Vol 1, No 6 (2010)

Table of Contents

Vol 1, No 6 (2010)

Articles

Proposed Methodology for Securing Wireless LANs from Wormhole Attack
A. K. Patel, Jaypalsinh A. Gohil, D. T. Meva
 Vol 1, No 6 (2010), Pagination: 342-346
ABSTRACT |  PDF Abstract Views: 113  |  PDF Views: 0
Robust Image Transmission Over Noisy Channel Using Independent Component Analysis
N. A. Deepak, Rajesh Shukla, D. Puttegowda
 Vol 1, No 6 (2010), Pagination: 347-352
ABSTRACT |  PDF Abstract Views: 107  |  PDF Views: 0
Exploring Round Trip Time Fairness for Adaptive Layered Transmission Control Protocol
V. Kavidha, V. Sadasivam
 Vol 1, No 6 (2010), Pagination: 353-358
ABSTRACT |  PDF Abstract Views: 107  |  PDF Views: 0
Content-Based Color Image Retrieval Using Adaptive Lifting
P. Manimegalai, K. Thanushkodi
 Vol 1, No 6 (2010), Pagination: 359-366
ABSTRACT |  PDF Abstract Views: 114  |  PDF Views: 0
Data Hiding and Water Marking Security Based on Nested Lattices
V. S. Giridhar Akula, P. Chandra Sekhar Reddy, N. Kalpa Latha, R. Sivam
 Vol 1, No 6 (2010), Pagination: 367-370
ABSTRACT |  PDF Abstract Views: 122  |  PDF Views: 0
Efficient Bio Metric IRIS Recognition System Using Fuzzy Neural Network
T. Karthikeyan
 Vol 1, No 6 (2010), Pagination: 371-376
ABSTRACT |  PDF Abstract Views: 112  |  PDF Views: 0
Remote Administrative Suite for Unix-Based Servers
G. Rama Koteswara Rao, G. Siva Nageswara Rao, B. V. Subba Rao
 Vol 1, No 6 (2010), Pagination: 377-381
ABSTRACT |  PDF Abstract Views: 113  |  PDF Views: 0
Adaptive CHOKe:An Algorithm to Increase the Fairness in Internet Routers
K. Chitra, G. Padamavathi
 Vol 1, No 6 (2010), Pagination: 382-386
ABSTRACT |  PDF Abstract Views: 103  |  PDF Views: 0
Threshold Based Authorization Model for Authentication of a Node in Wireless Mesh Networks
Divya Bansal, Sanjeev Sofat
 Vol 1, No 6 (2010), Pagination: 387-392
ABSTRACT |  PDF Abstract Views: 105  |  PDF Views: 0
System Security Management in SNMP
P. Deivendran, R. Dhanapal
 Vol 1, No 6 (2010), Pagination: 393-399
ABSTRACT |  PDF Abstract Views: 102  |  PDF Views: 0
Implementation of Web Usage Mining Using APRIORI and FP Growth Algorithms
B. Santhosh Kumar, K. V. Rukmani
 Vol 1, No 6 (2010), Pagination: 400-404
ABSTRACT |  PDF Abstract Views: 105  |  PDF Views: 0
A Schematic Representation of User Model Transfer for Email Virus Detection
M. Sreedhar Reddy, Manoj Alimilla, P. Viswanath Raghava
 Vol 1, No 6 (2010), Pagination: 405-410
ABSTRACT |  PDF Abstract Views: 115  |  PDF Views: 0