PDF-International Journal of Computer Applications (0975
Author : tatyana-admore | Published Date : 2015-08-30
x2013 8887 Volume 20 x2013 No 4 April 2011 18 Defining Malicious Behavior of a Node and its Defensive Methods in Ad Hoc Network Radhika Saini MTech Scholar Ambedkar
Presentation Embed Code
Download Presentation
Download Presentation The PPT/PDF document "International Journal of Computer Applic..." is the property of its rightful owner. Permission is granted to download and print the materials on this website for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.
International Journal of Computer Applications (0975: Transcript
x2013 8887 Volume 20 x2013 No 4 April 2011 18 Defining Malicious Behavior of a Node and its Defensive Methods in Ad Hoc Network Radhika Saini MTech Scholar Ambedkar Institute of Technolog. – 8887) Volume 2 – No. 2 , May 2010 36 Artificial Neural Network for Human Behavior Prediction through Handwriting Analysis Champa H N Assistant Professor, Department of Computer Sci – 8887) Volume 20 – No. 7 , April 2011 1 Neural N etworks for H andwritten English A lphabet R ecognition Yusuf Perwej Department of Compute r Science Singhania University Rajsthan, – 8887) Volume 106 – No. 18, November 2014 25 Avoiding Prankster Attack in Case of Selfish Driver using Location Aware VANET Nodes Tanisha Saini Department of Computer Science Enginee – 8887) Volume 65 – No.8, March 2013 12 Video Analytics Trip Wires for Surveillance System Aditi Jog Student, Pursuing ME K.J.Somaiya College of Engineering Vidyavihar,India Shirish – 8887) Volume 37 – No. 9 , January 2012 10 Segmentation of Characters from o ld Typewritten Documents u sing Radon Transform Apurva A. Desai Department of Computer Science Veer Narma – 8887) Volume 82 – No. 9 , November 2013 12 Investigation of Data M ining T echniques in Fraud Detection: Credit Card R. Gayathri Assistant Professor School of IT and Science Dr. G. – 8887) on Electronics, Information and Communication Engineering - ICEICE No.5, Dec 2011 33 A n Efficient Approach of an Audio Watermarking: Cascading o f the Discrete Wavelets Transform a (0975 – 8887) Volume 116 – No. 6, April 2015 34 An Optimal Secret Message based Image Sharing Method to Avoid Cheater in Message Reconstruction Preeti Rahangdale Research Scholar Co – 8887) Volume 106 – No. 7 , November 2014 1 Compressed Chatting Over Internet Swapnil Sonawane Student, University of Mumbai M.E.Information Tech nology VIT, Mumbai , India Dilip Mo – 8887) Volume 45 – No. 3 , May 2012 29 An Algorithm to Count onto Functions Rinku Kumar M.M.UNIVERSITY Mullana, Haryana India Rakesh Kamboj M.M. University Mullana, Haryana India Cheta – 8887) Volume 49 – No.20, July 2012 1 Reappearance Layout based Web Page Segmentation for Small Screen D evices V.Kalaivani M.E.,Ph.D., Associate Professor (SG), Department of CSE, Journal of Computer Applications (0975 – 8887) Volume 17 – No. 5 , March 2011 26 Implementation of Object Oriented Data Warehousing using a N arrower C ompassed D ata M odel in – 8887) Volume 10 – No. 6 , November 2010 5 Even Vertex Graceful o f Path, Circuit, Star, Wheel , some Extension - friendship Graphs and Helm Graph A. Solairaju 1 , P. Muruganantham – 8887) Volume 90 – No 6 , March 2014 31 Improved Onlooker Bee Phase in A rtificial Bee Colony Algorithm Sandeep Kumar Jagannath University Chaksu, Jaipur, Rajasthan, India - 303901
Download Document
Here is the link to download the presentation.
"International Journal of Computer Applications (0975"The content belongs to its owner. You may download and print it for personal use, without modification, and keep all copyright notices. By downloading, you agree to these terms.
Related Documents