Volume 2, Problème 10 (2014)

article de recherche

The Use and Industrial Importance of Virtual Databases

  • Dr V S Dhaka, Sonali Vyas

article de recherche

An Efficient Attack Resistance Model Using Application Based Polynomial Distribution

  • Vince Paul, Dr. K. Prasadh, Jasmy Davies

article de recherche

A Survey of Cloud Authentication Attacks and Solution Approaches

  • B.Sumitra, C.R. Pethuru, M.Misbahuddin

article de recherche

Mobile Social TV based on Cloud

  • Rajesh Mallela, K.Rajsekhar Reddy and M.Subba Rao

article de recherche

Mitigation of Vampire Attacks in Wireless Sensor Networks

  • M.Nageswara Prasadhu, D.V.Bharath and G.Lakshmikanth

article de recherche

Neighbour Position Discovery and Verification in MANETs

  • S.Feroz Ahammad and M.Vikram and Kadiyala Ramana

article de recherche

A Novel Cloud based Mobile Social TV

  • Srilatha Pavuluri and S.Sravani and Kadiyala Ramana

article de recherche

Advanced Data Access Scheme in Disruption Tolerant Network

  • S.Revathi , A.P.V.Raghavendra

article de recherche

A Survey of Random Routing Protocol for Load Reduction in MANET's

  • Tipirneni Venkata Satyanarayana, Dr.syed umar, Vunnam Naresh, Pillarisetty vivek

article de recherche

OTP Encryption Techniques in Mobiles for Authentication and Transaction Security

  • Dr.AnanthiShesashaayee, D. Sumathy

article de recherche

Comprehensive and Comparative Analysis of Cryptographic Solutions in Cloud

  • P.Madhubala , Dr.P.Thangaraj

article de recherche

A Survey of Associate Access Points to Increase the Performance of IEEE 802.11 Wirelesses LAN

  • Tipirneni Venkata Satyanarayana, Dr.syed umar, Devagiri Sayee Chaitanya Reddy, Harshad Mahatha.Shaik

article de recherche

A Survey of Clustering In Mobile Ad-Hoc Networks

  • K.Madhu Pavan, Dr.syed umar, P.V.Avinash Reddy, Munnangi.Chandradeep

article de recherche

Designing Of Fast Multipliers with Ancient Vedic Techniques

  • Jeevitha.R, Jayanthi.P, Gowthami A.K, Uvarajan K.P

article de recherche

Enhancing the Performance of Mining High Utility Itemsets Based On Pattern Algorithm

  • Ranjith Kumar. M, kalaivani. A, Dr. Sankar Ram. N

article de recherche

Dijkstra’s Shortest Path Algorithm for Road Network

  • K.Rohila, P.Gouthami, Priya M

article de recherche

Hot Topics Perception in Social Network

  • Kayalvizhi P, Anoor Selvi C

article de recherche

Advanced Data Access Scheme in Disruption Tolerant Network

  • S.Revathi , A.P.V.Raghavendra

article de recherche

Improvement of Energy Efficiency in Wireless Sensor Network Using Intelligent Water Drop

  • Harshwinder Singh, Navpreet Kaur Walia

article de recherche

Big Data Analytics Security Issues in Data Driven Information System

  • M. Chithik Raja, Munir Ahmed Rabbani

article de recherche

Stateless Routing for Wireless Networks Using Ravenous Perimeter

  • Anwar Ahsan, U T Nagdeve

article de recherche

A Recent Improvements in Quantum Model and Counter Measures in Quantum Computing

  • J.Senthil Murugan, V.Parthasarathy , S.Sathya, M.Anand

article de recherche

A Study of Information Extraction Tools for Online English Newspapers (PDF): Comparative Analysis

  • M. Hanumanthappa, Deepa T. Nagalavi, Manish Kumar

article de recherche

A Study on Unidentified Routing Protocols in MANETs

  • N.Saravana Selvam, R.T.Nivetha, S.S.Nevatha

article de recherche

A Survey on Delegated Access Control in Public Cloud

  • V.Karthik, K.S.Arvind

article de recherche

A Survey of Web Image Search and Re- Ranking Technique

  • B. Steffi Graph, M. Ramesh

article de recherche

Incremental Violation Detection of Inconsistencies in Distributed Cloud Data

  • S. Anantha Arulmary, N.S. Usha

article de recherche

A Data Mining Model to Read and Classify Your Employees’ Attitude

  • J John Victor Antony, G M Nasira

article de recherche

Protection of Smartphone, Personal Computer and Other Similar Devices from Virus Infections

  • Sudhakar Singh, P.K. Khare, J.M. Keller, P. Mor, M.K. Pathak

article de recherche

Investigations on Remote Virtual Machine to Secure Lifetime PHR in Cloud

  • V.M.Prabhakaran, Prof.S.Balamurugan, S.Charanyaa

article de recherche

A Novel Technique for Detection of CVSD Encoded Bit Stream

  • Parthraj Tripathi, Dr.K.Padma Raju, V.Ravi Chandra

article de recherche

Certain Investigations on Securing Moving Data Objects

  • P.Andrew, J.Anish Kumar, R.Santhya, Prof.S.Balamurugan, S.Charanyaa

article de recherche

Investigations on Evolution of Strategies to Preserve Privacy of Moving Data Objects

  • P.Andrew, J.Anish Kumar, R.Santhya, Prof.S.Balamurugan, S.Charanyaa

article de recherche

Certain Investigations on Strategies for Protecting Medical Data in Cloud

  • V.M.Prabhakaran, Prof.S.Balamurugan, S.Charanyaa

article de recherche

DC Chopping for High Power Application

  • D.Pavithra , K.C.Anandhan

article de recherche

Impact of Using G.729 on the Voice over LTE Performance

  • Younes LABYAD, Mohammed MOUGHIT1, 2, Abderrahim Marzouk1, Abdelkrim HAQIQ1, 3

article de recherche

Improving Ad Hoc Network Behaviour Using Clustering T echnique with NS2

  • GhaidaaMuttasher Abdulsahib, Norrozila Sulaiman, Osamah Ibrahem Khalaf,