- DocumentOptimised Hybrid Integrated Renewable Energy Systemuploaded byIjact Editor
- DocumentImplementation of Digital WatermarkingUsing MATLAB Softwareuploaded byIjact Editor
- DocumentThe Big Data 'A GROWING TORRENT OF TECHNOLOGY'uploaded byIjact Editor
- DocumentHuman Vision System's Region of Interest Based Video Codinguploaded byIjact Editor
- DocumentBlind Watermarking Technique for Relational Databaseuploaded byIjact Editor
- DocumentNOVEL APPROACHES TO MULTI-CRITERIA DECISION MAKING WITH INCOMPLETE INFORMATION SYSTEMuploaded byIjact Editor
- DocumentGENE ONTOLOGY SIMILARITY METRIC BASED ON DAG USING DIABETIC GENEuploaded byIjact Editor
- DocumentGraphical Password Authentication Scheme Using Clouduploaded byIjact Editor
- DocumentRole of Information Technology in Supply Chain Managementuploaded byIjact Editor
- DocumentInformation Technology in Human Resource Managementuploaded byIjact Editor
- DocumentA new cryptographic scheme with modified diffusion for digital imagesuploaded byIjact Editor
- DocumentAttacks analysis and countermeasures in routing protocols of mobile ad hoc networksuploaded byIjact Editor
- DocumentAudit Planning for Investigating Cyber Crimesuploaded byIjact Editor
- DocumentImpact of e-Governance and its Challenges in Context to Indiauploaded byIjact Editor
- DocumentRecent Advances in Risk Analysis and Management (RAM)uploaded byIjact Editor
- DocumentAdaptive Firefly Optimization on Reducing High Dimensional Weighted Word Affinity Graphuploaded byIjact Editor
- DocumentMeasurement, analysis and data collection in the programming LabVIEWuploaded byIjact Editor
- DocumentArchiving data from the operating system Androiduploaded byIjact Editor
- DocumentCOMPUSOFT, 3(12), 1386-1396.pdfuploaded byIjact Editor
- DocumentCOMPUSOFT, 3(12), 1377-1385.pdfuploaded byIjact Editor
- DocumentCOMPUSOFT, 3(12), 1374-1376.pdfuploaded byIjact Editor
- DocumentCOMPUSOFT, 3(12), 1369-1373.pdfuploaded byIjact Editor
- DocumentCOMPUSOFT, 3(12), 1364-1368.pdfuploaded byIjact Editor
- DocumentCOMPUSOFT, 3(12), 1360-1363.pdfuploaded byIjact Editor
- DocumentCOMPUSOFT, 3(12), 1354-1359.pdfuploaded byIjact Editor
- DocumentCOMPUSOFT, 3(12), 1350-1353.pdfuploaded byIjact Editor
- DocumentCOMPUSOFT, 3(11), 1343-1349.pdfuploaded byIjact Editor
- DocumentCOMPUSOFT, 3(11), 1337-1342.pdfuploaded byIjact Editor
- DocumentCOMPUSOFT, 3(11), 1327-1336.pdfuploaded byIjact Editor
- DocumentCOMPUSOFT, 3(11), 1317-1326.pdfuploaded byIjact Editor
- DocumentCOMPUSOFT, 3(11), 1314-1316.pdfuploaded byIjact Editor
- DocumentCOMPUSOFT, 3(11), 1309-1313.pdfuploaded byIjact Editor
- DocumentCOMPUSOFT, 3(11), 1306-1308.pdfuploaded byIjact Editor
- DocumentCOMPUSOFT, 3(11), 1300-1305.pdfuploaded byIjact Editor
- DocumentCOMPUSOFT, 3(11), 1294-1299.pdfuploaded byIjact Editor
- DocumentCOMPUSOFT, 3(11), 1289-1293.pdfuploaded byIjact Editor
- DocumentCOMPUSOFT, 3(11), 1282-1288.pdfuploaded byIjact Editor
- DocumentCOMPUSOFT, 3(11), 1276-1281.pdfuploaded byIjact Editor
- DocumentCOMPUSOFT, 3(11), 1270-1275.pdfuploaded byIjact Editor
- DocumentCOMPUSOFT, 3(11), 1265-1269.pdfuploaded byIjact Editor
- DocumentCOMPUSOFT, 3(11), 1259-1264.pdfuploaded byIjact Editor
- DocumentCOMPUSOFT, 3(11), 1249-1258.pdfuploaded byIjact Editor
- DocumentCOMPUSOFT, 3(10), 1211-1215.pdfuploaded byIjact Editor
- DocumentCOMPUSOFT, 3(11), 1245-1248.pdfuploaded byIjact Editor
- DocumentCOMPUSOFT, 3(10), 1204-1210.pdfuploaded byIjact Editor
- DocumentCOMPUSOFT, 3(11), 1238-1244.pdfuploaded byIjact Editor
- DocumentCOMPUSOFT, 3(10), 1198-1203.pdfuploaded byIjact Editor
- DocumentCOMPUSOFT, 3(11), 1232-1237.pdfuploaded byIjact Editor
- DocumentCOMPUSOFT, 3(11), 1228-1231.pdfuploaded byIjact Editor