A Prey-Predator Model with Third order Interaction
Bakare E.A, Adekunle Y.A, Kadiri K.O
MHD and Oscillatory Flow of Rivlin-Ericksen Fluid Through an Inclined Channel in a Porous Media
P.Raji Reddy, D.Bhagyamma, P.Narender, S. Thiagarajan
Securing Server System from Buffer Overflow vulnerability using Vel-Alagar Algorithm
P.Vadivelmurugan , K.Alagarsamy
M. Thirumalaiswamy, S. Birundha
A Note on Generalized Skew Derivations on Rings
Asma Ali, Kapil Kumar, MD Hamidur Rahaman
Normal magic square and its some matrix properties
Anup Kumar Thander, Chinmay Ghosh, Goutam Mandal
Tollgate Billing and Security of Vehicle Using RFID
Sagar Muppalla , G.Rajesh Chandra, N.Rajesh Babu