Issue | Title | |
Vol 9, No 2 (2016) | Congestion Avoidance in Packet Networks Using Network Simulator-3 (NS-3) | Abstract PDF |
Guneet Kaur Walia, O. P. Gupta, Sunil Kumar | ||
Vol 9, No 1 (2016) | Constructing Well-Organized Wireless Sensor Networks with Low-Level Identification | Abstract PDF |
M. Rajesh, J. M. Gnanasekar | ||
Vol 4, No 1 (2011) | Construction of High Performance Stream Ciphers for Text Web Browsers Using Adders | Abstract PDF |
Raj Kumar, V. K. Saraswat | ||
Vol 10, No 3 (2017) | Constructive and Clustering Methods to Solve Capacitated Vehicle Routing Problem | Abstract PDF |
M. A. H. Akhand, Tanzima Sultana, M. I. R. Shuvo, Al-Mahmud | ||
Vol 4, No 1 (2011) | Consumer Awareness to Protect Internet Users-A Scenario | Abstract PDF |
P. Srinivas | ||
Vol 2, No 1 (2009) | Content-Based Image Retrival in the World Wide Web | Abstract PDF |
P. N. R. L. Chandra Sekhar, D. Rajya Lakshmi, J. A. Chandulal, Mandava V. Basaveswara Rao | ||
Vol 8, No 3 (2015) | Context Driving Speed Limit Alert, Synchronized Monitoring System | Abstract PDF |
Abedalhakeem T. E. Issa | ||
Vol 3, No 1 (2010) | Contrast Enhancement in Gray-Scale Images Using Background Approximation by Blocks and Morphological Operations | Abstract PDF |
A. I. Beena, B. Arthi | ||
Vol 6, No 4 (2013) | Control Algorithm to The Semantic D ata Security in Computer Networks | Abstract PDF |
Al-Shredei Khaled Sadeq, Mohamad A. A. Al-Rababah, Nour E. Oweis | ||
Vol 12, No 2 (2019) | Controlling the Speed of Conveyor Belt using Python Raspberry Pi 3B+ | Abstract PDF |
M. Kamalakannan, K. Devadharshini | ||
Vol 10, No 1 (2017) | Convergence In Future Wireless Network Technology | Abstract PDF |
Shaikh Abdul Azeem, Satyendra Kumar Sharma | ||
Vol 6, No 1 (2013) | Coplanar Wire Crossing Based on Bayesian Scheme for QCA | Abstract PDF |
K. Jeyakanth | ||
Vol 9, No 3 (2016) | Copy Move Image Forgery Detection Using SIFT | Abstract PDF |
Priyanka R. Ruikar, Pravin S. Patil | ||
Vol 12, No 3 (2019) | Copy Move Image Forgery Detection with Exact Match Block Based Technique | Abstract PDF |
Priyanka, Derminder Singh | ||
Vol 4, No 1 (2011) | Cyber Crime Effecting E-Commerce Technology | Abstract PDF |
N. Leena | ||
Vol 6, No 3 (2013) | Dangers of Internet to Society and Practical Avoidance | Abstract PDF |
Mohammad Al-Rababah, Al-Marghirani Abdulsamad, Al-Shomrani Mohammed Mosa | ||
Vol 2, No 2 (2009) | Data Allocation in a Mobile Computing Network with Minimized Response Time and Communication Cost | Abstract PDF |
Shaheen Ayyub, Sanjeev Jain | ||
Vol 6, No 1 (2013) | Data Analysis and Management Techniques in Wireless Sensor Networks | Abstract PDF |
T. Ravi Kumar, K. Raghava Rao | ||
Vol 4, No 2 (2011) | Data Mining for Banking and Finance | Abstract PDF |
M. B. Hammawa | ||
Vol 6, No 2 (2013) | Data Mining:Exploring New Horizons from Huge Data Store | Abstract PDF |
Trushar B. Patel, Premal Soni | ||
Vol 13, No 2,3 (2020) | Data Preprocessing: the Techniques for Preparing Clean and Quality Data for Data Analytics Process | Abstract PDF |
Ashish P. Joshi, Biraj V. Patel | ||
Vol 1, No 1 (2008) | Data Warehousing Practices in Business Initiatives | Abstract PDF |
G. Vijay Kumar, M. Sreedevi | ||
Vol 7, No 1 (2014) | Decentralized Self-Adaptation Mechanism for Service Based Applications in Cloud using Spectral Clustering | Abstract PDF |
E. Nisha | ||
Vol 4, No 2 (2011) | Decision Support System (DSS) Heart Component for MIS Development | Abstract PDF |
Md. Sadique Shaikh | ||
Vol 2, No 1 (2009) | Decision Tree Approach for Predicting Customers Credit Risk | Abstract PDF |
K. Venkat Rao, T. Jyothirmayi, M. V. Basaveswara Rao | ||
201 - 225 of 583 Items | First Previous 4 5 6 7 8 9 10 11 12 13 Next Last |
Browse Title Index
Scroll