Search in Medwell
 
 

Asian Journal of Information Technology (2016 Volume 15)

Number of issues per year: 12
ISSN : 1682-3915 (Print)
ISSN : 1993-5994 (Online)
 
 
CURRENT ISSUE  |  ARCHIVE |  EDITORS  |  GUIDE TO AUTHORS  |  SUBMIT A MANUSCRIPT
 
CURRENT ISSUE
Secure Group Authentication Technique for VANET
A. Punitha and J. Martin Leo Manickam
 
Robust Automatic Color Image Region Segmentation
A. Kalaivani and S. Chitrakala
 
Robot Repair Algorithm for Automatic Hole Detection and Coverage in Wireless Sensor Networks
T. Samraj Lawrence and V. Seenivasagam
 
Improving the Energy Level of Node and Prevent the Cluster Head Failure in Wireless Sensor Networks
T. Prabakaran and N.K. Karthikeyan
 
Design of a Reduced Carry Chain Propagation Adder Using FinFET
S. Saravanan and V.M. Senthil Kumar
 
Offline Sanskirthandwritten Character Recognition Framework Based on Multi Layerfeed Forward Network with Intelligent Character Recognition
R. Dinesh Kumar
 
Design of an Error Tolerance Flip-Flop for Pipeline Architecture for SOC
K. Raja and S. Saravanan
 
An Enhanced Query Optimization Approach for Cloud Data Management
Eman A. Maghawry, Rasha M. Ismail, Nagwa L. Badr and M.F. Tolba
 
Performance Comparison of Adaptive Algorithms with Improved Adaptive Filter Based Algorithm for Speech Signals
M.A. Raja and B. Aruna Devi
 
An Innovative Cloud Framework for Tracking and Monitoring Tangible Assets in a Smarter Campus Using RFID
D. Venkata Vara Prasad, Suresh Jaganathan and R. Padma Priya
 
An Optimal Algorithm for Range Search on Multidimensional Points
T. Hema and K.S. Easwarakumar
 
Energy Efficiency in Randomized Raodv Routing Protocol of Wireless Networks
K. Santhi, B. Parvathavarthini and R. Rajachandrasekar
 
OTSIR: An Optimal Trust Based Swarm Intelligent Routing in Manet
S.P. Manikandan and R. Manimegalai
 
Fuzzy Logic Based CH Selection for Secured Data Communication with PVR Encryption Using VK-Constructs
A. Vijayalakshmi and P. Vanaja Ranjan
 
Software Security Risk Assessment of Data Communication Network Through Attack Decomposition Using Fuzzy Rough Sets
D. Kavitha, S. Chandrasekaran and M. Vigilson Prem
 
A Framework for an Intelligent Broker Model of Cloud Service Selection
R. Manikandan and G. Kousalya
 
Reducing Power and Delay in Instruction Queue for Sram Based Processor Unit
G. Dhanalakshmi, M. Sundarambal and K. Muralidharan
 
Incremental Hash Integrity Validation for Scalable and Secure Multicasting in Social Networking
R. Venkatesan and A. Sabari
 
Safety Assessment of Distributed Automotive Software System Model with Design for Traceability
S. Ravikumar, S. Chandrasekaran and S. Ramesh
 
Adaptive Phase Adjustment and Channel Prediction Strategies (APA-CPS) in MIMO-OFDM Based Cognitive Radios
R. Sarankumar, P. Poongodi and G. Umamaheswari
 
Sliding Mode Control for Voltage Regulation in Positive Output Elementary Parallel Connected Boost Converter
Spencer Prathap Singh, Kesavan Nair, G. Jiji, M. Rajaram and T. Ajith Bosco Raj
 
Reducing Mobile IPTV Traffic in 3G Network by Providing Favorite Channels in DVB-H Network
Ali Athari Beyragh and Shirin Khezri
 
Particle Swarm Optimization-Based Thresholding for Corneal Segmentation in Pterygium Detection
Siti Raihanah Abdani, W. Mimi Diyana W. Zaki, Aini Hussain and Mohamad Hanif Md. Saad
 
Fairness Aware Probabilistic Algorithm with Rate Control and Congestion Avoidance in WSN
C. Ram Kumar, S. Karthik and N. Karthikeyan
 
Optimization of Fuzzy Rules for Online Fraud Detection with the Use of Developed Genetic Algorithm and Fuzzy Operators
Mohammad Reza Parsaei, Reza Javidan and Mohammad Javad Sobouti
 
Structural Equation Modeling of Relations Between Old Texture Housing Planning, Housing Quality and Quality of Life of Residents of Javadieh Tehran
Khodayar Palouzian, Ali Rabiee and Ali Mohaghar
 
Assessment on the Effect of Strategic Capabilities on the Country’s Export Performance in the Carpet Industry
Farzad Tarhani and Leila Zoroufchi
 
Cloud Sourcing Challenges in it Projects
Seyede Maryam, Seyed Khamesi and Amir Hooshang Tajfar