Home > Articles (Current Page:30)
Open Access
S.ANKITHA, M.BALAJEE
Abstract:Internet of Things (IoT) involves creating network of everyday items embedded with electronics, software and network connectivity. For any technology to be successful and achieve widespread use, it needs to gain the trust of users by providing adequate security and privacy assurance. Some of the devices used by [...] Read more.
Abstract      ReferencesPDF (262 K)   December 21, 2016     154 Downloads    1302 Views
Open Access
Lena J-T Strömberg
Abstract:Assuming that time is determined by a present frequency, relations are derived based on the angular velocity of a noncircular orbit. Formats relating concepts of noncircular orbits with fix points of the sine circular map, so-called Arnold’s tongues, will be obtained. [...] Read more.
Abstract      ReferencesPDF (398 K)   December 21, 2016     240 Downloads    1321 Views
Open Access
Lam Weng Siew, Lam Weng Hoe
Abstract:Index tracking is a form of portfolio management in stock market investment. Index tracking aims to track the performance of the stock market index without purchasing all the stocks that make up the market index in order to achieve rate of return similar to the market return. This objective can be achieved by determining an [...] Read more.
Abstract      ReferencesPDF (182 K)   December 21, 2016     158 Downloads    1192 Views
Open Access
V SAI MANOJ, M BALAJEE
Abstract:In this paper I discuss about a basic design of communication of smart objects. There are many designs for providing medium for communication of smart objects. It includes several components on background. But for both reliability and security we have to choose the best architecture for the design of communication of smart [...] Read more.
Abstract      ReferencesPDF (208 K)   December 21, 2016     139 Downloads    1171 Views
Open Access
A.Sedky, Ahmed Abdel-Rahim, Eslam Sedky
Abstract:We reported here the concepts, applications and side effects of radiotherapy on the human tissue. The properties of x and γ rays, and their applications on the tumor tissues such as radiation therapy, gamma camera and gamma Knife are presented. Further, the physics of laser and its applications such as photo-coagulation, ph [...] Read more.
Abstract      ReferencesPDF (1754 K)   December 21, 2016     163 Downloads    1395 Views
Open Access
Attada Venkataramana, K.Jayasri
Abstract:Wireless Hotspots plays significant role in today’s working environment. Business as usual no longer involves working in a traditional workplace at set hours. Today’s workforce is more mobile and every day more people are working from virtual offices, client sites, home offices, coffee shops, airports, hotels, and any numbe [...] Read more.
Abstract      ReferencesPDF (324 K)   December 21, 2016     159 Downloads    1190 Views
Open Access
Md. Mustafizur Rahman, Dr. Nobuaki Ohmori
Abstract:There is, however, limited knowledge of how precisely the needs of disabled people are defined and incorporated, or not, into the design and development for the accessible environment1. This study assumes that the accessible design in public places facilities are of benefit not only to disabled people but all people with th [...] Read more.
Abstract      ReferencesPDF (1534 K)   December 20, 2016     166 Downloads    1169 Views
Open Access
Seung-Hun Lee, Rakesh Jaiswal, Nikolai Kuhnert
Abstract:Abstract Origin and coffee grades are major factors determining the price of coffee beans. Jamaica Blue Mountain coffee achieves among the highest prices in coffee trading due to its assumed high quality. In this contribution we show the first chemical composition analysis of Jamaica Blue Mountain using LC-MS methods. In pa [...] Read more.
Abstract      ReferencesPDF (465 K)   December 20, 2016     202 Downloads    1257 Views
Open Access
Antonio Giardi
Abstract:The aim of the research is to investigate how the technological tools that support traditional teaching methods (such as the video files recorded by the lecturer) help learners to study improving their evaluations for examinations. Starting from multimedia learning theories, a mobile course model has been designed using the [...] Read more.
Abstract      ReferencesPDF (544 K)   December 20, 2016     146 Downloads    1643 Views
Open Access
Wenjun Fan, Kevin Lwakatare, Rong Rong
Abstract:Social engineering is the attack aimed to manipulate dupe to divulge sensitive information or perform actions to help the adversary bypassing the secure perimeter in front of the information-related resources in order to complete attacking goals. Though there are a number of security tools, such as firewalls and intrusion d [...] Read more.
Abstract      ReferencesPDF (274 K)   December 20, 2016     138 Downloads    1399 Views
Most Views
Article
by Sergey M. Afonin
2923 Downloads 26181 Views
Article
by Syed Adil Hussain, Taha Hasan Associate Professor
2283 Downloads 16932 Views
Article
by Omprakash Sikhwal, Yashwant Vyas
2355 Downloads 14524 Views
Article
by Munmun Nath, Bijan Nath, Santanu Roy
2249 Downloads 14373 Views
Upcoming Conferences