体积 3, 问题 3 (2012)

技术说明

VEHICULAR AD HOC NETWORKS

  • Manjot Kaur, Sukhman Kaur and Gurpreet Singh

评论文章

PROCESS SUPPORT FOR REQUIREMENTS ENGINEERING

  • Onkar Nath Pandey , D.B.Ojha

评论文章

ANALYSIS OF DIFFERENT VULNERABILITIES IN AUTO TELLER MACHINE TRANSACTIONS

  • Navneet Sharma and Dr.Vijay Singh Rathore

评论文章

A CLOSER LOOK INTO THE RECTANGULAR CODES: WHERE THE PARITY CHECK PREDOMINATES

  • Romi Banerjee, Saptarshi Naskar and Samar Sen Sarma

研究文章

A NEW METRICS FOR PREDICTING NETWORK SECURITY LEVEL

  • Tito Waluyo Purboyo, Budi Rahardjo, Kuspriyanto, and Intan Muchtadi-Alamsyah

研究文章

IMAGE STEGANOGRAPHY USING LEAST SIGNIFICANT BIT WITH CRYPTOGRAPHY

  • Mr . Vikas Tyagi, Mr. Atul kumar, Roshan Patel, Sachin Tyagi, Saurabh Singh Gangwar

研究文章

AN ADAPTIVE STEGANOGRAPHY TECHNIQUE FOR GRAY AND COLORED IMAGES

  • Sherish Johri and Amit Asthana

研究文章

A STUDY OF GENETIC ALGORITHM TO SOLVE TRAVELLING SALESMAN PROBLEM

  • Naveen Kumar, Karambir, Rajiv Kumar

研究文章

MULTI AGENT BASED APPROACH FOR NETWORK INTRUSION DETECTION USING DATA MINING CONCEPT

  • Ankita Agarwal, Sherish Johri, Ankur Agarwal, Vikas Tyagi, Atul Kumar

研究文章

A NOVEL STEGANOGRAPHY TECHNIQUE FOR GRAY AND COLORED IMAGES

  • Ankita Agarwal, A. K. Vatsa

研究文章

A CLOSER LOOK INTO THE RECTANGULAR CODES: WHERE THE PARITY CHECK PREDOMINATES

  • Romi Banerjee, Saptarshi Naskar and Samar Sen Sarma

索引于

谷歌学术
学术期刊数据库
打开 J 门
学术钥匙
研究圣经
引用因子
电子期刊图书馆
参考搜索
哈姆达大学
学者指导
国际创新期刊影响因子(IIJIF)
国际组织研究所 (I2OR)
宇宙

查看更多