•  
  •  
 

International Journal of Communication Networks and Security

Volume 2, Issue 1 (2013)

Articles

PDF

CURRENT REUSE ACTIVE INDUCTOR BASED WIDEBAND LNA
DIPALI DASH, MARINA E J, and J MANJULA
DOI: 10.47893/IJCNS.2013.1058

PDF

HERMITIAN SYMMETRY BASED FIBER NON-LINEARITY COMPENSATION IN OPTICAL OFDM NETWORKS
KAMALA KANNAN P, GURU VIGNESH B, INIYAN P A, and ILAVARASAN T
DOI: 10.47893/IJCNS.2013.1059

PDF

WIRELESS REAL TIME PROPORTIONAL CONTROL SYSTEM
UJJWALA G. BORATE and PROF. R.T. PATIL
DOI: 10.47893/IJCNS.2013.1060

PDF

FAULT TOLERANT SYSTEM FOR CELLULAR NETWORK
KARUNESH RAM TRIPATHI, VIJAY PRATAP SINGH, and ASHISH PANDEY
DOI: 10.47893/IJCNS.2013.1061

PDF

A TOOL FOR EFFECTIVE DETECTION OF FRAUD IN CREDIT CARD SYSTEM
SATVIK VATS, SURYA KANT DUBEY, and NAVEEN KUMAR PANDEY
DOI: 10.47893/IJCNS.2013.1062

PDF

STUDY ON AUDIO AND VIDEO WATERMARKING
HARLEEN KAUR
DOI: 10.47893/IJCNS.2013.1064

PDF

EFFICIENT LOAD BALANCING IN PEER-TO-PEER SYSTEMS USING VIRTUAL SERVERS
SUBY MARIA JACOB
DOI: 10.47893/IJCNS.2013.1065

PDF

INTRUSION DETECTION FOR DISCRETE SEQUENCES
MRS. M. VIJAYALAKSHMI and MR. K . JANARDHAN
DOI: 10.47893/IJCNS.2013.1066

PDF

LIGHT WEIGHT SECURITY FOR OPC UA BASED ARCHITECTURE
VARUN SHIVAPRASAD and KALLINATHA H. D
DOI: 10.47893/IJCNS.2013.1067

PDF

VOD STREAMING WITH A NETWORK CODING EQUIVALENT CONTENT DISTRIBUTION SCHEME
P. PRATYUSHA, SD.AFZAL AHMAD, and P. BABU
DOI: 10.47893/IJCNS.2013.1068

PDF

ATTACK AGAINST ANONYMITY USING CELL COUNTING
S. D. HABEEBUNNISA, S. K. KARIMULLAH, and P. BABU
DOI: 10.47893/IJCNS.2013.1069

PDF

AERIAL SURVEILLANCE FOR VEHICLE DETECTION USING DBN AND CANNY EDGE DETECTOR
SK. MADEENA, SD.AFZAL AHMED, and P. BABU
DOI: 10.47893/IJCNS.2013.1070

PDF

ENTITY EXTRACTION USING STATISTICAL METHODS USING INTERACTIVE KNOWLEDGE MINING FRAMEWORK
SHAIK MUNEEB AHAMED, SD.AFZAL AHMAD, and P. BABU
DOI: 10.47893/IJCNS.2013.1071

PDF

MINIMIZATION OF MOBILE AD HOC NETWORKS ROUTING ATTACKS USING DS MATHEMATICAL THEORY
SK. JASMINE, CH. SUBBARAO, and P. BABU
DOI: 10.47893/IJCNS.2013.1072

PDF

SMC PROTOCOL FOR DISTRIBUTED K- ANONYMITY
V. SIREESHA and B. OBULESU
DOI: 10.47893/IJCNS.2013.1073

PDF

A BIO GENETIC PROCESS TO REPLICAS-FREE REPOSITORY
N. VENKATESWARLU and D. SIREESHA SIREESHA
DOI: 10.47893/IJCNS.2013.1074

IJCNS Cover Art