Volume 4, Problème 7 (2013)

Article de révision

A SHORT SURVEY OF DATA COMPRESSION TECHNIQUES FOR COLUMN ORIENTED DATABASES

  • Priyanka Raichand and Rinkle Rani Aggarwal

Article de révision

THE EFFECT OF JORDANIAN LAWS IN REDUCING SOFTWARE PIRACY

  • Essam Said Hanandeh, Hayel Hussain Khafajeh

Article de révision

WEIGHTED INTUITIONISTIC FUZZY DELPHI METHOD

  • Arindam Garai and Tapan Kumar Roy

article de recherche

AN EFFICIENT MODEL FOR PROVIDING SECURITY IN CLOUD COMPUTING ENVIRONMENT

  • Vikas Kumar , Sweta Pandey

article de recherche

INVISIBLE WATERMARKING USING K-HARRIES AFFINE POINT DETECTION ALGORITHIM

  • Neterpuneet singh, Rakesh singh

article de recherche

A SECURITY FRAMEWORK FOR WIRELESS SENSOR NETWORKS

  • Namdeep Singh, Er. Jasvir Singh

article de recherche

SEGMENTATION OF RADIOGRAPHIC IMAGES OF WELD DEFECT

  • Wafaa Al-Hameed,Prof. Yahya Mayali and Prof. Phil Picton

article de recherche

ENERGY SAVING THROUGH TOPOLOGY CONTROLLED PROTOCOLS IN WSN

  • Neetu Verma, Balpreet Singh

Indexé dans

Google Scholar
Academic Journals Database
Open J Gate
Academic Keys
ResearchBible
CiteFactor
Electronic Journals Library
RefSeek
Hamdard University
Scholarsteer
International Innovative Journal Impact Factor (IIJIF)
International Institute of Organised Research (I2OR)
Cosmos

Voir plus