 Open Access
		Open Access 
		 Subscription or Fee Access
					Subscription or Fee Access
			Table of Contents
Articles
| An Enhanced Speech Based Vmail for Visually Impaired People | PDF   | 
| C. Leena, P. Dhivya, S. Hemalatha, M. Keerthana | 1-5 | 
| Removal of Malicious Nodes Launching Blackhole Attack in MANETs | PDF   | 
| V. Ramya, S. Mylsamy | 6-10 | 
| Energy Aware Span Routing Protocol in Mobile Ad Hoc Networks | PDF   | 
| S. Santhi Priya, H. Muthu Krishnan | 11-16 | 
| On-Demand Clustering Routing Protocol in Ant-Based Algorithm Using WCDS for MANET | PDF   | 
| S. Preethi, K. Logeswaran | 17-22 | 
| Detection of Malicious Nodes in MANETs using Analytical Model | PDF   | 
| G. Srinidhi, K. Sentamilselvan | 23-28 | 
| Detection and Defense Scheme against Selfish Nodes in MAC-Layer | PDF   | 
| V. Shanmathi, C. Poongodi | 29-34 | 
| Opportunistic Cluster Based Broadcasting Using Selective Reliable Broadcast in VANET | PDF   | 
| B. Vidhya, M. Ramalingam | 35-40 | 
| Fire-Alarming Application Model for the Internet of Things | PDF   | 
| Dina Darwish | 41-52 | 
| A Critical Review on the Implementation of MIMO with CSIT and CSIR | PDF   | 
| Dr Seetaiah Kilaru, B. Rohith Kumar, S. Jaipal Reddy, Ch. Revanth, M. Sai Greeshma | 53-57 | 
 
		
		This work is licensed under a Creative Commons Attribution 3.0 License.
ISSN: 0974 – 9640
