Article of the Month
Downloads: 229 | Views: 420 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2
Information Technology, India, Volume 5 Issue 1, January 2016
Pages: 85 - 87Cyber Crime: Critical View
Rita Dewanjee, Dr. R. Vyas
Volume 5 Issue 1, January 2016: Page 2
Downloads: 138 | Views: 236
Botany, India, Volume 5 Issue 1, January 2016
Pages: 51 - 55Reproductive Biology and Phenology of Croton scabiosus Bedd. - An Endemic Tree Species of Southern Eastern Ghats of Kadapa District, Andhra Pradesh
L. Nagireddy | S. Nazaneen Parveen | T. Pullaiah [3]
Downloads: 121 | Views: 214
Computer Science & Engineering, India, Volume 5 Issue 1, January 2016
Pages: 56 - 58Survey on RedTacton: An Innovative Human Area Networking Technology
Rahul Shirbhate [2] | Vishal Mogal [4]
Downloads: 139 | Views: 232
Civil Engineering, India, Volume 5 Issue 1, January 2016
Pages: 59 - 61Causes of Delays in any Construction Project
Naikwadi Sumaiyya R. [2] | Khare Pranay R. [2]
Downloads: 121 | Views: 216
Mathematics, India, Volume 5 Issue 1, January 2016
Pages: 62 - 68(k,d)-Mean Labeling of Some Family of Trees
B. Gayathri [5] | V. Sulochana
Downloads: 128 | Views: 206
Peace and Conflict Studies, India, Volume 5 Issue 1, January 2016
Pages: 69 - 71Equal Wings: Women and Men- Partnership for a Healthy Planet
Lalita Sharma
Downloads: 130 | Views: 219
Electronics & Communication Engineering, India, Volume 5 Issue 1, January 2016
Pages: 72 - 77Microcontroller Based Power Factor Correction Using IC L6561
Priya S. Devkar
Downloads: 171 | Views: 261
Electronics & Communication Engineering, India, Volume 5 Issue 1, January 2016
Pages: 78 - 84Face Recognition and Hand Gesture Analysis System
Sunny Shahdadpuri | Bhagwat Kakde [2]
Downloads: 229 | Views: 420 | Today Hits: ⮙1 | Monthly Hits: ⮙2
Information Technology, India, Volume 5 Issue 1, January 2016
Pages: 85 - 87Cyber Crime: Critical View
Rita Dewanjee | Dr. R. Vyas
Downloads: 127 | Views: 211
Information Technology, India, Volume 5 Issue 1, January 2016
Pages: 88 - 93A Three Level Graphical Password Scheme for Providing High Degree of Security
Pranita H. Mokal | R. N. Denikar
Downloads: 136 | Views: 209
Computer Science & Engineering, India, Volume 5 Issue 1, January 2016
Pages: 94 - 98Survey on Preventing Cross Web Site Request Forgery Attacks with Activation Link
Kadambari Pradip Chaudhari | Manisha Tijare