Issue | Title | |
Vol 2, No 9 (2010) | Protection of Database Security VIA Collaborative Inference Detection | Abstract |
P. Kamakshi, J. Ramadevi, S. Gopala Krishna Murthy | ||
Vol 7, No 9 (2015) | Providing Enhanced Security on Monitoring Using Multifeature Background Subtraction with Support Vector Machine | Abstract |
M. Sabareesan, B. Lekka, U. Saranya Devi, P. Sujatha | ||
Vol 2, No 1 (2010) | Providing Secured Data Storage by Privacy and Third Party Auditing in Cloud | Abstract |
Lingaraj Dhabale, Priti Pavale | ||
Vol 3, No 14 (2011) | PurposeNet-A Semantic Knowledgebase | Abstract |
P. Kiran Mayee | ||
Vol 2, No 12 (2010) | QoS Localized Routing for Guarantee Reliability in Wireless Sensor Networks using Data Fusion Method with Different Data Traffic Types | Abstract |
S. J. Kavitha, J. Roselin, P. Latha | ||
Vol 12, No 2 (2020) | QoS of Security Threats and Solution in Cloud Computing Organization | Abstract |
M. Bhavani Preetha | ||
Vol 1, No 1 (2009) | Quality Depth-First Closed Itemsets (DCI_Closure) Associator | Abstract |
M. Sakthi Ganesh, C. Kalairasan, Shalini Ramnath, V. D. Mytri | ||
Vol 1, No 2 (2009) | Quality Enhancement and Self Diagnostic Survey of Higher Education Institutions | Abstract |
S. Nazreen Begum, R. S. D. Wahidabanu | ||
Vol 7, No 2 (2015) | Quantitative Measurement of Islamic Mutual Funds in Pakistan "Using Two Indexes KMI 30 and KSE 100" | Abstract |
Asaf Zia | ||
Vol 6, No 9 (2014) | Query Centric Information Retrieval System Vs Context Sensitive Information Retrieval System | Abstract |
Rushali S. Patil, P. D. Ganjewar | ||
Vol 4, No 8 (2012) | Query Extraction Using Natural Language Processing | Abstract |
Ashish Tamrakar, Deepty Dubey | ||
Vol 5, No 4 (2013) | Query Profile Obfuscation for Secure Transaction | Abstract |
R. Vijayalakshmi, A. Shamaladevi, N. Vidhya | ||
Vol 7, No 9 (2015) | Rainstorm Prediction Using Support Vector Machine in Hadoop Cluster | Abstract |
C. P. Shabariram | ||
Vol 3, No 6 (2011) | Ranked XML Semantic Query Processing | Abstract |
R. Narmada Devi, B. Reena | ||
Vol 2, No 12 (2010) | Rational Computation for Mining Association Rules from XML Documents | Abstract |
T. Sandhiya, M. S. Saravanan | ||
Vol 3, No 1 (2011) | RBAC Framework Based on XACML Policy in WS-BPEL Process | Abstract |
J. Ramkumar | ||
Vol 3, No 7 (2011) | RBAC Framework for Web Based Services in Work Flow Foundation | Abstract |
J. Ramkumar | ||
Vol 8, No 6 (2016) | Real Time Implementation of Enhanced Nonlinear PID Controller for a Conical Tank Process | Abstract |
S. Prince Samuel, R. Kiruba, M. Saranya | ||
Vol 6, No 5 (2014) | Recency, Frequency and Time Based Web Cache Replacement Policy for Improvement in Web Cache Performance:RFTP | Abstract |
Vipul Dholariya, Madhu Shukla | ||
Vol 2, No 3 (2010) | Recognition of Audiovisual Celebrity in Unrestrained Web Videos | Abstract |
Vijay Dhir, Amit Kamra, Rakesh Kumar, Baljeet Saini | ||
Vol 2, No 8 (2010) | Recommender System for Prevention of Juvenile Plantar Dermatosis Disease | Abstract |
L. Arockiam, S. Charles, C. Lalitha, A. Sujanitha, V. Arul Kumar | ||
Vol 4, No 8 (2012) | Reconstruction Based Privacy Preservation in Centralized Incremental Data Mining | Abstract |
V. Rajalakshmi, G. S. Anandha Mala, P. Muthuchelvi | ||
Vol 6, No 5 (2014) | Reinforcement of Communication Through Unconventional Methods of Advertising | Abstract |
A. Latha | ||
Vol 6, No 8 (2014) | Reliability Modeling of a Cold Standby System with Different Repair Policies and Imperfect Coverage | Abstract |
Ashish Kumar, Monika Saini, Devesh Kumar Srivastava | ||
Vol 8, No 5 (2016) | Reliable Data Collection Method for Remote Sensor Systems in the Vicinity of Collusion Assaults | Abstract |
Pranav Bhushan | ||
701 - 725 of 857 Items | First Previous 24 25 26 27 28 29 30 31 32 33 Next Last |
Browse Title Index
Scroll