Downloads :-
Innovation of assistive technologies in Special Education: A Review
Anna Felicia, Sabariah Sharif, W. K. Wong, Muralindran Marriappan, (MALAYSIA), VOL. 2, ISSUE 3, MAY-JUNE, June, 2014
On an Irreducibility Theorem of A. Cohn
Archana Malik, VOL. 2, ISSUE 3, MAY-JUNE, June, 2014
An Innovative Learning Cycle in Problem-Based Learning
Hussain Othman, Berhannuddin M. Salleh, Abdullah Sulaiman, (MALAYSIA), VOL. 2, ISSUE 3, MAY-JUNE, June, 2014
Design and Characteristics of Photonic Crystal based Optical NOT Logic Gate
Gloria Joseph, Arpita Sharma, Mr. Asif Sayeed Khan, Vol. 3, Issue 5, May, 2014
Three Port Add Drop Filter based on Two Way Waveguide using Photonic Crystal
Arpita Sharma, Pawan Kumar Inaniya, Gloria Jospeh, Vol. 3, Issue 5, May, 2014
Gain Flatness and Bit Error Rate Improvements for an EDFA in WDM System
Deepika Verma, Santosh Meena, Vol. 3, Issue 5, May, 2014
Data Vulnerabilities in the Saas Service Layer with Emphasis on Privacy, Trust and Informed Storage
Salman Hussain, (AUSTRAILIA), Vol. 3, Issue 5, May, 2014
An extended model for effective migrating parallel web crawling with domain specific crawling
Mahesh Singh, Navita, Vol. 3, Issue 6, June, 2014
PSO Application to Optimization of AGC in Interconnected Power System with Diverse Sources of Power Generation
Majid Alizadeh Moghadam, Saeed Jalilzadeh, (IRAN), Vol. 3, Issue 6, June, 2014
Offline Signature Verification and Recognition System
Rosy Vig, Dr. Mahesh Kumar, Vol. 3, Issue 6, June, 2014
Using Traditional and Fuzzy Filtering to Noise removal from Color Images
Dr. Baydaa Ibraheem Khaleel, (IRAQ), Vol. 3, Issue 6, June, 2014
Finger gesture authentication system using touch screen devices
Amit Kumar, Ravi S. Pandey, Viral Shah, Manali Sakle, Vol. 3, Issue 5, May, 2014
An Extended Frequent Pattern Mining for Privacy Preserving transactional data set using Probabilistic Models
Vijay Kumar, Dr. T. Christopher, Vol. 3, Issue 6, June, 2014
Energy Efficient Congestion Control Operation in WSNs
Adel Gaafar A. Elrahim, (SUDAN), Vol. 3, Issue 6, June, 2014
A New design of 1-bit full adder based on XOR-XNOR gate
Sandeep Gotam, Izhar Ahmed, Vishal Ramola, Rajeev Kumar, Vol. 3, Issue 6, June, 2014
A review on security and reporting mechanisms for coerced cash withdrawal from ATM
Madhu Sharma, Vijay Singh Rathore, Vol. 3, Issue 5, May, 2014
Multi Agent Approach for Evolving Data Mining in Parallel and Distributed Systems using Genetic Algorithms and Semantic Ontology
K. Syed Kousar Niasi, Dr. E. Kannan, Vol. 3, Issue 5, May, 2014
Design & Development of Robust Control for Paper Making Headbox System
Puneet Dhaka, Rajesh Kumar, Vol. 3, Issue 5, May, 2014
Experimental Analysis of Highway Construction & Recycled Aggregate Approach
Sandeep Singh, Vol. 3, Issue 5, May, 2014
Integration of Metric Tools for Software Testing
Shubha Jain, Viplav Srivastava, Preeti Katiyar, Vol. 3, Issue 5, May, 2014
Design and Implementation an Private Cloud Cluster for G-Cloud in IRAQ
Sayf Addin Mahmood N, Mazin Abed Mohammed, Rabah Nory Farhan, (IRAQ), Vol. 3, Issue 5, May, 2014