Volumen 4, Ausgabe 4 (2013)

Rezensionsartikel

EFFICIENT IDENTIFICATION OF HIDDEN VIDEOFILES EXPLOITATION COMPRESSION AND SECRET RECOGNITION TECHNIQUES

  • Santhosh Kumar S, Kishore A and Mr. Chandrasekaran

Rezensionsartikel

A Cloud-based Intrusion Detection Forensic Analysis on Smart Phones

  • I. Raja, P.Sreevenkataramana

Rezensionsartikel

IMAGE SEGEMNTATION USING CLUATERING TECHNIQUE ANS SWARM INTELLIANGE

  • P.Tamije Selvy, Dr. V. Palanisamy, M. Sri Radhai

Rezensionsartikel

IMPLEMENTING ICT PRACTICES OF EFFECTIVE TOURISM MANAGEMENT: A CASE STUDY

  • Muheet Ahmed Butt, Majid Zaman

Rezensionsartikel

A SURVEY OF INTRUSION DETECTION FOR AD-HOC NETWORK

  • Jacob Abraham, V.Arun Prasath,G.Michael

Rezensionsartikel

SMART RATION CARD

  • Vikram Singh, VellankiAamani , Booreddy Mounika

Rezensionsartikel

REVIEW ON MOBILE AD HOC NETWORK

  • Reena Rani, Reena Thakral

Rezensionsartikel

WIRELESS HOME AND INDUSTRIAL AUTOMATION SECURITY SYSTEM USING GSM

  • R.Anandan, Mr.B.Karthik., Dr.T.V.U.Kiran Kumar

Rezensionsartikel

REVIEW: DESIGN OF DIRECT FORM TRANSPOSED FIR INTERPOLATOR

  • Pallavi Chande, Gurpreet Walia

Rezensionsartikel

STUDY OF MODIFICATION IN THE EFFICIENCY OF SOLAR CELL

  • Mukul Kant Sharma, Deepak Tanwar and Prof. Vikram Singh

Rezensionsartikel

COGNITIVE WAY OF CLASSIFYING DOCUMENTS: A PRACTITIONER APPROACH

  • Muheet Ahmed Butt, Majid Zaman

Rezensionsartikel

SECURED AND DEPENDABLE STORAGE IN CLOUD COMPUTING USING HOMOMORPHIC

  • Kiruthiga Prabakaran, Dr.C.Nalini

Rezensionsartikel

A REVIEW ON DIFFERENT APPROACHES FOR LOAD BALANCING IN COMPUTATIONAL GRID

  • Mr.Gaurav Sharma, Jagjit Kaur Bhatia

Rezensionsartikel

EVALUATION OF CLASSIFICATION ALGORITHMS FOR DISEASE DIAGNOSIS

  • Tamije Selvy P, Palanisamy V, Elakkiya S

Rezensionsartikel

PASSWORD KNIGHT SHIELDS PASSWORD STEALING AND RE-USE ATTACK

  • D Caine, V Radhey Shyam and G Michael

Rezensionsartikel

A BRIEF STUDY OF VARIOUS WAVELET FAMILIES AND COMPRESSION TECHNIQUES

  • Meenakshi Chaudhary, Anupma Dhamija

Forschungsartikel

MAPPING OF DATA SECURITY COUNCIL OF INDIA SECURITY FRAMEWORK WITH ISO/IEC 27002:2005 AND COBIT 4.1

  • Watika Gupta, Sanchita Dwivedi and Dr. Vijay Kumar Chaurasiya

Forschungsartikel

FAST AND SECURE HANDOVER IN IEEE 802.16e NETWORKS

  • M. Deva Priya, K. Jaya Bharathi , M.L.Valarmathi

Forschungsartikel

CRYPTOGRAPHY USING MUSIC NOTES

  • M. Yamuna, Krishna Pandey , Nikhil Choudhary

Forschungsartikel

BRING YOUR OWN DEVICE (BYOD): SECURITY RISKS AND MITIGATING STRATEGIES

  • Prashant Kumar Gajar, Arnab Ghosh and Shashikant Rai

Forschungsartikel

RELATIONSHIP BETWEEN E-COMMERCE & KNOWLEDGE ECONOMY AND THEIR ROLE IN RISK ASSESSMENT PROCESS

  • Anushree Pandey, Vandana, Saurabh Mishra, Shashikant Rai

Forschungsartikel

AN IMPROVED LOCAL TETRA PATTERN FOR CONTENT BASED IMAGE RETRIEVAL

  • Thangadurai K, Bhuvana S, Dr Radhakrishnan R

Forschungsartikel

2D CROSS CORRELATION MULTI-MODAL IMAGE RECOGNITION

  • C Yuganya, A V Khirthana, and Udayakumara pandian

Forschungsartikel

USE OF INFLUENCE DIAGRAMS FOR DECISION SUPPORT IN DRILLING AUTOMATION

  • Taras Mychailovych Matviykiv, Vasyl Mykolaiovych Teslyuk

Indiziert in

Google Scholar
Academic Journals Database
Open J Gate
Academic Keys
ResearchBible
CiteFactor
Elektronische Zeitschriftenbibliothek
RefSeek
Hamdard-Universität
Gelehrter
International Innovative Journal Impact Factor (IIJIF)
Internationales Institut für organisierte Forschung (I2OR)
Kosmos

Mehr sehen