Browse Title Index


 
Issue Title
 
Vol 3, No 6 (2012): June - 2012 A REVIEW ON VISUAL CRYPTOGRAPHY SCHEMES Abstract   PDF2
Thottempudi Kiran
 
Vol 4, No 8 (2013): Volume 4 No 8 A ROBUST TECHNIQUE IMPLEMENTATION FOR FACIAL RECOGNITION UNDER EIGEN FEATURE EXTRACTION Abstract   pdf2
Soninder Singh Garcha
 
Vol 3, No 4 (2012): April 2012 A SCHEDULING IN HETEROGENEOUS COMPUTING ENVIRONMENT USING ALEA SIMULATOR BASED ON GRIDSIM Abstract   PDF2
Satheesh Kumar N
 
Vol 4, No 7 (2013): July-2013 A SECURITY FRAMEWORK FOR WIRELESS SENSOR NETWORKS Abstract   pdf2
Namdeep Singh
 
Vol 4, No 7 (2013): July-2013 A SHORT SURVEY OF DATA COMPRESSION TECHNIQUES FOR COLUMN ORIENTED DATABASES Abstract   pdf2
Priyanka Raichand
 
Vol 3, No 10 (2012): October 2012 A SIMPLE EXPLANATION OF SEARCH TECHNIQUE IN QUANTUM FRAMEWORK Abstract   PDF2
Shaktikanta Nayak, Sitakanta Nayak, J.P. Singh
 
January-2011 A Simplex Grid Computing Methodology For Monitoring Resources Abstract   PDF
G. Mohammed Nazer
 
Vol 5, No 7 (2014): July-2014 A Study of Privacy Attacks on Social Network Data Abstract   PDF2
SRI KRISHNA ADUSUMALLI, VALLI KUMARI VATSAVAYI, JYOTHI VADISALA
 
Vol 5, No 5 (2014): May-2014 A study of Steganography Techniques using Discrete Wavelet Transform Abstract   PDF2
Pratap Chandra Mandal
 
Vol 4, No 12 (2013): December-2013 A study on achieving fault tolerance in MANETs Abstract   PDF2
Parul Aggarwal
 
Vol 8, No 10 (2017): October-2017 A STUDY ON CONSTRAINED FREQUENT PATTERN MINING OF STREAMING DATA Abstract   PDF
Dr.B. Lavanya
 
Vol 4, No 4 (2013): Volume 4 No 4 A Study on Improving Challenges of Network with Cloudlets for Mobile Cloud Computing Abstract   pdf2
Rutika Manubhai Modh, Jayesh M Patel
 
September-2010 A STUDY ON THE PERFORMANCE OF CT-APRIORI AND CT-PRO ALGORITHMS USING COMPRESSED STRUCTURES FOR PATTERN MINING Abstract   PDF
Mrs. A.B. Dhivya
 
Vol 3, No 4 (2012): April 2012 A SURVEY OF FOCUSED CRAWLER APPROACHES Abstract   PDF2
Maryam Hazman
 
Vol 8, No 9 (2017): September-2017 A SURVEY OF HASHING TECHNIQUES AND ITS APPLICABILITY FOR EFFICIENT BUFFER CACHE MANAGEMENT Abstract   PDF
TAILOR Priti, MORENA Rustom D
 
Vol 4, No 4 (2013): Volume 4 No 4 A SURVEY OF INTRUSION DETECTION FOR AD-HOC NETWORK Abstract   pdf2
Jacob Abraham
 
Vol 3, No 12 (2012): December-2012 A Survey of Routing Protocols and Geographic Routing protocol Using GPS in MANET Abstract   PDF2
Sanjay Singh
 
Vol 4, No 8 (2013): Volume 4 No 8 A SURVEY OF SOFTWARE LOCALIZATION WORK Abstract   pdf2
varsha tomar
 
April-2011 A Survey of Steganography and Steganalysis Technique in Image, Text, Audio and Video as Cover Carrier Abstract   PDF
Souvik Bhattacharyya
 
Vol 4, No 8 (2013): Volume 4 No 8 A SURVEY OF TECHNIQUES AND APPLICATIONS FOR REAL TIME IMAGE PROCESSING Abstract   pdf2
Pratishtha Gupta
 
Vol 5, No 8 (2014): August-2014 A SURVEY ON BIOMETRIC AUTHENTICATION TECHNIQUES USING PALM VEIN FEATURE Abstract   PDF2
Dipti Verma
 
Febuary-2011 A Survey on Brain Image Segmentation Methods Abstract   PDF
Prof. Samir Kumar Bandyopadhyay
 
Vol 4, No 12 (2013): December-2013 A Survey on Cloud Model-Based Resource Sharing Security Issues From Multi Cloud Environment Abstract   PDF2
parul indoria, Abhishek Didel
 
Vol 3, No 9 (2012): September-2012 A SURVEY ON CONTENT BASED IMAGE RETRIEVAL USING BDIP,BVLC AND DCD Abstract   PDF2
Kanchan Saxena
 
Vol 4, No 1 (2013): Volume 4 No 1 A SURVEY ON ENERGY EFFICIENT MODULATION AND CODING TECHNIQUES FOR WIRELESS SENSOR NETWORKS Abstract   PDF2
M. Sheik Dawood
 
76 - 100 of 637 Items << < 1 2 3 4 5 6 7 8 9 10 > >>