| Suitability of Service Oriented Architecture for Solving GIS Problems |
| Mortaza Saleh, Tahere Yaghoobi and Ahmad Faraahi, Payame Noor University, Tehran |
| Volume : 2 volume number : 2 pdf |
| A Software Agent Framework To Overcome Malicious Host Threats And Uncontrolled Agent Clones |
| G. Annie Sujitha and T.Amudha, Bharathiar University, India |
| Volume : 2 volume number : 2 pdf |
| A Universal Bit Level Block Encoding Technique Using Session Based Symmetric Key Cryptography to Enhance the Information Security |
| Manas Paul1 and Jyotsna Kumar Mandal2, 1JIS College of Engineering,India and 2Kalyani University,India |
| Volume : 2 volume number : 2 pdf |
| Data Security Analysis and Security Extension for Smart Cards Using Java Card |
| A A Deshmukh1, Manali Dubal1, Mahesh TR2, C R Chauhan3, 1Sinhgad College of Engineering and Technology,India, 2Adhiyamaan College of Engineering,India and 3PIET,India |
| Volume : 2 volume number : 2 pdf |
| Scheduling Different Customer Activities with Sensing Device |
| A.Prasanth Rao1, A.Govardhan1, and Prasad Pinagali2, 1JNTU,India and 2SETU Software Systems Pvt..Ltd,India |
| Volume : 2 volume number : 2 pdf |
| The Active Controller Design for Achieving Generalized Projective Synchronization of Hyperchaotic Lu and Hyperchaotic CAI Systems |
| Sarasu Pakiriswamy and Sundarapandian Vaidyanathan, Vel Tech Dr. RR & Dr. SR Technical University,India |
| Volume : 2 volume number : 2 pdf |
| Scheduling and Allocation Algorithm for an Elliptic Filter |
| Sangeetha Marikkannan, Leelavathi, Udhayasuriyan Kalaiselvi, Kavitha, Karpaga Vinayaga College of Engineering and Technology,India |
| Volume : 2 volume number : 2 pdf |