Published: 2015-03-02
Articles
Network Security Cryptographic Protocols and Lattice Problems
Read Statistic: 31
Roll of Total Quality Management and Organizational Management
Read Statistic: 31
Globalization: A Mathematical Biology & Topology Transformation
Read Statistic: 28
Identifying Feasible Central Meeting Location from Multiple Geo-Points
Read Statistic: 45
A Survey on Web Usage Mining
Read Statistic: 31
A Survey on Digital Video Watermarking
Read Statistic: 64
Wind Power Generation System Using Railway – A Prototype Model
Read Statistic: 46
Hacking in Social Media and Some Guidelines to Avoid It
Read Statistic: 50
Supervised Multi Attribute Gene Manipulation for Cancer
Read Statistic: 34
Collaborative Location Privacy Through Buffering
Read Statistic: 34
FODEX: Forensic Document Examiner –Using Graphology Science
Read Statistic: 31
Mining Comparators From Comparative Questions
Read Statistic: 26
Integrated Campus
Read Statistic: 26
A Review Study on A-TIG Welding of 316(L) Austenitic Stainless Steel
Read Statistic: 112
User Compatibility Checking Model For Cloud
Read Statistic: 27
Applications of Accelerometer as a Vibration Detector
Read Statistic: 32
Radio Frequency Ablation - The Magic treatment for Osteoid Osteoma
Read Statistic: 47
Wrapper Approach for IDS Using Fuzzy Genetic Algorithm
Read Statistic: 32
Efficient iSLIP Arbiter with iSLIP Scheduling Algorithm for NoC
Read Statistic: 32
Biometric Another Way of User Authentication
Read Statistic: 52
Risc Processor Using VHDL
Read Statistic: 34
Winding Fault Detection in Power Transformer by SFRA with DOBLE M5100
Read Statistic: 46