Vol 7, No 1 (2015)

Table of Contents

Vol 7, No 1 (2015)

Articles

Security Solutions against Computer Networks Threats
Fatemeh Soleimani Roozbahani, Reihaneh Azad
 Vol 7, No 1 (2015), Pagination: 2576-2581
ABSTRACT |  PDF Abstract Views: 125  |  PDF Views: 3
Routing Optimization with Load Balancing:An Energy Efficient Approach
S. Prabhavathi, A. Subramanyam, A. Ananda Rao
 Vol 7, No 1 (2015), Pagination: 2582-2592
ABSTRACT |  PDF Abstract Views: 119  |  PDF Views: 2
Managing Instantly Dense Hot Spot Regions in Wireless Cellular Communication Networks
Vikas Solanki, M. Qasim Rafiq
 Vol 7, No 1 (2015), Pagination: 2593-2605
ABSTRACT |  PDF Abstract Views: 124  |  PDF Views: 2
Significant Data Hiding through Discrete Wavelet Transformation Approach
Premal B. Nirpal, Ganesh M. Magar
 Vol 7, No 1 (2015), Pagination: 2606-2610
ABSTRACT |  PDF Abstract Views: 133  |  PDF Views: 2
An Adaptive Cluster Based Routing Protocol for WSN
G. H. Raghunandan, R. Navyashree, S. Jagadish, Arshiya Farheen
 Vol 7, No 1 (2015), Pagination: 2611-2615
ABSTRACT |  PDF Abstract Views: 145  |  PDF Views: 2
The Use of Monte Carlo Simulation in Quantitative Risk Assessment of IT Projects
Sanaz Nikghadam Hojjati, Nasibeh Rahbar Noudehi
 Vol 7, No 1 (2015), Pagination: 2616-2621
ABSTRACT |  PDF Abstract Views: 132  |  PDF Views: 2
Monitoring in IOT Enabled Devices
Udit Gupta
 Vol 7, No 1 (2015), Pagination: 2622-2625
ABSTRACT |  PDF Abstract Views: 131  |  PDF Views: 4
Classification of Cloud Types for Rainfall Forecasting
Niyati Salot, Priya R. Swaminarayan
 Vol 7, No 1 (2015), Pagination: 2626-2629
ABSTRACT |  PDF Abstract Views: 152  |  PDF Views: 4
Distributed Computing:An Overview
Md. Firoj Ali, Rafiqul Zaman Khan
 Vol 7, No 1 (2015), Pagination: 2630-2635
ABSTRACT |  PDF Abstract Views: 141  |  PDF Views: 3
Secure Management of Logs in Internet of Things
Udit Gupta
 Vol 7, No 1 (2015), Pagination: 2636-2639
ABSTRACT |  PDF Abstract Views: 120  |  PDF Views: 3