Volume 2 Issue 5

1
Tenable Route Encounter Modus Operandi In Manets
Authors : Dr. SIVAKUMAR K
Pages : 81 - 85

2
Safe And Secure Transformation Of Data On An Encrypted Image
Authors : J. Keziah, E. GoldinaEben, P. Angela Gladys
Pages : 76-80

3
Smart Alert System By Tuning Data Rate Of Sensors For Wireless Body
Authors : S.Sowmika, C.Ranjani
Pages : 70-75

4
Trust Based Co-operative Dsr Routing Protocol For Manet
Authors : K.Nishanthi, R.Vijayakumar
Pages : 65-69

5
The Game Theory-based Block Image Compression Method
Authors : M.Indirani , M.J.Shalini , R.Vanishree, J.Sheila, J.Seethalakshmi
Pages : 59-64

6
A Markov Random Field Groupwise
Authors : Syamkrishnan C. K , Dr A.Prabhu
Pages : 54 - 58

7
Performance Analysis Of Shannon-fano Coding And Tunstall Coding
Authors : Ezhilarasu.P, Murali.C, Krishnaraj.N, Sowmya.R, Manoj Prabhakar.J, Karpagam.R
Pages : 33-53

8
Deadline Based Resource Provisioning
Authors : S.Mohana priya , R.Premkumar
Pages : 29- 32

9
Upgrading The Next Generation Internet
Authors : Mrs. C . Rajeswari , S.Almy Alana
Pages : 21 -24

10
Authenticate Data Distribution Based On User Identity
Authors : M.Manipriya , C.Yalini
Pages : 25 - 28

11
A Multilevel Distributed Key Management For Manets
Authors : Pawandeep kaur jhajj, Jaspreet kaur
Pages : 17-20

12
Authentication And Isolation Of Cryptographic Services
Authors : Madhavi Shyamsunder Shinde
Pages : 14-16

13
Data Visualization & Applications Of Big Data In Various Sectors
Authors : Soumya Jha, Nikhil Kumar Agrawal
Pages : 9-13

14
Classification Based Intrusion Detection System
Authors : R. Sivagami, D. Sathya
Pages : 1-8