Issue | Title | |
Vol 10, No 2 (2018) | User Authentication Using Image Processing Techniques | Abstract PDF |
Nagabhushana, T. V. Aravinda, B. S. Nataraja | ||
Vol 3, No 3 (2011) | Using Digital Stethoscopes in Remote Patient Assessment via Wireless Networks:The User’s Perspective | Abstract PDF |
Raj Gururajan, Heng-Sheng Tsai, Haoyu Chen | ||
Vol 2, No 6 (2011) | Using Genetic Algorithm for Automated Efficient Software Test Case Generation for Path Testing | Abstract PDF |
Premal B. Nirpal, K. V. Kale | ||
Vol 3, No 2 (2011) | Using of Artificial Neural Networks to Recognize the Noisy Accidents Patterns of Nuclear Research Reactors | Abstract PDF |
Abdelfattah A. Ahmed, Nwal Ahmed Alfishawy, Ali Karam Eldin, Said Sh. Haggag | ||
Vol 15, No 2 (2023) | Utilization of Machine Learning Strategies in the Investigation of Suspected Credit Card Fraud | Abstract PDF |
Rifat Al Mamun Rudro, Md. Faruk Abdullah Al Sohan | ||
Vol 14, No 6 (2023) | Utilizing Deep Reinforcement Learning and QLearning Algorithms for Improved Ethereum Cybersecurity | Abstract PDF |
Gabriel Kabanda, Tendeukai Chipfumbu, Tinashe Chingoriwo | ||
Vol 3, No 4 (2012) | Validation of Internet Application:Study, Analysis and Evaluation | Abstract PDF |
Dinesh Kumar | ||
Vol 10, No 5 (2019) | Variants of the Constrained Bottleneck LAN Edge Link in Household Networks | Abstract PDF |
Koffka Khan, Wayne Goodridge | ||
Vol 10, No 5 (2019) | Video Streaming Evaluation of Path Efficient and Geographical Distance based AOMDV (PE-GD-AOMDV) Routing Protocol in MANET | Abstract PDF |
M. Kokilamani, E. Karthikeyan | ||
Vol 3, No SP 5 (2012) | Video Surveillance System Using Motion Detection-A Survey | Abstract PDF |
Radha S. Shirbhate, Nitish D. Mishra, Rasika P. Pande | ||
Vol 1, No 5 (2010) | Virtual Market Using Logistics Optimization | Abstract PDF |
Reddy Veera Babu, M. Venkata Rao | ||
Vol 5, No 4 (2014) | Voltage Sag and Swell Mitigation Using Matrix Converter with Reduced Number of Switches | Abstract PDF |
Samuel Rajesh Babu, S. Deepa | ||
Vol 2, No 5 (2011) | Watermarking Algorithm Using Sobel Edge Detection | Abstract PDF |
P. Ramesh Kumar, K. L. Sailaja | ||
Vol 3, No 3 (2011) | Wavelet Based Non LSB Steganography | Abstract PDF |
H. S. Manjunatha Reddy, K. B. Raja | ||
Vol 1, No 2 (2009) | Wavelet Scalar Quantization | Abstract PDF |
B. Karuna Kumar, K. Satya Prasad | ||
Vol 1, No 4 (2010) | Web Based Multimedia Recommendation System for e-Learning Website | Abstract PDF |
Syed Farhan Mohsin, Rizwan Ur Rashid | ||
Vol 7, No 5 (2016) | Web OS in Cloud Computing: A Case study | Abstract PDF |
Ranjan Kumar Mondal, Debabrata Sarddar | ||
Vol 1, No 2 (2009) | Web User Categorization and Behavior Study Based on Refreshing | Abstract PDF |
Ratnesh Kumar Jain, Sanjay Singh Thakur, Ramveer Singh Kasana, Suresh Jain | ||
Vol 8, No 5 (2017) | Web-Based User Interface for the Floodlight SDN Controller | Abstract PDF |
Hakan Akcay, Yiltas-Kaplan Derya | ||
Vol 10, No 1 (2018) | What Happens When Adaptive Video Streaming Players Compete in Time-Varying Bandwidth | Abstract PDF |
Koffka Khan, Wayne Goodridge | ||
Vol 10, No 3 (2018) | What Happens When Adaptive Video Streaming Players Compete with Long-Lived TCP Flows? | Abstract PDF |
Koffka Khan, Wayne Goodridge | ||
Vol 10, No 6 (2019) | What Happens when Stochastic Adaptive Video Streaming Players Share a Bottleneck Link? | Abstract PDF |
Koffka Khan, Wayne Goodridge | ||
Vol 3, No SP 5 (2012) | Wireless Mobile Communication-A Study of 3G Technology | Abstract PDF |
Amit K. Mogal | ||
Vol 3, No 2 (2011) | Wireless Sensor Network Based Fire Monitoring and Extinguishing System in Real Time Environment | Abstract PDF |
P. N. Narendra Reddy, P. I. Basarkod, S. S. Manvi | ||
Vol 10, No 1 (2018) | WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System | Abstract PDF |
Pinki Sharma, Jyotsna Sengupta, P. K. Suri | ||
901 - 925 of 929 Items | First Previous 32 33 34 35 36 37 38 Next Last |
Browse Title Index
Scroll