|
Issue |
Title |
|
Vol 4, No 8 (2013): Volume 4 No 8 |
A SURVEY OF SOFTWARE LOCALIZATION WORK |
Abstract
pdf2
|
varsha tomar |
|
April-2011 |
A Survey of Steganography and Steganalysis Technique in Image, Text, Audio and Video as Cover Carrier |
Abstract
PDF
|
Souvik Bhattacharyya |
|
Vol 4, No 8 (2013): Volume 4 No 8 |
A SURVEY OF TECHNIQUES AND APPLICATIONS FOR REAL TIME IMAGE PROCESSING |
Abstract
pdf2
|
Pratishtha Gupta |
|
Vol 5, No 8 (2014): August-2014 |
A SURVEY ON BIOMETRIC AUTHENTICATION TECHNIQUES USING PALM VEIN FEATURE |
Abstract
PDF2
|
Dipti Verma |
|
Febuary-2011 |
A Survey on Brain Image Segmentation Methods |
Abstract
PDF
|
Prof. Samir Kumar Bandyopadhyay |
|
Vol 4, No 12 (2013): December-2013 |
A Survey on Cloud Model-Based Resource Sharing Security Issues From Multi Cloud Environment |
Abstract
PDF2
|
parul indoria, Abhishek Didel |
|
Vol 3, No 9 (2012): September-2012 |
A SURVEY ON CONTENT BASED IMAGE RETRIEVAL USING BDIP,BVLC AND DCD |
Abstract
PDF2
|
Kanchan Saxena |
|
Vol 4, No 1 (2013): Volume 4 No 1 |
A SURVEY ON ENERGY EFFICIENT MODULATION AND CODING TECHNIQUES FOR WIRELESS SENSOR NETWORKS |
Abstract
PDF2
|
M. Sheik Dawood |
|
Vol 4, No 5 (2013): May-2013 |
A SURVEY ON PERIODICITY DETECTION IN TIME SERIES DATABASE |
Abstract
pdf2
|
B. Sujatha |
|
July-2011 |
A SURVEY ON WIRELESS SENSOR NETWORK ARCHITECTURE, PROTOCOLS AND APPLICATIONS |
Abstract
PDF
|
Dr. M. Lilly Florence |
|
Vol 3, No 2 (2012): Febuary-2012 |
A SURVEY-CLASSIFIER FUSION |
Abstract
PDF
|
Kanchan Saxena |
|
Vol 3, No 11 (2012): November-2012 |
A SYSTEMATIC APPROACH AND ALGORITHM FOR FREQUENT DATA ITEMSETS |
Abstract
PDF2
|
Sachin Sharma, Vidushi Singhal, Seema Sharma |
|
Vol 4, No 5 (2013): May-2013 |
A SYSTEMATIC REVIEW OF COST ESTIMATION MODELS |
Abstract
pdf2
|
G Rajkumar, Dr. K. Alagarsamy |
|
Vol 3, No 3 (2012): March-2012 |
A TECHNICAL DISCUSSION ON REQUIREMENT ENGINEERING WITH AN EXAMPLE |
Abstract
PDF2
|
Onkar Nath Pandey |
|
Vol 3, No 3 (2012): March-2012 |
A UML MODEL FOR MEASURING THE PERFORMANCE OF STUDENTS USING OBJECT ORIENTED APPROACH |
Abstract
PDF2
|
Dr. Gufran Ahmad Ansari |
|
July-2011 |
A UNIFIED BLOCK AND STREAM CIPHER BASED FILE ENCRYPTION |
Abstract
PDF
|
Manikandan. G |
|
June 2011 |
A VALIDATION OF SIM-A WITH OVPSIM |
Abstract
PDF
|
Gajendra Kumar Ranka, Dr. Manoj Kumar Jain |
|
January-2011 |
A WEB-ENGINEERING SOLUTION TO ACADEMIC MANAGEMENT SYSTEM OF AN EDUCATIONAL INSTITUTE |
Abstract
PDF
|
Razeef Mohd |
|
Vol 9, No 6 (2018): June-2018 |
Accelerating the search of fraudulent XBRL Instance Document |
Abstract
PDF
|
Guang Yih Sheu |
|
Vol 3, No 6 (2012): June - 2012 |
ADAPTIVE JOIN OPERATORS FOR RESULT RATE MAXIMIZATION |
Abstract
PDF2
|
Pallavi D. Umap |
|
Vol 4, No 5 (2013): May-2013 |
AD-HOC ROUTING PROTOCOL “REVIEW PAPER” |
Abstract
pdf2
|
Rupali Gupta |
|
Vol 6, No 10 (2015): October 2015 |
ADOPTION OF E-GOVERNMENT IN DEVELOPING COUNTRIES: THE CASE OF THE STATE OF KUWAIT |
Abstract
PDF
|
Ahmad A. Rabaai, Bashar Zogheib, Abdullah AlShatti, Enas M. AlJamal |
|
Vol 3, No 6 (2012): June - 2012 |
Advanced Secure Dynamic-ID Based Remote User Authentication Scheme |
Abstract
PDF2
|
chandra sekhar vorugunti |
|
Vol 3, No 6 (2012): June - 2012 |
Advanced Secure Remote User Authentication Scheme Preserving User Anonymity |
Abstract
PDF2
|
chandra sekhar vorugunti, Mrudula Sarvabhatla |
|
April-2011 |
AGENT BASED E-HEALTH CARE INFORMATION SYSTEM |
Abstract
PDF
|
Arijit Das |
|
101 - 125 of 677 Items |
<< < 1 2 3 4 5 6 7 8 9 10 > >> |