Volume-2 , Issue-8 , Aug - 2014 Go Back

Open Access   Article

A Comprehensive Survey on Methods Implemented For Intruder Detection System

B. Kiranmai, A. Damodaram
Research Paper | Journal Paper
Vol.2 , Issue.8 , pp.70-73, Aug-2014
Open Access   Article

Carrier Frequency Offset Estimation Techniques in OFDM System: A Survey

S. Singh, A.S. Buttar
Survey Paper | Journal Paper
Vol.2 , Issue.8 , pp.74-77, Aug-2014
Open Access   Article

A Hop Based Robust Routing Protocol in Wireless Sensor Network

D. Suresh, K. Selvakumar
Research Paper | Journal Paper
Vol.2 , Issue.8 , pp.78-81, Aug-2014
Open Access   Article

Mechanisms for Secure Data Transmission: A Survey

B. Jyoshna
Review Paper | Journal Paper
Vol.2 , Issue.8 , pp.82-83, Aug-2014
Open Access   Article

Augmentation of Information Security by Cryptography in Cloud Computing

K.Revana Suresh, Ch. Shasikala, S.P. Kumar
Research Paper | Journal Paper
Vol.2 , Issue.8 , pp.84-87, Aug-2014
Open Access   Article

Energy Saving For Mobile Users Using Cloud Computing Via S3

K. Venkateswarlu, M.S. Lakshmi, S.P. Kumar
Research Paper | Journal Paper
Vol.2 , Issue.8 , pp.88-92, Aug-2014
Open Access   Article

Optimization of Multi-server Configuration for Profit Maximization using M/M/m Queuing Model

M.G. Madhusudhan, K.D. Babu
Research Paper | Journal Paper
Vol.2 , Issue.8 , pp.93-98, Aug-2014
Open Access   Article

Reliability Based Task Allocation Scheme to Enhance the Performance of Distributed Environment

F.N. Khan, K. Govil
Research Paper | Journal Paper
Vol.2 , Issue.8 , pp.99-102, Aug-2014
Open Access   Article

Derailment Assessment using FBG

A. Kumar
Research Paper | Journal Paper
Vol.2 , Issue.8 , pp.103-107, Aug-2014
Open Access   Article

Encoded Video Stream Sharing in Mobile Social TV using Clouds

P.B. Prakash, P.S. Basha
Research Paper | Journal Paper
Vol.2 , Issue.8 , pp.108-111, Aug-2014
First    Previous    Next    Last