International Journal of Computer Application
ISSN: 2250-1797
Issue 2, Volume 6 (DECEMBER 2012)

The Influence of Security Threats and Vulnerabilities on Digital Forensic Investigation

Inikpi O. Ademu

United Kingdom

[FULL TEXT]

-----------------------------------------------------

CAPEX and OPEX Minimization Using Cloud Technology

K.Govinda , Kenneth  U. Okereafor , Kodali Rajesh Babu

India

 [FULL TEXT]

-----------------------------------------------------

Efficient Location Protocol for Wireless Sensor Networks

Theja N, Shivappa M Metagar, B P Savukar

India

 [FULL TEXT]

-----------------------------------------------------

A RESULT ON HALIN AND HAMILTONIAN GRAPHS

S. Venu Madava Sarma,T. V. PRADEEP KUMAR

India

[FULL TEXT]

-----------------------------------------------------

DECOMPOSITION OF bI*S-CONTINUITY IN IDEAL TOPOLOGICAL SPACES

Ponnuthai Selvarani.S.,Sujipriya.A.,Shalini Tharanya. J.

India

[FULL TEXT]

-----------------------------------------------------

Bipartite Semigraph Structure in DNA Splicing System

S.JeyaBharathi, M. Angayarkanni, S.Sinthanai Selvi, R.Anusha

India

[FULL TEXT]

-----------------------------------------------------

DECOMPOSITION OF GENERALIZED bI*S-CONTINUITY IN IDEAL TOPOLOGICAL SPACES

Ponnuthai Selvarani.S.,Sujipriya.A., Shalini Tharanya. J.

India

 [FULL TEXT]

-----------------------------------------------------

Security Evaluation of Online Shopping Cart Software Design Using Neural Network


Adetunji Adebiyi, and Chris Imafidon


 London

 [FULL TEXT]

-----------------------------------------------------

Comparison of Different Soft Techniques applicable to Multilevel Inverter for Harmonic Elimination


Suman Debnath, Dr. Rup Narayan Ray
AND Tapajit Ghosh

India

 [FULL TEXT]

-----------------------------------------------------

Wiener Polynomial for Steiner distance of Corona and Complement graphs


Mary U, Dr.Arockiaraj PS and Dr.James Albert A

India

 [FULL TEXT]

-----------------------------------------------------