Browse Title Index


 
Issue Title
 
June 2011 ASSESSMENT OF SECURITY IN MOBILE AD-HOC NETWORKS (MANET) Abstract   PDF
Deepak Chayal
 
June 2011 ATTACK DESCRIPTION LANGUAGE FOR COLLABORATED ALERTS-USING XML AND UML Abstract   PDF
K.V.S.N. Rama Rao
 
Vol 5, No 9 (2014): September-2014 AUTHENTICATION OF DATA STORAGE USING DECENTRALIZED ACCESS CONTROL IN CLOUDS Abstract   PDF2
A. Vijayalakshmi, R. Arunapriya
 
Vol 4, No 2 (2013): February-2013 AUTOMATED DAMAGED FLOWER DETECTION USING IMAGE PROCESSING Abstract   PDF2
Kanij Fatema Aleya
 
Vol 3, No 5 (2012): May - 2012 Autonomic Computing: A Long Term Vision in Computing Abstract   PDF2
Sandeep Kumar Chauhan
 
April-2011 Autonomous Mobile Robots Designing Abstract   PDF
Dr. V. M. Murthy (Director)
 
Vol 8, No 10 (2017): October-2017 BANK STATEMENTS RECONCILIATION USING SWIFT- MESSAGE TRANSFER940 Abstract   PDF
A. Madhavi
 
Vol 6, No 6 (2015): June-2015 Biology and Data Interpretation Techniques Concepts Abstract   PDF
Sindhu Pingili
 
Vol 3, No 11 (2012): November-2012 BIOMETRIC TECHNIQUES AND FACIAL EXPRESSION RECOGNITION-A REVIEW Abstract   PDF2
Renu Nagpal, Pooja Nagpal, Sumit Malhotra
 
Vol 2, No 10 (2011): October 2011 BIOMETRIC: CASE STUDY Abstract   PDF
Sushma Jaiswal, Dr. Sarita Singh Bhadauria, Dr.Rakesh Singh Jadon
 
Vol 2, No 11 (2011): November 2011 BIOMETRICS BASED IDENTIFICATION TECHNIQUES (BIT) Abstract   PDF
Akash Srivastva, Vedpal Singh
 
June 2011 BMP To JPEG- the conversion process Abstract   PDF
Anjali Anand
 
April-2011 BRAIN TUMOR SEGMENTATION AND QUANTIFICATION FROM MRI OF BRAIN Abstract   PDF
Sudipta Roy
 
Vol 4, No 4 (2013): Volume 4 No 4 BRING YOUR OWN DEVICE (BYOD): SECURITY RISKS AND MITIGATING STRATEGIES Abstract   pdf2
ARNAB GHOSH, PRASHANT KUMAR GAJAR, SHASHIKANT RAI
 
Vol 3, No 11 (2012): November-2012 BROADBAND INTERFERENCE SUPPRESSION USING VOLTERRA FILTERS Abstract   PDF2
Sheena Agarwal
 
Vol 4, No 1 (2013): Volume 4 No 1 CASE STUDY – CENTRALITY MEASURE ANALYSIS ON CO-AUTHORSHIP NETWORK Abstract   PDF2
Dr. V. Umadevi
 
Vol 3, No 4 (2012): April 2012 CELLULAR AUTOMATA BASED IDENTIFICATION AND REMOVAL OF IMPULSIVE NOISE FROM CORRUPTED IMAGES Abstract   PDF2
Fasel Qadir
 
Vol 6, No 3 (2015): March-2015 CHALLENGES TO COMPONENT TESTABILITY Abstract   PDF2
Dr. Latika Kharb
 
August 2010 CLASSIFICATION AND CLUSTERING OF WEB LOG DATA TO ANALYZE USER NAVIGATION PATTERNS Abstract   PDF
Niranjana Kannan
 
Vol 3, No 5 (2012): May - 2012 CLASSIFICATION AND COMPARATIVE STUDY OF DATA MINING CLASSIFIERS WITH FEATURE SELECTION ON BIONOMIAL DATA SET Abstract   PDF2
Pushpalata Pujari
 
Vol 6, No 11 (2015): November 2015 CLINICAL AND GENOMIC STRATEGIES FOR DETECTING HEPATOCELLULAR CARCINOMA IN EARLY STAGES: A SYSTEMATIC REVIEW Abstract   PDF
Esraa M. Hashem, Mai S. Mabrouk, Ayman M. Eldeib
 
Vol 3, No 10 (2012): October 2012 CLOCKING STRATEGIES IN HIGH SPEED I/O USING PLL Abstract   PDF2
Namita Jain
 
July-2011 Cloud Computing Abstract   PDF
Rahul Pareek
 
Vol 4, No 3 (2013): March-2013 CLOUD COMPUTING AND SOCIAL NETWORKS: A COMPARISON STUDY OF MYSPACE AND FACEBOOK Abstract   pdf2
Priyanka Dudi
 
Vol 5, No 9 (2014): September-2014 Cloud Computing Issues for Real Time OS Abstract   PDF2
Ashish Ramdasi
 
176 - 200 of 637 Items << < 3 4 5 6 7 8 9 10 11 12 > >>