Browse Title Index


 
Issue Title
 
Vol 21, No 1 (2016) Scalable Packet Behaviour Based Firewall Vulnerability Analysis Tools Review Abstract
k. Indumathi
 
Vol 31, No 1 (2018) Scalable Pattern Architecture for Mobile Portal Abstract   PDF
Omogbhemhe Izah Mike, Iyafokhai Issac Uzoyalore
 
Vol 20, No 1 (2016) Scene Classification using Localized Histogram of Oriented Gradients Method Abstract
Md. Faisal Bin Abdul Aziz
 
Vol 14, No 1 (2014) Scheduling Mechanisms in Packet-Switching Networks Abstract
Miroslaw Robinson
 
Vol 4, No 1 (2011) Science and Technology in conflict with middle east Environmental Ethics Abstract
Akram abbass, Karam radi
 
Vol 6, No 1 (2012) Search engine coverage of open access collections Abstract
Raju Uma
 
Vol 25, No 1 (2017) Secure Data Sharing in Cloud Computing: A Comprehensive Review Abstract   PDF
Muthi Reddy P, Manjula S. H., Venugopal K. R.
 
Vol 6, No 1 (2012) Securing Web Applications and Databases against SQL Injection Attacks Abstract
Surepeddi Gowtham
 
Vol 16, No 1 (2015) Securing Authentication of TCP/IP Layer Abstract
Bharti Nagpal
 
Vol 26, No 1 (2017) Securing the IP Multimedia Subsystem with IPsec and HTTP Digest Abstract   PDF
Mohammed Ibrahim Omar, Dr. Cheruiyot W. Kipruto, Dr. Michael W. Kimwele
 
Vol 24, No 1 (2017) Security Analysis of Digital Signature Scheme with Message Recovery using Self-Certified Public Keys Abstract   PDF
Mahshid Sadeghpour
 
Vol 19, No 1 (2015) Security Enhancement System Based on the Integration of Cryptography and Steganography Abstract
Zin May Zaw, Su Wai Phyo
 
Vol 15, No 1 (2014) Security of Wireless Networks: A Brief Survey Abstract
Kate Jevtic
 
Vol 15, No 1 (2014) Security Requirements analysis method for Information Systems Abstract
Mick Schulz, Anders Petersen
 
Vol 5, No 1 (2012) Security Requirements analysis methods: How To Improve? Abstract
Mick Schulz, Anders Petersen
 
Vol 19, No 1 (2015) SEGMENTATION AND IDENTIFICATION OF SPECIAL OBJECT IN AN IMAGE Abstract
Rashmi Konda
 
Vol 28, No 1 (2018) Selecting the Honeywords from Existing User’s Passwords Using Improved Hashing and Salting Algorithm Abstract   PDF
Khin Su Myat Moe, Thanda Win
 
Vol 11, No 1 (2013) SEMANTIC CLUSTERING WITH CONTEXT ONTOLOGY FOR INFORMATION RETRIEVAL SYSTEM Abstract
thinn lai
 
Vol 14, No 1 (2014) Semantic Network to Formalize Learning Items from Books Abstract
Kuntida Sawakejun, Yongzhong GOU
 
Vol 6, No 1 (2012) Signature Verification Using Support vector machines Abstract
Schreiber Gunter
 
Vol 16, No 1 (2015) Simulation of Rank Correlation Based Detection Mechanism for Distributed Denial of Services Attacks Abstract
G. Rama Rao, Avinash Konduri, Venkat Narayana Rao
 
Vol 11, No 1 (2013) Simulation of Traction System for High-Speed Train Abstract
Sihui Mu
 
Vol 9, No 1 (2013) Skin Tone Based Secret Data Hiding in Images Using Wavelet Transform Abstract
JEEVAN KISHOR GANGEPOGU, Harini Vemula
 
Vol 19, No 1 (2015) SMART Framework for Integrating the Software Project Tasks and Software Change Requests Abstract
Maitanmi Olusola Stephen
 
Vol 19, No 1 (2015) Smart Secret Detection of Sensitive Data Leakage Abstract
Prajakta R.
 
