CATEGORIES
IJANA ARTICLES

VOLUME 1
Issue 1
Issue 2
Issue 3
Issue 4
Issue 5
Issue 6
Volume 1 Issue:06 May-June 2010
Proposed Methodology for Securing Wireless LANs from Wormhole Attack

A.K. Patel, Jaypalsinh A. Gohil, D.T. Meva
342-346
Robust Image Transmission over Noisy Channel Using Independent Component Analysis

Deepak N. A, Rajesh Shukla, Puttegowda. D
347-352
Exploring Round Trip Time fairness for Adaptive Layered Transmission Control Protocol

V.Kavidha, Dr. V.Sadasivam
353-358
Content-Based Color Image Retrieval Using Adaptive Lifting

P.Manimegalai, Dr.K.Thanushkodi
359-366
Data Hiding and Water Marking Security based on nested lattices

V.S Giridhar Akula, P ChndraSekhar Reddy, N.KalpaLatha, R.Sivam
367-370
Efficient Bio Metric IRIS Recognition System Using Fuzzy Neural Network

Dr. T. Karthikeyan
371-376
Remote Administrative Suite for Unix-Based Servers

G.Rama Koteswara Rao, G.Siva Nageswara Rao, B.V.Subba Rao
377-381
AdaptiveCHOKe: An algorithm to increase the fairness in Internet Routers

K.Chitra, Dr. G.Padamavathi
382-386
Threshold based Authorization model for Authentication of a node in Wireless Mesh Networks

Divlya Bansal, Sanjeev Sofat
387-392
System Security Management in SNMP

P. Deivendran, Dr. R. Dhanapal
393-399
Implementation of Web Usage Mining Using APRIORI and FP Growth Algorithms

B.Santhosh Kumar, K.V.Rukmani
400-404
A Schematic Representation of User Model Transfer for Email Virus Detection

Dr. M.Sreedhar Reddy, Manoj Alimilla, Viswanath Raghava.P
405-410
All Copyrights © 2017 , Eswar PublicationsDesigned by , klmn Software Solutions