Vol 5, No 1 (2014)

Table of Contents

Vol 5, No 1 (2014)

Open Access Open Access  Restricted Access Subscription Access

Articles

Analysis of Android Vulnerabilities and Modern Exploitation Techniques
Himanshu Shewale, Sameer Patil, Vaibhav Deshmukh, Pragya Singh
 Vol 5, No 1 (2014), Pagination: 863-867
ABSTRACT |  PDF     Abstract Views: 170  |  PDF Views: 0
Failure Correction of Linear Array Antenna with Multiple Null Placement Using Cuckoo Search Algorithm
R. Muralidaran, A. Vallavaraj, Hemant Patidar, G. K. Mahanti
 Vol 5, No 1 (2014), Pagination: 877-881
ABSTRACT |  PDF     Abstract Views: 170  |  PDF Views: 0
DCRS: A Dynamic Contention Resolution Scheme for Wimax Networks
M. Deva Priya, M. L. Valarmathi, D. Prithviraj
 Vol 5, No 1 (2014), Pagination: 882-889
ABSTRACT |  PDF     Abstract Views: 165  |  PDF Views: 0
Prioritized Queue with Round Robin Scheduler for Buffered Crossbar Switches
N. Narayanan Prasanth, Kannan Balasubramanian, R. Chithra Devi
 Vol 5, No 1 (2014), Pagination: 890-893
ABSTRACT |  PDF     Abstract Views: 170  |  PDF Views: 0
An Energy Efficient Fitness Based Routing Protocol in Wireless Sensor Networks
A. Balamurugan
 Vol 5, No 1 (2014), Pagination: 894-899
ABSTRACT |  PDF     Abstract Views: 164  |  PDF Views: 0
Noise Secures Secret Data! by Act as a Reference for Embedding
J. Jayaseelan, B. Kruthika
 Vol 5, No 1 (2014), Pagination: 900-903
ABSTRACT |  PDF     Abstract Views: 155  |  PDF Views: 0
Performance Analysis of Distinct Secured Authentication Protocols Used in the Resource Constrained Platform
S. Prasanna, M. Gobi
 Vol 5, No 1 (2014), Pagination: 904-906
ABSTRACT |  PDF     Abstract Views: 162  |  PDF Views: 0