Distributed Cycle Minimization Protocol (DCPM) for
An Efficient Approach to Solve Sudoku Problem by Harmony Search Algorithm
Data Shield Algorithm (DSA) for Security against Phishing Attacks
PERFORMANCE ANALYSIS OF SYMMETRIC KEY CRYPTOGRAPHY ALGORITHMS: DES, AES and BLOWFISH
Wireless Body Area Network & ITS APPLICATION
Plagiarism and Detection Tools: An Overview
POS TAGGING OF PUNJABI LANGUAGE USING HIDDEN MARKOV MODEL
TO FIND THE POS TAG OF UNKNOWN WORDS IN PUNJABI LANGUAGE
Experimental Investigation of Process Parameters in drilling operation using different software technique
Performance Comparisons Using Routing Protocols with OPNET Simulator in Mobile Ad Hoc Networks
Design and Properties of Transaction Processing System for Web Applications in the Cloud Computing
Design and comparison of butterworth and chebyshev type-1 low pass filter using Matlab
A questionnaire on survey of Enterprise Resource Planning (ERP) in Engineering Institutes
Throughput Analysis of Ethernet and Fiber Distributed Data Interface using OPNET IT Guru Academic Edition 9.1
Call for Papers - IJOES Volume 9 December 2013
01-Vol8
02-Vol8
03-Vol8
04-Vol8
06-Vol8