Volume-2 , Issue-2 , Feb - 2014 Go Back

Open Access   Article

Modeling of a Building With The Aim of The Evaluation of its Energy Consumption Application to a Typical Building in Morocco

G. Touria, S. Abdallah
Research Paper | Journal Paper
Vol.2 , Issue.2 , pp.1-5, Feb-2014
Open Access   Article

Constraint Random Verification of Network Router for System on Chip Applications Using Advanced Verification Methodologies

L.S. Bandaru, V.K. Sandepudi, C. Sindhuja
Research Paper | Journal Paper
Vol.2 , Issue.2 , pp.6-10, Feb-2014
Open Access   Article

Network Security and Methods of Encoding and Decoding

S. Kaur, R. Singh, S. Gagneja
Research Paper | Journal Paper
Vol.2 , Issue.2 , pp.11-15, Feb-2014
Open Access   Article

Analysis of Speech Algorithms in Disease affected Voice Patterns

D. Karunanithi, P. Rodrigues
Research Paper | Journal Paper
Vol.2 , Issue.2 , pp.16-20, Feb-2014
Open Access   Article

A Survey on Secure Handover Optimization in Mobile WiMAX Network

B.M. Nikhar, K.N. Hande
Survey Paper | Journal Paper
Vol.2 , Issue.2 , pp.21-27, Feb-2014
Open Access   Article

Pattern Based Cache Management Policies

N. Dafre, U. Shrawankar, D. Kapgate
Technical Paper | Journal Paper
Vol.2 , Issue.2 , pp.28-35, Feb-2014
Open Access   Article

Energy Efficient Routing with Mobile Collector in Wireless Sensor Networks (WSNs)

R. Nathiya, S.G. Santhi
Research Paper | Journal Paper
Vol.2 , Issue.2 , pp.36-43, Feb-2014
Open Access   Article

Shortest Route Algorithm Using Dynamic Programming by Forward Recursion

N. Karthikeyan
Research Paper | Journal Paper
Vol.2 , Issue.2 , pp.44-48, Feb-2014
Open Access   Article

Resource Management in Large Cloud Environments Using Lyapunov and Heuristic Algorithm

T. Therasa, V. Vasanth, M. Vidhya
Review Paper | Journal Paper
Vol.2 , Issue.2 , pp.49-51, Feb-2014
Open Access   Article

An Innovational Approach to Security in Cloud Environment

N. Thakur, V. Pandey, B. Singh
Survey Paper | Journal Paper
Vol.2 , Issue.2 , pp.52-54, Feb-2014
Next    Last