 |
Opportunistic Cluster Based Broadcasting Using Selective Reliable Broadcast in VANET |
PDF
![]() |
B. Vidhya, M. Ramalingam | 35-40 |
Fire-Alarming Application Model for the Internet of Things |
PDF
![]() |
Dina Darwish | 41-52 |
A Critical Review on the Implementation of MIMO with CSIT and CSIR |
PDF
![]() |
Dr Seetaiah Kilaru, B. Rohith Kumar, S. Jaipal Reddy, Ch. Revanth, M. Sai Greeshma | 53-57 |
![Creative Commons License](http://i.creativecommons.org/l/by/3.0/80x15.png)
This work is licensed under a Creative Commons Attribution 3.0 License.
ISSN: 0974 – 9640