Volume-2 , Issue-5 , May - 2014 Go Back

Open Access   Article

The Role of Morphological Analyzer and Generator for Tamil Language in Machine Translation Systems

S. Ananthi , D.V.R. Angela
Survey Paper | Journal Paper
Vol.2 , Issue.5 , pp.107-111, May-2014
Open Access   Article

DoS Flooding Attacks against SIP based VoIP Systems- a Survey

M.Kaur, S. Kumar, S. Sharma
Survey Paper | Journal Paper
Vol.2 , Issue.5 , pp.112-117, May-2014
Open Access   Article

A Review of Approaches for Steganography

K. Arora, G. Gandhi
Review Paper | Journal Paper
Vol.2 , Issue.5 , pp.118-122, May-2014
Open Access   Article

Usage of Multiple Clouds to increase Security in Cloud Computing

Ch.A. Kumar, K.S. Rao
Research Paper | Journal Paper
Vol.2 , Issue.5 , pp.123-125, May-2014
Open Access   Article

Analysis on Social Networking

K. Nasa, U. Sharma
Research Paper | Journal Paper
Vol.2 , Issue.5 , pp.126-128, May-2014
Open Access   Article

Defending Against Source Routing Attacks and Packet Forwarding in Ad-Hoc Networks

S. Kolla
Research Paper | Journal Paper
Vol.2 , Issue.5 , pp.129-133, May-2014
Open Access   Article

Detecting Face in video file and images

N. Mahale, M.S. Nagmode
Research Paper | Journal Paper
Vol.2 , Issue.5 , pp.134-137, May-2014
Open Access   Article

Efficacy of Different Strategies in Graph Coloring with Parallel Genetic Algorithms

F.E. Sangari, M. Nabahat
Research Paper | Journal Paper
Vol.2 , Issue.5 , pp.138-141, May-2014
Open Access   Article

Comparative Study of Hierarchical Routing Protocols in Wireless Sensor Networks

V. Singhal, S. Suri
Review Paper | Journal Paper
Vol.2 , Issue.5 , pp.142-147, May-2014
Open Access   Article

Comparative Study and Analysis of DSR, DSDVAND ZRP in Mobile Ad-Hoc Networks

R. Kachal, S. Suri
Research Paper | Journal Paper
Vol.2 , Issue.5 , pp.148-152, May-2014
First    Previous    Next    Last