Downloads :-
Data Vulnerabilities in the Saas Service Layer with Emphasis on Privacy, Trust and Informed Storage
Salman Hussain, (AUSTRAILIA), Vol. 3, Issue 5, May, 2014
An extended model for effective migrating parallel web crawling with domain specific crawling
Mahesh Singh, Navita, Vol. 3, Issue 6, June, 2014
PSO Application to Optimization of AGC in Interconnected Power System with Diverse Sources of Power Generation
Majid Alizadeh Moghadam, Saeed Jalilzadeh, (IRAN), Vol. 3, Issue 6, June, 2014
A Comprehensive Survey on Wireless Sensor Network (WSN) Security
Sumit Kumar, Sumeer Kumar, Vol. 3, Issue 8, August, 2014
Offline Signature Verification and Recognition System
Rosy Vig, Dr. Mahesh Kumar, Vol. 3, Issue 6, June, 2014
Using Traditional and Fuzzy Filtering to Noise removal from Color Images
Dr. Baydaa Ibraheem Khaleel, (IRAQ), Vol. 3, Issue 6, June, 2014
An Extended Frequent Pattern Mining for Privacy Preserving transactional data set using Probabilistic Models
Vijay Kumar, Dr. T. Christopher, Vol. 3, Issue 6, June, 2014
Energy Efficient Congestion Control Operation in WSNs
Adel Gaafar A. Elrahim, (SUDAN), Vol. 3, Issue 6, June, 2014
A New design of 1-bit full adder based on XOR-XNOR gate
Sandeep Gotam, Izhar Ahmed, Vishal Ramola, Rajeev Kumar, Vol. 3, Issue 6, June, 2014
A review on security and reporting mechanisms for coerced cash withdrawal from ATM
Madhu Sharma, Vijay Singh Rathore, Vol. 3, Issue 5, May, 2014