Issue | Title | |
Vol 3, No 1 (2010) | Subanta pada Analyzer for Sanskrit | Abstract PDF |
Smita Selot, A. S. Zadgaonkar, Neeta Tripathi | ||
Vol 12, No 4 (2019) | A Bayesian Network Model for a Zimbabwean Cybersecurity System | Abstract PDF |
Gabriel Kabanda | ||
Vol 10, No 4 (2017) | A Comparative Analysis of Classification Algorithms on Weather Dataset Using Data Mining Tool | Abstract PDF |
D. Ramesh, Syed Nawaz Pasha, G. Roopa | ||
Vol 11, No 2 (2018) | A Comparative Analysis of Classification Methods for Diagnosis of Lower Back Pain | Abstract PDF |
Mittal Bhatt, Vishal Dahiya, Arvind K. Singh | ||
Vol 10, No 1 (2017) | A Comparative Review on Different Methods of Face Recognition | Abstract PDF |
Tenzin Dawa, N. Vijayalakshmi | ||
Vol 10, No 3 (2017) | A Comparative Study and Analysis of EZW and SPIHT Methods for Wavelet Based Image Compression | Abstract PDF |
Chetan R. Dudhagara, Mayur M. Patel | ||
Vol 8, No 1 (2015) | A Comparative Study of Classification Techniques in Data Mining Algorithms | Abstract PDF |
Sagar S. Nikam | ||
Vol 4, No 2 (2011) | A Comparative Study of Mobile Wireless Networks | Abstract PDF |
Shiv Kumar Gupta, Ramesh C. Poonia, Ritu Vijay | ||
Vol 16, No 1 (2023) | A Comparison between Position-Based and Image-Based Multi-Layer Graphical User Authentication System | Abstract PDF |
Audu Lovingkindness Edward, Hassan Suru, Mustapha Abubakar Giro | ||
Vol 7, No 1 (2014) | A Comparison on Different Image Completion Methods | Abstract PDF |
Merin Varghese, Sherin Chacko Thomas, S. Manimurugan | ||
Vol 4, No 1 (2011) | A Comprehensive Study of Technologies and Trends Used in Latest Mobile Computing Environment | Abstract PDF |
Vaibhav Shukla, Som Nath Ghosh | ||
Vol 4, No 1 (2011) | A Comprehensive Study to Reduce Traffic Accidents Using Fuzzy Logic Approach | Abstract PDF |
Somnath Ghosh | ||
Vol 15, No 1-2-3 (2022) | A Comprehensive Survey of IoT- Based Cloud Computing Cyber Security | Abstract PDF |
SHIPRA YADAV | ||
Vol 4, No 1 (2011) | A Compression Method for PML Document Based on Internet of Things | Abstract PDF |
Jamal Mohammad Aqib | ||
Vol 7, No 2 (2014) | A Computerised Approach of Statistical Inference | Abstract PDF |
Akazue Maureen, Ojeme Blessing, Daniel Anidibia | ||
Vol 4, No 1 (2011) | A Concept of File Deletion and Restoration as A Threat to Commit Cyber Crime | Abstract PDF |
Anisha Kumar | ||
Vol 14, No 1,2,3 (2021) | A Cybersecurity Culture Framework for Grassroots Levels in Zimbabwe | Abstract PDF |
Gabriel Kabanda, Tinashe Chingoriwo | ||
Vol 5, No 1 (2012) | A Fault Tolerant Power Constraint AODV Protocol for MANET | Abstract PDF |
K. Vanaja, R. UMARANI | ||
Vol 8, No 2 (2015) | A Flexible Conceptual Framework for Supporting Collaborative Work | Abstract PDF |
Aiman Turani | ||
Vol 10, No 3 (2017) | A Framework For Integration of A Patients’ Body Area Network With IoT | Abstract PDF |
Dawood A. Khan | ||
Vol 5, No 1 (2012) | A Framework for Managing Verb Phrase Effective and Easy English-Hindi Machine Translation | Abstract PDF |
Vivek Dubey, H. R. Sharma | ||
Vol 5, No 2 (2012) | A Genetic Algorithm Scheduling Approach for Virtual Machine Resources in Cloud Data Centers | Abstract PDF |
Zohreh Royaee, Majid Mohammadi | ||
Vol 4, No 1 (2011) | A Hybrid Multi-Agent Routing Algorithm Based on Ant Colony Optimization for MANET | Abstract PDF |
V. K. Saraswat, Amit Singhal | ||
Vol 3, No 1 (2010) | A Knowledge-Based Visual Analytics Query System | Abstract PDF |
Olusegun Folorunso, Adesina Temitayo Bello, Adesina S. Sodiya, Lateef O. Yusuf | ||
Vol 7, No 1 (2014) | A Lightweight Approach Multiplexing Resource Allocation Scheme by Virtualization based on Time Series in SOC | Abstract PDF |
C. Saravanan, C. Anuradha | ||
1 - 25 of 583 Items | 1 2 3 4 5 6 7 8 9 10 Next Last |
Browse Title Index
Scroll