View Abstract & full text pdf of Secure Packet Transfer in a Network Using Hierarchical Scheduler with Crypto-Algorithm
Category Archives: NCICCT – 2014 (Volume 2 – Issue 05)
View Abstract & full text pdf of Energy Utilization and Data Gathering In Wireless Sensor Networks Using Mobile Sink
View Abstract & full text pdf of Secret Data Hiding Based on Zigzag Pixel Indicator
View Abstract & full text pdf of Blocking Misbehaving Users in Anonymizing Networks: Nymbles
View Abstract & full text pdf of A Novel Noise Guided Random Stegging with Adaptive K-bit Engrafting to Enhance Eminent Concealing Capacity
View Abstract & full text pdf of Era Identification and Recognition of Stone In-scripted Kannada Characters Using Artificial Neural Networks
View Abstract & full text pdf of Facial Action Unit Tracking and Facial Activity Recognition Based On Dynamic Bayesian Network
View Abstract & full text pdf of A Survey of Attacks and Security Mechanisms in Wireless Networks
View Abstract & full text pdf of An Efficient Approach For Subspace Clustering By Using OCA 3DS Seekerc Algorithm
View Abstract & full text pdf of An Effective Approach to Auto Email Content Management: Keyword Based Classification