Journal of Computer Science IJCSIS January 2016
A Novel Architecture for Improving Performance under Virtualized Environments
Conversion of an SR-Flip Flop to a JK-Flip Flop
GPGPU based Parallel Spam Filter
Trellis Analysis of Transmission Burst Errors in Viterbi Decoding
Computational Algorithms Based on the Paninian System to Process Euphonic Conjunctions for Word Searches
Journal of Computer Science IJCSIS July 2014
A Survey of Power Management Techniques of Computing Systems
Vulnerability analysis of E-transactions in the Banking Industry, with a specific reference to malwares and types of attacks
Implementation of Two link Articulated Robot Kinematic Simulation using Echo state neural network
Heart Disease Diagnosis by Using FFBP and GRNN Algorithm of Neural Network
Hybrid Encryption Technique Using RSA with SHA-1 Algorithm in Data-At-Rest and Data-In-Motion Level
The control model of security in the deployment of ERP systems
New Hybrid Intrusion Detection System based on Data Mining Technique to Enhanced Performance
Evaluation of Cryptanalytic Algorithm for A5/2 Stream Cipher
Building High Performance Computing Using Beowulf Linux Cluster
Route optimization and roaming capability based MIPv6 protocol in internet network
A Survivability Strategy in Mobile Network by Key Distribution and Cross-layer protocol
Effect of Cross Layer optimization of Traffic Management in Ad Hoc Mobile Network
Performance of and Traffic management for a Mobile networks by using Cross-layer protocol