Volume 1, Issue 12 May 2015

Title And Author Area Page
Secured and Optimized Energy Efficient Routing Protocol to detect Black hole attack in Wireless Sensor Network
- Panam R.Fadia
Full Article
1337-1343
Criminology Of Botnet Resilience Technology And Mitigation Of Botnet
- Shaishav D.Shukla; Mr.Pushkar Jha
Full Article
1344-1351
Homomorphic Encryption In Cloud Computing
- Dishita Dave; Rikkin Thakkar
Full Article
1352-1357
Performance Comparision Of Energy And Routing Load In Different On-Demand MANET Routing Protocols And Anlyzing Their Effect On Basis Of Various Queuing Mechanisms
- Prachi Pancholi; Vikas Tulshyan
Full Article
1358-1369
Quantifying The Severity Of Jellyfish Attack On Mobile Adhoc Network
- Ashish Patel; Vikas Tulshyan
Full Article
1376-1383
Optimizing Fuzzy Rule based Classifier for Multi Label Classification using ACO
- Rajvi P.Rami; Amit R.Thakkar; Chetna Chand
Full Article
1384-1389
Web Based Steganography Using Combination Of Three Methods
- Karan H.Parmar; Avaniba Parmar
Full Article
1390-1396
New Image Fusion Methodbased On Integration Of Wavelet And Curvelet Tranform In Image Processing
- Krupa B.Patel; Asst.Prof.Rikin Thakkar
Full Article
1397-1401
Application of Xanthan Gum as a Viscosity Modifying Admixture along with Super Plasticizer for Self-Compacting Concrete (SCC)
- Mr.Ronak B.Patel; Prof.M.A.Jamnu; Prof.B.M.Purohit
Full Article
1402-1406
Rules generation by ARM and Classification based on Chi-square Analysis
- Nilesh Solanki; Rikin Thakkar
Full Article
1407-1411

Go To Issue



Call For Paper

Volume 4 Issue 3

Last Date 25 August 2017


About Us

IJIRT.org enables door in research by providing high quality research articles in open access market.

Send us any query related to your research on editor@ijirt.org

Contact Details

Telephone:704 821 9842/43
Email: editor@ijirt.org
Website: ijirt.org