Effective Tunneling Of Data And Traffic Management Over Network Using L2TP Based ON L2F
Journal Title: International Journal of Science and Research (IJSR) - Year 2013, Vol 2, Issue 5
Abstract
Effective Tunneling Of Data And Traffic Management Over Network Using L2TP Based ON L2F
Secret Digital Image Sharing Using Natural Image Based VSS Scheme
Visual cryptography is a technique of sharing secret images. This technique encrypts a secret image into number of shares. Combining these shares generates the original image and it can be directly recognized by the huma...
Hand Gesture Recognition Technique
Hand Gesture Recognition Technique
Sonographic Assessment of Endometrial Thickness in Different Menstrual Stages in Sudanese Normal Women in Khartoum State
Sonographic Assessment of Endometrial Thickness in Different Menstrual Stages in Sudanese Normal Women in Khartoum State
A Study to Assess the Effectiveness of Structured Teaching on Anxiety Level of Women Undergoing in Vitro Fertilisation (IVF) in a Selected Infertility Centre
"Abstract Background: According to WHO, one in seven couples have problems in conceiving out of 60 to 80 million couples with the incidence similar in most countries independent of the country-s development. In India 10...
Image Segmentation using Improved Bacterial Foraging Algorithm
Bacterial foraging optimization algorithm (BFOA) has been widely accepted as a global optimization algorithm of current interest for distributed optimization and control. BFOA is inspired by the social foraging behavior...