Issue | Title | |
Vol 13, No 2,3 (2020) | A Review of Efficient Dynamic Key Management Scheme for Heterogeneous Wireless Sensor Networks | Abstract PDF |
Itfaq Ahmad Mir, G. M. Mir, Mudasir Ahmad Makhdoomi | ||
Vol 5, No 1 (2012) | A Review of Peer-to-Peer Networking on the Internet | Abstract PDF |
C. R. Rachana | ||
Vol 12, No 2 (2019) | A Review on Cyber Security and the Fifth Generation Cyberattacks | Abstract PDF |
A. Saravanan, S. Sathya Bama | ||
Vol 10, No 2 (2017) | A Review on Electronic Dictionary and Machine Translation System Developed in North-East India | Abstract PDF |
Saiful Islam, Bipul Syam Purkayastha | ||
Vol 10, No 2 (2017) | A Review on IoT Security Issues and Countermeasures | Abstract PDF |
J. Yashaswini | ||
Vol 5, No 2 (2012) | A Review on Role of Information Technology in Business Management | Abstract PDF |
A. Sreeram, D. R. P. Chandra Sekhar, S. R. Karumuri, Y. Srinivas, J. Vijayasekhar | ||
Vol 7, No 1 (2014) | A Review on Shot Boundary Detection | Abstract PDF |
H. B. Basanth Kumar | ||
Vol 9, No 1 (2016) | A Review on Text-Independent Speaker Verification Techniques in Realistic World | Abstract PDF |
Renu Singh, Arvind Kumar Singh, Utpal Bhattacharjee | ||
Vol 7, No 1 (2014) | A Review Study:Automated Risk Identification Tool for Software Development Process | Abstract PDF |
Omni Thakur, Janpreet Singh | ||
Vol 8, No 2 (2015) | A Robust DCT Based Digital Image Watermarking Using Fusion of Computational Intelligence Techniques | Abstract PDF |
Monika Patel, Priti Srinivas Sajja | ||
Vol 5, No 2 (2012) | A Secure and Robust Prototype for Electronic Voting System | Abstract PDF |
Ashraf Darwish, Magidalgendy, Eman Mohamed | ||
Vol 2, No 1 (2009) | A Security Analysis of GSM Security Using ECC Technique | Abstract PDF |
Tarun Kumar | ||
Vol 4, No 2 (2011) | A Site Rank-Based Swarming Ordering Approach | Abstract PDF |
Maya Ram Atal, Roohi Ali, Ram Kumar, Rajendra Kumar Malviya | ||
Vol 13, No 2,3 (2020) | A Smart Structure For Environmental Sustainability In Rose Fields | Abstract PDF |
Indumathi S K | ||
Vol 10, No 3 (2017) | A Soft Approach to Estimate Woody Volume of a Live Tree | Abstract PDF |
Nikita Singla, Derminder Singh | ||
Vol 10, No 3 (2017) | A Study on Machine Learning in Big Data | Abstract PDF |
L. Dhanapriya, S. Manju | ||
Vol 9, No 1 (2016) | A Study on Usage of E-Commerce through Cell Phones by College Students | Abstract PDF |
J. Tamizhkumaran, Ranjanmayee Sabar, P. Manesh Kumar, P. Ramajayam | ||
Vol 4, No 2 (2011) | A Survey of Current Trends in Cloud Computing | Abstract PDF |
M. Lawanya Sri | ||
Vol 2, No 1 (2009) | A Survey of MANET Reactive Routing Protocols Under Different Mobility Models | Abstract PDF |
M. K. Jeya Kumar, R. S. Rajesh | ||
Vol 10, No 3 (2017) | A Survey on Accelerated Mapreduce for Hadoop | Abstract PDF |
Jyotindra Tiwari, Mahesh Pawar, Anjana Pandey | ||
Vol 6, No 4 (2013) | A Survey on Radio Frequency Identification (RFID) | Abstract PDF |
Monika Jatiwal, Chetna Arora, Aastha Gupta | ||
Vol 10, No 2 (2017) | A Survey on User Authentication Techniques | Abstract PDF |
K. Sharmila, V. Janaki, A. Nagaraju | ||
Vol 7, No 1 (2014) | A Systematic Literature Survey on Various Techniques for Software Fault Proneness | Abstract PDF |
Prerna Jain, Balraj Singh | ||
Vol 10, No 3 (2017) | A Systematic Review on the Suspicious Profiles Detection on Online Social Media Data | Abstract PDF |
Asha, Balkishan | ||
Vol 10, No 2 (2017) | A Tpa-Authentication Scheme for Public Cloud Using Kerberos Protocol | Abstract PDF |
Arpit Agrawal, Shubhangi Verma | ||
51 - 75 of 583 Items | First Previous 1 2 3 4 5 6 7 8 9 10 Next Last |
Browse Title Index
Scroll