Vol 3, No 7 (2013)

Table of Contents


A New Approach of Detecting Network Anomalies using Improved ID3 with Horizontal Partioning Based Decision Tree PDF
Sonika Tiwari, Roopali Soni 1-6
Implementation of Query Optimization for Reducing Run Time PDF
S.C. Tawalare, S.S. Dhande 7-11
Performance Evaluation of Network Security Protocols on Open Source and Microsoft Windows Platforms PDF
Oluwaranti A.I., Adejumo, E.O. 12-21
Elimination of Wormhole Attacker Node in MANET Using Performance Evaluation Multipath Algorithm PDF
Rajpal Singh Khainwar, Anurag Jain, Jagdish Prasad Tyagi 22-29
Energy Efficient Protocol with Static Clustering (EEPSC) Comparing with Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol PDF
Vinidha roc, Ajay D. Vimalraj, C.Maria Antoine Pushparaj 30-37
Using Multi-agent System for Solving Coverage Problem in Wireless Sensor Network PDF
Sherehan aburomman, Khalaf khataneh 38-45
Synthesis and Performance Analysis of Network Topology using Graph Theory PDF
U N Bassey, K N Bassey, E N Bassey 46-53

Paper submission email: NCS@iiste.org

ISSN (Paper)2224-610X ISSN (Online)2225-0603

Please add our address "contact@iiste.org" into your email contact list.

This journal follows ISO 9001 management standard and licensed under a Creative Commons Attribution 3.0 License.

Copyright © www.iiste.org