Authentication in Mobile Cloud Computing
Today the capabilities of mobile devices have improved real world user friendly applications,...
Read MoreOnline Calculator based on the Client Server Socket Programming
RSA algorithm is an efficient algorithm for preventing unauthorized access over the...
Read MoreImproved Oil Recovery vs. Enhanced Oil Recovery
Nowadays, the problem of enhanced oil recovery (EOR) and improved oil recovery...
Read MoreAnimation and Games Computer Design to Build Awareness of Energy Conservation
This research is to design of animation and games computer to build awareness...
Read MoreA Quantitative Technique for Systematic Monitoring of the Treatment Efficiency Psoriasis Lesion
Psoriasis is a chronic skin disease affecting an estimated 125 million people...
Read MoreIn Silico Analysis of Single Nucleotide Polymorphisms (SNPs) of three Isoforms of Human Nitric Oxide Synthase (nNOS, iNOS, eNOS) Genes
The three isoforms of Nitric Oxide Synthase (NOS) synthesize free radical nitric oxide...
Read MoreApplication of Client Server Network In Multiplayer Augmented Reality Games
This research develops augmented reality games by applying multiplayer features. Some previous...
Read MoreFeedback on the Peformance of Students in their Information Technology Module
This study aims to identify the performance of the students in their...
Read MorePerformance Analysis of Dispersion Compensation System Schemes at 10gb/s Compare RZ & NRZ Pulse Generators with PIN and APD Photo Detectors Device
In this paper, the dispersion compensating method is done by comparing two systems...
Read MoreAn Efficient Method of Vehicle Registration Number Plate Extraction and Recognition using Image Processing
Due to increasing population, the number of vehicles is growing day by...
Read MoreSpeaker Identification of Whispering Sound: Effectiveness of Timbre Audio Descriptors
Identification of a person from the whispered voice is challenging task as...
Read MoreGlobal Trends in Cyber Security
With the growth of Internet of Things (IoT) technology, a lot of devices...
Read MoreJocaxian Protection for Database Passwords
We will show a new database password protection method that can be used...
Read MoreEnhancing the Customer's Centricity Through Web Analytics 2.0
This paper introduced an overview of Web analytic 2.0 and the BI...
Read More