Downloads :-
Security of Cloud from Data Mining based Attacks
Inderjit Kaur, Vol. 3, Issue 5, May, 2014
Equality of Connected Edge Domination and Total Edge Domination in Graphs
S. Velammal, Vol. 3, Issue 5, May, 2014
An Introduction to Sign Language Recognition
Amit Seharawat, Sangeeta Yogi, Vol. 3, Issue 5, May, 2014
Two roots in mandibular canines; Root canal treatment: A Case Report
Dr. Amal Kanti Ghosh, Dr. Dipto De, Dr. Rohit Miglani, Vol. 1, Issue 3, May, 2014
Invisible Orthodontics - Smile all you want
Dr. Satyapriya Pal, Dr. Sumit Kumar Yadav, Dr. Deepesh Jaiswal, Vol. 1, Issue 3, May, 2014
Sleep Apnoea and Its Management: A Review
Dr. Sitaram Wagle, Dr. Preeti Kalia, Dr. Harendra Shahi, Dr. Kamal Kishore Agarwal, Dr. Pankaj Jain, Vol. 1, Issue 3, May, 2014
Non-Surgical Treatment of Periapical Lesions Using Calcium Hydroxide: A Case Report
Dr. Amal Kanti Ghosh, Dr. Dipto De, Dr. Rohit Miglani, Dr. Amit Mishra, Vol. 1, Issue 2, April, 2014
Detecting Wormhole Attack in Mobile Ad-hoc Networks
Bipin N. Patel, Prof. Tushar S. Patel, Vol. 3, Issue 5, May, 2014
Review on Wireless Sensor Network Techniques for Security in Railways
Md. Faruqul Islam, Saurabh Maheshwari, Yogesh Kumar, Vol. 3, Issue 5, May, 2014
Multi-product Pipeline Scheduling Based on Adaptive Genetic Algorithm
CUI Yanyu, NING Lina, ZHENG Meilu, (CHINA), Vol. 3, Issue 5, May, 2014