K. Sendil Kumar, M. Sakthi Sindhu, V. Sivaranjani, T.K. Sri Shilpa
Category: IJRIM
PROPOSED SOLUTION TO PREVENT BLACK HOLE ATTACK IN MANE
Download FileReena Karandikar, Rashmit Kaur Khanuja, Surendra Shukla
DEVELOPING RELIABILITY MODEL IN CONTRACT NET PROTOCO
Download FileAnkit Jagga, Vijay Rana
POWER CONTROL AND PERFORMANCE IMPROVEMENT IN WIRELESS MESH NETWORK THROUGH MULTIPATH AOD
Download FileRuchi Gupta, Akhilesh A. Waoo, P.S. Patheja
DATA MINING TYPES AND TECHNIQUES: A SURVE
Download FileSurbhi Anand, Rinkle Rani Aggarwal
HILL CLIMBING ALGORITHM FOR DATA DISTRIBUTION IN SECURE DATABASE SERVICE
Download FileRahul Meshram, S. J. Karale
A REFLEXIVE ARCHITECTURE FOR OBJECT ORIENTED SOFTWARE TESTIN
Download FileMahamaya Mohanty, Surbhi Agarwal, Bhavyatta Bhardwaj
COMPARATIVE STUDY OF HUMAN IDENTIFICATION METHODS
Download FilePunita Arora, Shalini Goel, Sunil Kumar
THE ROLE AND USE OF DATA MINING TECHNIQUES FOR INTRUSION DETECTION SYSTEM
Download FileAmit Sharma
WEB MINING IN ELECTRONIC LEARNIN
Download FileLaxmi Choudhary