|
Issue |
Title |
|
Vol 3, No 2 (2017) |
5G Wireless Systems |
Abstract
|
Kashish . |
|
Vol 6, No 2 (2020) |
A Compact Slotted Patch Antenna with Enhanced Gain Antenna for Satellite Application |
Abstract
|
Divya *, Jyoti * |
|
Vol 1, No 2 (2015) |
A Comprehensive Methodology for Data Security and Privacy in Cloud Computing Systems |
Abstract
|
Abid Hussain Wani |
|
Vol 6, No 2 (2020) |
A Four-Layer Wireless Sensor Network Framework for IoT Applications |
Abstract
|
R. Kaliyappan, Dr.A. Linda Sherin, Dr. A. Finny Belwin, Dr. Antony Selvadoss Thanamani |
|
Vol 5, No 2 (2019) |
A New Logical Architecture of Wallace Tree Encoder, with Reduced Computations as well as Auto-detection of Bubble Error in Flash ADC |
Abstract
|
Anirban Roy, Satish Kumar, K.L. Baishnab |
|
Vol 8, No 2 (2022) |
A Pragmatic Approach on Adoption of EDA to Make Intelligent Business Decisions |
Abstract
|
Jay C. Thakkar, Vikas S. Chomal |
|
Vol 5, No 1 (2019) |
A Review on Snort Analyzer and it’s Implementation |
Abstract
|
Akshay Mistry, Ashish Mishra |
|
Vol 4, No 1 (2018) |
A Review Paper on Information Security and Cryptography |
Abstract
|
Y. Durga Tejaswi, T. Sahithi |
|
Vol 8, No 2 (2022) |
A Survey on Energy Efficient Routing Pathway for WSN Application |
Abstract
|
Garima Yadav, Anita Yadav |
|
Vol 7, No 2 (2021) |
A Wireless Sensor Network Intrusion Detection System with Parameters and Distributed Trust |
Abstract
|
B. M. Rajesh, Antony Selvadoss Thanamani, B. Chithra, A. Finny Belwin, A. Linda Sherin |
|
Vol 6, No 2 (2020) |
A Wireless Sensor Networks for Intelligent Building Energy Efficient Based on Multi-communication Standards using IoT |
Abstract
|
R. Kaliyappan, Dr.A. Linda Sherin, Dr. A. Finny Belwin, Dr. Antony Selvadoss Thanamani |
|
Vol 8, No 2 (2022) |
Adaptability of Opportunistic Routing Protocols in Underwater Wireless Sensor Networks: A Review |
Abstract
|
Mukul Joshi, Kapil Mehta, Sanjay Charaya |
|
Vol 6, No 1 (2020) |
Advanced AQM Blue Algorithm in Wireless Network |
Abstract
|
Uma R. Pujeri |
|
Vol 7, No 2 (2021) |
Advancements in Cyber Security for Autonomous Vehicles |
Abstract
|
P. Uma Maheshwari, Sunkireddy Bhargavi, Sunkireddy Umarani |
|
Vol 4, No 1 (2018) |
AES Security Algorithm Implement on FSR Protocol under Black Hole Attack using FPGA (XILINX) |
Abstract
|
vinay bhatt, Dr. Sanjay Kumar |
|
Vol 6, No 2 (2020) |
Age Estimation from Face Image Using Two Direction 2DPCA |
Abstract
|
Varsha Soni, Dr.Preeti Rai |
|
Vol 1, No 1 (2016) |
An Empirical Evaluation of a New Comparison Sort Algorithm |
Abstract
PDF
|
Brijender Kahanwal |
|
Vol 3, No 1 (2017) |
An Energy Efficient Routing Protocol for Wireless Sensor Networks |
Abstract
|
K Arasi, S.B. Gopal, K Nandhini, B Rashika |
|
Vol 4, No 2 (2018) |
An improved Data Transmission approach for Mobile Sink using CH in WSN |
Abstract
|
Deepa Singh |
|
Vol 4, No 1 (2018) |
An Improved Method for the Removal of Malicious in Mobile Ad Hoc Network |
Abstract
|
Sukanya Kargaiyan, Neelam Joshi |
|
Vol 3, No 2 (2017) |
Analysis of Security attacks and Solutions in Vehicular Ad-Hoc Network |
Abstract
|
Shiv Shankar |
|
Vol 7, No 2 (2021) |
Analysis of Wireless Sensor Networks Through Secure Routing Protocols Using Directed Diffusion Methods |
Abstract
|
E. N. Ganesh |
|
Vol 3, No 2 (2017) |
Challenges in Mobile Ad-hoc Networks |
Abstract
|
Anandhi Giri |
|
Vol 2, No 1 (2016) |
Comparative Studies among 3G, 4G & 5G in wireless communication |
Abstract
|
Tejas Dhoble |
|
Vol 2, No 1 (2016) |
Comparison of Wi-Fi Vs Li-Fi |
Abstract
|
Manisha Dhoble |
|
1 - 25 of 77 Items |
1 2 3 4 > >> |