Online Submission!

Browse Title Index


 
Issue Title
 
Vol 3, No 10 (2014): Volume-III, Issue-X 1157 SECURING DATA USING FULLY HOMOMORPHIC ENCRYPTION SCHEMES OVER CLOUD COMPUTING Abstract   PDF
V. Satish Kumar, V.Trilik Kumar
 
Vol 4, No 4 (2015): Volume-IV, Issue-IV 1670 ER-LOCK: NEXT GENERATION AUTO THEFT PREVENTION SYSTEM USING SMART GRAVITATIONAL LOCK VEHICLE TRACKING WITH GPS FENCING AND REMOTE FUEL CUT-OFF Abstract   PDF
S. Philomina, Shalini Sourav
 
Vol 8, No 5 (2019): Volume-8, Issue-5 5G TRANSIT CONNECTIONS Abstract   PDF
Ibraimov Rifat Rafikovich
 
Vol 7, No 8 (2018): Volume-07, Issue-08 A MODIFIED APPROACH OF VIDEO STEGANOGRAPHY FOR INFORMATION HIDING Abstract   PDF
Bhavna Gupta
 
Vol 8, No 5 (2019): Volume-8, Issue-5 A BI-TECHNICAL ANALYSIS FOR ARABIC STOP-WORDS DETECTION Abstract   PDF
Driss Namly, Karim Bouzoubaa, Abdellah Yousfi
 
Vol 3, No 10 (2014): Volume-III, Issue-X A COMPARATIVE ANALYSIS OF SOME HIGH PERFORMANCE COMPUTING TECHNOLOGIES Abstract   PDF
Minakshi Tripathy, C.R. Tripathy
 
Vol 3, No 4 (2014): Volume-III, Issue-IV A Comparative Study of Context-Based Information Refinding Abstract   PDF
A.P. Nivethith, D. KeranaHanirex, Dr.K.P. Kaliyamurthie
 
Vol 4, No 5 (2015): Volume-IV, Issue-V A COMPARATIVE STUDY OF FUZZY TECHNIQUES USED FOR HIGH RESOLUTION IMAGERY Abstract   PDF
N Thinaharan, Srimathi P
 
Vol 8, No 9 (2019): Volume-8, Issue-9 A COMPARATIVE STUDY OF MULTI-FOCUS, MULTI-RESOLUTION IMAGE FUSION TRANSFORMS AND METHODS Abstract   PDF
Mike Giansiracusa, Larry Pearlstein, Tyler Daws, Soundararajan Ezekiel, Abdullah Ali Alshehri
 
Vol 8, No 8 (2019): Volume-8, Issue-8 A COMPARATIVE STUDY OF THREE DECADAL LU/LC MAPS OF SABARMATI RIVER BASIN Abstract   PDF
Shibani Chourushi, Dr. Pradeep P. Lodha, Dr. Indra Prakash
 
Vol 2, No 4 (2013): Volume-II, Issue-IV A COMPARATIVE STUDY OF VARIOUS APPROACHES FOR DIALOGUE MANAGEMENT Abstract   PDF
Manzoor Ahmed, Romana Riyaz, Saduf Afzal
 
Vol 4, No 5 (2015): Volume-IV, Issue-V A COMPARATIVE STUDY OF VARIOUS IMAGE STEGANOGRAPHIC TECHNIQUES USED FOR INFORMATION HIDING Abstract   PDF
Samiksha k. Jichkar, Mahip M. Bartere
 
Vol 3, No 6 (2014): Volume-III, Issue-VI A Comparative Study on Resource Allocation Policies in Cloud Computing Environment Abstract   PDF
Bhavani B H, H S Guruprasad
 
Vol 3, No 8 (2014): Volume-III, Issue-VIII A COMPREHENSIVE STUDY ON VISUAL CRYPTOGRAPHY Abstract   PDF
Malyala Sravya Lakshmi, Gadi Lava Raju
 
Vol 2, No 3 (2013): Volume-II, Issue-III A Corruption less fee distribution system integrated with students attendances in Educational Institutions Abstract   PDF
V Janardhan Babu, T K Balaji, G Bala Gangadhara, P. Jayanthi
 
Vol 3, No 4 (2014): Volume-III, Issue-IV A Cost Effective Approach for Provisioning In Cloud Abstract   PDF
Manisha Ghorpade, Mangesh Wanjari
 
Vol 6, No 12 (2017): Volume-06, Issue-12 A Critical Research Analysis of Low-Energy Techniques for Instruction Memory Organisations in Embedded Systems Abstract   PDF
Prof.Dr.G.Manoj Someswar, A.Suman Kumar Reddy
 
Vol 6, No 12 (2017): Volume-06, Issue-12 A Critical Research Analysis on Low Power Very Large Scale Integrated Circuits in Real Time Systems Abstract   PDF
Prof.Dr.G.Manoj Someswar, B.Babu Rajesh
 
Vol 8, No 11 (2019): Volume-8, Issue-11 A DIGITAL IDENTITY SECURITY MODEL WITH SMART CARD AND PUBLIC KEY INFRASTRUCTURE Abstract   PDF
Ghizlane MOUKHLISS, Olaf MALASSE, RedaFilali Hilali, Hicham Belhadaoui
 
Vol 7, No 6 (2018): Volume-07, Issue-06 A DISTRIBUTED AIRLINE RESERVATION SYSTEM FOR NIGERIAN AIRLINE COMPANIES Abstract   PDF
Moses Adah Agana, Bassey Igbo Ele, Paul T Bukie
 
Vol 4, No 1 (2015): Volume-IV, Issue-I A FLANN and RBF with PSO Viewpoint to Identify a Model for Competent Forecasting Bombay Stock Exchange Abstract   PDF
Asif Perwej, Yusuf Perwej, Nikhat Akhtar, Firoj Parwej
 
Special Issue A FRAMEWORK FOR REAL-TIME STREAMING ANALYTICS USING MACHINE LEARNING APPROACH Abstract   PDF
D. Jayanthi, G. Sumathi
 
Vol 4, No 12 (2015): Volume-4, Issue-12 A Fundamental Implementations and Working Principles of Wireless Sensor Networks Abstract   PDF
P. J. Shriidhar, A. Senthil Kumar
 
Vol 2, No 6 (2013): Volume-II, Issue-VI A GENERALIZED VERSION OF PLAY FAIR CIPHER Abstract   PDF
Jitendra Choudhary, Ravindra Kumar Gupta, Shailendra Singh
 
Vol 2, No 3 (2013): Volume-II, Issue-III A Generic Evolution of Key Using Quantum Cryptography Management for Transcript Abstract   PDF
Basant Dhakad, Dharmendra Gwala, Manish Sharma, Vivek Shrivastava
 
1 - 25 of 679 Items 1 2 3 4 5 6 7 8 9 10 > >>