Vol 4, No 2 (2013)

Table of Contents

Vol 4, No 2 (2013)

Open Access Open Access  Restricted Access Subscription Access

Articles

Implementation and Comparison of Different CIC Filter Structure for Decimation
M. Madheswaran, V. Jayaprakasan
 Vol 4, No 2 (2013), Pagination: 709-716
ABSTRACT |  PDF     Abstract Views: 167  |  PDF Views: 0
Conception of Bi-Fold Authenticated Agent - Monitored Transaction Architecture
Srivatsan Sridharan, Gorthy Ravi Kiran
 Vol 4, No 2 (2013), Pagination: 717-722
ABSTRACT |  PDF     Abstract Views: 181  |  PDF Views: 0
Efficient Load Balancing Technique to Ensure Predictability and Reliability in Wireless Sensor Network
G. Vasantha Suganthi, E. Srie Vidhya Janani
 Vol 4, No 2 (2013), Pagination: 723-730
ABSTRACT |  PDF     Abstract Views: 169  |  PDF Views: 0
On Secure Full Duplex Communication in Mobile AD HOC Network
S. C. Gupta Dutta, Sudha Singh, D. K. Singh
 Vol 4, No 2 (2013), Pagination: 731-736
ABSTRACT |  PDF     Abstract Views: 185  |  PDF Views: 0
A Unified Approach for Detection and Prevention of DDOS Attacks Using Enhanced Support Vector Machines and Filtering Mechanisms
T. Subbulakshmi, P. Parameswaran, C. Parthiban, M. Mariselvi, J. Adlene Anusha, G. Mahalakshmi
 Vol 4, No 2 (2013), Pagination: 737-743
ABSTRACT |  PDF     Abstract Views: 214  |  PDF Views: 0
Analysis of the Crosstalk in Optical Amplifiers
Mandeep Singh, S. K. Raghuwanshi
 Vol 4, No 2 (2013), Pagination: 744-749
ABSTRACT |  PDF     Abstract Views: 167  |  PDF Views: 0
Improving Resource Utilization Using Qos Based Load Balancing Algorithm for Multiple Workflows in IAAS Cloud Computing Environment
L. Shakkeera, Latha Tamilselvan, Mohamed Imran
 Vol 4, No 2 (2013), Pagination: 750-757
ABSTRACT |  PDF     Abstract Views: 158  |  PDF Views: 0