Volume 2, Problème 7 (2014)

article de recherche

Data Mining-Based Intrusion Detection Systems

  • B.Muthulakshmi, Dr.V.Thiagarasu

article de recherche

Performance of RANSAC Techniques under Classical and Robust Methods

  • R. Muthukrishnan, E.D. Boobalan, R.Reka

article de recherche

A QoS Based Proactive VHOM Scheme for Interworking of WiMAX/WLAN Networks

  • Naresh Prasad Das, K. Lokesh Krishna, Dr.K.Anuradha

article de recherche

Design of High Capacity Microwave Link between Two Cities

  • R.K Manjunath, Soumya Hegde, Dr.K.N Nagabhushan Raju, Manju.S

article de recherche

An Overview on Facial Image Annotation

  • A.Nithya, K.Haridas

article de recherche

FACE RECOGNITION USING EIGENFACE AND SUPPORT VECTOR MACHINE

  • MR. KANNAN SUBRAMANIAN

article de recherche

The Survey of Congestion Control Protocols for Smart Transport System

  • Koushik reddy ramasani, Dr.syed umar, seelam eswar reddy

article de recherche

Fusion of RGB and Depth Images for Robust Face Recognition using Close-Range 3D Camera

  • Srinivas Kishan Anapu, Dr. Srinivasa Rao Peri

article de recherche

Authentication Provision for WSN Based On Multilevel Security

  • Shamna Hameed, Liliya.T.Jose

article de recherche

A Review on Geographic Routing in Wireless Sensor Network

  • Anandhi.R, Dr.R.Manicka chezian

article de recherche

On The Performance Analysis of AODV Protocol in Mobile Ad-Hoc Network

  • Mitali Sinha , Mira Rani Debbarma, Sangita Rani Bhowmik, Trina Sil, Jhunu Debbarma

article de recherche

A Hybrid Routing Protocol for VANETs

  • B.Sahaya Jenila, S.Ashvini

article de recherche

Performance of M-PSK Schemes under Rayleigh Fading Channels

  • Vivekanand, KangkanThakuria, AbhijyotiGhosh

article de recherche

A Novel Method for Peer To Peer Sharing Using Cloud Based Mobile Social TV (Cloud MoV)

  • D.Bhanu sravanthi , A Nageswara Rao

article de recherche

Comparative Analysis of Image Quality Assessment Using HVS Model

  • Anu, Komal, Shipra Khurana, Amit Kumar

article de recherche

A New Fast Access Low Power Multilevel Cache Architecture

  • Janeera.D.A, Dr.H.Mangalam

article de recherche

Privacy and Security of Distributed Accountability in Cloud

  • Gokulakannan R , Manjunath G, R Arulselvi

article de recherche

Optimized Blowfish Encryption Technique

  • Christina L , Joe Irudayaraj V S

article de recherche

Beaconing Strategy for Geo-Graphic Routing In Mobile Ad Hoc Networks

  • Pasupuleti Neelima, K.Bhargavi

article de recherche

Dynamic Scheduling and Pricing in Wireless Cloud Computing

  • R.Saranya, G.Indra, Kalaivani.A

article de recherche

A Survey: Routing Protocols in MANETs

  • Krupa A Talwar, Benakappa S M, Dr. Yuvaraju B N

article de recherche

A Reliable Cloud Data Sharing Scheme Ensuring Security for Frequent Change of Membership

  • Kanchan Govinda Vaidya, P. Jyotheeswari

article de recherche

Optimized Link State Routing In Wireless Ad Hoc Sensor Networks

  • Sreekanth Reddy Dandala, B Sowmya

article de recherche

Emotion Recognition Using Human Computation Technique

  • DR.A.MUTHU KUMARAVEL

article de recherche

Secure Multiparty Data Anonymization and Integration with m-Privacy

  • M.Ashok Kumar, R.Nandhakumar,

article de recherche

Reliability in MAC Protocols for Wireless Sensor Networks: A Survey

  • Nicholas N. Karekwaivanane, Wilson Bakasa, Kudakwashe Zvarevashe

article de recherche

Comparative Analysis of advanced Face Recognition Techniques

  • MS.P.JENNIFER, DR. A. MUTHU KUMARAVEL

article de recherche

Balancing the Virtual Machines Load by Dynamic Move for Cloud Environment

  • Dhanasekar.P , A.Senthilkumar ,Sairamprabhu.S.G

article de recherche

Secure Routing In Mobile Adhoc Networks (MANET)

  • Muralidharan.R , Sampathkumar.J , Palanisamy.P.N

article de recherche

Automated Anaphora Resolution

  • Kalyani Kamune, Avinash Agrawal