ER Publications

Thomson Researcherid Journals | UGC Approved Journals | Online & Print Journals | Refereed Journals | Peer Reviewed Journals
UGC Approved Journals. Publish Research Papers & Books with proper ISSN and ISBN in International Indexed Journals/Conferences in 24 hrs and low cost..

Search Download

Downloads :-


Software Security Risks in Mobile E-Commerce

Yeddula Venkatramana Reddy, Member IEEE, Vol.1, Issue 3, December, 2012

Linear and Nonlinear Controller Contrast for the Vibration Isolation System utilizing Smart Spring

Ch. Arshad Mehmood, Muhammad Ali, (USA), Vol.1, Issue 3, December, 2012

Cloud Computing and its impact on Supply Chain Performance

Ali, Syed Imran, (Saudi Arabia), Vol.1, Issue 3, December, 2012

Collaborative Word Processors

Ali A Altalbe, (Saudi Arabia), Vol.1, Issue 3, December, 2012

Applications of Ethical Hacking Techniques to Software Professionals with respect to Behavioral Science

Prof. A. T. Gaikwad, Dr. R. V. Kulkarni, Vol.1, Issue 3, December, 2012

Artificial Neural Network for Ecosystems Analysis (ANEA), A Neural Ecosystem Analyzer.

Khalda F. Ali, Riza. M. Suliman, Mohd Talib Latif, (Malayasia), Vol.1, Issue 3, December, 2012

Introduce an Integrated Approach to Vendor Evaluation

Ali Nazeri, Mehdi Nosratpour, Awaluddin Bin Mohamed Shaharoun, (Malaysia), Vol.1, Issue 3, December, 2012

Prevention of Privacy Threats in Social Networking Sites

Gurpreet Singh, Gagandeep Singh, Neha Kohli, Vol. 2, Issue 1, January, 2013

Derivation Rule Dependency and Data Provenance Semantics

Choon Lee, Don Kerr, (KOREA), Vol.2, Issue 1, January, 2013

CPU Scheduling Algorithm with Deadline and Optimize Time Slice for soft real time systems

Vikash Chandra Sharma, Priyadarshini, Ajay Chaudhary, Manindar singh Nehra, Vol.2, Issue 1, January, 2013

Utilities of GIS and Remote Sensing Data in Spatial Analysis of the Radioactive Contamination Site in Nineveh Province

Sabah Hussein Ali, (Mosul), Vol.1, Issue 3, December, 2012

A THEMIS Billing System for the Cloud Computing Environment

Thoudam Johnson Singh, Dr. R. Sugumar, Vol.2, Issue 1, January, 2013

A look back at Issues in the layers of TCP/IP Model

Gayatri Bhatti, Rajinder Singh, Prabhdeep Singh, Vol.2, Issue 1, January, 2013

A Computer Forensic Approach

Ivneet Singh, Malayasia, Vol.2, Issue 1, January, 2013

Protected transmission of medical images via LabVIEW using Watermarking technique

Nassiri Boujemaa, Latif Rachid, Toumanari Ahmed, F. M. R. Maoulainine, (Morocco), Vol. 2, Issue 1, January, 2013

Application of Statical Image Fusion in Medical Image Fusion

Mr. Sanket Choudhary, Prof. Vikas Gupta, Mr. Yash Kshirsagar, Vol. 2, Issue 1, January, 2013