- 2014-12-26 15:35:50SDR and Error Correction using Convolution Encoding with Viterbi Decoding
- 2014-12-26 15:33:56Software Radio
- 2014-12-26 15:31:34Recovery Based Architecture to Protect Hids Log Files using Time Stamps
- 2014-12-26 15:28:32Broadband Integrated Services over Proposed Open CPE Architecture
- 2014-12-26 15:25:55Copyright Protection of Gray Scale Images by Watermarking Technique using (N,N) Secret Sharing Scheme
- 2014-12-26 15:23:17Investigation of Blackhole Attack on AODV in MANET
- 2014-12-26 15:20:50Distance and Frequency based Route Stability Estimation in Mobile Adhoc Networks
- 2014-12-26 15:18:34Bee-Inspired Routing Protocols for Mobile Ad Hoc Network
- 2014-12-26 15:14:10Performance of Dominating and Adaptive Partial Dominating Sets in AODV Routing Protocol for MANETs
- 2014-12-26 15:06:54Guest Editorial—Special Issue on Emerging Technologies in Internet Security and Networks
- 2014-12-26 15:04:07A Survey of Text Summarization Extractive Techniques
- 2014-12-26 15:02:30Towards Intelligent Ontology Alignment Systems for Question Answering: Challenges and Roadblocks
- 2014-12-26 15:00:54GPS Talking For Blind People
- 2014-12-26 14:58:53Appliance Controlling Using IPAC
- 2014-12-26 14:55:43A New Approach in Requirements Elicitation Analysis