|
Issue |
Title |
|
Vol 3, No 1 (2012) |
Application of Portfolio Using Fuzzy Logic |
Abstract
|
Pravin S. Metkewar, Trupti M. Hake |
|
Vol 4, No 2 (2013) |
Applications of Depth-First Search |
Abstract
|
Gaurav Rathi, Shivani Goel |
|
Vol 5, No 1 (2014) |
Artificial Neural Network Model for Stock Market Forecasting |
Abstract
|
Neelima Budhani, C. K. Jha, Sandeep K. Budhani |
|
Vol 7, No 1 (2016) |
Authentication Authorization and Auditing for Regenerating Encrypted Information in Cloud Computing |
Abstract
|
Sandeep Dhamal, Mahesh Waghmare, Rohan Patil, Datta Bhujbal, G S Mate |
|
Vol 7, No 3 (2016) |
Authentication Scheme using Matrix |
Abstract
|
Vishal Chahar, Vishal Bharti, Amar Saraswat, Chain Singh |
|
Vol 6, No 3 (2015) |
Background Service QoS in Integrated UMTS-HSDPA and WLAN Ad Hoc Networks with Various Inter-Domain Routing Protocols |
Abstract
|
Tripathi S, Jain AK |
|
Vol 3, No 1 (2012) |
Cascade of Gait Recognition with Surveillance System in a Client-Server Environment |
Abstract
|
Nageshwar Rao, Mohammed Irfan, Mohamed Samiulla Khan, Asadulla Khan |
|
Vol 4, No 1 (2013) |
Challenges in Individual Representation of GP Classification |
Abstract
|
Venkatadri M., Hanumat Sastry G, Dr. Lokanatha C. Reddy |
|
Vol 3, No 1 (2012) |
Classification of Pattern using Spline Function and Statistical Data Mining: Review Paper |
Abstract
|
Prachi Deepak Junwale, Archana W. Bhade, Prashant N. Chatur |
|
Vol 5, No 3 (2014) |
Clustering the Data in Search Engines |
Abstract
|
Hamid Behrangi, Hossein Ahmadi |
|
Vol 3, No 2 (2012) |
Comparative Analysis of Session Hijacking on Different Operating Systems |
Abstract
|
Mohit Raj, Maninder Singh |
|
Vol 3, No 3 (2012) |
Comparative Parallel Computational Performance Study Using OpenMP |
Abstract
|
Hong Hu |
|
Vol 7, No 2 (2016) |
Comparative Performance Analysis of AODV, DSDV and ZRP under Various Network Density and Traffic in MANETs |
Abstract
|
Sumit Kumar, Dapinder Kaur, Meenu Talwar |
|
Vol 7, No 1 (2016) |
Computer Aid for Stability Testing Between Parts towards Automatic Assembly Sequence Generation |
Abstract
|
M V A Raju Bahubalendruni, Bibhuti Bhusan Biswal |
|
Vol 6, No 3 (2015) |
Concept of Trees: Using Data Structures |
Abstract
|
Leetasha Maheshwari |
|
Vol 4, No 3 (2013) |
Conservative PDES on Multicore Computer and Its Performance Analysis |
Abstract
|
Manzoor Ghulam Ahmed, Shirish V. Pattalwar, V. M. Thakare |
|
Vol 6, No 1 (2015) |
Continuous Location-based Spatial Queries using a Proxy-based Approach |
Abstract
|
Malatesh M., Kedarnath Biradar |
|
Vol 3, No 1 (2012) |
Cryptanalysis of Modified STPKE’ Protocol |
Abstract
|
H.K. Pathak, Manju Sanghi |
|
Vol 6, No 1 (2015) |
CTCHFA – Discovery of Circulating Tumor Cells in Metastatic Breast Cancer and Nonmetastatic Cancer by Using Novel Hybrid Hierarchical Clustering Algorithm in Firefly Distance |
Abstract
|
S. Mythili, A. V. Senthil Kumar |
|
Vol 5, No 3 (2014) |
Customization of GIS Tools through Web-based Open Source GRASS Interface |
Abstract
|
Suman Sinha, Laxmi Kant Sharma, Saurabh Sharma |
|
Vol 2, No 2 (2011) |
Data Mining and Machine Learning in Security |
Abstract
|
Khulood Al Junaibi |
|
Vol 7, No 3 (2016) |
Data Security using Cloud Computing Adaption Framework |
Abstract
|
Safeeda ., Savitha C.K, Prajna M.R, Ujwal U.J |
|
Vol 6, No 2 (2015) |
Decision Fusion based Pair of Iris Recognition using Back-Propagation Learning Neural Network Algorithm |
Abstract
|
Md. Rabiul Islam |
|
Vol 4, No 1 (2013) |
Design and Development of Web based Fuzzy Expert System for Diseases Diagnosis in Horticulture Sector: A Case Study of Flower Rose |
Abstract
|
Arun Solanki, Ela Kumar |
|
Vol 8, No 2 (2017) |
Detection of Intrusion for Achieving Security in Mobile Ad Hoc Network |
Abstract
|
Hemlata Kaurav, Krishna Kumar Joshi |
|
26 - 50 of 110 Items |
<< < 1 2 3 4 5 > >> |