IJAICE - Journal Papers

Tenable Route Encounter Modus Operandi In Manets

Authors :  Dr. SIVAKUMAR K | Pages : 81 - 85

Safe And Secure Transformation Of Data On An Encrypted Image

Authors :  J. Keziah, E. GoldinaEben, P. Angela Gladys | Pages : 76-80

Trust Based Co-operative Dsr Routing Protocol For Manet

Authors :  K.Nishanthi, R.Vijayakumar | Pages : 65-69

The Game Theory-based Block Image Compression Method

Authors :  M.Indirani , M.J.Shalini , R.Vanishree, J.Sheila, J.Seethalakshmi | Pages : 59-64

A Markov Random Field Groupwise

Authors :   Syamkrishnan C. K , Dr A.Prabhu | Pages : 54 - 58

Performance Analysis Of Shannon-fano Coding And Tunstall Coding

Authors :  Ezhilarasu.P, Murali.C, Krishnaraj.N, Sowmya.R, Manoj Prabhakar.J, Karpagam.R | Pages : 33-53

Deadline Based Resource Provisioning

Authors :  S.Mohana priya , R.Premkumar | Pages : 29- 32

Upgrading The Next Generation Internet

Authors :  Mrs. C . Rajeswari , S.Almy Alana | Pages : 21 -24

Authenticate Data Distribution Based On User Identity

Authors :  M.Manipriya , C.Yalini | Pages : 25 - 28

A Multilevel Distributed Key Management For Manets

Authors :  Pawandeep kaur jhajj, Jaspreet kaur | Pages : 17-20

Authentication And Isolation Of Cryptographic Services

Authors :  Madhavi Shyamsunder Shinde | Pages : 14-16

Data Visualization & Applications Of Big Data In Various Sectors

Authors :  Soumya Jha, Nikhil Kumar Agrawal | Pages : 9-13

Classification Based Intrusion Detection System

Authors :  R. Sivagami, D. Sathya | Pages : 1-8