Issue | Title | |
Vol 2, No 1 (2015) | A Comprehensive Approach to Intrusion Detection Alert Correlation | Abstract PDF |
L. Nalini | ||
Vol 6, No 1 (2017) | A Study to Improve Crop Yield in Agriculture Using IOT and Big Data | Abstract PDF |
N. G. Yethiraj, Noor Ayesha | ||
Vol 2, No 1 (2015) | A Survey on Cloud Computing Threats | Abstract PDF |
S. Nirmal | ||
Vol 5, No 2 (2016) | A Survey on Privacy in Social Networking Websites | Abstract PDF |
N. Jayalakshmi, R. G. Kavitha | ||
Vol 2, No 1 (2015) | An Empirical Study of Cloud Computing: Managing Garment Supply Chains | Abstract PDF |
Kavitha Venkatachari | ||
Vol 5, No 2 (2016) | Analysis of Energy Consumption in Cloud Data Center Using Green Cloud Simulator | Abstract PDF |
Vakula Rani Gumpina | ||
Vol 6, No 1 (2017) | Analyzing of the Leaf Boundary in Different Leaves | Abstract PDF |
S. Sumanth, K. Deepak | ||
Vol 2, No 1 (2015) | Cloud Computing Data Security in Cloud Computing for Banking | Abstract PDF |
Anand Tanvashi, B. Shravani | ||
Vol 3, No 2 (2015) | Congestion Control in Networks | Abstract PDF |
S. Suchitha | ||
Vol 3, No 2 (2015) | Data Security Issues and Challenges in Cloud Computing | Abstract PDF |
S. Nirmala | ||
Vol 6, No 1 (2017) | Development of Neural Network Application for Fuel Consumption and Mapping for Aircraft | Abstract PDF |
Supriya | ||
Vol 2, No 1 (2015) | Efficient Information Retrieval through Ontology in Semantic Web - Web Based Approach | Abstract PDF |
J. Anitha D'Souza | ||
Vol 5, No 2 (2016) | E-Governance:Bridging the Digital Divide | Abstract PDF |
Parvati N. Angadi, C. Sharada, H. R. Roopa | ||
Vol 3, No 2 (2015) | Electronic Blind Stick for Low Eye Sight People | Abstract PDF |
G. Y. Nivedit, A. Lokesh, R. Girisha | ||
Vol 2, No 1 (2015) | Enhancing the Functionality of Moodle in CSE | Abstract PDF |
A. M. Geetha, A. Vidya | ||
Vol 5, No 2 (2016) | Heart Disease Prediction Using Classification Techniques with Feature Selection Method | Abstract PDF |
K. Uma, M. Hanumathappa | ||
Vol 2, No 1 (2015) | Information Retrieval Model in Self Directed E-Learning Using Dynamic Semantic Network | Abstract PDF |
LathaKurian | ||
Vol 2, No 1 (2015) | In-memory Technique: High Performance Analytics with SAP HANA Track E-DATA Warehousing and Data Mining | Abstract PDF |
Sunitha Watts, Aliyas Shaik | ||
Vol 3, No 2 (2015) | Keyless House Entry-An Application of RFID | Abstract PDF |
Shilpa Abhang | ||
Vol 2, No 1 (2015) | Mail Server, Cloud Server, Cloud Zoro Application, Using P2P File Sharing | Abstract PDF |
V. Umesh | ||
Vol 4, No 1 (2016) | Mechanism and Framework for Secure Routing in Mobile Ad Hoc Networks | Abstract PDF |
Vijaykumar A. Patil, R. Girisha | ||
Vol 3, No 2 (2015) | Message from the Editor | Abstract PDF |
Anitha Ramachander | ||
Vol 4, No 1 (2016) | Message from the Editor | Abstract PDF |
Anitha Ramachander | ||
Vol 6, No 1 (2017) | Message from the Editor | Abstract PDF |
Anitha Ramachander | ||
Vol 5, No 2 (2016) | Message from the Editor | Abstract PDF |
Anitha Ramachander | ||
1 - 25 of 43 Items | 1 2 Next Last |
Browse Title Index
Scroll