|
Issue |
Title |
|
Vol 7, No 1 (2013): November 2013 |
Semi-automated Polyhouse Cultivation using LabVIEW |
Abstract
PDF
|
Prathiba Jonnala |
|
Vol 16, No 2 (2016): July-December 2016 |
Significance of Embedded Systems to IoT |
Abstract
PDF
|
R. S. M. Lakshmi Patibandla, P. Lakshmi Narayanamma, K. Santhi Sri |
|
Vol 12, No 1 (2014): April 2014 |
Simultaneous use of CPU and GPU to real time inverted index updating in Microblogs |
Abstract
PDF
|
sajad bolhasani |
|
Vol 10, No 1 (2014): February 2014 |
Software Architectural Pattern- Model View Controller to improve the Cost,Performance and Reliability of an Business Application |
Abstract
PDF
|
Manjula Srihari Gurigallu |
|
Vol 11, No 1 (2014): March 2014 |
Study of satisfaction assessment techniques for textual requirements |
Abstract
PDF
|
Divya K.S |
|
Vol 15, No 1 (2015): January 2015 |
Suggestions for Informational Influence on A Virtual Community |
Abstract
PDF
|
Zoriana Holub, R.V. Huminskyi, A. M. Peleshchyshyn |
|
Vol 12, No 1 (2014): April 2014 |
SURVEY ON BICLUSTERING AND ITS APPLICATIONS |
Abstract
PDF
|
K. SATHISHKUMAR, Dr.V. THIAGARASU, M. RAMALINGAM |
|
Vol 11, No 1 (2014): March 2014 |
Survey on MAC protocols for heterogenous traffic in Wirelass sensor networks |
Abstract
PDF
|
Sridevi S, Priyadharshini Ramesh kumar, Usha M |
|
Vol 14, No 1 (2014): July 2014 |
Symmetric Image Encryption Algorithm using 3D Rossler System |
Abstract
PDF
|
Vishnu Kamat, Madhu Sharma |
|
Vol 15, No 5 (2015): September 2015 |
Synthetic Vision Systems – Terrain Database, Symbology and Display Requirements |
Abstract
PDF
|
Srikanth PrahladaRao Kudlgi, Abhay Pashilkar |
|
Vol 17, No 1 (2017): January-June 2017 |
Systematic Review of Persuasive Health Technology Design and Evaluation Models |
Abstract
PDF
|
Funmilayo Kasali, Kuyoro Afolashade, Awodele Oludele |
|
Vol 14, No 3 (2014): November 2014 |
The Comparative Analysis of Power Optimization in Clustered Sleep Transistors |
Abstract
PDF
|
KRANTHI Y, M. Divya Sree, Vijaya Vardhan Kancharla |
|
Vol 4, No 1 (2013): August 2013 |
The Computer-Linguistic Analysis of Socio-Demographic Profile of Virtual Community Member |
Abstract
PDF
|
Solomia Fedushko, Yuriy Syerov, Andriy Peleschyshyn |
|
Vol 13, No 1 (2014): May 2014 |
The Energy Efficient Multi Hop Clutering Process for Data Transmission in Mobile Sensor Netork |
Abstract
PDF
|
shunmuga sundaram |
|
Vol 9, No 1 (2014): January 2014 |
The Significance of Genetic Algorithms in Search, Evolution, Optimization and Hybridization: A Short Review |
Abstract
PDF
|
Kunjal Bharatkumar Mankad |
|
Vol 15, No 6 (2015): November 2015 |
The Socio-Economic Impact of Identity Thefts and Cybercrime: Preventive Measures and Solutions |
Abstract
PDF
|
Nabie Y Conteh, Quinnesha Staton |
|
Vol 4, No 1 (2013): August 2013 |
Three Tank System Control Using Neuro - Fuzzy Model Predictive Control |
Abstract
PDF
|
Adel Abdulgalil Hazaa Abdulrahman |
|
Vol 13, No 1 (2014): May 2014 |
TRACING THE ADVERSARIES USING PACKET MARKING AND PACKET LOGGING |
Abstract
PDF
|
santhosh cool |
|
Vol 2, No 1 (2013): June 2013 |
Unstructured Data Integration Through Automata-Driven Information Extraction |
Abstract
PDF
|
Maroun Abi Assaf, Kablan Barbar, Youakim Badr, Mahmoud Rammal |
|
Vol 2, No 1 (2013): June 2013 |
Upcoming trends of Virtual Experiments for Laboratories |
Abstract
PDF
|
Bhaskar Y. Kathane, Pradeep B. Dahikar, Satish J. Sharma |
|
Vol 1, No 1 (2013): May 2013 |
Use of Intelligent Business, a Method for Complete Fulfillment of E-government |
Abstract
PDF
|
Majid Nili Ahmadabadi, Masoud Najafi, Peyman Gholami |
|
Vol 4, No 1 (2013): August 2013 |
Using Analytic Hierarchy Process (AHP) to Select and Rank a Strategy Based Technology |
Abstract
PDF
|
Majid Nili Ahmadabadi, Masoud Najafi, Peyman Gholami, Payam Gholami |
|
Vol 16, No 1 (2016): January-June 2016 |
Various Common Control Channel Assignment Schemes in CRNs: A Survey |
Abstract
PDF
|
Jagsir Singh, Inderdeep Kaur Aulakh, Roopali Garg |
|
Vol 13, No 1 (2014): May 2014 |
VIRTUALIZING THE INTER COMMUNICATION OF CLOUDS |
Abstract
PDF
|
subho roy chowdhury, Sambit Kumar Patel, Usha G Devi, Ankita Vinod Mandekar |
|
Vol 15, No 1 (2015): January 2015 |
VoIP Security: Improving Quality of Service through the Analysis of Secured Transmission |
Abstract
PDF
|
Uchenna Peter Daniel Ani |
|
151 - 175 of 178 Items |
<< < 2 3 4 5 6 7 8 > >> |