Vol 5, No 2 (2015)
Table of Contents
Articles
Journal Cover Page | |
Journal Editor |
Analysis and Evaluation of Quality of Service (QoS) Router using Round Robin (RR) and Weighted Round Robin (WRR) | |
John Niyi Iyanda | 1-8 |
Pattern Recognition Neural Network and Class of Grades | |
Ojuawo olutayo Oyewole, Olaiju O.A, Afolayan O | 9-12 |
Intelligent Malware Detection System | |
Sandeep B. Damodhare, V. S. Gulhane | 13-15 |
Parallel and Context Based Search in Cloud using Multi Agent System | |
Ronak C Patel, Hiren V Mer | 16-20 |
Network Traffic Threat Detection and Reporting System Validation through UML | |
Amit Kumar Bhardwaj, Maninder Singh | 21-29 |
Real Time Big Data Analytics Dependence on Network Monitoring Solutions using Tensor Networks and its Decomposition | |
Raman Kumar, Arjun Sahni, Divyanshu Marwah | 30-37 |
Vulnerabilities for Reactive Routing in Mobile Adhoc Networks | |
Parveen Kakkar, Krishan Kumar Saluja | 38-43 |
Application of Idle/ Waiting Time Operator Oi,W on Two Stage Flow Shop Scheduling Problem with Arbitrary Lags | |
Deepak Gupta, Harminder Singh, Renuka . | 44-48 |
Efficient Storage Management over Cloud Using Data Compression without Losing Searching Capacity | |
Amitkumar P Gohil, Amish Desai | 49-57 |
Paper submission email: NCS@iiste.org
ISSN (Paper)2224-610X ISSN (Online)2225-0603