Issue | Title | |
Vol 14 (2015) | Adventures in MF Authentication | Abstract PDF |
Thamraj Ghorsad, Swati Sonune | ||
Vol 18, No 1 (2016) | AES Encryption and MD5 Hash Function along with Steganography to Make Secure Money Transaction | Abstract PDF |
Ekta Chauhan | ||
Vol 17, No 1 (2016) | AGC of a Two-Area Interconnected Non-Reheat Power System with a Parallel HVDC Link using PI Controller and Fuzzy Logic Controller | Abstract PDF |
Simarpreet Singh, Jaspreet Kaur | ||
Vol 24, No 1 (2017) | An Adaptive Approach for Test Case Prioritization in Regression Testing Using Improved Genetic Algorithm | Abstract PDF |
Jagpuneet Kaur Bajwa, Ramanjeet Kaur | ||
Vol 20 (2016) | An Analysis of D-Fuzzy Flip-Flop Design | Abstract PDF |
Gurmeet Kaur, Ramanpreet Kaur | ||
Vol 4 (2011) | An Analysis of Difficulties in Punjabi Language Automation due to Non-Standardization of Fonts | Abstract PDF |
Dharam Veer Sharma | ||
Vol 17, No 1 (2016) | An Analysis of RTS/CTS Mechanism for Data Transfer In Wireless Network: A Review | Abstract PDF |
Ramandeep Kaur, Reecha Sharma | ||
Vol 26 (2017) | An Approach for Diabetes Detection using Data Mining Classification Techniques | Abstract PDF |
Sonu Bala Garg, Ajay Kumar Mahajan, T. S. Kamal | ||
Vol 22 (2016) | An Approach for Weather Nowcasting from Doppler Weather Radar Images using Thresholding | Abstract PDF |
Rhythm Naswa, Navdeep Kanwal | ||
Vol 30, No SP (2018) | An Assessment of Different Clustering Algorithms in Data Mining | Abstract PDF |
Mamta Rani Kamboj, Nitin | ||
Vol 35, No SP (2023) | An Automated Error Detection System for Indian Language Using Statistical Approach | Abstract PDF |
Misha Mittal, Vikas Verma, S.K. Sharma | ||
Vol 22 (2016) | An Edge Detection Technique Using Bacterial Foraging Optimization Method | Abstract PDF |
Harneet Kaur, Ishpreet Singh | ||
Vol 4 (2011) | An Efficient Approach to Solve Sudoku Problem by Harmony Search Algorithm | Abstract PDF |
Satyendra Nath Mandal, Soumi Sadhu | ||
Vol 17, No 1 (2016) | An Efficient Method to Generate Automation Scripts using Selenium Tool | Abstract PDF |
Brinda Sood, Dhavleesh Rattan | ||
Vol 35, No SP (2023) | An Efficient Tomato Leaf Disease Classification Framework by Background Removal Using Fully Convolutional Network and Residual Transformer Network | Abstract PDF |
Alampally Sreedevi, Manike Chiranjeevi | ||
Vol 22 (2016) | An Enhanced Watermarking Scheme in DWTSVD-FWHT Domain Using Key Based Encryption | Abstract PDF |
Dawinder Singh, Manoj Kumar | ||
Vol 31, No SP (2019) | An Improved Design of Contract Net Protocol | Abstract PDF |
Pratibha Kumari, Anjali Arya, Shalu Kumari | ||
Vol 4 (2011) | An Innovative Approach of Tabu Search in Prediction of Pod Yield of Mustard Plant | Abstract PDF |
Satyendra Nath Mandal, Arghya Ghosh, Subhojit Roy, J. Pal Choudhury, S. R. Bhadra Chaudhuri | ||
Vol 4 (2011) | An Innovative Way of Data Security:Steganography | Abstract PDF |
Sunil Khullar, Amanpal Singh Rayat, Inderjit Singh, Amandeep Kumar | ||
Vol 17, No 1 (2016) | An Integrated Approach to Search Engine Evolution | Abstract PDF |
Dharminder Singh, Ashwani Sethi | ||
Vol 35 (2023) | An Integrated Framework for Technical Document Summarization and Multiple-Choice Question Generation | Abstract PDF |
Aparna T B, Arun Babu K, Harsha T V, Soja N, Asha Ali, Ratheesh T K | ||
Vol 26 (2017) | An Investigation for Detection of Breast Cancer using Data Mining Classification Techniques | Abstract PDF |
Sonu Bala Garg, Ajay Kumar Mahajan, T. S. Kamal | ||
Vol 22 (2016) | An Investigation of Distributed Denial of Service Attacks at Application-Layer | Abstract PDF |
Parneet Kaur, Abhinav Bhandari | ||
Vol 21 (2016) | Analysing Saliency with SIFT for Intruder Detection | Abstract PDF |
Sultana Kadri, Pooja, Manju Bala | ||
Vol 1 (2011) | Analysis of Advanced Grid Resource Management Models | Abstract PDF |
Navjeet Kaur, Harpal Kaur, Er. Satinder Pal Ahuja | ||
101 - 125 of 741 Items | First Previous 1 2 3 4 5 6 7 8 9 10 Next Last |
Browse Title Index
Scroll