Volume 2, No. 1 (2013)
Article - 1
Title
Word and Syllable Boundary of Sylheti Phonemes/ Syllables
01 - 05
Article - 2
Title
Application Of Information And Computer Technology In Libraries
06 - 11
Article - 3
Title
A Comparative study of Counter mode with Cipher block chaining Message Authentication code Protocol (CCMP) and Temporal Key Integrity Protocol (TKIP): Wireless Security
12 - 15
Article - 4
Title
AN ANALYSIS OF SCHEDULING STRATEGIES BASED ON CRITICALITY OF JOBS
16 - 20
Article - 5
Title
The Basic Grapheme to Phoneme (G2P) Rules for Bodo Language
30 - 32
Article - 6
Title
Detection of position and posture of occupants using low resolution sensor
33 - 35
Article - 7
Title
Analysis and Implementation of Sentiment Classification Using Lexical POS
36 - 40