Browse Title Index


 
Issue Title
 
Vol 20, No 1 (2016) Optical character recognition for handwritten text Abstract
K. Mahalakshmi
 
Vol 12, No 1 (2014) Optimization of Speed using Compressors Abstract
Aashu Ghalyan, Virender Kadyan
 
Vol 15, No 1 (2014) Packet Switching Networks Traffic Prediction Using Neural Network Abstract
Indrzejczak Tomczyk, Jasmin Kacprzak
 
Vol 18, No 1 (2015) Pattern-Based Techniques in Reengineering Processes Abstract
Théophile Nagpal
 
Vol 10, No 1 (2013) peer-to-peer systems: Analysis And a Survey Abstract
Mendez Reyes
 
Vol 13, No 1 (2014) Performance Analysis and Verification of Multipliers Abstract
Aashu Ghalyan, Virender Kadyan
 
Vol 26, No 1 (2017) Performance Analysis of BAU Android Application using Firebase Analytics, ADT and Dalvik Tools Abstract   PDF
Md. Rakib Hassan
 
Vol 20, No 1 (2016) Performance Analysis of Three Transition Mechanisms between IPv6 Network and IPv4 Network: Dual Stack, Tunneling and Translation Abstract
Md. Asif Hossain, Durjoy Podder, Sarwar Jahan, Mustafa Hussain
 
Vol 13, No 1 (2014) Performance analysis of various data mining classification techniques on emergency room data Abstract
Supriya Chak
 
Vol 16, No 1 (2015) Performance Evaluation For Multimedia Database System Abstract
Raut Singh
 
Vol 9, No 1 (2013) Performance evaluation of Routing Protocols in Ad-hoc Network Abstract
Xiao Zhang, Ge Xiuquan, Li Guoqing
 
Vol 14, No 1 (2014) Performance Issues on K-Mean Partitioning Clustering Algorithm Abstract
chatti subbalakshmi, P. Venkateswara Rao, S Krishna Mohan Rao
 
Vol 14, No 1 (2014) Power and Performance Optimization for synchronized Circuits Abstract
Dagne Teshome
 
Vol 17, No 1 (2015) Prediction and Frequency Based Dynamic Thread Pool System Abstract
sajid Mehmood
 
Vol 19, No 1 (2015) Preventing Attacks by Malicious Nodes in Mobile Ad-hoc network Abstract
Kavita Nivedha
 
Vol 20, No 1 (2016) Proxy Promised Signcrypion Scheme Based on Elliptic Curve Crypto System Abstract
Insaf Ullah, Noor Ul Amin, Arif Iqbal Umar, Hizbullah khattak
 
Vol 20, No 1 (2016) Proxy Signcrypion Scheme Based on Hyper Elliptic Curves Abstract
Insaf Ullah, Inam Ul Haq, Noor Ul Amin, Arif Iqbal Umar, Hizbullah khattak
 
Vol 16, No 1 (2015) Quality Management System Implementation Barriers In Media Organizations In Iran Abstract
Ahmad shahristani, Kabbori aslamani
 
Vol 10, No 1 (2013) Quality Management System Implementation Barriers In Media Organizations In Pakistan and Iran Abstract
Ahmad shahristani, Kabbori aslamani
 
Vol 17, No 1 (2015) RAM: An Image Segmentation Method Abstract
Peter Lamal
 
Vol 17, No 1 (2015) Real-Time Applications Transport Protocols Abstract
Miroslaw McIlraith
 
Vol 5, No 1 (2012) Real-Time Detection Of Network Intruders: New Ideas Abstract
Mukesh kumar, Meena Harris, Khade Mane
 
Vol 13, No 1 (2014) Recognizing Human Activities from Sensors Using Hidden Markov Models Abstract
Ozgur pashak
 
Vol 15, No 1 (2014) Reduction of Real Power Loss by using Comprehensive Neighbourhood Algorithm Abstract
K. Lenin, Bhumanapally Ravindhranath Reddy
 
Vol 13, No 1 (2014) Redundancy Detection in Bi-lingual and Mono-lingual Corpora Abstract
Tobias Eiffel
 
