Article Audio Steganography: LSB Technique Using a Pyramid Structure and Range of Bytes Authors :Satish Bhalshankar and Avinash K. Gulve DOI : View Full Article
Article Dynamic fragmentation and query translation based security framework for distributed databases Authors :Arunabha Sengupta DOI : View Full Article
Article Investigation in the dispersive medium of the FRFT and its effect on WDM system Authors :Saif H. Abdulwahed DOI : View Full Article
Article Architecture and Ontological Modelling for Assisted Driving and Interaction Authors :Meryem Boudra, Manolo Dulva Hina, Amar Ramdane-Cherif and Chakib Tadj DOI : View Full Article
Article Using Science Museum Curator’s Knowledge to Create Astronomy Educational Content Authors :George Moroni Teixeira Batista, Mamoru Endo, Takami Yasuda, Mayu Urata and Katsuhiro Mouri DOI : View Full Article
Article A multi-agent based model for self motivated learners: self study tool Authors :Elizabeth Muli and James Kimutai DOI : View Full Article
Article Dynamic Flight Simulation of aircraft and its comparison to Flight tests Authors :Reza Khaki and Ali Gharibi DOI : View Full Article
Article Chinese Airline Official Microblog Influence Analysis Authors :Zhang Li and Lin Yan DOI : View Full Article
Article Evaluation of AODV Routing Protocol under MANETS with Various Density Nodes Authors :Himanshu Walia, Jasdeep Singh and Mandeep Singh DOI : View Full Article
Article Advancement in RFID security by proposed framework utilizing Random bit generator and sensor network Authors :Rohit Sharma, Anuj Kumar Agarwal and P.K. Singh DOI : View Full Article
Article Clustering Diabetics Data Using M-CFICA Authors :Jerusha Shalini Vaska and A. M. Sowjanya DOI : View Full Article