Browse Title Index


 
Issue Title
 
Vol 10, No 3 (2018) Storage of Mobile Sensor Data in Clouds using Information Classification Algorithms Abstract   PDF
Prashant Sangulagi, Ashok V. Sutagundar, S. Stelvarani
 
Vol 3, No SP 5 (2012) Strengthening of Data Security Against its Attack Abstract   PDF
Swapnil G. Deshpande, Pradeep B. Dahikar
 
Vol 6, No 3 (2014) String Identifier in Multiple Medical Databases Abstract   PDF
Simona-Roxana Dumitrescu, Dan Popescu
 
Vol 5, No 1 (2013) Study of Encryption and Decryption of Wave File in Image Formats Abstract   PDF
Rahul R. Upadhyay
 
Vol 8, No 3 (2016) Study of Resource Discovery trends in Internet of Things (IoT) Abstract   PDF
C. P. Vandana, Ajeet A. Chikkamannur
 
Vol 3, No 1 (2011) Study of Various Attacks in MANET and Elaborative Discussion of Rushing Attack on DSR with Clustering Scheme Abstract   PDF
Rusha Nandy, Debdutta Barman Roy
 
Vol 4, No 3 (2012) Study on Event Matching In Temporal Database Using AGT Approach Abstract   PDF
N. Duraimutharasan, K. Sarukesi
 
Vol 4, No 2 (2012) Survey of Elliptic Curve Scalar Multiplication Algorithms Abstract   PDF
E. Karthikeyan
 
Vol 10, No 4 (2019) Survey of Intrusion Detection Techniques and Architectures in Wireless Sensor Networks Abstract   PDF
Rakesh Sharma, Vijay Anant Athavale
 
Vol 6, No 4 (2015) Survey of Security and Privacy Issues of Internet of Things Abstract   PDF
Tuhin Borgohain, Uday Kumar, Sugata Sanyal
 
Vol 10, No SP 5 (2019) Survey on Behavioural Analysis of ASD using Clustering Techniques Abstract   PDF
Mohammed Ismail, K. Vijayalakshmi, Vinayakamurthy, Anuradha
 
Vol 10, No 4 (2019) Survey on Electricity Consumption using Data Mining Techniques Abstract   PDF
K. Kalaiselvi, J. Abdul Samath
 
Vol 6, No 2 (2014) Survey on Host and Network Based Intrusion Detection System Abstract   PDF
Niva Das, Tanmoy Sarkar
 
Vol 6, No 4 (2015) Survey:Biological Inspired Computing in the Network Security Abstract   PDF
V. Venkata Ramana, Y. Subba Reddy, G. Rama Subba Reddy, Pandurangan Ravi
 
Vol 4, No 1 (2012) Surveying Solutions to Securing On-Demand Routing Protocols in MANETs Abstract   PDF
Nitish Balachandran
 
Vol 1, No 6 (2010) System Security Management in SNMP Abstract   PDF
P. Deivendran, R. Dhanapal
 
Vol 14, No 6 (2023) Task Scheduling Optimization in Cloud Computing by Coronavirus Herd Immunity Optimizer Algorithm Abstract   PDF
Ahmed Y. Hamed, M. Kh. Elnahary, Hamdy H. El-Sayed
 
Vol 15, No 2 (2023) Task Scheduling Optimization in Cloud Computing by Social Group Optimization Algorithm Abstract   PDF
Ahmed Y. Hamed, M. Kh. Elnahary, Hamdy H. El-Sayed
 
Vol 12, No 3 (2020) Teaching Reform of Computer Basic Courses Based on the Hybrid Mode of Online and Offline Abstract   PDF
Pshwang Wang
 
Vol 2, No 4 (2011) Temporal Dynamics of Repetitions during the Early Stage of Stuttering:An Acoustic Study Abstract   PDF
V. K. Tara, K. M. RaviKumar
 
Vol 16, No 2 (2024) The Applications of Deep Learning Algorithms for Enhancing Big Data Processing Accuracy Abstract
Amira Hassan Abed
 
Vol 7, No 2 (2015) The Concept of Authenticity in Philosophy of Sartre and Implications for Using Internet as Educational Technology Abstract   PDF
Roohollah Mozaffaripour, Saeid Zarghami Hamrah
 
Vol 13, No 4 (2022) The DEEC and EDEEC Heterogeneous WSN Routing Protocols Abstract   PDF
Kenza Redjimi, Mohammed Redjimi
 
Vol 10, No SP 5 (2019) The Discovery for Privacy & Security in Various Big Data Application:A Study Abstract   PDF
Prince Vivek, Rajeev Ranjan
 
Vol 10, No 3 (2018) The Effect of Using COAP Protocol on Reducing Energy Consumption in Smart Houses (Case Study:Uromieh Culture House) Abstract   PDF
Kamelya Dehghani Kohnehshahri, Mohammad Hasan Kargar, Fatemeh Soleimani Roozbahani
 
851 - 875 of 929 Items First Previous 30 31 32 33 34 35 36 37 38 Next Last