Abstract

Authors and Affiliations

S. Bhargav Kumar#1 , S. Jagadeesh*2 , Dr. M. Ashok#3

Keywords

Related Articles

 IP Anycast Architecture

 This paper illustrates the methodology and architecture for network addressing and routing in which datagram packets routed through mathematical topological nearest node in a cluster of potential receivers that a...

 Robust Data Clustering Algorithms for Network Intrusion Detection

 IDS (Intrusion Detection system) is an active and driving defense technology. Intrusion detection is to detect attacks against a computer system. This project mainly focuses on intrusion detection based on data min...

Role Of Clustering On Gene Data

This Data mining is the process of finding correlations or patterns among dozens of fields in large relational databases. Clustering algorithm used to find groups of objects such that the objects in a group will be simil...

Power Efficient Weighted Modulo 2n+1 Adder

The comparison of three different architectures for modulo 2n+1 adders are introduced in this paper. The first two architecture can be implemented different power consumptions, while maintain the same delay. The partitio...

Pre-eminent Multi-path routing with maximum resource utilization in traffic engineering approach

the main objective of the proposed system is providing optimal path and extreme utilization with link state routing. This aims to provide best contribution of traffic engineering with effective load balancing. Eliminatio...

Download PDF file
  • EP ID EP87359
  • DOI -
  • Views 148
  • Downloads 0

How To Cite

S. Bhargav Kumar#1, S. Jagadeesh*2, Dr. M. Ashok#3 (2012).  . International Journal of Computer & organization Trends(IJCOT), 2(3), 73-79. https://www.europub.co.uk/articles/-A-87359