Consolidated Model of Procedures for Workflow Management |
Stanka Hadzhikoleva and Emil Hadzhikolev, University of Plovdiv, Bulgaria |
Volume : 2 volume number : 1 pdf |
Fragmentation of Handwritten Touching Characters in Devanagari Script |
Shuchi Kapoor and Vivek Verma, Rajasthan College of Engineering for Women, India |
Volume : 2 volume number : 1 pdf |
Remote Sensing Image Fusion Using Contourlet Transform With Sharp Frequency Localization |
Yoonsuk Choi, Ershad Sharifahmadian and Shahram Latifi, University of Nevada, USA |
Volume : 2 volume number : 1 pdf |
Towards to an Agent-Oriented Modeling and Evaluating Approach for Vehicular Systems Security |
Mohamed Garoui1, Belhassen Mazigh1, Béchir El Ayeb1 And Abderrafiaa Koukam2, 1prince Research Unit, Tunisia and 2Universite De Technologie De Belfort-Montbeliard, France |
Volume : 2 volume number : 1 pdf |
A Novel Secure Combination Technique of Steganography and Cryptography |
Pye Pye Aung1 and Tun Min Naing2, 1University of Technology (Yatanarpon Cyber City), Pyin Oo Lwin, Myanmar, 2Computer University (Pathein), Myanmar |
Volume : 2 volume number : 1 pdf |
Control of New 3D Chaotic System |
Masoud Taleb Ziabari1 and Ali Reza Sahab 2, 1Ahrar University, Iran and 2Islamic Azad University, Iran |
Volume : 2 volume number : 1 pdf |