|
Issue |
Title |
|
Vol 7, No 2 (2016) |
Intelligent Document Scanner |
Abstract
|
Devi Devapal, Aravind M.P, Athul P, Pranav S. Chandran, Vishak K.K |
|
Vol 6, No 3 (2015) |
Java Applet |
Abstract
|
Deepesh bhutani |
|
Vol 7, No 2 (2016) |
MANET Security |
Abstract
|
Sukhjeet Singh, Sandeep Kaur |
|
Vol 6, No 2 (2015) |
Measurement of Program Outcomes Attainment for Engineering Graduates by using Neural Networks |
Abstract
|
Therese Yamuna Mahesh |
|
Vol 1, No 1 (2010) |
Nonlinear Channel Equaliser using Discrete Gabor Transform |
Abstract
|
Gunamani Jena |
|
Vol 3, No 3 (2012) |
Online Open Access E-Journals in LIS: An Analytical Study |
Abstract
|
Chauhan Kaushal |
|
Vol 3, No 2 (2012) |
Open E-Journals in Library and Information Science: An analysis of its facilities and Features |
Abstract
|
Kaushal chauhan, Rabindra Kumar Mahapatra |
|
Vol 2, No 2 (2011) |
Pedestrian Gait Parameter Measurement Using a Cascade of Edge and Corner Detection Technique |
Abstract
|
Md. Ekramul Hamid |
|
Vol 2, No 1 (2011) |
Performance Analysis & Speed Control of 3 Phase Induction Motor on 8 Bit Controller Platforms Using LabVIEW® |
Abstract
|
Abhishek Shukla, Harsh Panchal |
|
Vol 4, No 1 (2013) |
Performance Analysis of AODV, OLSR and GRP Routing Protocols in MANET |
Abstract
|
Naveen Bilandi, Harsh K. Verma |
|
Vol 7, No 1 (2016) |
Performance Evaluation of an Academician using Fuzzy Logic: Student’s Perspective |
Abstract
|
Jagmohan Mago, Dinesh Kumar |
|
Vol 4, No 3 (2013) |
Performance Evaluation of DSR, AODV, CGSR based on Average Energy Consumption: A Review |
Abstract
|
priyanka bansal, Jawahar Thakur |
|
Vol 5, No 3 (2014) |
Periodic Turing Machines |
Abstract
|
Mark Burgin |
|
Vol 8, No 1 (2017) |
Person Identification Using Iris, Facial Image and Fingerprint with the Combined Algorithm of Principle Component Analysis and Singular Value Decomposition |
Abstract
|
A K M Akhtar Hossain, Md. Rokanujjaman, S.K. Ahmed Kamal |
|
Vol 6, No 3 (2015) |
Perspectives of Cloud Computing Management: An Overview |
Abstract
|
Priyanka Chawla, Surbhi Jha, Ritica Saxena, Ishita Shakya |
|
Vol 6, No 1 (2015) |
Perturbed Quantum Computation of the Non-linear Dynamical System in Terms of Bose-Mesner Algebra Using N-Coupled Maps |
Abstract
|
Tuhin Datta |
|
Vol 3, No 1 (2012) |
Quality Function Deployment and Software Engineering – A Literature Review |
Abstract
|
Ashish Kailash Sharma, Prof. I. C. Mehta, Sangita A Sharma, Durgesh Sharma, Dr. P. M. Bapat |
|
Vol 7, No 1 (2016) |
Research Issues and Challenges in Wireless Sensor Networks: A Review |
Abstract
|
Amanjot Singh Toor, A K Jain |
|
Vol 5, No 2 (2014) |
Retrieval of Data from Hidden Web using Web Agent |
Abstract
|
Das N. N., Kumar E. |
|
Vol 7, No 2 (2016) |
Rotation Invariant Copy-Move Image Forgery Detection Using a Method Based on Fuzzy-Zernike Moments |
Abstract
|
Prabhjot Kaur, Khyati Marwaha |
|
Vol 7, No 2 (2016) |
Scalable Key Management System for Wireless Sensor Networks |
Abstract
|
C. Koteeswaran, G.V. Ramesh Babu, M. Padmavathamma |
|
Vol 4, No 3 (2013) |
Securing Cloud Computing Environment with the help of Fully Homomorphic Encryption |
Abstract
|
G. K. Patra, Nilotpal Chakraborty |
|
Vol 8, No 2 (2017) |
Server Based Operating System (OS) Research Direction for Future Smart World Using Internet of Things |
Abstract
|
Istiaque Ahmed, Md. Rokanujjaman, Abu Fuad Ahmad |
|
Vol 2, No 1 (2011) |
SOFTWARE-FAULT TOLERANCE WITH OOP APPROACH BY .NET |
Abstract
|
Jigna B Prajapati, Savan K. Patel, Dr. Satyen M. Parikh |
|
Vol 7, No 3 (2016) |
SQL DATABASE |
Abstract
|
Salomi S. Thomas, Samuel K. Thomas |
|
76 - 100 of 110 Items |
<< < 1 2 3 4 5 > >> |