Published: 2015-03-02
Articles
Network Security Cryptographic Protocols and Lattice Problems
Read Statistic: 39
Roll of Total Quality Management and Organizational Management
Read Statistic: 40
Globalization: A Mathematical Biology & Topology Transformation
Read Statistic: 36
Identifying Feasible Central Meeting Location from Multiple Geo-Points
Read Statistic: 50
A Survey on Web Usage Mining
Read Statistic: 39
A Survey on Digital Video Watermarking
Read Statistic: 72
Wind Power Generation System Using Railway – A Prototype Model
Read Statistic: 55
Hacking in Social Media and Some Guidelines to Avoid It
Read Statistic: 59
Supervised Multi Attribute Gene Manipulation for Cancer
Read Statistic: 42
Collaborative Location Privacy Through Buffering
Read Statistic: 43
FODEX: Forensic Document Examiner –Using Graphology Science
Read Statistic: 38
Mining Comparators From Comparative Questions
Read Statistic: 34
Integrated Campus
Read Statistic: 35
A Review Study on A-TIG Welding of 316(L) Austenitic Stainless Steel
Read Statistic: 127
User Compatibility Checking Model For Cloud
Read Statistic: 37
Applications of Accelerometer as a Vibration Detector
Read Statistic: 41
Radio Frequency Ablation - The Magic treatment for Osteoid Osteoma
Read Statistic: 58
Wrapper Approach for IDS Using Fuzzy Genetic Algorithm
Read Statistic: 42
Efficient iSLIP Arbiter with iSLIP Scheduling Algorithm for NoC
Read Statistic: 42
Biometric Another Way of User Authentication
Read Statistic: 60
Risc Processor Using VHDL
Read Statistic: 46
Winding Fault Detection in Power Transformer by SFRA with DOBLE M5100
Read Statistic: 54