Previous Issues
Volume 15, Issue 4
Volume 15, Issue 3
Volume 15, Issue 2
Volume 15, Issue 1
Volume 14, Issue 4
Volume 14, Issue 3
Volume 14, Issue 2
Volume 14, Issue 1
Volume 13, Issue 4
Volume 13, Issue 3
Volume 13, Issue 2
Volume 13, Issue 1
Volume 12, Issue 4
Volume 12, Issue 3
Volume 12, Issue 2
Volume 12, Issue 1
Volume 11, Issue 4
Volume 11, Issue 3
Volume 11, Issue 2
Volume 11, Issue 1
Volume 10, Issue 4
Volume 10, Issue 3
Volume 10, Issue 2
Volume 10, Issue 1
Volume 9, Issue 4
Volume 9, Issue 3
Volume 9, Issue 2
Volume 9, Issue 1
Volume 8, Issue 4
Volume 8, Issue 3
Volume 8, Issue 2
Volume 8, Issue 1
Volume 7, Issue 4
Volume 7, Issue 3
Volume 7, Issue 2
Volume 7, Issue 1
Volume 6, Issue 4
Volume 6, Issue 3
Volume 6, Issue 2
Volume 6, Issue 1
Volume 5, Issue 4
Volume 5, Issue 3
Volume 5, Issue 2
Volume 5, Issue 1
Volume 4, Issue 4
Volume 4, Issue 3
Volume 4, Issue 2
Volume 4, Issue 1
Volume 3, Issue 4
Volume 3, Issue 3
Volume 3, Issue 2
Volume 3, Issue 1
Volume 2, Issue 4
Volume 2, Issue 3
Volume 2, Issue 2
Volume 2, Issue 1
Volume 1, Issue 4
Volume 1, Issue 3
Volume 1, Issue 2
Volume 1, Issue 1
Home
>>
Journals
>>
ICTACT Journal on Communication Technology
>>
View Articles
ICTACT Journal on Communication Technology
An International Publication of ICT Academy
Volume 4, Issue 3 Articles
September 2013
Volume 4
Issue 3
ISSN 2229-6948
Table of Contents
1070
PERFORMANCE COMPARISON OF INTRUSION DETECTION SYSTEM USING VARIOUS TECHNIQUES – A REVIEW
Page(s):
802 - 812
S. Devaraju, S. Ramakrishnan
Dr. Mahalingam College of Engineering and Technology, India
Abstract
Full Text
DOI :
10.21917/ijct.2013.0114
1069
ENERGY EFFICIENT DATA COLLECTION IN WIRELESS SENSOR NETWORK
Page(s):
796 - 801
Nandhini B, Srie Vidhya Janani E
Anna University Regional Centre, India
Abstract
Full Text
DOI :
10.21917/ijct.2013.0113
1068
EFFICIENT SPECTRUM UTILIZATION IN COGNITIVE RADIO THROUGH REINFORCEMENT LEARNING
Page(s):
790 - 795
Dhananjay Kumar, Pavithra Hari, Panbhazhagi Selvaraj, Sharavanti Baskaran
Anna University, MIT Campus, Chennai, India
Abstract
Full Text
DOI :
10.21917/ijct.2013.0112
1067
STEGANODB – A SECURE DATABASE USING STEGANOGRAPHY
Page(s):
785 - 789
R. Rejani
1
, D. Murugan
2
, Deepu V. Krishnan
3
Manonmanium Sundarnar University, India
1
, Manonmanium Sundarnar University, India
2
, Infosys Limited, Technopark Campus, India
3
Abstract
Full Text
DOI :
10.21917/ijct.2013.0111
1066
AN AUTOMATED NETWORK SECURITYCHECKING AND ALERT SYSTEM: A NEW FRAMEWORK
Page(s):
778 - 784
Vivek Kumar Yadav
1
, B.M. Mehtre
2
University of Hyderabad, India
1
, Institute for Development and Research in Banking Technology, Established by Reserve Bank of India, India
2
Abstract
Full Text
DOI :
10.21917/ijct.2013.0110
1065
ENERGY LEVEL DETERMINATION AND PERFORMANCE ANALYSIS OF QUANTUM DOT PHOTO DETECTOR
Page(s):
766 - 777
M. Madheswaran
1
, K.R. Kavitha
2
Mahendra Engineering College, India
1
, Sona College of Technology, India
2
Abstract
Full Text
DOI :
10.21917/ijct.2013.0109
1064
S-SPRAY ROUTING PROTOCOL FOR INTERMITTENTLY CONNECTED MOBILE NETWORKS
Page(s):
761 - 765
S. Ramesh
1
, R. Indira
2
, P. Ganesh Kumar
3
Anna University Regional Centre, Madurai, India
1
, Anna University Regional Centre, Madurai, India
2
, KLN College of Engineering, India
3
Abstract
Full Text
DOI :
10.21917/ijct.2013.0108
This work is licensed under a
Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License
.