Volume 1, Issue 12 May 2015

Title And Author Area Page
Secured and Optimized Energy Efficient Routing Protocol to detect Black hole attack in Wireless Sensor Network
- Panam R.Fadia
Full Article
Criminology Of Botnet Resilience Technology And Mitigation Of Botnet
- Shaishav D.Shukla; Mr.Pushkar Jha
Full Article
Homomorphic Encryption In Cloud Computing
- Dishita Dave; Rikkin Thakkar
Full Article
Performance Comparision Of Energy And Routing Load In Different On-Demand MANET Routing Protocols And Anlyzing Their Effect On Basis Of Various Queuing Mechanisms
- Prachi Pancholi; Vikas Tulshyan
Full Article
Quantifying The Severity Of Jellyfish Attack On Mobile Adhoc Network
- Ashish Patel; Vikas Tulshyan
Full Article
Optimizing Fuzzy Rule based Classifier for Multi Label Classification using ACO
- Rajvi P.Rami; Amit R.Thakkar; Chetna Chand
Full Article
Web Based Steganography Using Combination Of Three Methods
- Karan H.Parmar; Avaniba Parmar
Full Article
New Image Fusion Methodbased On Integration Of Wavelet And Curvelet Tranform In Image Processing
- Krupa B.Patel; Asst.Prof.Rikin Thakkar
Full Article
Application of Xanthan Gum as a Viscosity Modifying Admixture along with Super Plasticizer for Self-Compacting Concrete (SCC)
- Mr.Ronak B.Patel; Prof.M.A.Jamnu; Prof.B.M.Purohit
Full Article
Rules generation by ARM and Classification based on Chi-square Analysis
- Nilesh Solanki; Rikin Thakkar
Full Article

Go To Issue

Call For Paper

Volume 5 Issue 1

Last Date 25 June 2018

About Us

IJIRT.org enables door in research by providing high quality research articles in open access market.

Send us any query related to your research on editor@ijirt.org

Social Media

Contact Details

Telephone:704 821 9842/43
Email: editor@ijirt.org
Website: ijirt.org