Author of the publication

Web Based Learning Application for LMS.

. ICIC (1), volume 4113 of Lecture Notes in Computer Science, page 1164-1169. Springer, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Study on Application of Cyber Shopping Service with Utilization of Context Awareness in Smart Home Environment., and . ISPA Workshops, volume 4743 of Lecture Notes in Computer Science, page 144-152. Springer, (2007)Towards a Service-Oriented Architecture for Interactive Ubiquitous Entertainment Systems., and . ICEC, volume 6243 of Lecture Notes in Computer Science, page 419-421. Springer, (2010)Web Based Learning Application for LMS.. ICIC (1), volume 4113 of Lecture Notes in Computer Science, page 1164-1169. Springer, (2006)Eye Tracking Technique for Product Information Provision.. FGIT-SIP/MulGraB, volume 123 of Communications in Computer and Information Science, page 1-7. Springer, (2010)Mobile-Based DoS Attack Security Agent in Sensor Networking., , , and . Wireless Personal Communications, 86 (1): 91-107 (2016)User Behavior Analysis of the Open-Ended Document Classification System., , , , , and . Australian Conference on Artificial Intelligence, volume 4304 of Lecture Notes in Computer Science, page 1089-1095. Springer, (2006)Online Games and Security Issues., , , , and . FGCN (2), page 145-148. IEEE Computer Society, (2008)978-0-7695-3431-2.A Transaction Processing Model for Performance Analysis in Multilevel-Secure Database Systems., , and . ICCSA (2), volume 3981 of Lecture Notes in Computer Science, page 1060-1065. Springer, (2006)Study on Contents Protection in M-Learning Environment., , and . ICCSA (5), volume 3984 of Lecture Notes in Computer Science, page 575-583. Springer, (2006)Protecting Your Privacy with a Mobile Agent Device in RFID Environment., , , , , , and . Wireless Personal Communications, 51 (1): 165-178 (2009)