Issue | Title | |
Vol 10, No 4 (2017) | Quality of Service Provisioning in Cognitive Radio Network | Abstract PDF |
Nisar A. Lala, Altaf A. Balkhi, G. M. Mir, R. A. Simnani | ||
Vol 5, No 2 (2012) | Queuing Approach to Estimate the MANET’s Optimal Number of Nodes | Abstract PDF |
Saad Talib Hasson, Enass Fadil | ||
Vol 12, No 3 (2019) | Real Time Depth Hole Filling using Kinect Sensor and Depth Extract from Stereo Images | Abstract PDF |
Kapil Raviya, Ved Vyas Dwivedi, Ashish Kothari, Gunvantsinh Gohil | ||
Vol 10, No 4 (2017) | Realisation of Cognitive Radio:Issues and Challenges | Abstract PDF |
Nisar A. Lala, G. M. Mir, Altaf A. Balkhi | ||
Vol 4, No 1 (2011) | Reconstruction of A Binary Search Tree from Its Preorder Tree Traversal With The Unique Non-Recursive Approach | Abstract PDF |
Manoj C. Lohani, Upendra S. Aswal, Ramesh S. Rawat | ||
Vol 4, No 1 (2011) | Reliability Through Simulation:Goals and Limitations | Abstract PDF |
S. M. K. Quadri, Aasia Quyoum | ||
Vol 10, No 4 (2017) | Requirement Based Testability Estimation Model of Object Oriented Software | Abstract PDF |
Mohammad Zunnun Khan, M. A. Khanam, M. H. Khan | ||
Vol 5, No 2 (2012) | Requirement for Computer Support and its Protocols for AVT | Abstract PDF |
Asia Begum, Faheem Khan, Parveen Mehboob, Muhammad Shoaib, Lala Rukh | ||
Vol 10, No 2 (2017) | Research Summary of A Study for the Estimation of Legacy Programs for Effective Reengineering | Abstract PDF |
Harmeet Kaur, Shahanawaj Ahamad, Govinder N. Verma | ||
Vol 12, No 1 (2019) | Rethinking Cluster-Based Routing in Wireless Sensor Networks | Abstract PDF |
Dimitris Kanellopoulos | ||
Vol 10, No 4 (2017) | Re-UCP Effort Estimation for Web Application Evelopment | Abstract PDF |
Mudasir M. Kirmani | ||
Vol 3, No 1 (2010) | Review of FAT Data Structure of FAT32 File System | Abstract PDF |
Wasim Ahmad Bhat, S. M. K. Quadri | ||
Vol 5, No 2 (2012) | Review on Financial Forecasting using Neural Network and Data Mining Technique | Abstract PDF |
Mehzabin Shaikh, Gyankamal J. Chhajed | ||
Vol 11, No 4 (2018) | Revisiting the “An Improved Remote user Authentication Scheme with Key Agreement” | Abstract PDF |
Yalin Chen, Jue-Sam Chou, I-Chiung Liao | ||
Vol 10, No 1 (2017) | RFID Security Issues in IoT:A Comparative Study | Abstract PDF |
Denver Braganza, B. Tulasi | ||
Vol 4, No 2 (2011) | Risk and Remedies of E-Governance Systems | Abstract PDF |
Abhishek Roy, Sunil Karforma | ||
Vol 6, No 1 (2013) | Risk Management in Software Engineering | Abstract PDF |
Trushar B. Patel, Premal Soni | ||
Vol 6, No 3 (2013) | Robots Considered Harmful | Abstract PDF |
Sanjay Bhatt, Syed Minhaj Ali, Sana Iqbal | ||
Vol 10, No 3 (2017) | Role of ICT in Agriculture: Policy Implications | Abstract PDF |
Surabhi Singh, Santosh Ahlawat, Sarita Sanwal | ||
Vol 6, No 3 (2013) | Role of Information and Communication Technology in Education | Abstract PDF |
M. Akkalakshmi, N. Venkatanarayana, Y. Srinivas, J. Vijayasekhar, G. Ananda Rao | ||
Vol 7, No 3 (2014) | Role of Information Technology in Improvement of Current Scenario in Agriculture | Abstract PDF |
Kapil K. Shukla, Deven J. Patel, Bankim L. Radadiya | ||
Vol 14, No 1,2,3 (2021) | Role of Librarian in Electronic Libraries | Abstract PDF |
Shinde Mahadu Manohar Rao, Madhav Raghunath Rao Patil, Munjewar Subhadra Amrat | ||
Vol 4, No 2 (2011) | Role of Metadata in Data Warehousing for Effective Business Support | Abstract PDF |
Shiv Kumar Gupta, Ritu Vijay | ||
Vol 7, No 1 (2014) | Root to Fruit (1):An Evolutionary Study of Sorting Problem | Abstract PDF |
Pramod Kadam, Sachin Kadam | ||
Vol 7, No 3 (2014) | Root to Fruit (2): An Evolutionary Approach for Sorting Algorithms | Abstract PDF |
Pramod Kadam, Sachin Kadam | ||
451 - 475 of 583 Items | First Previous 14 15 16 17 18 19 20 21 22 23 Next Last |
Browse Title Index
Scroll