Sunday, October 6, 2013

Vol 3, No 7 (2013) Network and Complex Systems

Vol 3, No 7 (2013)

Table of Contents

Articles

A New Approach of Detecting Network Anomalies using Improved ID3 with Horizontal Partioning Based Decision TreePDF
Sonika Tiwari, Roopali Soni1-6
Implementation of Query Optimization for Reducing Run TimePDF
S.C. Tawalare, S.S. Dhande7-11
Performance Evaluation of Network Security Protocols on Open Source and Microsoft Windows PlatformsPDF
Oluwaranti A.I., Adejumo, E.O.12-21
Elimination of Wormhole Attacker Node in MANET Using Performance Evaluation Multipath AlgorithmPDF
Rajpal Singh Khainwar, Anurag Jain, Jagdish Prasad Tyagi22-29
Energy Efficient Protocol with Static Clustering (EEPSC) Comparing with Low Energy Adaptive Clustering Hierarchy (LEACH) ProtocolPDF
Vinidha roc, Ajay D. Vimalraj, C.Maria Antoine Pushparaj30-37
Using Multi-agent System for Solving Coverage Problem in Wireless Sensor NetworkPDF
Sherehan aburomman, Khalaf khataneh38-45
Synthesis and Performance Analysis of Network Topology using Graph TheoryPDF
U N Bassey, K N Bassey, E N Bassey46-53


Paper submission email: NCS@iiste.org
ISSN (Paper)2224-610X ISSN (Online)2225-0603

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.