Home
|
WEASJ
|
Journals
|
For Authors
|
Publications Ethics
|
Peer Review
|
Contact Us
WEASJ
|
Aims & Scope
|
Editorial board
|
Abstr/Indexing
|
On-line Issues
World Engineering & Applied Sciences Journal
(WEASJ)
—————————————————————————————————————————————————————————————————————————————————————————————————————————
Volume 7 Number 3, 2016
Evaluation of Aquifer Protective Capacity and Soil Corrosivity Using Geoelectrical Method
Tsepav, Matthew Tersoo and Umar Mohammed Alhaji
[ Abstract ] [
Full Text
]
——————————————————————————————————————————————————————————————————————————————————————————————————————————
A Biochemical Study of High-Density Lipoprotein Cholesterol (HDL-C) Changes in Middle Aged Common People with Different Lifestyle
Suresh Kanna, J.K. Jaiprabu and J. Jaya Bharathi
[ Abstract ] [
Full Text
]
——————————————————————————————————————————————————————————————————————————————————————————————————————————
Collaborative Pattern-Based Filtering Algorithm for Botnet Detection
P. Panimalar and K. Rameshkumar
[ Abstract ] [
Full Text
]
——————————————————————————————————————————————————————————————————————————————————————————————————————————
Implementation of P-Q Theory Infcmli Integrated UPQC for Enhancement of Power Quality in Utility System
Jibin Joseph and A. Rathinam
[ Abstract ] [
Full Text
]
——————————————————————————————————————————————————————————————————————————————————————————————————————————
New Approach of Performance and Security Enhancement in Optical Networks
Sumit Gupta and Aditya Goel
[ Abstract ] [
Full Text
]
——————————————————————————————————————————————————————————————————————————————————————————————————————————
5 W’S and 1 H: the Furtive of Interactive Reality Television Programme
V. Vijay Kumar and S. Arulchelvan
[ Abstract ] [
Full Text
]
——————————————————————————————————————————————————————————————————————————————————————————————————————————
A Secure Scheme for Privacy Preserving Data Mining Using Matrix Encoding
J. Shana and T. Venkatachalam
[ Abstract ] [
Full Text
]
——————————————————————————————————————————————————————————————————————————————————————————————————————————
Providing Secure Database as a Service with Encrypted Queryprocessing in Cloud
P. Reeta and J. Jesila Mol
[ Abstract ] [
Full Text
]
——————————————————————————————————————————————————————————————————————————————————————————————————————————
Data Integrity Checking in Multi Cloud Storage
G. Arthi and N. Srinivasan Narayanasamy
[ Abstract ] [
Full Text
]
——————————————————————————————————————————————————————————————————————————————————————————————————————————
—————————————————————————————————————————————————————————————————————————————————————————————————————————