Author(s): Surendra Kumar Patel, Anil Kumar Sharma, Gupteshwar Gupta
DOI:
Views:
9
(pdf),
2604
(html)
Access:
Open Access
Cite: Surendra Kumar Patel, Anil Kumar Sharma, Gupteshwar Gupta. A Review on Peer-to-Peer Grids Computing. Research J. Science and Tech 5(3): July- Sept., 2013 page 291-294. doi:
Read More
|
Author(s): Hemsagar Patel, Shivangi Diwan
DOI:
Views:
9
(pdf),
2976
(html)
Access:
Open Access
Cite: Hemsagar Patel, Shivangi Diwan. Development of Pulse Radar Detection Technique using Neural Network. Research J. Science and Tech 5(3): July- Sept., 2013 page 331-334. doi:
Read More
|
Author(s): Gargi Pandey, Sanjay Kumar, V. K. Patle
DOI:
Views:
27
(pdf),
2763
(html)
Access:
Open Access
Cite: Gargi Pandey, Sanjay Kumar, V. K. Patle . Effect of Pause Time and Network Size in Various Routing Protocol: MANET. Research J. Science and Tech 5(3): July- Sept., 2013 page 335-339. doi:
Read More
|
Author(s): V. K. Patle, Aamir Hasan, Sanjay Kumar
DOI:
Views:
12
(pdf),
2207
(html)
Access:
Open Access
Cite: V. K. Patle, Aamir Hasan, Sanjay Kumar. Performance Evaluation of AOMDV, AODV and DSR Reactive Routing Protocols using NS-2. Research J. Science and Tech 5(3): July- Sept., 2013 page 343-346. doi:
Read More
|
Author(s): Bhisham Sonkar, Devendra Chaphekar, Gupteshwar Gupta
DOI:
Views:
8
(pdf),
2159
(html)
Access:
Open Access
Cite: Bhisham Sonkar, Devendra Chaphekar, Gupteshwar Gupta. A Vision and Research Priorities of Service Driven Approach towards Future Internet. Research J. Science and Tech 5(3): July- Sept., 2013 page 347-351. doi:
Read More
|
Author(s): Kailash Prasad Dewangan, Somesh Kumar Dewangan
DOI:
Views:
1
(pdf),
1945
(html)
Access:
Open Access
Cite: Kailash Prasad Dewangan, Somesh Kumar Dewangan. Enhanced Checkpointing Algorithm for Mobile Applications. Research J. Science and Tech 5(3): July- Sept., 2013 page 352-357. doi:
Read More
|
Author(s): Kailash Prasad Dewangan, Somesh Kumar Dewangan
DOI:
Views:
3
(pdf),
2556
(html)
Access:
Open Access
Cite: Kailash Prasad Dewangan, Somesh Kumar Dewangan. Enhanced Checkpointing Algorithm for Mobile Applications. Research J. Science and Tech 5(3): July- Sept., 2013 page 352-357. doi:
Read More
|
Author(s): Deepmala, H. K. Pathak
DOI:
Views:
1
(pdf),
2314
(html)
Access:
Open Access
Cite: Deepmala, H. K. Pathak. On Solutions of Some Functional-Integral Equations in Banach Algebra. Research J. Science and Tech 5(3): July- Sept., 2013 page 358-362. doi:
Read More
|
Author(s): Ajay Kumar Sharma
DOI:
Views:
6
(pdf),
2119
(html)
Access:
Open Access
Cite: Ajay Kumar Sharma. Fixed point theorem for generalized cyclic -contraction maps in complete metric space . Research J. Science and Tech 5(3): July- Sept., 2013 page 363-367. doi:
Read More
|
Author(s): M.R. Yadav
DOI:
Views:
4
(pdf),
2136
(html)
Access:
Open Access
Cite: M.R. Yadav. Two-step Iteration Process for Nonexpansive Mapping in CAT (0) Space. Research J. Science and Tech 5(3): July- Sept., 2013 page 368-374. doi:
Read More
|
Author(s): Niyati Gurudwan
DOI:
Views:
1
(pdf),
1891
(html)
Access:
Open Access
Cite: Niyati Gurudwan. Approximating solutions for the system of Ф-strongly accretive operator equations. Research J. Science and Tech 5(3): July- Sept., 2013 page 375-383. doi:
Read More
|
Author(s): Anil Kumar Sharma, Surendra Kumar Patel, Gupteshwar Gupta
DOI:
Views:
13
(pdf),
2582
(html)
Access:
Open Access
Cite: Anil Kumar Sharma, Surendra Kumar Patel, Gupteshwar Gupta. Mobile Sensor Networks: A Review. Research J. Science and Tech 5(3): July- Sept., 2013 page 295-299. doi:
Read More
|
Author(s): Sushma Pradhan, Birendra Kumar Sharma
DOI:
Views:
27
(pdf),
3189
(html)
Access:
Open Access
Cite: Sushma Pradhan, Birendra Kumar Sharma. A Modified Variant of RSA Algorithm for Gaussian Integers. Research J. Science and Tech 5(3): July- Sept., 2013 page 300-302. doi:
Read More
|
Author(s): Dhammpal Ramtake, Sanjay Kumar, Vinod Kumar Patle
DOI:
Views:
19
(pdf),
2800
(html)
Access:
Open Access
Cite: Dhammpal Ramtake, Sanjay Kumar, Vinod Kumar Patle. Power Consuption of Routing Protocoals in Various Simulators: MANET. Research J. Science and Tech 5(3): July- Sept., 2013 page 303-306. doi:
Read More
|
Author(s): Tejeshwari Thakur, Birendra Kumar Sharma
DOI:
Views:
2
(pdf),
2453
(html)
Access:
Open Access
Cite: Tejeshwari Thakur, Birendra Kumar Sharma . New Identity ¬based Key ¬Exposure Free Chameleon Hashing Based on the RSA Assumption . Research J. Science and Tech 5(3): July- Sept., 2013 page 307-312. doi:
Read More
|
Author(s): Rinki Kaur, Sanjay Kumar, V.K. Patle
DOI:
Views:
14
(pdf),
2401
(html)
Access:
Open Access
Cite: Rinki Kaur, Sanjay Kumar, V.K. Patle . Analysis of Tunneling Transition Mechanism in IPv6 . Research J. Science and Tech 5(3): July- Sept., 2013 page 313-318. doi:
Read More
|
Author(s): Devendra Chaphekar, Bhisham Sonkar, Gupteshwar Gupta
DOI:
Views:
25
(pdf),
2685
(html)
Access:
Open Access
Cite: Devendra Chaphekar, Bhisham Sonkar, Gupteshwar Gupta. Integration of Mobile IP with Mobile Adhoc Network, a Conceptual Study. Research J. Science and Tech 5(3): July- Sept., 2013 page 319-322. doi:
Read More
|
Author(s): Rahul Gedam, Sanskriti Sharma
DOI:
Views:
37
(pdf),
3093
(html)
Access:
Open Access
Cite: Rahul Gedam, Sanskriti Sharma . Simulation Model of OFDM with Security Algorithm for Estimation of BER and SNR. Research J. Science and Tech 5(3): July- Sept., 2013 page 323-326. doi:
Read More
|
Author(s): Kiran, Sanjay Kumar, V. K. Patle
DOI:
Views:
8
(pdf),
2680
(html)
Access:
Open Access
Cite: Kiran, Sanjay Kumar, V. K. Patle. Effect of Selfish Nodes in Trust Base Route: MANET. Research J. Science and Tech 5(3): July- Sept., 2013 page 327-330. doi:
Read More
|