Vol 2 No 4 (2012): Asian Journal of Computer Science and Information Technology

Published: 2013-10-12

Articles

SECURE AUTHENTICATION SCHEME PREVENTING WORMHOLE ATTACKS IN COGNITIVE RADIO NETWORKS

Fatty Mustafa Salem*, Maged Hamada Ibrahim, Ihab Abd El-wahab Ali
Abstract 124 |

AUTHENTICATED GROUP KEY TRANSFER IMPLEMENTATION PROTOCOL BASED ON SECRET SHARING.

Aruna Averneni*, Y.V.V.N. Vara Prasad
Abstract 119 | PDF Downloads 158

THE SURVEY OF DATA MINING APPLICATIONS AND FEATURE SCOPE

Pragnyaban Mishra, Neelamadhab Padhy*, Rasmita Panigrahi
Abstract 140 | PDF Downloads 145

AUTOMATIC CLASSIFICATION OF MAMMOGRAM MRI USING DENDOGRAMS

A.S.Pitchumani Angayarkanni*, Nadira Banu Kamal,
Abstract 111 | PDF Downloads 87

EMERGING TRENDS IN WIRELESS SENSOR NETWORKS

N. Vikram Narayanadas*, N.Sainath
Abstract 385 | PDF Downloads 89

A MULTI-AGENT BASED SYSTEM FOR REDUCTION OF BULLWHIP EFFECT IN SUPPLY CHAIN MANAGEMENT

Vivek Jaglan*, Vikas Dhankhar, S.Srinivasan, Manoj Kumar
Abstract 115 | PDF Downloads 135