ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login
Archived Papers for Journal

Engineering and Scientific International Journal >>

Vol.S, No.1

Publisher: Innovative Research Developers and Publishers (IRDP)

Publishing Date: 2015-05-20

  1. Authentication for Mobile Communication using Aka Protocol

    Authors: A.Kirthika S.Karpagavalli

  2. Bluetooth Enhancement in Data Transmission

    Authors: Aswin Castro .B.U Rajesh. M

  3. Trust based Routing in Mobile Ad Hoc Networks using Ant Colony Optimization

    Authors: D. Shalini K.Jansirani

  4. Analysis of Neural Network Algorithms in Data Mining

    Authors: G.Priya K.Revathi S.Subharani

  5. SQL Injection Attack

    Authors: J.makesh S.Thirunavukarasu

  6. Massive MIMO for Next Generation Wireless Sensor Networks

    Authors: K.Jayavarman S.Narasimman

  7. Image Enhancement using Adaptive and Gaussian Filters, DWT for Face Recognition

    Authors: K.Mala T.Lavanya

  8. Attack Detection Using Intrusion Detection System in Wireless Sensor Network

    Authors: U.Revathi

  9. Perfect and Secure Speech Recognizer

    Authors: V.Niranjan P.Mohankumar

  10. Non-Congestion Control Mechanism to Improve TCP Performance in MHWN

    Authors: Saranya Moorthy Panchami Mol

  11. Approaches on Operating System using Reconfigurable Architecture

    Authors: P.Priya V.Rekha M.Vaitheswari

  12. Human voice Interaction with ATM machine

    Authors: Rajesh.K Arun.R Sivanesan.V

  13. Security Controls and Measures in Mobile Computing

    Authors: M.Sandhiya K.Saranya

  14. Soul Security through Automatic Call using Google Glass

    Authors: C.Mageshwari

  15. Lyric Generation using Artificial Intelligence

    Authors: R.Sam Thayakaran StephenJebakumar

  16. Providing Security using Touch Screen Pattern

    Authors: P.Rajeswari

  17. Detection of Diffusion in Attacks

    Authors: R . Sakthi Bharathi

  18. Cryptography in Digital Watermarking - A Wavelet based Contrast Sensitivity

    Authors: Divya.R Sowmiya.R

  19. Wireless Sensor on Patient Health Care Monitoring

    Authors: B.Surya B.Subashini M.Raja Lakshmi

  20. Image Steganography for Secure the Data using Least Significant Bit

    Authors: Revathi. R.R Tamilarasi.P Vigneshwari.D

  21. Blue Brain using Wetware Technology and Fuzzy Logic

    Authors: Nandhini V