|
Issue |
Title |
|
Vol 3, No 3 (2013) |
Iris Recognition System Using Principal Component Analysis based Back-Propagation Learning Neural Networks |
Abstract
|
Md. Rabiul Islam |
|
Vol 4, No 3 (2014) |
Knowledge Transfer among Paddy Farmers in Selangor, Malaysia |
Abstract
|
Dang Merduwati Hashim, Szarina Abdullah, Khairul Mizan Taib |
|
Vol 6, No 1 (2016) |
Library Resources and Collection Development: A Study |
Abstract
|
Rajaram K, S. Jeyachitra, B.S. Swaroop Rani |
|
Vol 6, No 2 (2016) |
Lossless and Reversible Data Hiding in Encrypted Images with Public Key Cryptography |
Abstract
|
Amrtha Anand.K, Dheena Kurien |
|
Vol 5, No 2 (2015) |
Marketing of Information in LIS |
Abstract
|
Rajaram K, S. Jeyachitra, B.S. Swaroop Rani |
|
Vol 2, No 2 (2012) |
Matnob - Multi Access To Network Oriented Browsers |
Abstract
|
Vanchhit Khare, Shashank Bhatnagar |
|
Vol 2, No 1 (2012) |
Metrics and Measures to Job Placement |
Abstract
|
Priyavrat Thareja, Abhishek Gupta, Manish Garg |
|
Vol 2, No 1 (2012) |
Modeling and Simulation of Autonomous Vehicle Management System using Fuzzy Theory |
Abstract
|
Sandhya Tarar |
|
Vol 5, No 2 (2015) |
Multi-Modal Iris and Retina Recognition System using Discrete Hidden Markov Model based Score Fusion Technique |
Abstract
|
Dr. Md. Rabiul Islam, Md. Fayzur Rahman |
|
Vol 1, No 1 (2011) |
Off-Line List Accessing Algorithms with Circular Doubly Linked List and Partial Cost Model |
Abstract
|
Himansu Sekhar Behera, Rakesh Mohanty |
|
Vol 6, No 1 (2016) |
Park Information System for Kolkata: A Low Cost Web Enabled Solution |
Abstract
|
Arati Paul, Debasish Chakraborty, Dibyendu Dutta, Prabir Kumar Das, Mallika Jalan, Siddharth Chettri, Nirpendra Shrestha, Shruti Menon |
|
Vol 4, No 1 (2014) |
Performance Analysis of Fusion Classifier of Face Recognition System based on ANN and GA |
Abstract
|
Rizoan Toufiq, Md. Rabiul Islam |
|
Vol 1, No 2 - 3 (2011) |
Performance Improvements in Thin Client Through Software Fault Tolerance |
Abstract
|
Jigna Bhupendra Prajapati, Dr. N. K. Modi |
|
Vol 3, No 3 (2013) |
Pervasive Computing Issues, Challenges and Applications |
Abstract
|
Lathies Bhasker T |
|
Vol 3, No 3 (2013) |
Power Consumption Reduction using Microarchitecture Techniques for Modern Multicore Microprocessors |
Abstract
|
Nikesh A. Shah, D. H. Ahir |
|
Vol 6, No 3 (2016) |
Protected Data Compilation in WSN Using Random Routing Algorithms |
Abstract
|
Raju Dara, Jellela Satish Reddy |
|
Vol 6, No 3 (2016) |
Public Auditing Based Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks |
Abstract
|
Raju Dara, Srikanth Ravula |
|
Vol 5, No 1 (2015) |
Quantitative Analysis of Static Load Balancing Algorithms in Cloud Computing Environment |
Abstract
|
Swati Katoch, Jawahar Thakur |
|
Vol 6, No 1 (2016) |
Real Time Analysis of Twitter Data |
Abstract
|
Rishu Chaudhary, Anurag Singhbaghel |
|
Vol 5, No 1 (2015) |
Reference Management Tools: A Comparative Study |
Abstract
|
Tawfeeq Nazir |
|
Vol 7, No 2 (2017) |
Remote Service Management System |
Abstract
|
Vinita Agarwal, Abhishek Gupta, Harshita Gupta, Lakshya Jain, Shivangi Gupta |
|
Vol 5, No 3 (2015) |
Research Methods in Library and Information Science |
Abstract
|
K Rajaram, S Jeyachitra, BS Swaroop Rani |
|
Vol 1, No 1 (2011) |
Risk and Precaution Measure on Mobile Phone Usage While Driving |
Abstract
|
Abdul Shabeer |
|
Vol 3, No 2 (2013) |
Rule based Normalization of Regular Expression |
Abstract
|
Jitender Khedar, Ajay Loura |
|
Vol 1, No 2 - 3 (2011) |
Sentiment Extraction and Analysis of Product Reviews at Sentence Level |
Abstract
|
Rajashree Shettar, Sashikanta Taorem |
|
51 - 75 of 86 Items |
<< < 1 2 3 4 > >> |