Issue | Title | |
Vol 12, No 4 (2021) | A Novel Approach to Restructure the Input Java Program | Abstract PDF |
R. N. Kulkarni, K. S. Aparna | ||
Vol 3, No SP 5 (2012) | A Novel Efficient Approximate Query Processing in P2P Network | Abstract PDF |
A. P. Bhagat, P. P. Pawade, R. D. Jadhav | ||
Vol 6, No 2 (2014) | A Novel Technique in Software Engineering for Building Scalable Large Parallel Software: Demonstration on Dynamical Core of Varsha - A Global Circulation Model Software | Abstract PDF |
T. Venkatesh, U. N. Sinha | ||
Vol 3, No 5 (2012) | A Novel Wormhole Detection Technique for Wireless Ad Hoc Networks | Abstract PDF |
Muhammad Sharif, Aisha Azeem, Mudassar Raza, Waqas Haider | ||
Vol 12, No 6 (2021) | A Perspective for Intrusion Detection & Prevention in Cloud Environment | Abstract PDF |
Vaneeta , Sangeeta Rani | ||
Vol 9, No 2 (2017) | A Proposed Algorithm to Detect the Largest Community Based On Depth Level (LC-BDL) | Abstract PDF |
Mohamed H. Farrag, Mona M. Nasr | ||
Vol 14, No 2 (2022) | A Proposed Cognitive Framework Model for a Student Support Chatbot in a Higher Education Institution | Abstract PDF |
V. Bala Dhandayuthapani | ||
Vol 10, No 4 (2019) | A Proposed Framework for Detecting and Predicting Diseases through Business Intelligence Applications | Abstract PDF |
Soha Ahmed, Ahmed Ibrahim El Seddawy, Mona Nasr | ||
Vol 9, No 3 (2017) | A Proposed GSM Biometric Attendance Management System for Ghana Education | Abstract PDF |
Antoh-Baffoe Charles | ||
Vol 9, No 2 (2017) | A Proposed Model for a Web-Based Academic Advising System | Abstract PDF |
Esraa Afify, Mona Nasr | ||
Vol 9, No 2 (2017) | A Proposed Transformation Model for Integration Between E-Justice Applications and E-Commerce Services | Abstract PDF |
Mona Nasr, Mostafa Sayed | ||
Vol 10, No 2 (2018) | A Propulsive Roadmap for IoT Beyond 2025 | Abstract PDF |
Manas Kumar Yogi, K. Ganga Devi Bhavani | ||
Vol 4, No 3 (2012) | A Quality Hybrid Service Discovery Protocol | Abstract PDF |
D. Annapurna, K. B. Raja, K. R. Venugopal, L. M. Patnaik | ||
Vol 1, No 4 (2010) | A Rake Receiver Model for Filtering White Nose Presence in the Receiving Signals | Abstract PDF |
V. Umadevi Chezhian, K. Ramar | ||
Vol 4, No 5 (2013) | A Real Time Intrusion Aggregation And Prevention Technique | Abstract PDF |
Fouzia Sultana, Stephens Charles, A. Govardhan | ||
Vol 12, No 5 (2021) | A Reliable Authentication Protocol for Peer to Peer Based Applications | Abstract PDF |
Ramesh Kumar | ||
Vol 3, No 5 (2012) | A Review of Color Visual Cryptographic Schemes | Abstract PDF |
Richa K. Makhijani, Lavina D. Panjwani | ||
Vol 4, No 5 (2013) | A Review of Fuzzy Based QoS Web Service Discovery | Abstract PDF |
R. Buvanesvari, V. Prasath, H. Sanofar Nisha | ||
Vol 4, No 1 (2012) | A Review of Techniques to Mitigate Sybil Attacks | Abstract PDF |
Nitish Balachandran, Sugata Sanyal | ||
Vol 6, No 6 (2015) | A Review on Speech Corpus Development for Automatic Speech Recognition in Indian Languages | Abstract PDF |
Cini Kurian | ||
Vol 6, No 1 (2014) | A Review: Benefits and Critical Factors of Customer Relationship Management | Abstract PDF |
Vijay Pal Dhaka, Pooja Nahar | ||
Vol 10, No 5 (2019) | A Roadmap to Mitigation Techniques:Bedrock for Atmospheric Turbulence | Abstract PDF |
Krina Patel, Dippal Israni, Dweepna Garg | ||
Vol 1, No 6 (2010) | A Schematic Representation of User Model Transfer for Email Virus Detection | Abstract PDF |
M. Sreedhar Reddy, Manoj Alimilla, P. Viswanath Raghava | ||
Vol 13, No 3 (2021) | A Secure GUI Method for Reliable Data Communication | Abstract PDF |
Ramesh Kumar | ||
Vol 1, No 5 (2010) | A Secure Key Agreement Protocol Using Braid Groups | Abstract PDF |
Atul Chaturvedi, Shyam Sundar | ||
51 - 75 of 929 Items | First Previous 1 2 3 4 5 6 7 8 9 10 Next Last |
Browse Title Index
Scroll