Author(s): Surendra Kumar Patel, Anil Kumar Sharma, Gupteshwar Gupta
DOI:
Views:
9
(pdf),
2845
(html)
Access:
Open Access
Cite: Surendra Kumar Patel, Anil Kumar Sharma, Gupteshwar Gupta. A Review on Peer-to-Peer Grids Computing. Research J. Science and Tech 5(3): July- Sept., 2013 page 291-294. doi:
Read More
|
Author(s): Hemsagar Patel, Shivangi Diwan
DOI:
Views:
9
(pdf),
3174
(html)
Access:
Open Access
Cite: Hemsagar Patel, Shivangi Diwan. Development of Pulse Radar Detection Technique using Neural Network. Research J. Science and Tech 5(3): July- Sept., 2013 page 331-334. doi:
Read More
|
Author(s): Gargi Pandey, Sanjay Kumar, V. K. Patle
DOI:
Views:
33
(pdf),
2948
(html)
Access:
Open Access
Cite: Gargi Pandey, Sanjay Kumar, V. K. Patle . Effect of Pause Time and Network Size in Various Routing Protocol: MANET. Research J. Science and Tech 5(3): July- Sept., 2013 page 335-339. doi:
Read More
|
Author(s): V. K. Patle, Aamir Hasan, Sanjay Kumar
DOI:
Views:
12
(pdf),
2416
(html)
Access:
Open Access
Cite: V. K. Patle, Aamir Hasan, Sanjay Kumar. Performance Evaluation of AOMDV, AODV and DSR Reactive Routing Protocols using NS-2. Research J. Science and Tech 5(3): July- Sept., 2013 page 343-346. doi:
Read More
|
Author(s): Bhisham Sonkar, Devendra Chaphekar, Gupteshwar Gupta
DOI:
Views:
8
(pdf),
2356
(html)
Access:
Open Access
Cite: Bhisham Sonkar, Devendra Chaphekar, Gupteshwar Gupta. A Vision and Research Priorities of Service Driven Approach towards Future Internet. Research J. Science and Tech 5(3): July- Sept., 2013 page 347-351. doi:
Read More
|
Author(s): Kailash Prasad Dewangan, Somesh Kumar Dewangan
DOI:
Views:
1
(pdf),
2084
(html)
Access:
Open Access
Cite: Kailash Prasad Dewangan, Somesh Kumar Dewangan. Enhanced Checkpointing Algorithm for Mobile Applications. Research J. Science and Tech 5(3): July- Sept., 2013 page 352-357. doi:
Read More
|
Author(s): Kailash Prasad Dewangan, Somesh Kumar Dewangan
DOI:
Views:
3
(pdf),
2780
(html)
Access:
Open Access
Cite: Kailash Prasad Dewangan, Somesh Kumar Dewangan. Enhanced Checkpointing Algorithm for Mobile Applications. Research J. Science and Tech 5(3): July- Sept., 2013 page 352-357. doi:
Read More
|
Author(s): Deepmala, H. K. Pathak
DOI:
Views:
1
(pdf),
2466
(html)
Access:
Open Access
Cite: Deepmala, H. K. Pathak. On Solutions of Some Functional-Integral Equations in Banach Algebra. Research J. Science and Tech 5(3): July- Sept., 2013 page 358-362. doi:
Read More
|
Author(s): Ajay Kumar Sharma
DOI:
Views:
6
(pdf),
2280
(html)
Access:
Open Access
Cite: Ajay Kumar Sharma. Fixed point theorem for generalized cyclic -contraction maps in complete metric space . Research J. Science and Tech 5(3): July- Sept., 2013 page 363-367. doi:
Read More
|
Author(s): M.R. Yadav
DOI:
Views:
4
(pdf),
2284
(html)
Access:
Open Access
Cite: M.R. Yadav. Two-step Iteration Process for Nonexpansive Mapping in CAT (0) Space. Research J. Science and Tech 5(3): July- Sept., 2013 page 368-374. doi:
Read More
|
Author(s): Niyati Gurudwan
DOI:
Views:
1
(pdf),
2015
(html)
Access:
Open Access
Cite: Niyati Gurudwan. Approximating solutions for the system of Ф-strongly accretive operator equations. Research J. Science and Tech 5(3): July- Sept., 2013 page 375-383. doi:
Read More
|
Author(s): Anil Kumar Sharma, Surendra Kumar Patel, Gupteshwar Gupta
DOI:
Views:
15
(pdf),
2879
(html)
Access:
Open Access
Cite: Anil Kumar Sharma, Surendra Kumar Patel, Gupteshwar Gupta. Mobile Sensor Networks: A Review. Research J. Science and Tech 5(3): July- Sept., 2013 page 295-299. doi:
Read More
|
Author(s): Sushma Pradhan, Birendra Kumar Sharma
DOI:
Views:
27
(pdf),
3354
(html)
Access:
Open Access
Cite: Sushma Pradhan, Birendra Kumar Sharma. A Modified Variant of RSA Algorithm for Gaussian Integers. Research J. Science and Tech 5(3): July- Sept., 2013 page 300-302. doi:
Read More
|
Author(s): Dhammpal Ramtake, Sanjay Kumar, Vinod Kumar Patle
DOI:
Views:
19
(pdf),
3348
(html)
Access:
Open Access
Cite: Dhammpal Ramtake, Sanjay Kumar, Vinod Kumar Patle. Power Consuption of Routing Protocoals in Various Simulators: MANET. Research J. Science and Tech 5(3): July- Sept., 2013 page 303-306. doi:
Read More
|
Author(s): Tejeshwari Thakur, Birendra Kumar Sharma
DOI:
Views:
2
(pdf),
2598
(html)
Access:
Open Access
Cite: Tejeshwari Thakur, Birendra Kumar Sharma . New Identity ¬based Key ¬Exposure Free Chameleon Hashing Based on the RSA Assumption . Research J. Science and Tech 5(3): July- Sept., 2013 page 307-312. doi:
Read More
|
Author(s): Rinki Kaur, Sanjay Kumar, V.K. Patle
DOI:
Views:
14
(pdf),
2594
(html)
Access:
Open Access
Cite: Rinki Kaur, Sanjay Kumar, V.K. Patle . Analysis of Tunneling Transition Mechanism in IPv6 . Research J. Science and Tech 5(3): July- Sept., 2013 page 313-318. doi:
Read More
|
Author(s): Devendra Chaphekar, Bhisham Sonkar, Gupteshwar Gupta
DOI:
Views:
25
(pdf),
2858
(html)
Access:
Open Access
Cite: Devendra Chaphekar, Bhisham Sonkar, Gupteshwar Gupta. Integration of Mobile IP with Mobile Adhoc Network, a Conceptual Study. Research J. Science and Tech 5(3): July- Sept., 2013 page 319-322. doi:
Read More
|
Author(s): Rahul Gedam, Sanskriti Sharma
DOI:
Views:
41
(pdf),
3269
(html)
Access:
Open Access
Cite: Rahul Gedam, Sanskriti Sharma . Simulation Model of OFDM with Security Algorithm for Estimation of BER and SNR. Research J. Science and Tech 5(3): July- Sept., 2013 page 323-326. doi:
Read More
|
Author(s): Kiran, Sanjay Kumar, V. K. Patle
DOI:
Views:
8
(pdf),
2924
(html)
Access:
Open Access
Cite: Kiran, Sanjay Kumar, V. K. Patle. Effect of Selfish Nodes in Trust Base Route: MANET. Research J. Science and Tech 5(3): July- Sept., 2013 page 327-330. doi:
Read More
|