Vol 20, No 1 (2016) Soccer Goalkeeper Task Plan Modeling and Analyzing Abstract
Azadeh Gawade
 
Vol 21, No 1 (2016) Software Quality Assurance in Network Security Using Advanced Cryptographic Techniques Abstract
Tarannam Zaffar
 
Vol 21, No 1 (2016) SOIL ANALYSIS & REPORTING Fast System Abstract
vipin yadav, Nizamud Din, Arif Iqbal Umar
 
Vol 14, No 1 (2014) Spatial Domain Robust Watermarking Scheme for Non Colored Images Abstract
Rajeshree Kulat
 
Vol 12, No 1 (2014) Speech Recognition System for Romanian Language Abstract
Hirsch Yalcinoz
 
Vol 13, No 1 (2014) Speed Control of an Automated Guided Vehicle Abstract
Austin Moore, Jordan Martin, Kevin Rodriguez
 
Vol 16, No 1 (2015) SQL Injection in SQL Server: An exploration of vulnerabilities Abstract
George Rouskas
 
Vol 21, No 1 (2016) State of the Art Computational Ternary Logic Currnent-Mode Circuits Based on CNTFET Technology Abstract
Mona Moradi
 
Vol 14, No 1 (2014) Static and Dynamic Algorithms for Regular Data Broadcasting Plans in Controled Wireless Mobile Environment Abstract
Fozia Khan, Anwar Shafaat
 
Vol 7, No 1 (2012) Statistical Pattern Recognition Abstract
Aron Borglund
 
Vol 31, No 1 (2018) Stereo Vision-Based Road Obstacles Detection and Tracking Abstract   PDF
Khalid zebbara
 
Vol 21, No 1 (2016) Stochastic Optimization for Routing Shortest Path in LAN Abstract
Sana ghazal
 
Vol 8, No 1 (2013) Strategies for Improving Quality of Education in Nigeria through the Use of Community Informatics Social E-Learning Network Abstract
Nicholas A. Esene, Simeon Ozuomba, Obinwa Christian Amaefule
 
Vol 14, No 1 (2014) Structural Analysis and Retargetable Netlist Generation using an Downstream Hardware Compiler Abstract
Narendra Devane, Kazuki Fujita
 
Vol 20, No 1 (2016) Success Factors for Building and Managing High Performance Agile Software Development Teams Abstract
Dan Schilling Nguyen, Ph.D
 
Vol 21, No 1 (2016) Supporting Confidentiality Protection in Advanced Web Search Abstract
M. Mozhi
 
Vol 20, No 1 (2016) Supporting Privacy Protection in Web Seacrh Abstract
Riaz Shah
 
Vol 3, No 1 (2011) Survey About Intrusion Detection System Abstract
Jacques Feldens
 
Vol 2, No 1 (2010) survey of various data mining classification techniques Abstract
Supriya Chak
 
Vol 18, No 1 (2015) Survey on Window and Linux as Server Operating System Abstract
Shahid Hussain, Faisal Bahadur, Faqir Gul, Arif Iqbal, Ghazala Ashraf, Sumat Nazeer
 
Vol 4, No 1 (2011) Survey: Distance Vector Routing Algorithms Abstract
Ahmad shahristani, Kabbori aslamani
 
Vol 26, No 1 (2017) Surveying Preschoolers’ Computer Use Capabilities Abstract   PDF
Michael Vitoulis
 
Vol 17, No 1 (2015) System Logs Analysis Using Association Rule Mining Abstract
yong Cheng
 
Vol 13, No 1 (2014) task allocation and scheduling in sensor networks Abstract
James Butler, Matthew Simmons
 
Vol 3, No 1 (2011) Task Planning based on Intelligence Algorithm Abstract
Peter Lamal
 
Vol 4, No 1 (2011) Text Categorization for French Language Abstract
Vetrivelan Pandu, Suneeta Dieter
 
