Issue | Title | |
Vol 7, No 3 (2014) | Directive Access Control System | Abstract PDF |
Dabhi Manishaben Dahyabhai, B. K. Mehta | ||
Vol 9, No 3 (2016) | Discovering Spatio-Temporal Patterns of Themes in Social Media | Abstract PDF |
Tobore Igbe, Bolanle Ojokoh, Olumide Adewale | ||
Vol 3, No 1 (2010) | Distributed Remote Architectures CORBA | Abstract PDF |
Hasrat Jahan, Manmohan Singh | ||
Vol 13, No 1 (2020) | Diverging Mysterious in Green Supply Chain Management | Abstract PDF |
Shahzad Ashraf, Tauqeer Ahmed, Sehrish Saleem, Zeeshan Aslam | ||
Vol 8, No 1 (2015) | DNA-Based Audio Steganography | Abstract PDF |
Rashmi M. Tank, Hemant D. Vasava, Vikram Agrawal | ||
Vol 7, No 3 (2014) | Domain Models Schemas: A Semantic Web Perspective | Abstract PDF |
Thabet Slimani | ||
Vol 5, No 2 (2012) | Double-reflecting Data Perturbation Method for Information Security | Abstract PDF |
Maram Balajee, Challa Narasimham | ||
Vol 13, No 2,3 (2020) | Early Prediction of Potato Leaf Diseases using ANN Classifier | Abstract PDF |
Kumar Sanjeev, Narendra Kumar Gupta, W. Jeberson, Suneeta Paswan | ||
Vol 6, No 2 (2013) | Edge Enhancement in Indoor Digital Images | Abstract PDF |
Lija Chacko, S. Karthiprem, V. Rajasekar | ||
Vol 6, No 3 (2013) | EE- commerce in Developing Countries | Abstract PDF |
Trushar Patel, Premal Soni | ||
Vol 2, No 1 (2009) | Effect of Surface Area on the Electronic Parameters of Vacuum Deposited Bismuth-Silicon Junctions | Abstract PDF |
S. S. Oluyamo, O. P. Faromika | ||
Vol 6, No 3 (2013) | Effect of the Neuron Coding by Gaussian Receptive Fields on Enhancing the Performance of Spiking Neural Network for An Automatic Lipreading System | Abstract PDF |
Asmaa Ourdighi, Abdelkader Benyettou | ||
Vol 11, No 2 (2018) | Effectiveness of Social Media in Monitoring Cadets Performance on Shipboard Training in Selected Maritime Schools Using System Quality Metrics | Abstract PDF |
Froilan D. Mobo, Friedr | ||
Vol 3, No 1 (2010) | Effectiveness of Software Testing Techniques on a Measurement Scale | Abstract PDF |
Sheikh Umar Farooq, S. M. K. Quadri | ||
Vol 9, No 1 (2016) | Eigen Values Matrix for Recognition English Letters | Abstract PDF |
Israa Mohammed Hassoon | ||
Vol 10, No 1 (2017) | Eighteenth Order Convergent Method for Solving Non-Linear Equations | Abstract PDF |
V. B. Kumar Vatti, Sri Ramadevi, M. S. Kumar Mylapalli | ||
Vol 2, No 2 (2009) | Emerging Information Communication Technologies to Modernize College Libraries | Abstract PDF |
Vipul Bansal | ||
Vol 8, No 2 (2015) | Empirically Implementation Adaboost to Solve Ambiguity | Abstract PDF |
Boshra F. Zopon AL Bayaty, Shashank Joshi | ||
Vol 4, No 2 (2011) | Emulating Rasterization and Von Neumann Machines with Retina | Abstract PDF |
Bijan Rouhi, Peiman Ghasemi, Amin Ghorbani | ||
Vol 8, No 2 (2015) | Enabling New Generation Security Paradigm With Quantum Cryptography | Abstract PDF |
T. Venkat Narayana Rao, Maithreyi Simhachalam, Smitha Bandyala, B. Vasundara Devi | ||
Vol 7, No 1 (2014) | Encryption of Images and Signals Using Wavelet Transform and Permutation Algorithm | Abstract PDF |
Ibtisam A. Aljazaery | ||
Vol 11, No 4 (2018) | Energy Audit Application for Rice-Wheat Cropping System | Abstract PDF |
Rajesh U. Modi, Mudasir Ali, Raghuvirsinh P. Parmar, Sharad Kumar Namdev | ||
Vol 4, No 2 (2011) | Energy Efficient Cluster Based key Management Technique for Wireless Sensor Networks | Abstract PDF |
T. Lalitha, R. Umarani | ||
Vol 4, No 1 (2011) | Energy Efficient Cluster Based Partial Multihop Algorithm for Hetrogeneous (CPMH) WSN | Abstract PDF |
M. Vasim Babu | ||
Vol 7, No 3 (2014) | Enhance the Interaction Between Mobile Users and Web Services using Cloud Computing | Abstract PDF |
Atul M. Gonsai, Rushi R. Raval | ||
251 - 275 of 583 Items | First Previous 6 7 8 9 10 11 12 13 14 15 Next Last |
Browse Title Index
Scroll