Issue | Title | |
Vol 8, No 4 (2016) | Secure Data Sharing in Cloud Without Certificate Verification Process Using Id-Based Proxy Ring Signature | Abstract |
S. Balaji | ||
Vol 5, No 3 (2013) | Secure DP Service Composition with Query Optimization | Abstract |
Amit B. Chougule, Rashmi R. Kulkarni | ||
Vol 5, No 2 (2013) | Secured New Generation CAPTCHA to Prevent BOTS and SPAMS | Abstract |
B. Suganya, R. Vaishnavi | ||
Vol 7, No 6 (2015) | Securing Data in Cloud Using Ring Signature | Abstract |
C. K. Sangeetha, Golda Dilip | ||
Vol 3, No 14 (2011) | Selecting Optimal Weighted Medoids for Clustering | Abstract |
B. Vara Prasada Rao, M. Sreelatha, M. Shashi | ||
Vol 3, No 12 (2011) | Selecting the Dataset for Classification Using Predictive Apriori and Diversity Measures | Abstract |
G. Maragatham, M. Lakshmi | ||
Vol 4, No 3 (2012) | Semantic Information Processing into Enriched WordNet Using Word Sense Disambiguation | Abstract |
D. Sindhu Suvitha, R. Janarthanan | ||
Vol 3, No 7 (2011) | Semantic Relation Based Page Ranking Using Genetic Algorithm and Conceptual Graph | Abstract |
J. Avanija, K. Ramar | ||
Vol 3, No 16 (2011) | Semantic Web Mining for Personalization and Recommendation | Abstract |
K. B. Manwade | ||
Vol 5, No 12 (2013) | Semantic-Based Web Mining Under the Framework of Agent | Abstract |
Usha Venna, K. Syama Sundara Rao | ||
Vol 5, No 7 (2013) | Sentence Abusive Detection Using Text Mining | Abstract |
A. Habiba, J. I. Sheeba | ||
Vol 10, No 7 (2018) | Sentiment Analysis and Aspect Classification on Hotel Reviews | Abstract |
B. Sandhiya, N. Shanthi, A. Thara Pearlly, S. Sumathi | ||
Vol 13, No 6 (2021) | Sentiment Analysis using SVM Machine Learning Techniques on Social Media | Abstract |
R Gunavathi, N Saranya | ||
Vol 3, No 12 (2011) | Sentiment Extraction and Analysis of Product Reviews at Sentence Level | Abstract |
Rajashree Shettar | ||
Vol 7, No 9 (2015) | Sentimental Analysis of Twitter Feed | Abstract |
Ruchi Madhusudan Marwal, Rashmi Deshmukh | ||
Vol 9, No 7 (2017) | Sequence Prediction–Hidden Markov Model and Recurrent Neural Networks | Abstract |
B. Ganapathy Subramaniam, T. Rama Prabha, Daniel Steven | ||
Vol 8, No 6 (2016) | Service Delivery Model for Big Data as a Service | Abstract |
Devang Swami, Bibhudatta Sahoo | ||
Vol 3, No 4 (2011) | Significance of Data Models in Knowledge Discovery | Abstract |
Manu Sehgal, Divya Christopher, A. N. Pathak | ||
Vol 2, No 11 (2010) | Similarity Analysis of Digital Image with Nonparametric Tests on Time Series | Abstract |
Subbiah Selvakumar, Kaliaperumal Senthamarai Kannan, Vanniappan Balamurugan | ||
Vol 4, No 2 (2012) | Similarity Search in Recent Biased Data Stream with Sliding Windows | Abstract |
D. Muruga Radha Devi, P. Thambidurai | ||
Vol 13, No 2 (2021) | Simple and Secure File Transfer on Cloud Using Hybrid Cryptography and Steganography | Abstract |
Y Chirag, N Nachiketh Subramanya, P Anitha | ||
Vol 3, No 14 (2011) | Simple Password Protector | Abstract |
I. Rajasekhar, M. Srikanth, M. Sreelatha, M. Shashi | ||
Vol 2, No 10 (2010) | Simulator for Database Aggregation Using Metadata | Abstract |
Sandeep Kumar, Shiv Kumar | ||
Vol 12, No 10-12 (2020) | Smart Building Control System using Raspberry Pi and its Application using Bluetooth Beacon Communication | Abstract |
Dr. Ravi Mishra, Vipin Bhure, Shrikant Chavate | ||
Vol 2, No 9 (2010) | Smart Information Management for Smarter Decision Making | Abstract |
R. Mala, R. Balasubramaniyan, A Anandan | ||
751 - 775 of 857 Items | First Previous 26 27 28 29 30 31 32 33 34 35 Next Last |
Browse Title Index
Scroll