This access is for Demo Purpose only

rgpv search form
Total Articles: 11081
Title Subject Article Journal
Testing the Efficiency of Background Subtraction Techniques Trends in Information Technology India
Data Mining Methods for Terrorist Activity Network Security India
A Review on AODV Protocol and Various Attacks in Mobile Ad Hoc Network Network Security India
CBIR using Feature Extraction approaches and Application: A survey Network Security India
Public Services through Cloud Computing Network Security India
Wireless Sensor Network: A Review Network Security India
MODIFIED KEY GENERATION OF BLOWFISH ALGORITHM FOR TEXTUAL AND IMAGE DATA Network Security India
Performance Analysis of Flying Ad-Hoc Network Over cloud with Variation of Protocal with Variation of Antenna of Flying Unmanned Air Vehicle (UAVs Network Security India
HIDDEN MARKOV MODEL FOR DETECTION AND PREVENTION OF SQL INJECTION ATTACKS Network Security India
CHMOD LEACH: INNOVATIVE TECHNIQUE FOR CLUSTER HEAD SELECTION Network Security India

 

Outlaw Books: NYC, USA

August 12th, 2018 - 9:30 PM