Published: 2015-03-02
Articles
Network Security Cryptographic Protocols and Lattice Problems
Read Statistic: 26
Roll of Total Quality Management and Organizational Management
Read Statistic: 26
Globalization: A Mathematical Biology & Topology Transformation
Read Statistic: 23
Identifying Feasible Central Meeting Location from Multiple Geo-Points
Read Statistic: 40
A Survey on Web Usage Mining
Read Statistic: 25
A Survey on Digital Video Watermarking
Read Statistic: 59
Wind Power Generation System Using Railway – A Prototype Model
Read Statistic: 40
Hacking in Social Media and Some Guidelines to Avoid It
Read Statistic: 45
Supervised Multi Attribute Gene Manipulation for Cancer
Read Statistic: 29
Collaborative Location Privacy Through Buffering
Read Statistic: 28
FODEX: Forensic Document Examiner –Using Graphology Science
Read Statistic: 26
Mining Comparators From Comparative Questions
Read Statistic: 21
Integrated Campus
Read Statistic: 21
A Review Study on A-TIG Welding of 316(L) Austenitic Stainless Steel
Read Statistic: 105
User Compatibility Checking Model For Cloud
Read Statistic: 22
Applications of Accelerometer as a Vibration Detector
Read Statistic: 27
Radio Frequency Ablation - The Magic treatment for Osteoid Osteoma
Read Statistic: 42
Wrapper Approach for IDS Using Fuzzy Genetic Algorithm
Read Statistic: 22
Efficient iSLIP Arbiter with iSLIP Scheduling Algorithm for NoC
Read Statistic: 24
Biometric Another Way of User Authentication
Read Statistic: 44
Risc Processor Using VHDL
Read Statistic: 28
Winding Fault Detection in Power Transformer by SFRA with DOBLE M5100
Read Statistic: 40