Browse Title Index


 
Issue Title
 
Vol 1, No 1 (2009) new data fusion method in peer-to-peer systems Abstract
Mendez Reyes
 
Vol 6, No 1 (2012) New Design for intrusion detection systems Abstract
Sudha Monica
 
Vol 4, No 1 (2011) New Email Spam Classifier using Data Mining Technique Abstract
Agarwal Beaven, Iwasokun Gabriel
 
Vol 12, No 1 (2014) New Expert System for Spam Detection Abstract
Genya Coffey
 
Vol 7, No 1 (2012) New Intelligent Computer Intrusion Detection Method Abstract
Chrysanthi Lioliou
 
Vol 17, No 1 (2015) New Intrusion Detection System Using Genetic Algorithm Abstract
Martin Brunner
 
Vol 17, No 1 (2015) New Intrusion Detection System Using Immune Ideas Abstract
Martin Brunner
 
Vol 12, No 1 (2014) New Layered Framework For Intrusion Detection System Abstract
Jacques Feldens
 
Vol 27, No 1 (2017) New Media and Privacy the Privacy Paradox in the Digital World: I Will Not Disclose My Data. Actually, I Will ... It Depends Abstract   PDF
Andrea Carignani, Vanessa Gemmo
 
Vol 14, No 1 (2014) New Multiple Description Scalable Coding Implementation for Video Transmission over Unreliable Networks Abstract
Pushpa Memon
 
Vol 11, No 1 (2013) New Multiple Hand Gesture Recognition System Abstract
Anupam Agrawal
 
Vol 11, No 1 (2013) New Protection idea for Wireless Sensor Networks from Internal Attacks Abstract
Athénaïs Roux, Eya Bertrand
 
Vol 21, No 1 (2016) New Security System Based on Linear Equations Abstract
Madhura Hegde
 
Vol 11, No 1 (2013) New Security System for Critical Computers Abstract
Avgoustos Dieter
 
Vol 4, No 1 (2011) New Spectral Clustering Algorithm Abstract
Léonard Petit
 
Vol 17, No 1 (2015) New technique for load balancing in public cloud. Abstract
Z. Nivedha
 
Vol 10, No 1 (2013) New Tfidf Algorithm For Text Categorization Abstract
Schreiber Gunter
 
Vol 19, No 1 (2015) New Tree Implementation In Bank Transactional Databases Abstract
Amandeep SONI
 
Vol 17, No 1 (2015) New WCDMA System for Different Modulations with Equal Gain Combining Scheme Abstract
A. V. Srinivas
 
Vol 18, No 1 (2015) Noise Reduction for Automatic Gridding of Microarray Images Abstract
Tanja Goldschmidt
 
Vol 7, No 1 (2012) Novel Term-Weighting Approach In Automatic Text Retrieval Abstract
Pan Belaton
 
Vol 16, No 1 (2015) Object Tracking in Surveillance Application Abstract
Romain Blanchard
 
Vol 13, No 1 (2014) Online counseling Abstract
Julia Watson
 
Vol 2, No 1 (2010) Online customer loyalty improvement Abstract
Vinita Hansen
 
Vol 2, No 1 (2010) Online Test Analysis using Data Mining Abstract
Miroslaw McIlraith
 
Vol 6, No 1 (2012) Ontology Based E-Learning Systems in the Semantic Web Abstract
raji rajagopal, S Baskaran
 
Vol 22, No 1 (2016) Ontology for Task and Quality Management in Crowdsourcing Abstract   PDF
Reham Alabduljabbar, Hmood Al-Dossari
 
Vol 6, No 1 (2012) Open access and institutional repositories in Pakistan Abstract
Lim Chen
 
Vol 6, No 1 (2012) Open access movement in turkey Abstract
Zheng Bahari
 
Vol 11, No 1 (2013) Open, Flexible and Distributed e-Learning Environments Abstract
Sola Stephen Maitanmi, Adio Adesina Kamorudeen, Adekunle Yiinka, Gregory Onwodi
 
