62)
Presenting a New Method for Detection and Prevention of Single Black Holes Attack in AODV Protocol in Wireless Ad Hoc Network
Pages 686 - 689
nullIman Zangeneh Sedigheh Navaezadeh Abolfazl Jafari

10.7753/IJCATR0206.1011

Show Preview
  |  
PDF
63)
The proposed System for Indoor Location Tracking
Pages 690 - 698
Ashraf Mohamed Ali Hassen

10.7753/IJCATR0206.1012

Show Preview
  |  
PDF
64)
Occlusion and Abandoned Object Detection for Surveillance Applications
Pages 708 - 713
M. Chitra M.Kalaiselvi Geetha L.Menaka

10.7753/IJCATR0206.1014

Show Preview
  |  
PDF
65)
Implementation Of Ontology Matching Using Prot?g?
Pages 723 - 725
Jayanth Kumar Sujitha Reddy Priya.M Raju.J

10.7753/IJCATR0206.1017

Show Preview
  |  
PDF
66)
Survey on Dynamic Resource Allocation Strategy in Cloud Computing Environment
Pages 731 - 737
N.Krishnaveni G.Sivakumar

10.7753/IJCATR0206.1019

Show Preview
  |  
PDF
67)
A New Design of Multiplier using Modified Booth Algorithm and Reversible Gate Logic
Pages 743 - 747
K.Nagarjun S.Srinivas

10.7753/IJCATR0206.1021

Show Preview
  |  
PDF
68)
A Hybrid approach for enhancing the capability of Spam Filter
Pages 759 - 762
Amandeep Kaur Malti Sarangal

10.7753/IJCATR0206.1024

Show Preview
  |  
PDF
69)
A Survey on Enhancing the Efficiency of Various Web Structure Mining Algorithms
Pages 771 - 774
Arun Kumar Singh Avinav Pathak Dheeraj Sharma

10.7753/IJCATR0206.1026

Show Preview
  |  
PDF
70)
Clustering that depends upon Various Viewpoints Similarity Measure
Pages 5 - 9
V. Venkaiah A. Pramod Reddy P.V.S. Srinivas

10.7753/IJCATR0301.1002

Show Preview
  |  
PDF