Issue | Title | |
Vol 2, No 5 (2010) | Potential Security Attacks on Wireless Networks and their Countermeasure | Abstract PDF |
C. Sreedhar, S. Madhusudhana Verma, N. Kasiviswanath | ||
Vol 9, No 1 (2017) | PPO-An Approach to Personalized Web Acceleration | Abstract PDF |
K. S. Shailesh, P. V. Suresh | ||
Vol 4, No 2 (2012) | Prashnottar: A Hindi Question Answering System | Abstract PDF |
Shriya Sahu, Nandkishor Vasnik, Devshri Roy | ||
Vol 7, No 2 (2015) | Prediction for Short-Term Traffic Flow Based on Optimized Wavelet Neural Network Model | Abstract PDF |
Tao Li, Liu Sheng | ||
Vol 15, No 1 (2023) | Prediction of Anemia Using Machine Learning Algorithms | Abstract PDF |
Prakriti Dhakal, Santosh Khanal, Rabindra Bista | ||
Vol 7, No 5 (2015) | Predictive and Statistical Analyses for Academic Advisory Support | Abstract PDF |
Mohammed Al-Sarem | ||
Vol 7, No 2 (2015) | Prefix-Based Labeling Annotation for Effective XML Fragmentation | Abstract PDF |
Kok-Leong Koong, Su-Cheng Haw, Lay-Ki Soon, Samini Subramaniam | ||
Vol 7, No 2 (2015) | Preprocessing for PPM: Compressing UTF-8 Encoded Natural Language Text | Abstract PDF |
William J. Teahan, Khaled M. Alhawiti | ||
Vol 5, No 1 (2013) | Pre-Segmentation for the Computer Aided Diagnosis System | Abstract PDF |
Myat Mon Kyaw | ||
Vol 9, No 3 (2017) | Prevention Method of False Report Generation in Cluster Heads for Dynamic En-Route Filtering of Wireless Sensor Networks | Abstract PDF |
Jung-Sub Ahn, Tae-Ho Cho | ||
Vol 6, No 1 (2014) | Processing Obtained Email Data By Using Naive Bayes Learning Algorithm | Abstract PDF |
Valery V. Pelenko, Aleksandr V. Baranenko | ||
Vol 13, No 3 (2021) | Product Sentiment Analysis for Amazon Reviews | Abstract PDF |
Arwa S. M. AlQahtani | ||
Vol 5, No 5 (2013) | Project Monitoring and Control Measures in CMMI | Abstract PDF |
Mahmoud Khraiwesh | ||
Vol 7, No 2 (2015) | Prop - Patronage of PHP Web Applications | Abstract PDF |
C. Sireesha, G. Jyostna, P. Raghu Varan, P. R. L. Eswari | ||
Vol 3, No 3 (2011) | Proposed Information Sharing Security Approach for Security Personnels, Vertical Integration, Semantic Interoperability Architecture and Framework for Digital Government | Abstract PDF |
Md. Headayetullah, G. K. Pradhan, Sanjay Biswas, B. Puthal | ||
Vol 13, No 6 (2021) | Provides An Approach Based On Adaptive Forwarding And Label Switching To Improve The Speed Of Packet Forwarding In NDN Networks | Abstract PDF |
Hadis Rezaei, Sahar Sadeghi, Leila Badeli | ||
Vol 4, No 4 (2012) | PSO Algorithm for IPD Game | Abstract PDF |
Xiaoyang Wang, Yibin Lin | ||
Vol 10, No 2 (2018) | PWM Based Android Controlled Wheelchair | Abstract PDF |
Tarun Debnath, A. F. M. Zainul Abadin, Md. Anwar Hossain | ||
Vol 4, No 1 (2012) | Quality of Service Using PSO Algorithm | Abstract PDF |
S. M. ELseuofi | ||
Vol 14, No 5 (2022) | Quantifying the Theory Vs. Programming Disparity Using Spectral Bipartivity Analysis and Principal Component Analysis | Abstract PDF |
Natarajan Meghanathan | ||
Vol 7, No 2 (2015) | Quantum Clustering-Based Feature Subset Selection for Mammographic Image Classification | Abstract PDF |
N. Hamdi, K. Auhmani, M. M. Hassani | ||
Vol 11, No 5 (2019) | Query Optimization for Big Data Analytics | Abstract PDF |
Manoj Muniswamaiah, Tilak Agerwala, Charles Tappert | ||
Vol 12, No 4 (2020) | Railway Safety Protection with Android Mobile Application for 5G New Radio Network | Abstract PDF |
Tony Tsang, Man Cheng Chong | ||
Vol 8, No 5 (2016) | Ranking Criteria of Enterprise Information Security Architecture Using Fuzzy Topsis | Abstract PDF |
Farzaneh Sadat Jalayer, Akbar Nabiollahi | ||
Vol 4, No 1 (2012) | Ranking Popular Items By Naive Bayes Algorithm | Abstract PDF |
Gouthami Shiramshetty, Jose Mary Golamari, Pulluri Srinivas Rao | ||
651 - 675 of 867 Items | First Previous 22 23 24 25 26 27 28 29 30 31 Next Last |
Browse Title Index
Scroll