International Journal of Communication Networks and Security
Volume 2, Issue 1 (2013)
Articles
CURRENT REUSE ACTIVE INDUCTOR BASED WIDEBAND LNA
DIPALI DASH, MARINA E J, and J MANJULA
DOI: 10.47893/IJCNS.2013.1058
HERMITIAN SYMMETRY BASED FIBER NON-LINEARITY COMPENSATION IN OPTICAL OFDM NETWORKS
KAMALA KANNAN P, GURU VIGNESH B, INIYAN P A, and ILAVARASAN T
DOI: 10.47893/IJCNS.2013.1059
WIRELESS REAL TIME PROPORTIONAL CONTROL SYSTEM
UJJWALA G. BORATE and PROF. R.T. PATIL
DOI: 10.47893/IJCNS.2013.1060
FAULT TOLERANT SYSTEM FOR CELLULAR NETWORK
KARUNESH RAM TRIPATHI, VIJAY PRATAP SINGH, and ASHISH PANDEY
DOI: 10.47893/IJCNS.2013.1061
A TOOL FOR EFFECTIVE DETECTION OF FRAUD IN CREDIT CARD SYSTEM
SATVIK VATS, SURYA KANT DUBEY, and NAVEEN KUMAR PANDEY
DOI: 10.47893/IJCNS.2013.1062
ADAPTIVE CHANNEL SPLIT RATIO IN TDD BASED WI-MAX NETWORK FOR LINK IMPROVEMENT ANALYSIS
JEMIMAH DIGAL and S. SMYS
DOI: 10.47893/IJCNS.2013.1063
STUDY ON AUDIO AND VIDEO WATERMARKING
HARLEEN KAUR
DOI: 10.47893/IJCNS.2013.1064
EFFICIENT LOAD BALANCING IN PEER-TO-PEER SYSTEMS USING VIRTUAL SERVERS
SUBY MARIA JACOB
DOI: 10.47893/IJCNS.2013.1065
INTRUSION DETECTION FOR DISCRETE SEQUENCES
MRS. M. VIJAYALAKSHMI and MR. K . JANARDHAN
DOI: 10.47893/IJCNS.2013.1066
LIGHT WEIGHT SECURITY FOR OPC UA BASED ARCHITECTURE
VARUN SHIVAPRASAD and KALLINATHA H. D
DOI: 10.47893/IJCNS.2013.1067
VOD STREAMING WITH A NETWORK CODING EQUIVALENT CONTENT DISTRIBUTION SCHEME
P. PRATYUSHA, SD.AFZAL AHMAD, and P. BABU
DOI: 10.47893/IJCNS.2013.1068
ATTACK AGAINST ANONYMITY USING CELL COUNTING
S. D. HABEEBUNNISA, S. K. KARIMULLAH, and P. BABU
DOI: 10.47893/IJCNS.2013.1069
AERIAL SURVEILLANCE FOR VEHICLE DETECTION USING DBN AND CANNY EDGE DETECTOR
SK. MADEENA, SD.AFZAL AHMED, and P. BABU
DOI: 10.47893/IJCNS.2013.1070
ENTITY EXTRACTION USING STATISTICAL METHODS USING INTERACTIVE KNOWLEDGE MINING FRAMEWORK
SHAIK MUNEEB AHAMED, SD.AFZAL AHMAD, and P. BABU
DOI: 10.47893/IJCNS.2013.1071
MINIMIZATION OF MOBILE AD HOC NETWORKS ROUTING ATTACKS USING DS MATHEMATICAL THEORY
SK. JASMINE, CH. SUBBARAO, and P. BABU
DOI: 10.47893/IJCNS.2013.1072
SMC PROTOCOL FOR DISTRIBUTED K- ANONYMITY
V. SIREESHA and B. OBULESU
DOI: 10.47893/IJCNS.2013.1073
A BIO GENETIC PROCESS TO REPLICAS-FREE REPOSITORY
N. VENKATESWARLU and D. SIREESHA SIREESHA
DOI: 10.47893/IJCNS.2013.1074