Vol 25, No 1 (2017) Opinion Mining Using Twitter Feeds for Political Analysis Abstract   PDF
Manogna Meduru, Antara Mahimkar, Krishna Subramanian, Puja Y. Padiya, Prathmesh N. Gunjgur
 
Vol 20, No 1 (2016) Optical character recognition for handwritten text Abstract
K. Mahalakshmi
 
Vol 12, No 1 (2014) Optimization of Speed using Compressors Abstract
Aashu Ghalyan, Virender Kadyan
 
Vol 15, No 1 (2014) Packet Switching Networks Traffic Prediction Using Neural Network Abstract
Indrzejczak Tomczyk, Jasmin Kacprzak
 
Vol 18, No 1 (2015) Pattern-Based Techniques in Reengineering Processes Abstract
Théophile Nagpal
 
Vol 10, No 1 (2013) peer-to-peer systems: Analysis And a Survey Abstract
Mendez Reyes
 
Vol 13, No 1 (2014) Performance Analysis and Verification of Multipliers Abstract
Aashu Ghalyan, Virender Kadyan
 
Vol 26, No 1 (2017) Performance Analysis of BAU Android Application using Firebase Analytics, ADT and Dalvik Tools Abstract   PDF
Md. Rakib Hassan
 
Vol 20, No 1 (2016) Performance Analysis of Three Transition Mechanisms between IPv6 Network and IPv4 Network: Dual Stack, Tunneling and Translation Abstract
Md. Asif Hossain, Durjoy Podder, Sarwar Jahan, Mustafa Hussain
 
Vol 13, No 1 (2014) Performance analysis of various data mining classification techniques on emergency room data Abstract
Supriya Chak
 
Vol 29, No 1 (2018) Performance and Security of Group Signature in Wireless Networks Abstract   PDF
Joshua J. Tom, Prof Boniface. K. Alese, Dr. Aderonke F. Thompson, Dr. Nlerum P. Anebo
 
Vol 16, No 1 (2015) Performance Evaluation For Multimedia Database System Abstract
Raut Singh
 
Vol 9, No 1 (2013) Performance evaluation of Routing Protocols in Ad-hoc Network Abstract
Xiao Zhang, Ge Xiuquan, Li Guoqing
 
Vol 14, No 1 (2014) Performance Issues on K-Mean Partitioning Clustering Algorithm Abstract
chatti subbalakshmi, P. Venkateswara Rao, S Krishna Mohan Rao
 
Vol 14, No 1 (2014) Power and Performance Optimization for synchronized Circuits Abstract
Dagne Teshome
 
Vol 28, No 1 (2018) Predicting Students' Degree Completion Using Decision Trees Abstract   PDF
Josan Dionisio Tamayo, MIT. Nilo V Francisco, Ph. D. Mary Eujene P Malonzo, Abigail P Bugay
 
Vol 17, No 1 (2015) Prediction and Frequency Based Dynamic Thread Pool System Abstract
sajid Mehmood
 
Vol 19, No 1 (2015) Preventing Attacks by Malicious Nodes in Mobile Ad-hoc network Abstract
Kavita Nivedha
 
Vol 20, No 1 (2016) Proxy Promised Signcrypion Scheme Based on Elliptic Curve Crypto System Abstract
Insaf Ullah, Noor Ul Amin, Arif Iqbal Umar, Hizbullah khattak
 
Vol 20, No 1 (2016) Proxy Signcrypion Scheme Based on Hyper Elliptic Curves Abstract
Insaf Ullah, Inam Ul Haq, Noor Ul Amin, Arif Iqbal Umar, Hizbullah khattak
 
Vol 16, No 1 (2015) Quality Management System Implementation Barriers In Media Organizations In Iran Abstract
Ahmad shahristani, Kabbori aslamani
 
