• Home
  • Archives
Register Login
    Flag icon
  1. Home
  2. Archives
  3. Volume 185
  4. Issue 2
This website uses cookies

We use cookies to personalize your content and to analyze our traffic. We do not share information about your use of our site with any of our partners including Google Scholar, Web of Science and affiliated journals.

By continuing to use our website, you consent to our use of cookies.

Issue 2 of Volume 185

Consequences of Violating Database Integrity Rules in Data Management Systems

Authors: Ametovi Koffi Jacques Olivier

A Model of Linear Programming for Profit Optimization and Share Profit between Investment Partners and Seller: A Case Study of Bangladesh Cookies Company

Authors: Nahida Islam, Muhammed Hanif, Ashraf Uddin

Implementation of Text Similarity using Cosine Similarity Method in Python

Authors: Ahmad Farhan Alshammari

Security Analysis of Medical Image Encryption using AES Modes for IoMT Systems

Authors: Zied Guitouni, Mohammed Ali Ghaieb, Mohsen Machhout

Comparison of Speed Control for Separately Exacted DC Motor by using PID(Z) and PID(S) Controller

Authors: Murtadha Jasim Hasan

Visco-Elastic Oscillatory Flow in a Porous Channel with Heat Transfer in Presence of Magnetic Field

Authors: Hridi Ranjan Deb

Information Security Policy Implementation Assessment in Libyan Telecommunications Companies

Authors: Salima Benqdara, Ibrahim Alshiekhy

Review of EEG-based Classification of Depression Patients

Authors: Yasmeen Anis, Kaptan Singh, Amit Saxena

Journal platform powered by
PhDFocus®
A to Z of Journal Management
API powered by
Web of Science™
PhDFocus® is compliant with United States Education Policy. A part of Foundation of Computer Science. © PhDFocus 2009 - 2025
About PhDFocus®
  • Contact Us
  • FAQ
  • Documentation
  • Privacy
  • Terms
  • Return & Refund