Volume 2 Issue 2
Research Article | IJMCA-V2I3P102
Wireless Sensor Network Based on Reduced Packet Loss with Maximum Clusters
Dr.J.Amitava and T. Anil
Research Article | IJMCA-V2I3P104
Detection of Black Hole and Worm Whole Attacks in MANETS
Dr.V.Egaiarasu and D.Kailashchandra
Research Article | IJMCA-V2I3P105
Study of Routing Protocols in Mobile Ad-Hoc Network
R.Hemangini and Dr.M.Nirupama
Research Article | IJMCA-V2I3P119
Credit Card Number Fraud Detection Using K-Means with Hidden Markov Method
Pooja Bhati and Manoj Sharma
Research Article | IJMCA-V2I3P121
Performance analysis of mRSA for varying key sizes and data modulus
Manvi goyal and Jatin Sharma
Research Article | IJMCA-V2I4P103
A Study of Mobile Application Usage in Bangladesh
Saif Ahmed , Zubier Abdullah , Dr Rajesh Palit and Dr Rokonuzzama
Research Article | IJMCA-V2I4P104
Analysis on Dispersed Responsibility for Data Distribution in the Cloud
Dr.O.L. Anderson and P.Antonio Brown
Research Article | IJMCA-V2I4P105
The Analysis of Procedures for Link Retrieval & Admission Mechanism in Wireless Network System
Dr.G.E.Victor Cruz and Dr.H.K.Buffalo Bills
Research Article | IJMCA-V2I4P106
Comparable Encryption Procedure Shared with Protected Single Sign-on Instrument for Dispersed Computer Systems
Dr.S.Maniraj and C.Sasikala