Issue | Title | |
Vol 10, No 3 (2018) | Storage of Mobile Sensor Data in Clouds using Information Classification Algorithms | Abstract PDF |
Prashant Sangulagi, Ashok V. Sutagundar, S. Stelvarani | ||
Vol 3, No SP 5 (2012) | Strengthening of Data Security Against its Attack | Abstract PDF |
Swapnil G. Deshpande, Pradeep B. Dahikar | ||
Vol 6, No 3 (2014) | String Identifier in Multiple Medical Databases | Abstract PDF |
Simona-Roxana Dumitrescu, Dan Popescu | ||
Vol 5, No 1 (2013) | Study of Encryption and Decryption of Wave File in Image Formats | Abstract PDF |
Rahul R. Upadhyay | ||
Vol 8, No 3 (2016) | Study of Resource Discovery trends in Internet of Things (IoT) | Abstract PDF |
C. P. Vandana, Ajeet A. Chikkamannur | ||
Vol 3, No 1 (2011) | Study of Various Attacks in MANET and Elaborative Discussion of Rushing Attack on DSR with Clustering Scheme | Abstract PDF |
Rusha Nandy, Debdutta Barman Roy | ||
Vol 4, No 3 (2012) | Study on Event Matching In Temporal Database Using AGT Approach | Abstract PDF |
N. Duraimutharasan, K. Sarukesi | ||
Vol 4, No 2 (2012) | Survey of Elliptic Curve Scalar Multiplication Algorithms | Abstract PDF |
E. Karthikeyan | ||
Vol 10, No 4 (2019) | Survey of Intrusion Detection Techniques and Architectures in Wireless Sensor Networks | Abstract PDF |
Rakesh Sharma, Vijay Anant Athavale | ||
Vol 6, No 4 (2015) | Survey of Security and Privacy Issues of Internet of Things | Abstract PDF |
Tuhin Borgohain, Uday Kumar, Sugata Sanyal | ||
Vol 10, No SP 5 (2019) | Survey on Behavioural Analysis of ASD using Clustering Techniques | Abstract PDF |
Mohammed Ismail, K. Vijayalakshmi, Vinayakamurthy, Anuradha | ||
Vol 10, No 4 (2019) | Survey on Electricity Consumption using Data Mining Techniques | Abstract PDF |
K. Kalaiselvi, J. Abdul Samath | ||
Vol 6, No 2 (2014) | Survey on Host and Network Based Intrusion Detection System | Abstract PDF |
Niva Das, Tanmoy Sarkar | ||
Vol 6, No 4 (2015) | Survey:Biological Inspired Computing in the Network Security | Abstract PDF |
V. Venkata Ramana, Y. Subba Reddy, G. Rama Subba Reddy, Pandurangan Ravi | ||
Vol 4, No 1 (2012) | Surveying Solutions to Securing On-Demand Routing Protocols in MANETs | Abstract PDF |
Nitish Balachandran | ||
Vol 1, No 6 (2010) | System Security Management in SNMP | Abstract PDF |
P. Deivendran, R. Dhanapal | ||
Vol 14, No 6 (2023) | Task Scheduling Optimization in Cloud Computing by Coronavirus Herd Immunity Optimizer Algorithm | Abstract PDF |
Ahmed Y. Hamed, M. Kh. Elnahary, Hamdy H. El-Sayed | ||
Vol 15, No 2 (2023) | Task Scheduling Optimization in Cloud Computing by Social Group Optimization Algorithm | Abstract PDF |
Ahmed Y. Hamed, M. Kh. Elnahary, Hamdy H. El-Sayed | ||
Vol 12, No 3 (2020) | Teaching Reform of Computer Basic Courses Based on the Hybrid Mode of Online and Offline | Abstract PDF |
Pshwang Wang | ||
Vol 2, No 4 (2011) | Temporal Dynamics of Repetitions during the Early Stage of Stuttering:An Acoustic Study | Abstract PDF |
V. K. Tara, K. M. RaviKumar | ||
Vol 16, No 2 (2024) | The Applications of Deep Learning Algorithms for Enhancing Big Data Processing Accuracy | Abstract |
Amira Hassan Abed | ||
Vol 7, No 2 (2015) | The Concept of Authenticity in Philosophy of Sartre and Implications for Using Internet as Educational Technology | Abstract PDF |
Roohollah Mozaffaripour, Saeid Zarghami Hamrah | ||
Vol 13, No 4 (2022) | The DEEC and EDEEC Heterogeneous WSN Routing Protocols | Abstract PDF |
Kenza Redjimi, Mohammed Redjimi | ||
Vol 10, No SP 5 (2019) | The Discovery for Privacy & Security in Various Big Data Application:A Study | Abstract PDF |
Prince Vivek, Rajeev Ranjan | ||
Vol 10, No 3 (2018) | The Effect of Using COAP Protocol on Reducing Energy Consumption in Smart Houses (Case Study:Uromieh Culture House) | Abstract PDF |
Kamelya Dehghani Kohnehshahri, Mohammad Hasan Kargar, Fatemeh Soleimani Roozbahani | ||
851 - 875 of 929 Items | First Previous 30 31 32 33 34 35 36 37 38 Next Last |
Browse Title Index
Scroll