Vol 2 No 4 (2012): Asian Journal of Computer Science and Information Technology

Published: 2013-10-12

Articles

SECURE AUTHENTICATION SCHEME PREVENTING WORMHOLE ATTACKS IN COGNITIVE RADIO NETWORKS

Fatty Mustafa Salem*, Maged Hamada Ibrahim, Ihab Abd El-wahab Ali
Abstract 125 |

AUTHENTICATED GROUP KEY TRANSFER IMPLEMENTATION PROTOCOL BASED ON SECRET SHARING.

Aruna Averneni*, Y.V.V.N. Vara Prasad
Abstract 120 | PDF Downloads 158

THE SURVEY OF DATA MINING APPLICATIONS AND FEATURE SCOPE

Pragnyaban Mishra, Neelamadhab Padhy*, Rasmita Panigrahi
Abstract 141 | PDF Downloads 145

AUTOMATIC CLASSIFICATION OF MAMMOGRAM MRI USING DENDOGRAMS

A.S.Pitchumani Angayarkanni*, Nadira Banu Kamal,
Abstract 112 | PDF Downloads 87

EMERGING TRENDS IN WIRELESS SENSOR NETWORKS

N. Vikram Narayanadas*, N.Sainath
Abstract 386 | PDF Downloads 89

A MULTI-AGENT BASED SYSTEM FOR REDUCTION OF BULLWHIP EFFECT IN SUPPLY CHAIN MANAGEMENT

Vivek Jaglan*, Vikas Dhankhar, S.Srinivasan, Manoj Kumar
Abstract 116 | PDF Downloads 135