Volume 4, Emitir 4 (2013)

Artigo de Revisão

EFFICIENT IDENTIFICATION OF HIDDEN VIDEOFILES EXPLOITATION COMPRESSION AND SECRET RECOGNITION TECHNIQUES

  • Santhosh Kumar S, Kishore A and Mr. Chandrasekaran

Artigo de Revisão

A Cloud-based Intrusion Detection Forensic Analysis on Smart Phones

  • I. Raja, P.Sreevenkataramana

Artigo de Revisão

IMAGE SEGEMNTATION USING CLUATERING TECHNIQUE ANS SWARM INTELLIANGE

  • P.Tamije Selvy, Dr. V. Palanisamy, M. Sri Radhai

Artigo de Revisão

IMPLEMENTING ICT PRACTICES OF EFFECTIVE TOURISM MANAGEMENT: A CASE STUDY

  • Muheet Ahmed Butt, Majid Zaman

Artigo de Revisão

A SURVEY OF INTRUSION DETECTION FOR AD-HOC NETWORK

  • Jacob Abraham, V.Arun Prasath,G.Michael

Artigo de Revisão

SMART RATION CARD

  • Vikram Singh, VellankiAamani , Booreddy Mounika

Artigo de Revisão

REVIEW ON MOBILE AD HOC NETWORK

  • Reena Rani, Reena Thakral

Artigo de Revisão

WIRELESS HOME AND INDUSTRIAL AUTOMATION SECURITY SYSTEM USING GSM

  • R.Anandan, Mr.B.Karthik., Dr.T.V.U.Kiran Kumar

Artigo de Revisão

REVIEW: DESIGN OF DIRECT FORM TRANSPOSED FIR INTERPOLATOR

  • Pallavi Chande, Gurpreet Walia

Artigo de Revisão

STUDY OF MODIFICATION IN THE EFFICIENCY OF SOLAR CELL

  • Mukul Kant Sharma, Deepak Tanwar and Prof. Vikram Singh

Artigo de Revisão

COGNITIVE WAY OF CLASSIFYING DOCUMENTS: A PRACTITIONER APPROACH

  • Muheet Ahmed Butt, Majid Zaman

Artigo de Revisão

INDEPENDENT CHANGEABLE INFORMATION HIDING IN ENCRYPTED IMAGES

  • Lavanya.S, Anuradha.C

Artigo de Revisão

SECURED AND DEPENDABLE STORAGE IN CLOUD COMPUTING USING HOMOMORPHIC

  • Kiruthiga Prabakaran, Dr.C.Nalini

Artigo de Revisão

A REVIEW ON DIFFERENT APPROACHES FOR LOAD BALANCING IN COMPUTATIONAL GRID

  • Mr.Gaurav Sharma, Jagjit Kaur Bhatia

Artigo de Revisão

EVALUATION OF CLASSIFICATION ALGORITHMS FOR DISEASE DIAGNOSIS

  • Tamije Selvy P, Palanisamy V, Elakkiya S

Artigo de Revisão

PASSWORD KNIGHT SHIELDS PASSWORD STEALING AND RE-USE ATTACK

  • D Caine, V Radhey Shyam and G Michael

Artigo de Revisão

A BRIEF STUDY OF VARIOUS WAVELET FAMILIES AND COMPRESSION TECHNIQUES

  • Meenakshi Chaudhary, Anupma Dhamija

Artigo de Pesquisa

MAPPING OF DATA SECURITY COUNCIL OF INDIA SECURITY FRAMEWORK WITH ISO/IEC 27002:2005 AND COBIT 4.1

  • Watika Gupta, Sanchita Dwivedi and Dr. Vijay Kumar Chaurasiya

Artigo de Pesquisa

FAST AND SECURE HANDOVER IN IEEE 802.16e NETWORKS

  • M. Deva Priya, K. Jaya Bharathi , M.L.Valarmathi

Artigo de Pesquisa

CRYPTOGRAPHY USING MUSIC NOTES

  • M. Yamuna, Krishna Pandey , Nikhil Choudhary

Artigo de Pesquisa

BRING YOUR OWN DEVICE (BYOD): SECURITY RISKS AND MITIGATING STRATEGIES

  • Prashant Kumar Gajar, Arnab Ghosh and Shashikant Rai

Artigo de Pesquisa

RELATIONSHIP BETWEEN E-COMMERCE & KNOWLEDGE ECONOMY AND THEIR ROLE IN RISK ASSESSMENT PROCESS

  • Anushree Pandey, Vandana, Saurabh Mishra, Shashikant Rai

Artigo de Pesquisa

AN IMPROVED LOCAL TETRA PATTERN FOR CONTENT BASED IMAGE RETRIEVAL

  • Thangadurai K, Bhuvana S, Dr Radhakrishnan R

Artigo de Pesquisa

2D CROSS CORRELATION MULTI-MODAL IMAGE RECOGNITION

  • C Yuganya, A V Khirthana, and Udayakumara pandian

Artigo de Pesquisa

USE OF INFLUENCE DIAGRAMS FOR DECISION SUPPORT IN DRILLING AUTOMATION

  • Taras Mychailovych Matviykiv, Vasyl Mykolaiovych Teslyuk

Indexado em

Google Scholar
Academic Journals Database
Open J Gate
Academic Keys
ResearchBible
CiteFactor
Electronic Journals Library
RefSeek
Hamdard University
Scholarsteer
International Innovative Journal Impact Factor (IIJIF)
International Institute of Organised Research (I2OR)
Cosmos

Veja mais