Vol. 14 No. G5 (2014): GJCST-G Interdisciplinary: Volume 14 Issue G5
Upcoming
Current
Archives
About
About the Journal
Submissions
Editorial Team
Privacy Statement
Contact
Search
Register
Login
Change the language. The current language is:
English
Español (España)
Français (France)
Italiano
Português (Brasil)
Português (Portugal)
Русский
简体中文
Register
Login
Change the language. The current language is:
English
Español (España)
Français (France)
Italiano
Português (Brasil)
Português (Portugal)
Русский
简体中文
Vol. 14 No. G5 (2014)
Published February 5, 2015
GJCST-G Interdisciplinary: Volume 14 Issue G5
GJCST-G Interdisciplinary: Volume 14 Issue G5
Full Issue
Download E-Journal
Articles
Mohsen Kakavand
23-31
A Text Mining-Based Anomaly aZDetection Model in Network Security
Article PDF
Md. Shahidul Islm
39-42
Voip End-To-End Security using S/Mime and a Security Toolbox
Article PDF
K.Nithiya, A.Vinoth Kannan
1-5
A Novel Method of Violated Constraint Prediction with Modified Spatial Analysis based Fuzzy Sorting
Article PDF
B. Jaiganesh
17-22
Analysis of Handoff Latency in Advanced Wireless Networks
Article PDF
Nazrul Islam, Md. Ahsanul Hoque, Sajjad Waheed
33-38
Priority based Congestion Control Mechanism in Multipath Wireless Sensor Network
Article PDF
Olawuyi J.O, Olawuyi J.O, Mgbole F.
7-15
Using Latency to Evaluate Computer System Performance
Article PDF
×
Username
*
Required
Password
*
Required
Forgot your password?
Keep me logged in
Login
No account?
Register here