Home | AEJSR | Journals | For Authors | Publications Ethics | Peer Review | Contact Us
AEJSR | Aims & Scope |  Editorial board | Abstr/Indexing | On-line Issues 
American-Eurasian Journal of Scientific Research
—————————————————————————————————————————————————————————————————————————————————————————————————————————
                                  Volume 11 Number 1, 2016


Pulsed Electromagnetic Charges in the Management of Coronary Artery Atherosclerosis-Clinical Research

Ahmad A. Gharaibeh and Hussein AbuElasal

[ Abstract ]  [ Full Text ]

—————————————————————————————————————————————————————————————————————————————————————————————————————————

Gender Analysis of Sweet Potato Production in Ghana

E.N. Amengor, Harriet Yeboah, Eric Fordjour, P.P. Acheampong, J. Osei Adu, N.B. Frimpong, K. Adofo and R. Sagoe

[ Abstract ]  [ Full Text ]

—————————————————————————————————————————————————————————————————————————————————————————————————————————

Three Phase 15 Level Cascaded H-Bridges Multilevel Inverter for Motor Drives

M.S. Saravanan and R. Jeyabharath

[ Abstract ]  [ Full Text ]

—————————————————————————————————————————————————————————————————————————————————————————————————————————

Informative Review on Data Partition and Node Stability in Mining

Akey Sungheetha, R. Rajesh Sharma, R. Indu Poornima, N. Vaitheeka and G. Ashokkumar

[ Abstract ]  [ Full Text ]

—————————————————————————————————————————————————————————————————————————————————————————————————————————

Time Orient Frequency Estimation Technique Based Intrusion Detection System for Cluster Routing in Mobile Adhoc Networks at Battle Field Conditions Using Fuzzy Rule Sets

W. Gracy Theresa and S. Sakthivel

[ Abstract ]  [ Full Text ]

—————————————————————————————————————————————————————————————————————————————————————————————————————————

Prioritizing Service Based on Multi-Tier Service Approximation Technique for Dynamic Selection and Composition of Cloud Services in Multi Tier Clouds

G.R. Anantha Raman and S. Sakthivel

[ Abstract ]  [ Full Text ]

—————————————————————————————————————————————————————————————————————————————————————————————————————————

Designing the Appearance of the Street Based on Social Studies, for Example the Street Held in Common Between Aran and Bidgol

Maryam Rezaei Ghale and Maryam Ramezani

[ Abstract ]  [ Full Text ]

—————————————————————————————————————————————————————————————————————————————————————————————————————————

Secure Speech Communication Using Improved OFDM Scrambler for next Generation Mobile Communication Systems

G. Dhanya and J. Jayakumari

[ Abstract ]  [ Full Text ]

—————————————————————————————————————————————————————————————————————————————————————————————————————————

Service Orient Stream Cipher Based Key Management Scheme for Secure Data Access Control Using Elliptic Curve Cryptography in Wireless Broadcast Networks

D. Geetha and Dr. S. Sakthivel

[ Abstract ]  [ Full Text ]

—————————————————————————————————————————————————————————————————————————————————————————————————————————
—————————————————————————————————————————————————————————————————————————————————————————————————————————