Browse Title Index


 
Issue Title
 
Vol 6, No 2 (2014) A Novel Technique in Software Engineering for Building Scalable Large Parallel Software: Demonstration on Dynamical Core of Varsha - A Global Circulation Model Software Abstract   PDF
T. Venkatesh, U. N. Sinha
 
Vol 3, No 5 (2012) A Novel Wormhole Detection Technique for Wireless Ad Hoc Networks Abstract   PDF
Muhammad Sharif, Aisha Azeem, Mudassar Raza, Waqas Haider
 
Vol 12, No 6 (2021) A Perspective for Intrusion Detection & Prevention in Cloud Environment Abstract   PDF
Vaneeta , Sangeeta Rani
 
Vol 9, No 2 (2017) A Proposed Algorithm to Detect the Largest Community Based On Depth Level (LC-BDL) Abstract   PDF
Mohamed H. Farrag, Mona M. Nasr
 
Vol 14, No 2 (2022) A Proposed Cognitive Framework Model for a Student Support Chatbot in a Higher Education Institution Abstract   PDF
V. Bala Dhandayuthapani
 
Vol 10, No 4 (2019) A Proposed Framework for Detecting and Predicting Diseases through Business Intelligence Applications Abstract   PDF
Soha Ahmed, Ahmed Ibrahim El Seddawy, Mona Nasr
 
Vol 9, No 3 (2017) A Proposed GSM Biometric Attendance Management System for Ghana Education Abstract   PDF
Antoh-Baffoe Charles
 
Vol 9, No 2 (2017) A Proposed Model for a Web-Based Academic Advising System Abstract   PDF
Esraa Afify, Mona Nasr
 
Vol 9, No 2 (2017) A Proposed Transformation Model for Integration Between E-Justice Applications and E-Commerce Services Abstract   PDF
Mona Nasr, Mostafa Sayed
 
Vol 10, No 2 (2018) A Propulsive Roadmap for IoT Beyond 2025 Abstract   PDF
Manas Kumar Yogi, K. Ganga Devi Bhavani
 
Vol 4, No 3 (2012) A Quality Hybrid Service Discovery Protocol Abstract   PDF
D. Annapurna, K. B. Raja, K. R. Venugopal, L. M. Patnaik
 
Vol 1, No 4 (2010) A Rake Receiver Model for Filtering White Nose Presence in the Receiving Signals Abstract   PDF
V. Umadevi Chezhian, K. Ramar
 
Vol 4, No 5 (2013) A Real Time Intrusion Aggregation And Prevention Technique Abstract   PDF
Fouzia Sultana, Stephens Charles, A. Govardhan
 
Vol 12, No 5 (2021) A Reliable Authentication Protocol for Peer to Peer Based Applications Abstract   PDF
Ramesh Kumar
 
Vol 3, No 5 (2012) A Review of Color Visual Cryptographic Schemes Abstract   PDF
Richa K. Makhijani, Lavina D. Panjwani
 
Vol 4, No 5 (2013) A Review of Fuzzy Based QoS Web Service Discovery Abstract   PDF
R. Buvanesvari, V. Prasath, H. Sanofar Nisha
 
Vol 4, No 1 (2012) A Review of Techniques to Mitigate Sybil Attacks Abstract   PDF
Nitish Balachandran, Sugata Sanyal
 
Vol 6, No 6 (2015) A Review on Speech Corpus Development for Automatic Speech Recognition in Indian Languages Abstract   PDF
Cini Kurian
 
Vol 6, No 1 (2014) A Review: Benefits and Critical Factors of Customer Relationship Management Abstract   PDF
Vijay Pal Dhaka, Pooja Nahar
 
Vol 10, No 5 (2019) A Roadmap to Mitigation Techniques:Bedrock for Atmospheric Turbulence Abstract   PDF
Krina Patel, Dippal Israni, Dweepna Garg
 
Vol 1, No 6 (2010) A Schematic Representation of User Model Transfer for Email Virus Detection Abstract   PDF
M. Sreedhar Reddy, Manoj Alimilla, P. Viswanath Raghava
 
Vol 13, No 3 (2021) A Secure GUI Method for Reliable Data Communication Abstract   PDF
Ramesh Kumar
 
Vol 1, No 5 (2010) A Secure Key Agreement Protocol Using Braid Groups Abstract   PDF
Atul Chaturvedi, Shyam Sundar
 
Vol 2, No 1 (2010) A Secure Nominative Proxy Signature Scheme for Distributed Shared Object Systems Abstract   PDF
I. A. Ismail, S. F. El-Zoghdy, A. A. Abdo
 
Vol 14, No 1 (2022) A Security Assessment Framework for Routing and Authentication Protocols of Mobile Ad-Hoc Networks Abstract   PDF
Brijendra Kumar Joshi, Megha Soni
 
51 - 75 of 889 Items First Previous 1 2 3 4 5 6 7 8 9 10 Next Last