Vol 21, No 1 (2016) Relative Review of Automated Testing Tools Abstract
Ayesha ghazal
 
Vol 15, No 1 (2014) Reliable Routing For Wireless Adhoc Network Abstract
Andrew Shalinie
 
Vol 24, No 1 (2017) Repositioning the Logistic Industry for Effective Service Delivery in Nigeria: A Case Study Abstract   PDF
Osang Francis Bukie
 
Vol 18, No 1 (2015) Resource management improvement in cloud computing Abstract
G. Jayasurya
 
Vol 24, No 1 (2017) Review Aspects of Using Social Annotation for Enhancing Search Engine Performance Abstract   PDF
Eman ElSayed, Abeer ElKorany, Akram salah, Hesham Hafny
 
Vol 14, No 1 (2014) Ring-Based Wireless Mesh Network Performance Evaluation Abstract
Bhupesh Kadam, Hilary Ngbea
 
Vol 7, No 1 (2012) Risk Analysis In Communication Outsourcing Abstract
Anselimo Peters
 
Vol 16, No 1 (2015) Risk Analysis Methods In Communication Outsourcing Abstract
Anselimo Peters
 
Vol 12, No 1 (2014) Risk-Assessment Methods for Cyber Attacks: A Survey Abstract
Tanja Garcia
 
Vol 7, No 1 (2012) Robust Algorithm For Mining Association Rules Abstract
Alireza Vedad, Gordor Podgornyy
 
Vol 18, No 1 (2015) ROBUST FACE-NAME GRAPH MATCHING FOR MOVIE FRAMES Abstract
Abha Ziółko
 
Vol 12, No 1 (2014) Routing Protocols in Ad-hoc Network: A Survey Abstract
Xiao Zhang, Ge Xiuquan, Li Guoqing
 
Vol 23, No 1 (2016) Satellite Image Classification Using Moment and SVD Method Abstract   PDF
Mohammed S. Mahdi Al-Taei, Assad H. Thary Al-Ghrairi
 
Vol 28, No 1 (2018) SBKMMA: Sorting Based K Means and Median Based Clustering Algorithm Using Multi Machine Technique for Big Data Abstract   PDF
E. Mahima Jane, Dr. E. George Dharma Prakash Raj
 
Vol 21, No 1 (2016) Scalable Packet Behaviour Based Firewall Vulnerability Analysis Tools Review Abstract
k. Indumathi
 
Vol 20, No 1 (2016) Scene Classification using Localized Histogram of Oriented Gradients Method Abstract
Md. Faisal Bin Abdul Aziz
 
Vol 14, No 1 (2014) Scheduling Mechanisms in Packet-Switching Networks Abstract
Miroslaw Robinson
 
Vol 4, No 1 (2011) Science and Technology in conflict with middle east Environmental Ethics Abstract
Akram abbass, Karam radi
 
Vol 6, No 1 (2012) Search engine coverage of open access collections Abstract
Raju Uma
 
Vol 25, No 1 (2017) Secure Data Sharing in Cloud Computing: A Comprehensive Review Abstract   PDF
Muthi Reddy P, Manjula S. H., Venugopal K. R.
 
Vol 6, No 1 (2012) Securing Web Applications and Databases against SQL Injection Attacks Abstract
Surepeddi Gowtham
 
Vol 16, No 1 (2015) Securing Authentication of TCP/IP Layer Abstract
Bharti Nagpal
 
Vol 26, No 1 (2017) Securing the IP Multimedia Subsystem with IPsec and HTTP Digest Abstract   PDF
Mohammed Ibrahim Omar, Dr. Cheruiyot W. Kipruto, Dr. Michael W. Kimwele
 
Vol 24, No 1 (2017) Security Analysis of Digital Signature Scheme with Message Recovery using Self-Certified Public Keys Abstract   PDF
Mahshid Sadeghpour
 
Vol 19, No 1 (2015) Security Enhancement System Based on the Integration of Cryptography and Steganography Abstract
Zin May Zaw, Su Wai Phyo
 
