Browse Title Index


 
Issue Title
 
Vol 9, No 4 (2018): April-2018 AN IMPROVED GAIT RECOGNITION SYSTEM BASED ON PCA AND ACO ALGORITHM Abstract   PDF
Manuj Mishra
 
Vol 4, No 4 (2013): Volume 4 No 4 AN IMPROVED LOCAL TETRA PATTERN FOR CONTENT BASED IMAGE RETRIEVAL Abstract   pdf2
Thangadurai K
 
Vol 3, No 6 (2012): June - 2012 AN IMPROVED ROUND ROBIN CPU SCHEDULING ALGORITHM Abstract   PDF2
Manish Kumar Mishra
 
Vol 2, No 12 (2011): December 2011 An Insight Overview of Issues and Challenges in Vehicular Adhoc Network Abstract   PDF
Monika Khatri
 
July-2011 AN INTELLIGENT DECISION SUPPORT USING GENETIC FUZZY INTEGRATION FOR CAPABILITY ANALYSIS Abstract   PDF
Kunjal B. Mankad
 
Vol 3, No 10 (2012): October 2012 AN INTRODUCTION TO HYPERION ESSBASE Abstract   PDF2
Varsha Bishnoi
 
August-2011 AN INTRODUCTION TO QUANTUM NEURAL COMPUTING Abstract   PDF
Shaktikanta Nayak
 
Vol 4, No 3 (2013): March-2013 AN OPTIMAL ROUTE DETERMINING METHODOLOGY BASED ON DECISION SUPPORT SYSTEM Abstract   pdf2
H. Vignesh Ramamoorthy
 
November-2010 AN OPTIMIZED VERTICAL HANDOFF DECISION STRATEGY USING GENETIC ALGORITHM IN HETEROGENEOUS WIRELESS NETWORKS Abstract   PDF
Mrs. Chandralekha
 
October-2010 AN OPTIMIZED VERTICAL HANDOFF DECISION STRATEGY USING GENETIC ALGORITHM IN HETEROGENEOUS WIRELESS NETWORKS Abstract   PDF
Mrs. Chandralekha
 
Vol 5, No 1 (2014): January-2014 An Overview and Survey of Various Cloud Simulation Tools Abstract   PDF2
Parveen Kumar, Anjandeep Kaur Rai
 
Vol 3, No 3 (2012): March-2012 AN OVERVIEW OF BLUETOOTH SECURITY: ISSUES AND CHALLENGES Abstract   PDF2
Nishant Mishra
 
Vol 3, No 5 (2012): May - 2012 AN OVERVIEW OF VARIOUS FORMS OF LINGUISTIC STEGANOGRAPHY AND THEIR APPLICATIONS IN PROTECTING DATA Abstract   PDF2
M. K. Kaleem
 
Vol 3, No 10 (2012): October 2012 AN OVERVIEW ON PHYSICAL IMPLEMENTATION OF SECURE ETL WORKFLOW Abstract   PDF2
Nitin Anand
 
November-2010 AN SCHEME TO TRANSMIT SECURE MESSAGE WITH AUTHENTICATION & INTEGRITY USING TRIPLE - EHDES Abstract   PDF
Ramveer Singh
 
Vol 3, No 9 (2012): September-2012 ANALYSIS AND ASSESSMENT OF SURFACE IMAGE TEXTURE MECHANISMS Abstract   PDF2
T.Venkat Narayana Rao
 
July-2011 ANALYSIS OF DDoS ATTACKS IN DISTRIBUTED PEER TO PEER NETWORKS Abstract   PDF
Vooka Pavan Kumar
 
Vol 3, No 3 (2012): March-2012 ANALYSIS OF DIFFERENT VULNERABILITIES IN AUTO TELLER MACHINE TRANSACTIONS Abstract   PDF2
Navneet Sharma
 
Vol 5, No 6 (2014): June-2014 Analysis of Issues in phishing attack and development of prevention mechanism Abstract   PDF2
Neelam Gupta
 
Vol 3, No 8 (2012): August-2012 Analysis of Lossless Reversible Transformation Algorithms to Enhance Data Compression Abstract   PDF2
Jeyanthi Perumal, Anuratha Vinodkumar
 
Vol 4, No 2 (2013): February-2013 ANALYSIS OF MITM ATTACK IN SECURE SIMPLE PAIRING Abstract   PDF2
Praveen Mishra
 
Vol 2, No 11 (2011): November 2011 ANALYSIS OF MOBILE AGENT Abstract   PDF
Prakash V. Rajguru, Dr. Sushant B. Deshmukh
 
Vol 3, No 11 (2012): November-2012 Analysis of Multipliers in VLSI Abstract   PDF2
Iffat Fatima
 
Vol 3, No 9 (2012): September-2012 ANALYSIS ON SUSPICIOUS THYROID RECOGNITION USING ASSOCIATION RULE MINING Abstract   PDF2
K. Saravana Kumar
 
July-2011 Analyzing the Superlative Symmetric Cryptographic Encryption Algorithm Abstract   PDF
Srinivasarao D
 
151 - 175 of 663 Items << < 2 3 4 5 6 7 8 9 10 11 > >>