आयतन 4, मुद्दा 4 (2013)

समीक्षा लेख

EFFICIENT IDENTIFICATION OF HIDDEN VIDEOFILES EXPLOITATION COMPRESSION AND SECRET RECOGNITION TECHNIQUES

  • Santhosh Kumar S, Kishore A and Mr. Chandrasekaran

समीक्षा लेख

A Cloud-based Intrusion Detection Forensic Analysis on Smart Phones

  • I. Raja, P.Sreevenkataramana

समीक्षा लेख

IMAGE SEGEMNTATION USING CLUATERING TECHNIQUE ANS SWARM INTELLIANGE

  • P.Tamije Selvy, Dr. V. Palanisamy, M. Sri Radhai

समीक्षा लेख

IMPLEMENTING ICT PRACTICES OF EFFECTIVE TOURISM MANAGEMENT: A CASE STUDY

  • Muheet Ahmed Butt, Majid Zaman

समीक्षा लेख

A SURVEY OF INTRUSION DETECTION FOR AD-HOC NETWORK

  • Jacob Abraham, V.Arun Prasath,G.Michael

समीक्षा लेख

SMART RATION CARD

  • Vikram Singh, VellankiAamani , Booreddy Mounika

समीक्षा लेख

SOME VARIANTS OF K-MEANS CLUSTERING WITH EMPHASIS ON IMAGE SEGMENTATION

  • Sheetal Aggarwal, Ashok

समीक्षा लेख

A STUDY ON IMPROVING CHALLENGES OF NETWORK WITH CLOUDLETS FOR MOBILE CLOUD COMPUTING

  • Rutika M. Modh, Dr.Jayesh.M.Patel

समीक्षा लेख

REVIEW ON MOBILE AD HOC NETWORK

  • Reena Rani, Reena Thakral

समीक्षा लेख

WIRELESS HOME AND INDUSTRIAL AUTOMATION SECURITY SYSTEM USING GSM

  • R.Anandan, Mr.B.Karthik., Dr.T.V.U.Kiran Kumar

समीक्षा लेख

REVIEW: DESIGN OF DIRECT FORM TRANSPOSED FIR INTERPOLATOR

  • Pallavi Chande, Gurpreet Walia

समीक्षा लेख

STUDY OF MODIFICATION IN THE EFFICIENCY OF SOLAR CELL

  • Mukul Kant Sharma, Deepak Tanwar and Prof. Vikram Singh

समीक्षा लेख

COGNITIVE WAY OF CLASSIFYING DOCUMENTS: A PRACTITIONER APPROACH

  • Muheet Ahmed Butt, Majid Zaman

समीक्षा लेख

INDEPENDENT CHANGEABLE INFORMATION HIDING IN ENCRYPTED IMAGES

  • Lavanya.S, Anuradha.C

समीक्षा लेख

SECURED AND DEPENDABLE STORAGE IN CLOUD COMPUTING USING HOMOMORPHIC

  • Kiruthiga Prabakaran, Dr.C.Nalini

समीक्षा लेख

A REVIEW ON DIFFERENT APPROACHES FOR LOAD BALANCING IN COMPUTATIONAL GRID

  • Mr.Gaurav Sharma, Jagjit Kaur Bhatia

समीक्षा लेख

EVALUATION OF CLASSIFICATION ALGORITHMS FOR DISEASE DIAGNOSIS

  • Tamije Selvy P, Palanisamy V, Elakkiya S

समीक्षा लेख

PASSWORD KNIGHT SHIELDS PASSWORD STEALING AND RE-USE ATTACK

  • D Caine, V Radhey Shyam and G Michael

समीक्षा लेख

PERFORMANCE OPTIMIZATION UNDER A VIRTUALIZED ENVIRONMENT

  • Argha Roy

समीक्षा लेख

A BRIEF STUDY OF VARIOUS WAVELET FAMILIES AND COMPRESSION TECHNIQUES

  • Meenakshi Chaudhary, Anupma Dhamija

शोध आलेख

MAPPING OF DATA SECURITY COUNCIL OF INDIA SECURITY FRAMEWORK WITH ISO/IEC 27002:2005 AND COBIT 4.1

  • Watika Gupta, Sanchita Dwivedi and Dr. Vijay Kumar Chaurasiya

शोध आलेख

FAST AND SECURE HANDOVER IN IEEE 802.16e NETWORKS

  • M. Deva Priya, K. Jaya Bharathi , M.L.Valarmathi

शोध आलेख

CRYPTOGRAPHY USING MUSIC NOTES

  • M. Yamuna, Krishna Pandey , Nikhil Choudhary

शोध आलेख

BRING YOUR OWN DEVICE (BYOD): SECURITY RISKS AND MITIGATING STRATEGIES

  • Prashant Kumar Gajar, Arnab Ghosh and Shashikant Rai

शोध आलेख

RELATIONSHIP BETWEEN E-COMMERCE & KNOWLEDGE ECONOMY AND THEIR ROLE IN RISK ASSESSMENT PROCESS

  • Anushree Pandey, Vandana, Saurabh Mishra, Shashikant Rai

शोध आलेख

AN IMPROVED LOCAL TETRA PATTERN FOR CONTENT BASED IMAGE RETRIEVAL

  • Thangadurai K, Bhuvana S, Dr Radhakrishnan R

शोध आलेख

2D CROSS CORRELATION MULTI-MODAL IMAGE RECOGNITION

  • C Yuganya, A V Khirthana, and Udayakumara pandian

शोध आलेख

USE OF INFLUENCE DIAGRAMS FOR DECISION SUPPORT IN DRILLING AUTOMATION

  • Taras Mychailovych Matviykiv, Vasyl Mykolaiovych Teslyuk

में अनुक्रमित

Google Scholar
Academic Journals Database
Open J Gate
Academic Keys
ResearchBible
CiteFactor
Electronic Journals Library
RefSeek
Hamdard University
Scholarsteer
International Innovative Journal Impact Factor (IIJIF)
International Institute of Organised Research (I2OR)
Cosmos

और देखें