Vol 15, No 1 (2014) Security of Wireless Networks: A Brief Survey Abstract
Kate Jevtic
 
Vol 15, No 1 (2014) Security Requirements analysis method for Information Systems Abstract
Mick Schulz, Anders Petersen
 
Vol 5, No 1 (2012) Security Requirements analysis methods: How To Improve? Abstract
Mick Schulz, Anders Petersen
 
Vol 19, No 1 (2015) SEGMENTATION AND IDENTIFICATION OF SPECIAL OBJECT IN AN IMAGE Abstract
Rashmi Konda
 
Vol 11, No 1 (2013) SEMANTIC CLUSTERING WITH CONTEXT ONTOLOGY FOR INFORMATION RETRIEVAL SYSTEM Abstract
thinn lai
 
Vol 14, No 1 (2014) Semantic Network to Formalize Learning Items from Books Abstract
Kuntida Sawakejun, Yongzhong GOU
 
Vol 6, No 1 (2012) Signature Verification Using Support vector machines Abstract
Schreiber Gunter
 
Vol 16, No 1 (2015) Simulation of Rank Correlation Based Detection Mechanism for Distributed Denial of Services Attacks Abstract
G. Rama Rao, Avinash Konduri, Venkat Narayana Rao
 
Vol 11, No 1 (2013) Simulation of Traction System for High-Speed Train Abstract
Sihui Mu
 
Vol 9, No 1 (2013) Skin Tone Based Secret Data Hiding in Images Using Wavelet Transform Abstract
JEEVAN KISHOR GANGEPOGU, Harini Vemula
 
Vol 19, No 1 (2015) SMART Framework for Integrating the Software Project Tasks and Software Change Requests Abstract
Maitanmi Olusola Stephen
 
Vol 19, No 1 (2015) Smart Secret Detection of Sensitive Data Leakage Abstract
Prajakta R.
 
Vol 20, No 1 (2016) Soccer Goalkeeper Task Plan Modeling and Analyzing Abstract
Azadeh Gawade
 
Vol 21, No 1 (2016) Software Quality Assurance in Network Security Using Advanced Cryptographic Techniques Abstract
Tarannam Zaffar
 
Vol 21, No 1 (2016) SOIL ANALYSIS & REPORTING Fast System Abstract
vipin yadav, Nizamud Din, Arif Iqbal Umar
 
Vol 14, No 1 (2014) Spatial Domain Robust Watermarking Scheme for Non Colored Images Abstract
Rajeshree Kulat
 
Vol 12, No 1 (2014) Speech Recognition System for Romanian Language Abstract
Hirsch Yalcinoz
 
Vol 13, No 1 (2014) Speed Control of an Automated Guided Vehicle Abstract
Austin Moore, Jordan Martin, Kevin Rodriguez
 
Vol 16, No 1 (2015) SQL Injection in SQL Server: An exploration of vulnerabilities Abstract
George Rouskas
 
Vol 21, No 1 (2016) State of the Art Computational Ternary Logic Currnent-Mode Circuits Based on CNTFET Technology Abstract
Mona Moradi
 
Vol 14, No 1 (2014) Static and Dynamic Algorithms for Regular Data Broadcasting Plans in Controled Wireless Mobile Environment Abstract
Fozia Khan, Anwar Shafaat
 
Vol 7, No 1 (2012) Statistical Pattern Recognition Abstract
Aron Borglund
 
Vol 21, No 1 (2016) Stochastic Optimization for Routing Shortest Path in LAN Abstract
Sana ghazal
 
Vol 8, No 1 (2013) Strategies for Improving Quality of Education in Nigeria through the Use of Community Informatics Social E-Learning Network Abstract
Nicholas A. Esene, Simeon Ozuomba, Obinwa Christian Amaefule
 
Vol 14, No 1 (2014) Structural Analysis and Retargetable Netlist Generation using an Downstream Hardware Compiler Abstract
Narendra Devane, Kazuki Fujita
 
376 - 450 of 519 Items << < 1 2 3 4 5 6 7 > >>