Zobrazeno 1 - 10
of 109
pro vyhledávání: '"C., Chellappan"'
Autor:
Dr. C. Chellappan
Publikováno v:
Pandian Journal of Women's Studies, Vol 3, Iss 2, Pp 32-32 (2023)
Eating Wasps is an appealing mystery novel written by Anita Nair. It is set in the setting of a small Indian town by the river Nila. The story involves the readers in a mysterious and captivating tale that explores themes such as loss, identity and t
Externí odkaz:
https://doaj.org/article/fab5f5e26b664970b41b95985566cb70
Publikováno v:
In AASRI Procedia 2013 4:125-131
Publikováno v:
International Journal of Pharmaceutical Sciences Review and Research. 66:20-22
Publikováno v:
The Medical journal of Malaysia. 76(3)
Inflammation plays a central role in the pathogenesis of cardiovascular events. The lack of exercise among Malaysians and the increasing cardiovascular diseases among young men are of concern. The aim of this study was to evaluate the reducing of inf
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::1c6f9a4b0b433b9fbd479537a1cfb16c
A HRIS (Human resource information system) is a combination of system and processes that connects human resource management and information technology through HR software. Since every organization is made up of people, acquiring their services, motiv
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::d3081e2d4a93a9f6a58d8c814e0cc033
Autor:
C. Chellappan, G. Murugesan
Publikováno v:
Research Journal of Applied Sciences. 7:119-125
Autor:
C. Chellappan, Krishnaveni Raju
Publikováno v:
International Journal of Communication Networks and Security. :64-67
With the advent and the rising popularity of Internet, security is becoming one of the focal point. At present, Web sites have become the attacker’s main target. The attackers uses the strategy of embedding the HTML tags, the script tag to include
Autor:
C. Chellappan, S. Asha
Publikováno v:
International Journal of Computer Applications. 14:42-51
Autor:
C. Chellappan, Jeevaa Katiravan
Publikováno v:
Asian Journal of Information Technology. 10:51-54