Issue | Title | |
Vol 6, No 1 (2018) | Improving the Service Solutions on Hybrid Clouds at Edge Network using Fuzzy Approaches | Abstract |
R. Poorvadevi, S. Ramamoorthy | ||
Vol 7, No 1 (2019) | Intramural Analysis of Blockchain | Abstract |
Prathyusha Kanakam, Raghu Varma Edarapalli, Shaik Mahaboob Hussain | ||
Vol 6, No 2 (2018) | Isolating Selfish Nodes and Analyzing Performance of Ad-Hoc Network Using Perfect Information Game Theory | Abstract |
Samara Mubeen | ||
Vol 2, No 2 (2014) | Knowledge Based Interaction of Smart Metering Service Capabilities | Abstract |
Ivaylo Ivanov Atanasov | ||
Vol 7, No 2 (2019) | Live Helmet Detection System for Detecting Bikers without Helmet | Abstract |
Harsh Nagoriya | ||
Vol 10, No 1 (2022) | Mango Leaf Diseases Detection using Deep Learning | Abstract |
Amisha Sharma, Rajneet Kaur Bijral, Jatinder Manhas, Vinod Sharma | ||
Vol 3, No 2 (2015) | Maya:The Convergence of Open World Gaming and Virtual Reality Technologies | Abstract |
Abhay Saxena, Manan Singh | ||
Vol 7, No 1 (2019) | Medical Health Posts Summarization using Lesk Algorithm | Abstract |
Vinod L. Mane, Ashwini Abhale, Sumit Khandelwal | ||
Vol 1, No 2 (2013) | Metadata Schemas and Cultural Resources: An overview | Abstract |
Humma, Tariq Ahmad Shah | ||
Vol 3, No 2 (2015) | M-Learning through Semantically Annotated Learning Objects and Ontologies | Abstract |
Reshmy Krishnan | ||
Vol 3, No 1 (2015) | Multi-View Face Recognition by Neural Network | Abstract |
Sanjay Kumar Dekate, Anupam Shukla | ||
Vol 7, No 2 (2019) | Performance Analysis of AODV and DSR Routing Protocols in Mobile Ad-Hoc Network | Abstract |
Samara Mubeen, Bibi Zahera, Ishwarya R., Ayesha G. S., Aishwarya M. | ||
Vol 3, No 1 (2015) | Performance Evaluation of Corporators and Authorities Based on Public Grievances Redressal | Abstract |
B. Vanya Shree, S. P. Shiva Prakash | ||
Vol 4, No 2 (2016) | Performance Evaluation of Feature Selection Measures | Abstract |
Smita Chormunge, Sudarson Jena | ||
Vol 5, No 1 (2017) | Privacy-Preserving Public Auditing for Secure Cloud Storage | Abstract |
N. Sivranjani, E. Ramaraj | ||
Vol 3, No 2 (2015) | Pure View Technology (Optimisation & Evaluation Techniques in Image Processing) | Abstract |
Jyoti Prakash Patra, Puru Agrawal | ||
Vol 1, No 1 (2013) | Radial Basis (Fewer Neurons) and Statistical Multiple Linear Regression Models for Predicting Shelf of Processed Cheese | Abstract |
Sumit Goyal, Gyanendra Kumar Goyal | ||
Vol 6, No 1 (2018) | Recent Developments in Mathematical Analysis of Queues for Machine Repair Problem:A Short Survey | Abstract |
Neetu Singh, Savita Rani | ||
Vol 3, No 2 (2015) | Research on Ranking Algorithms in Web Structure Mining | Abstract |
Suvarna Sharma, Amit Bhagat | ||
Vol 9, No 1 (2021) | Role of Artificial Intelligence in Indian Education Sector | Abstract |
S. K. Khatik, Praful Patel | ||
Vol 5, No 2 (2017) | Secure Ranked Keyword Search Over Encrypted Cloud Data | Abstract |
K. Mariyammal, A. Padmapriya | ||
Vol 4, No 2 (2016) | Secure Satellite Image Communication Using DCT, DWT, Median Filter and RSA | Abstract |
Ekta Chauhan | ||
Vol 6, No 2 (2018) | Service Halt in Repairable Redundant Machining System with Degraded Failure and Set-up | Abstract |
Neetu Singh | ||
Vol 6, No 1 (2018) | Short Messaging System (SMS) Based Security Box using Arduino and GSM Module | Abstract |
Safial Islam Ayon | ||
Vol 10, No 1 (2022) | Simulation and Performance Analysis of OFDM System based on Non-Fading AWGN Channel | Abstract |
Diponkor Bala, Md. Ibrahim Abdullah, Mohammad Alamgir Hossain | ||
51 - 75 of 83 Items | First Previous 1 2 3 4 Next Last |
Browse Title Index
Scroll