Browse Title Index


 
Issue Title
 
Vol 6, No 6 (2015) Cooperative Spatial Decision Support System for Controlling Animal Diseases Outbreaks in Egypt Abstract   PDF
Mahmoud Bakr, Mona Nasr, Maryam Hazman
 
Vol 13, No 3 (2021) Correlation Distance Based Greedy Perimeter Stateless Routing Algorithm for Wireless Sensor Networks Abstract   PDF
S. Venkatasubramanian
 
Vol 7, No 3 (2015) Cost Effective Routing Protocols Based on Two Hop Neighborhood Information (2NI) in Mobile Ad Hoc Networks Abstract   PDF
Anuradha Banerjee, Paramartha Dutta
 
Vol 5, No 3 (2013) Cost Optimization Technique of Task Allocation in Heterogeneous Distributed Computing System Abstract   PDF
Faizul Navi Khan, Kapil Govil
 
Vol 3, No 5 (2012) Counter Measures to Combat Misuses of MAC Address Spoofing Techniques Abstract   PDF
Alok Pandey, Jatinderkumar R. Saini
 
Vol 5, No 4 (2014) CPU Scheduling Algorithms: A Survey Abstract   PDF
Imran Qureshi
 
Vol 6, No 1 (2014) Cryptography System for Online Communication Using Polyalphabetic Substitution Method Abstract   PDF
Yekini N. Asafe, Aigbokhan E. Edwin, Okiki F. Mercy
 
Vol 3, No 1 (2011) Current Security Considerations for Issues and Challenges of Trustworthy Semantic Web Abstract   PDF
Akhilesh Dwivedi, Suresh Kumar, Abhishek Dwivedi, Manjeet Singh
 
Vol 4, No 2 (2012) Current Trends of High capacity Optical Interconnection Data Link in High Performance Optical Communication Systems Abstract   PDF
Ahmed Nabih Zaki Rashed
 
Vol 1, No 5 (2010) Customized PKI for SCADA System Abstract   PDF
Anupam Saxena, Om Pal, Zia Saquib, Dhiren Patel
 
Vol 1, No 1 (2009) Customized Way of Resource Discovery in a Campus Grid Abstract   PDF
Damandeep Kaur, Lokesh Shandil, Jyotsna Sengupta
 
Vol 14, No 2 (2022) Cyber Awareness Learning Imitation Environment (CALIE): A Card Game to provide Cyber Security Awareness for Various Group of Practitioners Abstract   PDF
P. Mohana Priya, Abhijit Ranganathan
 
Vol 11, No 6 (2020) Cybernetic Communication Roles in Managing Corona Virus Pandemic Risk:Nigeria Case Abstract   PDF
Yekini Nureni Asafe, Oloyede Adetokunbo Olamide, Akinwole Agnes Kikelomo
 
Vol 10, No 6 (2019) Data Encryption using SCT and access control using TRBAC in Cloud Computing for Big Data Abstract   PDF
Akhilesh Dwivedi, R. P. Pant, Durgesh Pant, Martand Pande, Senam Pandey
 
Vol 1, No 6 (2010) Data Hiding and Water Marking Security Based on Nested Lattices Abstract   PDF
V. S. Giridhar Akula, P. Chandra Sekhar Reddy, N. Kalpa Latha, R. Sivam
 
Vol 10, No SP 5 (2019) Data Mining on Classifiers Prophecy of Breast Cancer Tissues Abstract   PDF
B. G. Deepa, S. Senthil, Piyush Singh
 
Vol 5, No 3 (2013) Data Retrieval Mechanisms in Mobile Environments by Using Spatial Queries Abstract   PDF
C. Gopala Krishnan, R. Suceendrakumar
 
Vol 10, No 5 (2019) Data Security through Node-Disjoint on Demand Multipath Routing in MANETs Abstract   PDF
Y. Vasudeva Reddy, M. Nagendra
 
Vol 7, No 4 (2016) Decision Tree Based Algorithm for Intrusion Detection Abstract   PDF
Kajal Rai, M. Syamala Devi, Ajay Guleria
 
Vol 13, No 6 (2022) Deep Learning Techniques for Improving Breast Cancer Detection and Diagnosis Abstract   PDF
Amira Hassan Abed
 
Vol 15, No 2 (2023) Deep Neural Networks for Weather Forecasting Abstract   PDF
Naglaa Saeed Shehata, Mohamed Saeed Shehata
 
Vol 2, No 3 (2010) Defending Denial of Service:State Overload Attacks Abstract   PDF
S. S. Nagamuthu Krishnan, V. Saravanan
 
Vol 5, No 4 (2014) Delay-Efficient Energy and Velocity Conscious Non-Preemptive Scheduler (DEV-NS) For Mobile Ad Hoc Networks Abstract   PDF
Anuradha Banerjee, Paramartha Dutta
 
Vol 4, No 6 (2013) Deployment of Multicriteria Decision System for National Youth Service Corps (NYSC) Abstract   PDF
Afolayan A. Obiniyi, Christiana N. Anujeonye, Olumide S. Adewale
 
Vol 14, No 2 (2022) Deployment of Snort Intrusion Detection System on Usmanu Danfodiyo University Network Abstract   PDF
Muazu Dalhatu Sifawa, Bello Alhaji Buhari, Lawal Sulaiman
 
301 - 325 of 889 Items First Previous 8 9 10 11 12 13 14 15 16 17 Next Last