Vol 4, No 3 (2012)

Table of Contents

Vol 4, No 3 (2012)

Open Access Open Access  Restricted Access Subscription Access

Articles

Performance Analysis of OFZ-LEACH to Extend Network Lifetime in Wireless Sensor Networks
K. Ramesh, K. Somasundaram
 Vol 4, No 3 (2012), Pagination: 97-101
ABSTRACT |  PDF     Abstract Views: 177  |  PDF Views: 3
Review of Scheduling Schemes and Performance Evaluation of an Enhanced Scheduler
D. Rosy Salomi Victoria, S. Senthil Kumar
 Vol 4, No 3 (2012), Pagination: 102-109
ABSTRACT |  PDF     Abstract Views: 172  |  PDF Views: 3
A Effective Edge Replacement Technique for Packet Distribution System using V-LAN
P. R. Nirmal Binu, K. Sudharson
 Vol 4, No 3 (2012), Pagination: 110-114
ABSTRACT |  PDF     Abstract Views: 320  |  PDF Views: 4
An Efficient Digital Signature Scheme
G. Jai Arul Jose, C. Sajeev, C. Suyambulingom
 Vol 4, No 3 (2012), Pagination: 115-118
ABSTRACT |  PDF     Abstract Views: 170  |  PDF Views: 1
Monitoring and Mitigation of Application Layer DDOS Attacks through Heuristic Methods
C. Nithyanand Niranjan, E. Pooventhan
 Vol 4, No 3 (2012), Pagination: 119-122
ABSTRACT |  PDF     Abstract Views: 173  |  PDF Views: 1
Hybrid Approach in Information-Hypothetically Furtive Solution Generation for Vanishing Wireless Channels
J. Nagaraj, G. M. Kadhar Nawaz
 Vol 4, No 3 (2012), Pagination: 123-130
ABSTRACT |  PDF     Abstract Views: 151  |  PDF Views: 3
Role of Fuzzy Logic in Information Routing-A Review
Paramjit Singh, Ajay K. Sharma, T. S. Kamal
 Vol 4, No 3 (2012), Pagination: 131-134
ABSTRACT |  PDF     Abstract Views: 184  |  PDF Views: 2
A Novel QoS Aware Wavelength Assignment Algorithm with Dedicated Path Protection Consideration for all Optical Networks
K . Ramesh Kumar, R. S. D. Wahida Banu
 Vol 4, No 3 (2012), Pagination: 135-139
ABSTRACT |  PDF     Abstract Views: 161  |  PDF Views: 3
Exploration of Taxonomical Vulnerabilities in Operating System V
A. Ramachandran, S. Ramachandran, A. Sathiyaraj
 Vol 4, No 3 (2012), Pagination: 140-145
ABSTRACT |  PDF     Abstract Views: 173  |  PDF Views: 1
User Preferred Optimal Execution Path Selection from Quality Enabled Multi-Path Web Service Composition Graph
S. Justin Samuel, T. Sasipraba
 Vol 4, No 3 (2012), Pagination: 146-152
ABSTRACT |  PDF     Abstract Views: 153  |  PDF Views: 3
Network Congestion Management for Improved Network Performance
P. Josephine Arul Priya, P. Jaikumar Aravaanan
 Vol 4, No 3 (2012), Pagination: 153-158
ABSTRACT |  PDF     Abstract Views: 164  |  PDF Views: 3
Implicit Password Authentication System
A. Pandian, J. Venkatasubramanian, K. Balaji
 Vol 4, No 3 (2012), Pagination: 159-162
ABSTRACT |  PDF     Abstract Views: 176  |  PDF Views: 1
Dynamic Load Balancing with Partial Knowledge of System in Peer to Peer Networks
R. Vijayalakshmi, S. Muthu Kumarasamy
 Vol 4, No 3 (2012), Pagination: 163-167
ABSTRACT |  PDF     Abstract Views: 162  |  PDF Views: 3
Prevention of Sybil Attack using a Credential System in Anonymizing Networks
S. D. Chandhana, E. A. Mary Anita
 Vol 4, No 3 (2012), Pagination: 168-171
ABSTRACT |  PDF     Abstract Views: 157  |  PDF Views: 3
The Performance of Turbo Codes on a Rayleigh Fading Channel for Wireless Communication Systems
B. Gangadevi, B. Gowridevi, S. V. Arul Shiju, K. A. Anoop, J. Yamuna
 Vol 4, No 3 (2012), Pagination: 172-177
ABSTRACT |  PDF     Abstract Views: 148  |  PDF Views: 2
Smart System for Open Conductor Identification in LT Lines of Distribution System
M. P. Dineshbabu, R. M. Kishorenath, M. Praveenkumar, M. Sakthivel, V. J. Vijayalakshmi
 Vol 4, No 3 (2012), Pagination: 178-182
ABSTRACT |  PDF     Abstract Views: 171  |  PDF Views: 1