Previous Issue (Vol. 2, No. 1), 2012
![]() | |
![]() | |
![]() | MULTI-PEOPLE TRACKING ACROSS MULTIPLE CAMERASPages: 23-33 |
![]() | |
![]() | |
![]() | SECURE COMMUNICATION BASED ON QI HYPER-CHAOSPages: 70-80 |
![]() | |
![]() | |
![]() | PUBLISHING WEB SERVICES WHICH ENABLE SYSTEMATIC SEARCHPages: 103-112 |
![]() | |
![]() | CYBER FORENSICS: COMPUTER SECURITY AND INCIDENTRESPONSEPages: 127-137 |
![]() | |
![]() | |
![]() | |
![]() | DNA BASE DATA HIDING ALGORITHMPages: 183-192 |
![]() | |
![]() | |
![]() | |
![]() | |
![]() | |
![]() | SUPPLIER SELECTION BASED ON MULTIPLE CRITERIAPages: 258-273 |
![]() | |
![]() | |
![]() | |
![]() |