1 |
Volume 1 |
Issue 1 |
Achievable MAximum Throughput and Coverage Range of Wireless LANs |
K.K. Ahamed Siraj and M.P.Sebastian |
|
2 |
Volume 1 |
Issue 1 |
A Novel Bit-Weight Based Transformation Selection Algorithm for IFS based Fractal Image Compression |
S. Arokiasamy, K. Vivekanandan and J.Subramani |
|
3 |
Volume 1 |
Issue 1 |
IEEE 802.11b Wireless Class Room Network Performance Evaluation |
Atul M.Gonsai and N.N.Jani |
|
4 |
Volume 1 |
Issue 1 |
Short Term Load Forecasting for Utility System using Fuzzy Logic Approach |
S.Chenthur pandian, K.Duraiswamy and C. Christober Asir Rajan |
|
5 |
Volume 1 |
Issue 1 |
Word Sense Disambiguation |
K.R.Chowdhary |
|
6 |
Volume 1 |
Issue 1 |
Load Balancing in Clustersusing optimal Resource Set of Nodes |
N.P.Gopalan and K.Nagarajan |
|
7 |
Volume 1 |
Issue 1 |
Legacy Source Code Migration to.NET Architecture |
K.Gowthaman, K.Mustafa and R.A.Khan |
|
8 |
Volume 1 |
Issue 1 |
Life-Time Warranty Cost Model for Software Reliability with Discount Rate |
D.R.Prince Williams, S.Venkateswaran and P.Vivekanandan |
|
9 |
Volume 1 |
Issue 1 |
Efficient Implementation of Leap Traversal For FP-Tree Mining |
M.Shashi, Ch.Sujatha and M.Sudeepth |
|
10 |
Volume 1 |
Issue 1 |
Modeling Approach for Crypto Based Security Service in Embedded Environment |
S.N.Sivanandam and G.R.Karpagam |
|
11 |
Volume 1 |
Issue 1 |
A Simple Algebraic Approach for Model Reduction of Multivariable Linear Time InvariantSystems |
R.Venkatesan, J.Sugnathi and S.N.Sivanandam |
|
12 |
Volume 1 |
Issue 1 |
Routing Protocols in Mobile Ad Hoc Networks – A Simulation Study Final |
Yogesh Chaba and Naresh Kumar Medishetti |
|