Authentication in Mobile Cloud Computing

Mrs. Manjusha Anant Shinde [Bhandwalkar]
Posted by Mrs. Manjusha Anant Shinde [Bhandwalkar]
December 10, 2023

Authentication in Mobile Cloud Computing

Today the capabilities of mobile devices have improved real world user friendly applications,...

Read More
Harsh Sahay
Posted by Harsh Sahay
December 10, 2023

Online Calculator based on the Client Server Socket Programming

RSA algorithm is an efficient algorithm for preventing unauthorized access over the...

Read More
Prof. Nikolay P. Zapivalov
Posted by Prof. Nikolay P. Zapivalov
December 7, 2023

Improved Oil Recovery vs. Enhanced Oil Recovery

Nowadays, the problem of enhanced oil recovery (EOR) and improved oil recovery...

Read More
Joop Jang
Posted by Joop Jang
December 7, 2023

Animation and Games Computer Design to Build Awareness of Energy Conservation

This research is to design of animation and games computer to build awareness...

Read More
Tanya Shakir
Posted by Tanya Shakir
December 7, 2023

A Quantitative Technique for Systematic Monitoring of the Treatment Efficiency Psoriasis Lesion

Psoriasis is a chronic skin disease affecting an estimated 125 million people...

Read More
Dr. Shimaa Mahalah
Posted by Dr. Shimaa Mahalah
November 19, 2023

In Silico Analysis of Single Nucleotide Polymorphisms (SNPs) of three Isoforms of Human Nitric Oxide Synthase (nNOS, iNOS, eNOS) Genes

The three isoforms of Nitric Oxide Synthase (NOS) synthesize free radical nitric oxide...

Read More
Andi Nur Rachman, M. Adi Khairul Anshary, Euis Nur Fitriani Dewi
Posted by Andi Nur Rachman, M. Adi Khairul Anshary, Euis Nur Fitriani Dewi
November 6, 2023

Application of Client Server Network In Multiplayer Augmented Reality Games

This research develops augmented reality games by applying multiplayer features. Some previous...

Read More
Leovigildo Mallillin
Posted by Leovigildo Mallillin
November 4, 2023

Feedback on the Peformance of Students in their Information Technology Module

This study aims to identify the performance of the students in their...

Read More
Dr. Muthana Yaseen
Posted by Dr. Muthana Yaseen
September 30, 2023
S M Sohel Rana
Posted by S M Sohel Rana
September 27, 2023

An Efficient Method of Vehicle Registration Number Plate Extraction and Recognition using Image Processing

Due to increasing population, the number of vehicles is growing day by...

Read More
Vijay M. Sardar
Posted by Vijay M. Sardar
September 5, 2023

Speaker Identification of Whispering Sound: Effectiveness of Timbre Audio Descriptors

Identification of a person from the whispered voice is challenging task as...

Read More
Frankline Makokha
Posted by Frankline Makokha
August 11, 2023

Global Trends in Cyber Security

With the growth of Internet of Things (IoT) technology, a lot of devices...

Read More
Joao Carlos Holland De Barcellos
Posted by Joao Carlos Holland De Barcellos
October 13, 2021

Jocaxian Protection for Database Passwords

We will show a new database password protection method that can be used...

Read More
Muna Fayyadh
Posted by Muna Fayyadh
February 22, 2021

Enhancing the Customer's Centricity Through Web Analytics 2.0

This paper introduced an overview of Web analytic 2.0 and the BI...

Read More