Issue | Title | |
Vol 8, No 2 (2015) | Root to Fruit (3): A Framework to Manage Knowledge about Sorting Algorithms | Abstract PDF |
Pramod Kadam, Sachin Kadam | ||
Vol 6, No 1 (2013) | Route Stability in WiMAX (802.16) | Abstract PDF |
A. F. Sheik Subani | ||
Vol 3, No 2 (2010) | Rule Based Approach for English to Sanskrit Machine Translation and Synthesizer System | Abstract PDF |
D. T. Mane, P. R. Devale, S. D. Suryawanshi | ||
Vol 2, No 2 (2009) | Rule-Based Metadata Extraction for Heterogeneous References | Abstract PDF |
Bolanle Ojokoh | ||
Vol 8, No 3 (2015) | Scheduling Strategies in Hadoop: A Survey | Abstract PDF |
S. Rashmi, Anirban Basu | ||
Vol 7, No 1 (2014) | Search Engine Selection Approach in Metasearch Using Past Queries | Abstract PDF |
Sheo Das, Kuldeep Singh Raghuwanshi | ||
Vol 6, No 3 (2013) | Search Engine:A Review | Abstract PDF |
S. K. Vijay, Manish Maheshwari, Roohi Ali | ||
Vol 10, No 4 (2017) | Second Derivative Free Eighteenth Order Convergent Method for Solving Non-Linear Equations | Abstract PDF |
V. B. Kumar Vatti, Ramadevi Sri, M. S. Kumar Mylapalli | ||
Vol 3, No 2 (2010) | Secure and Auditable Agent-Based Communication Protocol for e-Health System Framework | Abstract PDF |
M. Aramudhan, K. Mohan | ||
Vol 10, No 2 (2017) | Secure ASP.NET Web Application by Discovering Broken Authentication and Session Management Vulnerabilities | Abstract PDF |
Rupal R. Sharma, Ravi K. Sheth | ||
Vol 3, No 1 (2010) | Secure Data Aggregation Using Mobile Agents in Wireless Sensor Networks | Abstract PDF |
Bhavna Arora Makin, Devanand Padha | ||
Vol 5, No 2 (2012) | Secure Dynamic Data Aggregation Routing Protocol for Wireless Sensor Networks | Abstract PDF |
Bhawana Mathur | ||
Vol 4, No 1 (2011) | Secure Watermarking Technique for Emerging Clouds | Abstract PDF |
R. Vinoth, S. Sivasankar | ||
Vol 10, No 1 (2017) | Security Enhancement of AODV Protocol using Fuzzy based Trust Computation in Mobile Ad Hoc Networks | Abstract PDF |
Ashish Kumar Jain, Vrinda Tokekar | ||
Vol 3, No 2 (2010) | Security Management System for Oilfield Based on Embedded Wireless Communications:A Design Approach | Abstract PDF |
Syed Minhaj Ali, Satish V. Reve, Roohi Ali, Sana Iqbal | ||
Vol 7, No 1 (2014) | Security Measures of WSN Networks by Avoiding Message Replay Attacks | Abstract PDF |
Geetanjali Kandhari, Deepak Aggarwal | ||
Vol 10, No 1 (2017) | Security with Respect to MANET (Mobile Ad-hoc Network) and IoT (Internet of Things) | Abstract PDF |
Vikram Agrawal | ||
Vol 11, No 3 (2018) | Segmentation of Activated Sludge Filaments using Phase Contrast Images | Abstract PDF |
Yuen Hang Ho, Humaira Nisar, Muhammad Burhan Khan | ||
Vol 6, No 2 (2013) | Selecting the Best Mobility Model with the AODV Routing Protocol in MANETs | Abstract PDF |
Saad Talib Hasson, Alaa Taima | ||
Vol 7, No 1 (2014) | Selecting the Optimal Location of Wireless Communication Network Stations | Abstract PDF |
Saad Talib Hasson, Al-Motairy Jullanar Ali, Luay Habeeb Hashim, Zainab Saad Talib | ||
Vol 4, No 2 (2011) | Semantic Based Smarter Natural Language Interface for Database | Abstract PDF |
Keshav Niranjan | ||
Vol 8, No 3 (2015) | Semantic Web: XML and RDF Roles | Abstract PDF |
Fadi Al kalani | ||
Vol 5, No 2 (2012) | Service Oriented Architecture Integration | Abstract PDF |
Suresh Krishnaraju, K. Subramani | ||
Vol 2, No 2 (2009) | Shape Optimization of Pedestals Using Artificial Neural Network | Abstract PDF |
Sangeeta Yadav, K. K. Pathak, Rajesh Shrivastava | ||
Vol 9, No 3 (2016) | Simulating Civil Disorder:An Agent-Based Modeling Approach | Abstract PDF |
Justin Kurland, Peng Chen | ||
476 - 500 of 583 Items | First Previous 15 16 17 18 19 20 21 22 23 24 Next Last |
Browse Title Index
Scroll