Published: 2015-01-06

Time-Based Proxy Re-encryption Scheme for Secure Data Sharing in a Cloud Environment

Dayananda RB, Prof. Dr. G. Manoj Someswar
Read Statistic: 29

Mobile Agent Based MapReduce Framework for Big Data Processing

Sonu Yadav
Read Statistic: 119

Projective Change between Special (α,β)- Finsler Metric and Rander’s Metric

Gayathri. K, Narasimhamurthy. S.K
Read Statistic: 29

Fuzzy Logic based Speed Control of an Induction Motor Using Indirect Vector Control Method

Lakhya Jyoti Phukon, Dr. Neelanjana Baruah
Read Statistic: 38

Engaging students in Group based Learning through e-learning techniques in Higher Education System

Sivakumar Venkataraman, Subitha Sivakumar
Read Statistic: 406

A Review on Nanomaterial: Chitosan

Prabhakar Narhari Gunjal, Sharad Narhari Gunjal, Sanjay Shivaji Kale, Shital Sanjay Kale, Prashant Uttam Gunjal, Yogita Prashant Gunjal, Shrikant Uttam Gunjal
Read Statistic: 76

Studies of Fresh Water Toxic Phytoplanktonic (Microcystis) of Keenkjhar Lake, Thatta, Sindh, and Pakstan

Khalid Hussain Lashari, Zulfiqar Ali Laghari, Zameer Ali Palh, Gulshan Ara Sahato, Ghulam Murtaza Mastoi
Read Statistic: 28

Traditonal Health Care Practices Among Kondh and Bhuyan Tribes of Odisha

Debajanee Lenka, A. Mohapatra
Read Statistic: 153

Kerberos Authentication with Role Based Access Control Model for Cloud Environment

Yaser Fuad Al-Dubai, Dr. Khamitkar S.D, Dr. Parag Bhalchandra
Read Statistic: 25

Review on Localization of License Plate Number Using Dynamic Image Processing Techniques and Genetic Algorithms

Kiran Kondlekar, A. S. Shirsat
Read Statistic: 36

A Review on Device Controlled Using Eye Movement

Prashant Salunkhe, Ashwini R. Patil
Read Statistic: 37

Filtering of Unwanted Messages from OSN User Walls

N. Bhargavi, K. Ramesh, D. Venkatesh
Read Statistic: 32