Vol. 5 No. 5 (2016)
Published:
2017-12-30
Articles
-
-
Articles
Data Restoration and Privacy Preserving of Data Mining Using Random Decision Tree Over Vertically Partitioned Data
287 245 -
-
Articles
Adaption of Cloud Computing On Smart Phones To Enable Efficient Multimedia Applications
232 259 -
-
-
-
-
-
Articles
Enhancing Web Navigation Appropriateness by Correlating Actual and Predictable Practice
267 259 -
-
-
Articles
Detection of Collision Attacks and Comparison of Efficiency in Wireless Sensor Network
287 243 -
Articles
Modeling The Performance Enablers Of Public Sector Banks Using Cfa And Conjoint Analysis.
248 228 -
-
-
-
-
-
-
-
Articles
New Approach in Biometrics to Combat the Automated Teller Machine Frauds: Facial Recognition
301 255 -
-
Articles
Study of vulnerability taxonomies to provide a Novel approach for vulnerability categorization
233 224 -
Articles
Optimum Route Selection & Modified Network Approach to optimize Power aware Routing in MANET
273 255 -
-
-
Articles
An Analytic Survey On Current Clustering Technique of data Categorizing and Retrieving
280 226 -
Articles
Equal And Unequal Distribution of Nodes based Simulation of Routing Protocols in MANET
185 248 -
-
Articles
Comparision of two different andriod versions i.e Lollipop and Marshmallow, and also development of campsys mobile Andriod Application - An Overview
310 238 -
Articles
Comparism Of Thermal And Microwave Methods In Structural Modification Of Lumefantrine
194 235 -
-
-
Articles
Outlier Detection in High Dimension Data Based On Multimodality And Neighbourhood Size Using KNN Method
279 238 -
Articles
A Review on an Efficient Monitoring Of Substations Using Microcontroller Based Monitoring System
292 242 -
-
-
-
-
-
-
Articles
GALSR: Geographical Based Adaptive Lifetime Secure Routing Protocol For Wireless Sensor Network
159 224 -
Articles
Implementation of Robust Barcode Modulation Mechanism for Large Data Trans Reception Using Android Device
149 220 -
-
-
-
-
Articles
Free Vibration Response Of Double-Bay Multi-Storey Building Frames With Stiffened Joints
143 194 -
Articles
A General Framework for Multi-level security to restrict unauthorized users in Sulaymaniyah E-Court Database
171 200 -
-
-
Articles
Implementation and Analysis of Multi-Processing Processor Using Data Encryption Standard on FPGA
187 213 -
-
-
Articles
Content Caching and Scheduling in Wireless Networks with Elastic and Inelastic Traffic
173 227 -
-
-
-
-
-
-
-
-
-
-
-
-
-