Volume-4 , Issue-2 , Feb - 2016 Go Back

Open Access   Article

Performance Analysis of Mobility Pattern for Vehicular Ad-Hoc Network Using Various Routing Protocols

Richa Mishra and Sachin Choudhari
Research Paper | Journal Paper
Vol.4 , Issue.2 , pp.121-124, Feb-2016
Open Access   Article

Fuzzy Keyword Search over Encrypted Stego in Cloud

TanmayDahake, MirsohailShaikh, Vipul Khandeparkar,Neerav Panchal4and Gajanan Bherde
Review Paper | Journal Paper
Vol.4 , Issue.2 , pp.125-127, Feb-2016
Open Access   Article

Intelligent Face Recognition

Akram Qureshi and Ashok Kajla
Technical Paper | Journal Paper
Vol.4 , Issue.2 , pp.128-133, Feb-2016
Open Access   Article

Implementation of OCR Based on Template Matching and Integrating it in Android Application

Aayushi Jain, Nitish Joshi, MayureshKhendkar
Technical Paper | Journal Paper
Vol.4 , Issue.2 , pp.134-136, Feb-2016
Open Access   Article

An Implementation of Intrusion Detection System Based on Genetic Algorithm

Kamlesh Patel and Prabhakar Sharma
Review Paper | Journal Paper
Vol.4 , Issue.2 , pp.137-141, Feb-2016
Open Access   Article

Crack Detection in Concrete Railway Sleeper

Shruthi Ramesh, Sonali Chavan, Juhi Kankani and Uday Joshi
Review Paper | Journal Paper
Vol.4 , Issue.2 , pp.143-144, Feb-2016
Open Access   Article

Comparative on AODV and DSR under Black Hole Attacks Detection Scheme Using Secure RSA Algorithms in MANET

Meenakshi Jamgade and Vimal Shukla
Research Paper | Journal Paper
Vol.4 , Issue.2 , pp.145-150, Feb-2016
Open Access   Article

Road-Based Routing Protocol for Vanet Using Sumo and Move

Devipriya. D and Muruganandam.A
Research Paper | Journal Paper
Vol.4 , Issue.2 , pp.151-155, Feb-2016
Open Access   Article

Steganography Using Reversible Texture Synthesis

J. SenthilMurugan, G. Hariharan and R. Kirubagaran
Review Paper | Journal Paper
Vol.4 , Issue.2 , pp.156-158, Feb-2016
First    Previous