-
301
Wireshark window authentication based packet captureing scheme to pervent DDoS related security issues in cloud network nodes
Published 2015“…As a result, the cloud node response is slow as usual and resource on cloud network becomes unavailable. Some Dos attacks are Ping of Death, Teardrop, Snork, Locking authentication, SYN flooding, Operating System Attacks etc. …”
Get full text
Get full text
Proceeding Paper -
302
-
303
Development of coated peanut separator and frying skillet machine
Published 2018“…The groundnut is sticking and become like a ping pong size ball and the time consuming to fry is longer. …”
Get full text
Article -
304
-
305
Topical delivery of Niacinamide: influence of binary and ternary solvent systems
Published 2019Get full text
Article -
306
Untitled (Publicity notice board)
Get full text
Photograph -
307
Perennial philosophy in re-understanding Malay mythology and science of symbol
Published 2010“…This paper will evaluate Malay mythology and the science of symbols from the perennialists point of view by taking into of consideration the various explanations made by scholars like Rene Guenon, Ananda Coomaraswamy, Frithjof Schuon, Martin Lings, and Seyyed Hossein Nasr regarding myths, symbols and imageries in traditional thought and literature. …”
Get full text
Proceeding Paper -
308
-
309
-
310
-
311
-
312
-
313
-
314
-
315
Back pain and osteolysis of the thoracic spine in an adult: a case of monostotic fibrous dysplasia masquerading as spinal metastasis
Published 2013“…Posterior element of T12 and bilateral erector spinae muscles sent for histopathological evaluation. …”
Get full text
Get full text
Proceeding Paper -
316
-
317
-
318
-
319
-
320
The controversial role of ct angiogram in paediatric supracondylar humeral fracture with pulseless, perfused limb
Published 2012“…She underwent an emergency closed reduction and percutaneous pinning. Post-reduction, her hand remained persistently pulseless but well-perfused. …”
Get full text
Get full text
Get full text
Article