Issue | Title | |
Vol 2, No 1 (2010) | A Secure Nominative Proxy Signature Scheme for Distributed Shared Object Systems | Abstract PDF |
I. A. Ismail, S. F. El-Zoghdy, A. A. Abdo | ||
Vol 14, No 1 (2022) | A Security Assessment Framework for Routing and Authentication Protocols of Mobile Ad-Hoc Networks | Abstract PDF |
Brijendra Kumar Joshi, Megha Soni | ||
Vol 12, No 5 (2021) | A Semantic Model of Web Service Choreography with Space Based QoS | Abstract PDF |
Ravi Shankar Pandey | ||
Vol 2, No 2 (2010) | A Service Oriented Architecture for Weather Forecasting Using Data Mining | Abstract PDF |
C. Beulah Christalin Latha, Sujni Paul, E. Kirubakaran, Sathianarayanan | ||
Vol 12, No 5 (2021) | A Short Review of Some of the Unequal Clustering Algorithms in Wireless Sensor | Abstract PDF |
Garima Pandey, Pankaj Kumar Mishra | ||
Vol 4, No 3 (2012) | A Simulation Based QoS Review of Multipath Routing Protocols for MANET | Abstract PDF |
P. Periyasamy, E. Karthikeyan | ||
Vol 1, No 3 (2009) | A Stable Adaptive Optimization for DSR Protocol in Ad Hoc Networks | Abstract PDF |
M. Neelakantappa, B. Satyanarayana, A. Damodharam | ||
Vol 13, No 6 (2022) | A State-of-the-Art Review on Fog Computing Architecture, Applications, and Security Issues | Abstract PDF |
Bipesh Subedi, Gajendra Sharma | ||
Vol 4, No 2 (2012) | A Study of Collaborative Filtering Approach for Temporal Dynamic Web Data | Abstract PDF |
Meghna Khatri | ||
Vol 13, No 4 (2022) | A Study of Emerging Image Processing and Machine Learning Methodologies for Classification of Plant Leaf Disease | Abstract PDF |
Asif Hassan, Lokesh B S | ||
Vol 9, No 1 (2017) | A Study of Image Processing in Agriculture | Abstract PDF |
K. Prakash, P. Saravanamoorthi, R. Sathishkumar, M. Parimala | ||
Vol 16, No 2 (2024) | A Study of New Micropayment Scheme for Blockchain | Abstract |
Gulab Das, B. P. Tripathi | ||
Vol 3, No 6 (2012) | A Study of Web Usage Mining Research Tools | Abstract PDF |
Chhavi Rana | ||
Vol 6, No 1 (2014) | A Study on Access Point Selection Algorithms in Wireless Mesh Networks | Abstract PDF |
G. Vijaya Kumar, C. Shoba Bindu | ||
Vol 12, No 2 (2020) | A Study on Cross-Site Request Forgery Attack and its Prevention Measures | Abstract PDF |
Puneet Kour | ||
Vol 14, No 2 (2022) | A Study on Deep Learning Based Classification of Flower Images | Abstract PDF |
Burhan Duman, Ahmet Ali Süzen | ||
Vol 8, No 5 (2017) | A Study on Device Oriented Security Challenges in Internet of Things (IoT) | Abstract PDF |
R. Vijaithaa, G. Padmavathi | ||
Vol 5, No 5 (2014) | A Study on Dynamic Source Routing In Ad Hoc Wireless Networks | Abstract PDF |
C. Suriya, R. Sudha | ||
Vol 8, No 3 (2016) | A Study on Hardware and Software Link Quality Metrics for Wireless Multimedia Sensor Networks | Abstract PDF |
G. Kirubasri, N. Uma Maheswari | ||
Vol 13, No 5 (2022) | A Study on Queuing Systems and its Deterministic Measures | Abstract PDF |
C.S Reddy, Krishna Anand S | ||
Vol 9, No 2 (2017) | A Survey of Cloud Computing Approaches, Business Opportunities, Risk Analysis and Solving Approaches | Abstract PDF |
Mohamed H. Farrag, Mona M. Nasr | ||
Vol 8, No 6 (2017) | A Survey of Cyber foraging Systems:Open Issues, Research Challenges | Abstract PDF |
Manas Kumar Yogi, Darapu Uma | ||
Vol 12, No 3 (2020) | A Survey of Data Exfiltration Prevention Techniques | Abstract PDF |
Peter S. Nyakomitta, Silvance O. Abeka | ||
Vol 11, No 3 (2019) | A Survey of Different Approaches of Machine Learning in Healthcare Management System | Abstract PDF |
Krishan Kumar Goyal, Aejaz Hassan Paray | ||
Vol 2, No 2 (2010) | A Survey of Energy-Efficient Hierarchical Cluster-Based Routing in Wireless Sensor Networks | Abstract PDF |
Shio Kumar Singh, M. P. Singh, D. K. Singh | ||
76 - 100 of 929 Items | First Previous 1 2 3 4 5 6 7 8 9 10 Next Last |
Browse Title Index
Scroll