Issue 2 of Volume 35

An approach for a Standard Polynomial for Cyclic Redundancy Check

Authors: Hasan Md. Mohtarim, Ayesha Zaman, Nowrin Hoque

Throughput Performance Evaluation of Video/Voice Traffic in IPv4/IPv6 Networks

Authors: Md. Tariq Aziz, Mohammad Saiful Islam, Md. Nazmul Islam Khan

Analysis of the Interaction between Routing Protocols and MANET Parameters

Authors: Md. Nazmul Islam Khan, Rashed Ahmed, Md. Tariq Aziz

A robust scheme for Digital Video Watermarking based on Scrambling of Watermark

Authors: Mahesh R. Sanghavi, Dr. Archana M., Dr. Rajeev Mathur, Kainjan S. Kotecha

Offline Signature Recognition & Verification using Neural Network

Authors: O. C. Abikoye, M. A. Mabayoje, R. Ajibade

Genetic Algorithm for Resource Allocation in WiMAX Network

Authors: Wankhede Vishal A., Dr. Gond V.J., Dr. Abhay Wagh, Dr. Upena Dalal

Intrusion Detection System for Ad hoc Mobile Networks

Authors: Muhammad Nawaz Khan, Muhammad Ilyas Khatak, Muhammad Faisal