|
Issue |
Title |
|
Vol 14, No 1 (2014): July 2014 |
Node Monitoring with Fellowship Model against Black Hole Attacks in MANET |
Abstract
PDF
|
Rutuja Shaileshkumar Shah |
|
Vol 15, No 3 (2015): May 2015 |
Novel Friendship Recommendation Based on Social Behavior Correlation |
Abstract
PDF
|
Dhananjaya G. M., Mushtaq Ahmed D. M., Sachin C. Raykar |
|
Vol 5, No 1 (2013): September 2013 |
Novel Image Fusion Techniques using DCT |
Abstract
PDF
|
VPS Naidu |
|
Vol 16, No 1 (2016): January-June 2016 |
Onto Tagger: Ontology Focused Image Tagging System Incorporating Semantic Deviation Computing and Strategic Set Expansion |
Abstract
PDF
|
Gerard Deepak, Sheeba J Priyadarshini |
|
Vol 3, No 1 (2013): July 2013 |
Ontology Based Multi-Viewed Approach For Requirments Engineering |
Abstract
PDF
|
Subha R, Palaniswami S. |
|
Vol 11, No 1 (2014): March 2014 |
Optimization of outsourcing ICT projects in public organizations; case study: Public center of Iranian ICT studies |
Abstract
PDF
|
Majid Nili Ahmadabadi, abbas bagheri, fariba abolghasemi |
|
Vol 14, No 2 (2014): September 2014 |
Optimized buffer control mechanism for wireless LAN mesh networks |
Abstract
PDF
|
varsha Anandani |
|
Vol 5, No 1 (2013): September 2013 |
Parallel Ensemble Techniques for Data Mining Application |
Abstract
PDF
|
Govindarajan Muthukumarasamy |
|
Vol 6, No 1 (2013): October 2013 |
Performance Evaluation of Sentiment Mining Classifiers on Balanced and Imbalanced Dataset |
Abstract
PDF
|
vinodhini G, Chandrasekaran RM |
|
Vol 7, No 1 (2013): November 2013 |
Performance Evaluation of Web Services in C#, JAVA, and PHP |
Abstract
PDF
|
SANTHOSHKUMAR MOHAN |
|
Vol 7, No 1 (2013): November 2013 |
Performance of Biometric Palm Print Personal Identification Security System Using Ordinal Measures |
Abstract
PDF
|
Narendira kumar, Dr.B. Srinivasan |
|
Vol 6, No 1 (2013): October 2013 |
Personalizing Education News Articles Using Interest Term and Category Based Recommender Approaches |
Abstract
PDF
|
Akhilan Subramanian |
|
Vol 12, No 1 (2014): April 2014 |
Pixel Level Image Fusion: A Neuro-Fuzzy Approach |
Abstract
PDF
|
VPS Naidu |
|
Vol 8, No 1 (2013): December 2013 |
Pragmatic Approach to Component Based Software Metrics Based On Static Methods |
Abstract
PDF
|
M. Poo vizhi, S. Sagaya Raj |
|
Vol 14, No 1 (2014): July 2014 |
Present a way to Find Frequent Tree Patterns Using Inverted Index |
Abstract
PDF
|
Saeid Tajedi, Hasan Naderi |
|
Vol 14, No 2 (2014): September 2014 |
Presentation of Fuzzy Model to Compute the Edge Betweenness Centrality in Social Networks |
Abstract
PDF
|
noushin saed90 |
|
Vol 13, No 1 (2014): May 2014 |
Progression of String Matching Practices in Web Mining – A Survey |
Abstract
PDF
|
KALADEVI A.C, NIVETHA S.M |
|
Vol 5, No 1 (2013): September 2013 |
Prospects of Thermal Management Techniques in Computer Architecture |
Abstract
PDF
|
Chigozirim Ajaegbu, A.S Sodiya, Shade Kuroyo |
|
Vol 11, No 1 (2014): March 2014 |
QUALITY PLATFORMS FOR INNOVATION AND BREAKTHROUGH |
Abstract
PDF
|
HIMA GUPTA |
|
Vol 15, No 3 (2015): May 2015 |
Quantitative Aspects of Knowledge: KNOWLEDGE POTENTIAL AND UTILITY |
Abstract
PDF
|
Syed Ahamed |
|
Vol 16, No 2 (2016): July-December 2016 |
Risk assessment in constructing Horseshoe Vault Tunnels using fuzzy technique |
Abstract
PDF
|
Erfan Shafaghat, Mostafa yousefi rad |
|
Vol 16, No 2 (2016): July-December 2016 |
Scalable Rough C-Means clustering using Firefly algorithm |
Abstract
PDF
|
Balakrushna Tripathy, Abhilash Namdev |
|
Vol 8, No 1 (2013): December 2013 |
SDI SYSTEM WITH SCALABLE FILTERING OF XML DOCUMENTS FOR MOBILE CLIENTS |
Abstract
PDF
|
Yi Yi Myint |
|
Vol 2, No 1 (2013): June 2013 |
Secured and Energy based QoS routing in MANETs |
Abstract
PDF
|
Sridhar Subramaniam, R. Baskaran |
|
Vol 3, No 1 (2013): July 2013 |
Security and Privacy in E-Passport scheme using Authentication Protocols and Multiple Biometrics Technology |
Abstract
PDF
|
Narendira kumar, Srinivasan B |
|
126 - 150 of 178 Items |
<< < 1 2 3 4 5 6 7 8 > >> |