Issue | Title | |
Vol 8, No 2 (2015) | Traceability of Implementation to Design and Requirements Specifications: A Formal Technical Review Method (Reverse Engineering Tool) | Abstract PDF |
Rashmi Yadav, Ravindra Patel, Abhay Kothari | ||
Vol 8, No 2 (2015) | Traffic Sign Symbol Recognition Using Single Dimension PCA | Abstract PDF |
Shashidhar T. Halakatti, Shambulinga T. Halakatti | ||
Vol 10, No 1 (2017) | Training Neural Network Elements Created From Long Shot Term Memory | Abstract PDF |
Kostantin P. Nikolic | ||
Vol 10, No 2 (2017) | Trends of Manufacturing Systems with Distributed Computing | Abstract PDF |
Abedalhakeem T. E. Issa | ||
Vol 6, No 2 (2013) | Trust and Caching Technique for Intelligent Semantic Query Routing in P2P Networks | Abstract PDF |
U. V. Arivazhagu, S. Srinivasan | ||
Vol 11, No 4 (2018) | Use of Mathematical Morphology in Vehicle Plate Detection | Abstract PDF |
Neeraja Mohanan, Afaq Ahmad, Sayyid Samir Al-Busaidi, Lazhar Khiriji Amir Abdulghani, Muhammad Al Nadabi | ||
Vol 3, No 1 (2010) | Use of XML in HL7 | Abstract PDF |
K. S. Mann, Preeti Saini | ||
Vol 3, No 2 (2010) | User Interface Modeling | Abstract PDF |
Ravinder G. Reddy | ||
Vol 6, No 2 (2013) | User-Based Intelligent Decision Support System in Route Selection on Road Network | Abstract PDF |
M. Geetha, G. M. Kadhar Nawaz | ||
Vol 5, No 2 (2012) | Using Artificial Bee Colony Algorithm for MLP Training on Software Defect Prediction | Abstract PDF |
Solmaz Farshidpour, Farshid Keynia | ||
Vol 5, No 1 (2012) | Using Conceptual Analysis in Java Environment for the X-Ray View on a Class | Abstract PDF |
Zaheer Aslam, Mohammad Kamran Khan, Shahzad Rizwan, Fawad Ali Khan, Zahid Haroon, Noor Zaman | ||
Vol 11, No 3 (2018) | Using Open Source Application In Education Technology | Abstract PDF |
Froilan D. Mobo | ||
Vol 4, No 1 (2011) | Using TINI Point-to-Point Protocol (PPP) | Abstract PDF |
Sagar Shankarrao Shillewar | ||
Vol 7, No 3 (2014) | Using Vectors of Features for Finite State Automata Dataset Reduction | Abstract PDF |
Tawfiq A. Al-Assadi, Abbood Kirebut Jassim | ||
Vol 8, No 2 (2015) | Various Techniques of DDoS Attacks Detection and Prevention at Cloud: A Survey | Abstract PDF |
Dalima Parwani, Amit Dutta, Piyush Kumar Shukla, Meenu Tahiliyani | ||
Vol 3, No 1 (2010) | Video Indexing and Retrieval – Applications and Challenges | Abstract PDF |
M. Ravinder, T. Venu Gopal, T. Venkat Narayana Rao | ||
Vol 11, No 2 (2018) | Virtual Agent Organizations to Optimize Energy Consumption in Households | Abstract PDF |
Alfonso Gonzalez-Briones, Juan M. Corchado | ||
Vol 14, No 1,2,3 (2021) | Virtual Machine Migration in Cloud Computing | Abstract PDF |
Waqas Hasan | ||
Vol 5, No 1 (2012) | Virtual Machines No Longer Considered Harmful | Abstract PDF |
S. Minhaj Ali, Roohi Ali, Sana Iqbal | ||
Vol 5, No 2 (2012) | Virtual Reality Helps Rheumatoid Arthritis Patients | Abstract PDF |
Wadee Alhalabi | ||
Vol 10, No 1 (2017) | Virtual Reality Treatments for Specific Phobias:A Review | Abstract PDF |
Sumit Roy, R. Kavitha | ||
Vol 6, No 1 (2013) | Visual Elicitation of Roles:Using a Hybrid Approach | Abstract PDF |
A. Arockia Eucharista, K. Haribaskar | ||
Vol 3, No 1 (2010) | VPN and IPSEC Server With IDS | Abstract PDF |
Anil Rajput, Manmohan Singh, Naveen Kher, Shumali Kankane, Pawan Meena | ||
Vol 10, No 2 (2017) | Wavelet Statistical Feature Based Malware Class Recognition and Classification using Supervised Learning Classifier | Abstract PDF |
Aziz Makandar, Anita Patrot | ||
Vol 6, No 1 (2013) | Web Usage Mining and Business Intelligence | Abstract PDF |
H. B. Basanth Kumar | ||
551 - 575 of 583 Items | First Previous 18 19 20 21 22 23 24 Next Last |
Browse Title Index
Scroll