Vol 4, No 1 (2011) Text Compression Using Encryption Abstract
Popescu Marius, Koladiya Vaghela, Miri Maeda
 
Vol 20, No 1 (2016) The Anatomy of a Small-Scale Hyper Textual Web Page Ranking Abstract
Deepika atulbhai yadav
 
Vol 12, No 1 (2014) The Dynamics of Implementing Software Engineering Projects Abstract
Isaac Nyabisa Oteyo, Gregory S. Namusonge, Joshua Mutua
 
Vol 13, No 1 (2014) The Economic Impact of Computer virus - A case of India Abstract
Andrea Baraldi
 
Vol 8, No 1 (2013) The Future Of Virtual Communities Abstract
Erik Larsson
 
Vol 8, No 1 (2013) The Hadoop Distributed File System Abstract
ANMOL KUMAR TAUNK, Amit Kumar Parmar, Rajesh Srivastav
 
Vol 9, No 1 (2013) The Impact of Virtual Simulations Abstract
Richard Khoury
 
Vol 10, No 1 (2013) The Increasing Costs Of Threats in Cyberspace Abstract
Daphne Duin
 
Vol 13, No 1 (2014) The Level of Usage of Computer and The Internet by Teenage Girls in Germany Abstract
Julia Weiss
 
Vol 29, No 1 (2018) The Need for Marker-Less Computer Vision Techniques for Human Gait Analysis on Video Surveillance to Detect Concealed Firearms Abstract   PDF
Henry Muchiri, Prof. Ismail Ateya, Prof. Gregory Wanyembi
 
Vol 20, No 1 (2016) The Rise in Cybercrime and the Dynamics of Exploiting the Human Vulnerability Factor Abstract
Dr. Nabie Y. Conteh, Malcolm D. Royer
 
Vol 17, No 1 (2015) The Role of Data Mining in Information Security Abstract
Osman Mohamed Abbas, Mohamed Elhafiz Mustafa, Siddig Balal Ibrahim
 
Vol 11, No 1 (2013) The Role Of GIS In Geology: Pros And Cons Abstract
Verma Vaghela
 
Vol 15, No 1 (2014) The Silo Effect of Information Technology on the Organizational Productivity: A Qualitative Research Study Abstract
Razak W. Abedalla
 
Vol 14, No 1 (2014) The Study of Behaviors and Effects of Internet Technology Focus on Online Game Exposure by Cairo High School Students Abstract
Sami Ahmad, Ab Rahman Halawani
 
Vol 22, No 1 (2016) The Unified Methodology for Application and Database Development UMADD (Using “abbCode” Framework) Abstract   PDF
Ahmed Fahmy
 
Vol 13, No 1 (2014) Threats of Internet Worms Abstract
Treveur Alexandre
 
Vol 17, No 1 (2015) Three-layered Framework for Network Troubleshooting Abstract
Verma Vikas, Hans uenther, Vasos Pavlika
 
Vol 29, No 1 (2018) To Improve the Probability of Detection in Spectrum Sensing by Using Equal Gain Combining Technique Abstract   PDF
K. Apurva, Mrs P Dhana Lakshmi
 
Vol 13, No 1 (2014) Toward A Cancer Risk Assessment System Abstract
Suneeta Dieter, Vetrivelan Pandu, Agarwal Beavzen
 
Vol 11, No 1 (2013) Toward On-Demand Distance Vector Routing Abstract
Ahmad shahristani, Kabbori aslamani
 
Vol 17, No 1 (2015) Toward The Creation Of An Automated Content-Based Image Query System Abstract
Moderato r Karola, Paolo Dillenburge
 
Vol 11, No 1 (2013) TRAB: A New Real-Time Applications Transport Protocol Abstract
Miroslaw McIlraith
 
Vol 6, No 1 (2012) Trilateral Filter for Image Restoration Abstract
Maria Beckenbauer, Steffen Engel, Lena Frankfurter
 
451 - 525 of 562 Items << < 1 2 3 4 5 6 7 8 > >>