Vol 10, No 1 (2013) Quality Management System Implementation Barriers In Media Organizations In Pakistan and Iran Abstract
Ahmad shahristani, Kabbori aslamani
 
Vol 17, No 1 (2015) RAM: An Image Segmentation Method Abstract
Peter Lamal
 
Vol 17, No 1 (2015) Real-Time Applications Transport Protocols Abstract
Miroslaw McIlraith
 
Vol 5, No 1 (2012) Real-Time Detection Of Network Intruders: New Ideas Abstract
Mukesh kumar, Meena Harris, Khade Mane
 
Vol 13, No 1 (2014) Recognizing Human Activities from Sensors Using Hidden Markov Models Abstract
Ozgur pashak
 
Vol 30, No 1 (2018) Reducing Complexity of Java Source Codes in Structural Testing by Using Program Slicing Abstract   PDF
Myint Myitzu Aung, Kay Thi Win
 
Vol 15, No 1 (2014) Reduction of Real Power Loss by using Comprehensive Neighbourhood Algorithm Abstract
K. Lenin, Bhumanapally Ravindhranath Reddy
 
Vol 13, No 1 (2014) Redundancy Detection in Bi-lingual and Mono-lingual Corpora Abstract
Tobias Eiffel
 
Vol 30, No 1 (2018) Reframing in Clustering: An Introductory Survey Abstract   PDF
Md. Geaur Rahman
 
Vol 21, No 1 (2016) Relative Review of Automated Testing Tools Abstract
Ayesha ghazal
 
Vol 15, No 1 (2014) Reliable Routing For Wireless Adhoc Network Abstract
Andrew Shalinie
 
Vol 24, No 1 (2017) Repositioning the Logistic Industry for Effective Service Delivery in Nigeria: A Case Study Abstract   PDF
Osang Francis Bukie
 
Vol 18, No 1 (2015) Resource management improvement in cloud computing Abstract
G. Jayasurya
 
Vol 30, No 1 (2018) Responding to and Preventing Threats to Cybersecurity When Utilizing the Internet of Things Abstract   PDF
Jaipratap Singh Grewal
 
Vol 24, No 1 (2017) Review Aspects of Using Social Annotation for Enhancing Search Engine Performance Abstract   PDF
Eman ElSayed, Abeer ElKorany, Akram salah, Hesham Hafny
 
Vol 14, No 1 (2014) Ring-Based Wireless Mesh Network Performance Evaluation Abstract
Bhupesh Kadam, Hilary Ngbea
 
Vol 7, No 1 (2012) Risk Analysis In Communication Outsourcing Abstract
Anselimo Peters
 
Vol 16, No 1 (2015) Risk Analysis Methods In Communication Outsourcing Abstract
Anselimo Peters
 
Vol 12, No 1 (2014) Risk-Assessment Methods for Cyber Attacks: A Survey Abstract
Tanja Garcia
 
Vol 7, No 1 (2012) Robust Algorithm For Mining Association Rules Abstract
Alireza Vedad, Gordor Podgornyy
 
Vol 18, No 1 (2015) ROBUST FACE-NAME GRAPH MATCHING FOR MOVIE FRAMES Abstract
Abha Ziółko
 
Vol 12, No 1 (2014) Routing Protocols in Ad-hoc Network: A Survey Abstract
Xiao Zhang, Ge Xiuquan, Li Guoqing
 
Vol 23, No 1 (2016) Satellite Image Classification Using Moment and SVD Method Abstract   PDF
Mohammed S. Mahdi Al-Taei, Assad H. Thary Al-Ghrairi
 
Vol 28, No 1 (2018) SBKMMA: Sorting Based K Means and Median Based Clustering Algorithm Using Multi Machine Technique for Big Data Abstract   PDF
E. Mahima Jane, Dr. E. George Dharma Prakash Raj
 
376 - 450 of 562 Items << < 1 2 3 4 5 6 7 8 > >>