

Publisher: IGI Global_journal
E-ISSN: 1548-3665|12|1|47-62
ISSN: 1548-3657
Source: International Journal of Intelligent Information Technologies (IJIIT), Vol.12, Iss.1, 2016-01, pp. : 47-62
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content


By Kumar V. Devadoss Ambeth Ramakrishnan M.
International Journal of Computer Applications in Technology, Vol. 48, Iss. 2, 2013-08 ,pp. :





