Table of Contents
Vol 4, No 3 (2012)


Articles
Performance Analysis of OFZ-LEACH to Extend Network Lifetime in Wireless Sensor Networks | ||
K. Ramesh, K. Somasundaram | ||
Vol 4, No 3 (2012), Pagination: 97-101 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 322 | PDF Views: 3 |
Review of Scheduling Schemes and Performance Evaluation of an Enhanced Scheduler | ||
D. Rosy Salomi Victoria, S. Senthil Kumar | ||
Vol 4, No 3 (2012), Pagination: 102-109 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 329 | PDF Views: 3 |
A Effective Edge Replacement Technique for Packet Distribution System using V-LAN | ||
P. R. Nirmal Binu, K. Sudharson | ||
Vol 4, No 3 (2012), Pagination: 110-114 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 509 | PDF Views: 4 |
An Efficient Digital Signature Scheme | ||
G. Jai Arul Jose, C. Sajeev, C. Suyambulingom | ||
Vol 4, No 3 (2012), Pagination: 115-118 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 327 | PDF Views: 1 |
Monitoring and Mitigation of Application Layer DDOS Attacks through Heuristic Methods | ||
C. Nithyanand Niranjan, E. Pooventhan | ||
Vol 4, No 3 (2012), Pagination: 119-122 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 307 | PDF Views: 1 |
Hybrid Approach in Information-Hypothetically Furtive Solution Generation for Vanishing Wireless Channels | ||
J. Nagaraj, G. M. Kadhar Nawaz | ||
Vol 4, No 3 (2012), Pagination: 123-130 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 285 | PDF Views: 3 |
Role of Fuzzy Logic in Information Routing-A Review | ||
Paramjit Singh, Ajay K. Sharma, T. S. Kamal | ||
Vol 4, No 3 (2012), Pagination: 131-134 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 334 | PDF Views: 2 |
A Novel QoS Aware Wavelength Assignment Algorithm with Dedicated Path Protection Consideration for all Optical Networks | ||
K . Ramesh Kumar, R. S. D. Wahida Banu | ||
Vol 4, No 3 (2012), Pagination: 135-139 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 320 | PDF Views: 3 |
Exploration of Taxonomical Vulnerabilities in Operating System V | ||
A. Ramachandran, S. Ramachandran, A. Sathiyaraj | ||
Vol 4, No 3 (2012), Pagination: 140-145 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 317 | PDF Views: 1 |
User Preferred Optimal Execution Path Selection from Quality Enabled Multi-Path Web Service Composition Graph | ||
S. Justin Samuel, T. Sasipraba | ||
Vol 4, No 3 (2012), Pagination: 146-152 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 303 | PDF Views: 3 |
Network Congestion Management for Improved Network Performance | ||
P. Josephine Arul Priya, P. Jaikumar Aravaanan | ||
Vol 4, No 3 (2012), Pagination: 153-158 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 299 | PDF Views: 3 |
Implicit Password Authentication System | ||
A. Pandian, J. Venkatasubramanian, K. Balaji | ||
Vol 4, No 3 (2012), Pagination: 159-162 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 323 | PDF Views: 1 |
Dynamic Load Balancing with Partial Knowledge of System in Peer to Peer Networks | ||
R. Vijayalakshmi, S. Muthu Kumarasamy | ||
Vol 4, No 3 (2012), Pagination: 163-167 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 315 | PDF Views: 3 |
Prevention of Sybil Attack using a Credential System in Anonymizing Networks | ||
S. D. Chandhana, E. A. Mary Anita | ||
Vol 4, No 3 (2012), Pagination: 168-171 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 311 | PDF Views: 3 |
The Performance of Turbo Codes on a Rayleigh Fading Channel for Wireless Communication Systems | ||
B. Gangadevi, B. Gowridevi, S. V. Arul Shiju, K. A. Anoop, J. Yamuna | ||
Vol 4, No 3 (2012), Pagination: 172-177 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 296 | PDF Views: 2 |
Smart System for Open Conductor Identification in LT Lines of Distribution System | ||
M. P. Dineshbabu, R. M. Kishorenath, M. Praveenkumar, M. Sakthivel, V. J. Vijayalakshmi | ||
Vol 4, No 3 (2012), Pagination: 178-182 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 312 | PDF Views: 1 |