Published: 2015-03-02
Articles
Network Security Cryptographic Protocols and Lattice Problems
Read Statistic: 30
Roll of Total Quality Management and Organizational Management
Read Statistic: 30
Globalization: A Mathematical Biology & Topology Transformation
Read Statistic: 27
Identifying Feasible Central Meeting Location from Multiple Geo-Points
Read Statistic: 44
A Survey on Web Usage Mining
Read Statistic: 30
A Survey on Digital Video Watermarking
Read Statistic: 63
Wind Power Generation System Using Railway – A Prototype Model
Read Statistic: 45
Hacking in Social Media and Some Guidelines to Avoid It
Read Statistic: 49
Supervised Multi Attribute Gene Manipulation for Cancer
Read Statistic: 33
Collaborative Location Privacy Through Buffering
Read Statistic: 32
FODEX: Forensic Document Examiner –Using Graphology Science
Read Statistic: 30
Mining Comparators From Comparative Questions
Read Statistic: 25
Integrated Campus
Read Statistic: 25
A Review Study on A-TIG Welding of 316(L) Austenitic Stainless Steel
Read Statistic: 111
User Compatibility Checking Model For Cloud
Read Statistic: 26
Applications of Accelerometer as a Vibration Detector
Read Statistic: 31
Radio Frequency Ablation - The Magic treatment for Osteoid Osteoma
Read Statistic: 46
Wrapper Approach for IDS Using Fuzzy Genetic Algorithm
Read Statistic: 31
Efficient iSLIP Arbiter with iSLIP Scheduling Algorithm for NoC
Read Statistic: 30
Biometric Another Way of User Authentication
Read Statistic: 50
Risc Processor Using VHDL
Read Statistic: 32
Winding Fault Detection in Power Transformer by SFRA with DOBLE M5100
Read Statistic: 45