Published: 2015-03-02
Articles
Network Security Cryptographic Protocols and Lattice Problems
Read Statistic: 45
Roll of Total Quality Management and Organizational Management
Read Statistic: 44
Globalization: A Mathematical Biology & Topology Transformation
Read Statistic: 42
Identifying Feasible Central Meeting Location from Multiple Geo-Points
Read Statistic: 60
A Survey on Web Usage Mining
Read Statistic: 45
A Survey on Digital Video Watermarking
Read Statistic: 78
Wind Power Generation System Using Railway – A Prototype Model
Read Statistic: 59
Hacking in Social Media and Some Guidelines to Avoid It
Read Statistic: 64
Supervised Multi Attribute Gene Manipulation for Cancer
Read Statistic: 48
Collaborative Location Privacy Through Buffering
Read Statistic: 47
FODEX: Forensic Document Examiner –Using Graphology Science
Read Statistic: 46
Mining Comparators From Comparative Questions
Read Statistic: 39
Integrated Campus
Read Statistic: 41
A Review Study on A-TIG Welding of 316(L) Austenitic Stainless Steel
Read Statistic: 138
User Compatibility Checking Model For Cloud
Read Statistic: 46
Applications of Accelerometer as a Vibration Detector
Read Statistic: 46
Radio Frequency Ablation - The Magic treatment for Osteoid Osteoma
Read Statistic: 64
Wrapper Approach for IDS Using Fuzzy Genetic Algorithm
Read Statistic: 47
Efficient iSLIP Arbiter with iSLIP Scheduling Algorithm for NoC
Read Statistic: 46
Biometric Another Way of User Authentication
Read Statistic: 68
Risc Processor Using VHDL
Read Statistic: 53
Winding Fault Detection in Power Transformer by SFRA with DOBLE M5100
Read Statistic: 61