Issue | Title | |
Vol 7, No 4 (2015) | To Control Unauthorized Propagation of Message in OSN Using NGCI Access Control Mechanism | Abstract |
J. S. Harilakshmanraj, N. Rajkumar | ||
Vol 3, No 1 (2011) | To Identify Dynamic Behaviour of Frequent Patterns by Exploiting Timestamps | Abstract |
K. Veningston, Deepa Kanmani, Sreeja S. Pillai | ||
Vol 6, No 4 (2014) | Towards Efficient Distributed Algorithm with Minimum Communication Overhead | Abstract |
Anil Pandya, Sahista Machchhar, Glory Shah | ||
Vol 11, No 3 (2019) | Transformerless Grid Connected Inverter with Active and Reactive Power Control in Distributed Generation System | Abstract |
S. Vivek, L. Keerthana, M. Tamilselvi, P. Vigneshwari | ||
Vol 11, No 4 (2019) | Transforming Relational Database to Ontology Using Multiple Tables | Abstract |
R. Priyanka, V. Sujatha | ||
Vol 4, No 11 (2012) | Two Pass Spam Filter Using Origin and Bayesian Approach | Abstract |
Rashmi Gupta, Nitin Rola | ||
Vol 2, No 11 (2010) | Uncertain Data Classification using RBF Neural Networks | Abstract |
G. V. Suresh, A. Yesu Babu, Usman Ali Sheik | ||
Vol 7, No 1 (2015) | Unstructured Text Summarization Approach in the Age of Big Data:A Review | Abstract |
Triveedee Sandhya, Sahista Machchhar | ||
Vol 2, No 8 (2010) | Updating Solving Set Algorithm of Outlier Detection to Reduce the Iterations for Large Data Sets and its Application to Fault Diagnosis | Abstract |
P. S. Dhabe, A. S. Shingare, M. L. Dhore | ||
Vol 3, No 6 (2011) | User Friendly API Based Cloud Database | Abstract |
D. Boopathy, R. Srividhya | ||
Vol 10, No 6 (2018) | Using BTS Encryption as a Hashing Function | Abstract |
M. Ahmed Samy, B. Youssef | ||
Vol 1, No 1 (2009) | Using Context Transformations as a Pre-Processing Step in Mining Large Datasets | Abstract |
B. Kalpana | ||
Vol 7, No 8 (2015) | Variant Constraint Multi Depot Vehicle Routing Problem | Abstract |
K. Sobhan Babu | ||
Vol 7, No 7 (2015) | Vendor Managed Inventory (VMI):Benefits, Challenges and Essentials in Implementation | Abstract |
Tarun Khatri, Manish Duhan, Sanjay Kumar, Abid Haleem | ||
Vol 7, No 3 (2015) | Visualization Analytics for Big Data | Abstract |
Trapti Sharma, Devesh Kumar Srivastava | ||
Vol 4, No 12 (2012) | Visualization of Crisp and Rough Clustering Using MATLAB | Abstract |
R. Nithya | ||
Vol 1, No 3 (2009) | Visualizing the Domain in 3-Dimension Using Semantic Clustering | Abstract |
Sanjay Madan, Purnima Ahuja, Shalini Batra | ||
Vol 5, No 4 (2013) | Vulnerability Management in Web Applications | Abstract |
R. Thenmozhi, M. Priyadharshini, V. Vidhya Lakshmi, K. Abirami | ||
Vol 4, No 8 (2012) | Wavelet-Transform Based K-Means Algorithm | Abstract |
Sunayana G. Domadia, Mayank A. Ardeshana | ||
Vol 4, No 5 (2012) | Weather Forecasting Using Incremental K-Means Clustering | Abstract |
Sanjay Chakraborty, N. K. Nagwani, Lopamudra Dey | ||
Vol 10, No 5 (2018) | Weather Forecasting Using Map Reduce Technique | Abstract |
P. S. Sindhu, Poornima Kulkarni | ||
Vol 2, No 10 (2010) | Web Application Protection from Wide Range of Web Vulnerabilities | Abstract |
K. Venkatesh Sharma, K. Satish Kumar | ||
Vol 4, No 2 (2012) | Web Based Resource for the Study of Heart Disease-Treatment | Abstract |
P. Senthilraja, P. Deepika, B. G. Geetha | ||
Vol 8, No 3 (2016) | Web Mining:Concepts and Application | Abstract |
Rafi Ahmad Khan | ||
Vol 8, No 4 (2016) | Web Services Discovery Overview | Abstract |
A. M. Helmy | ||
826 - 850 of 857 Items | First Previous 29 30 31 32 33 34 35 Next Last |
Browse Title Index
Scroll