The major issues associated with MANETs include the precious battery power of the nodes and security threats from compromised nodes inside the network. The introduction of an additional dynamic node may optimize the power, but however it leads to jamming and interference and thereby reducing the efficiency of the network. Since MANETs have a highly dynamic topology, they are vulnerable t...
Paper Information
Authors T. Sukumar, V. Vaishnavi, P. Varsha
Read Journal Click Here
Read Paper Click Here
Page No. 33 to 38

Vehicular Ad-hoc Networks (VANETs) are major popular wireless environment for Intelligence Transport Systems (ITS). This paper concentrates on Location Identification and Driver Safety (LIDS). Location identification is mapping out by using RFID (Radio Frequency Identification) technology to recognize the current location and also corresponding surrounded areas. The additional feature to...
Paper Information
Authors S.Shanmugam
Read Journal Click Here
Read Paper Click Here
Page No. 19 to 23

The continuous development in the field of communication have paved the way for Voice over Internet Protocol (VoIP). VoIP is a group of hardware and software that facilitates people to utilize the Internet as the transmission medium for telephone calls by transmitting voice data in packets using IP instead of using conventional circuit transmissions of the Public Switched Telephone Netwo...
Paper Information
Authors R.Shankar, Dr.E.Karthikeyan
Read Journal Click Here
Read Paper Click Here
Page No. 1 to 6

Computer quantization is important to consider in digital signal processing because it limits the accuracy of signals to be processed.In this paper we will talk about the quantization effect on system performance and use the result to make an improvement in the signal and systems field.Computers communicate with ones and zeros back and forth. The ones and zeros make a wordthat a computer...
Paper Information
Authors Dr. Ziad Sobih, Prof. Martin Schetzen,
Read Journal Click Here
Read Paper Click Here
Page No. 71 to 75

The subject of missing values in databases and how to handle them has received very little attention in the statistics and data mining literature1, 2, 3 and even less, if any at all, in the marketing literature. The usual attitude of practitioners is ‘we’ll just have to ignore records with missing values’. On the other hand, a few very adva...
Paper Information
Authors Atai Winkler
Read Journal Click Here
Read Paper Click Here
Page No. 41 to 48

E-learning (EL) is widely used in school and other organizations all over the world, because of difficulties in math skills (Remembering , understanding , application). There have not been any major surveys in the Yemen Public Primary School (YPPS) in that regard. This is the driving question behind this research: What is the effectiveness and usefulness of using e-learning approach in t...
Paper Information
Authors Tareq Saeed Ali Thabet, Dr.N.V.Kalyankar
Read Journal Click Here
Read Paper Click Here
Page No. 45 to 52

In recent years a new type of experiments are changing the way that biologists and other specialists analyze many problems. These are called high throughput experiments and the main difference with those that were performed some years ago is mainly in the quantity of the data obtained from them. Thanks to the technology known generically as microarrays, it is possible to study nowadays i...
Paper Information
Authors Prof G V Padma Raju, Dr Srinivasa Rao Peri, Dr Chandra Sekhar Vasamsetty
Read Journal Click Here
Read Paper Click Here
Page No. 23 to 39

Cognitive Networks are characterized by their intelligence and adaptability. Securing layered heterogeneous network architectures has always posed a major challenge to researchers. In this paper, the Observe, Orient, Decide and Act (OODA) loop is adopted to achieve cognition. Intelligence is incorporated by the use of discrete time dynamic neural networks. The use of dynamic neural netwo...
Paper Information
Authors G Sunilkumar, Thriveni J, K R Venugopal, L M Patnaik
Read Journal Click Here
Read Paper Click Here
Page No. 29 to 44

Now a day’s Cryptography is one of the broad areas for researchers; because of the conventional block cipher has lost its potency due to the sophistication of modern systems that can break it by brute force. Due to its importance, several cryptography techniques and algorithms are adopted by many authors to secure the data, but still there is a scope to improve the previ...
Paper Information
Authors Sangapu Venkata Appaji, Dr. Gomatam V S Acharyulu
Read Journal Click Here
Read Paper Click Here
Page No. 19 to 30

Health care domain systems globally face lots of difficulties because of the high amount of risk factors of heart diseases in peoples (WHO, 2013). To reduce risk, improved knowledge based expert systems played an important role and has a contribution towards the development of the healthcare system for cardiovascular disease. To make use of benefits of knowledge based system, it is neces...
Paper Information
Authors Kantesh Kumar Oad, Xu DeZhi
Read Journal Click Here
Read Paper Click Here
Page No. 17 to 22