|
Issue |
Title |
|
Vol 5, No 1 (2014) |
A Case based Practical Approach for Novel Data Transformation to Enhance Accuracy of Decision Tree Ensembles |
Abstract
|
Sandeep Kumar Budhanni, Govind Singh |
|
Vol 12, No 1 (2021) |
A Deep Survey on Techniques Used to Recognize Locust Based on CNN |
Abstract
|
Aruna Devi, T. Rajasenbagam |
|
Vol 1, No 1-3 (2011) |
A New Method for Measuring Overall Reliability and Performance in Growing Computer Networks with Static and Variable Connections |
Abstract
PDF
|
Baijnath Kaushik, Dr. Navdeep Kaur, Dr. Amit Kumar Kohli |
|
Vol 1, No 1-3 (2011) |
A Noble Approach towards Development of e-Governance Applications |
Abstract
PDF
|
Ashis Kumar Mahapatra, Dr. Sukanta Kumar Sahoo |
|
Vol 8, No 2 (2017) |
A Novel Approach for Detection and Prevention of Malicious Nodes in Mobile Ad Hoc Network |
Abstract
|
Sonam Choubey, Krishna Kumar Joshi |
|
Vol 3, No 1 (2012) |
A Novel Approach for Enhancing Direct Hashing and Pruning for Association Rule Mining |
Abstract
|
K. Purna Chand, N. Krishnaiah, G. Uday Kiran, G. Narsimha |
|
Vol 9, No 3 (2018) |
A Novel Approach of Tesseract-OCR Usage for Newspaper Article Images |
Abstract
|
Chaitanya Tejaswi, Bhargav Goradiya |
|
Vol 1, No 1-3 (2011) |
A Novel Approach to Image Enhancement using FUZZY Set |
Abstract
PDF
|
Gunamani Jena, Prof. R Baliarsingh |
|
Vol 7, No 2 (2016) |
A Page Ranking Algorithm Based on Outbound links of a Page |
Abstract
|
Shivam Nagar, Arun Solanki |
|
Vol 8, No 3 (2017) |
A Personalized Mobile Search Engine Using Ontology |
Abstract
PDF
|
Sharayu D. Shende, Bhushan A. Deshpande |
|
Vol 5, No 3 (2014) |
A Practical Iterative Side Channel Cube Attack on AES-128/256 |
Abstract
|
Erfan Aghaee, Shahram Jamali, Majid Rahimi, Hamed Yusefi |
|
Vol 14, No 2 (2023) |
A Review on Neural Networks and its Applications |
Abstract
|
Shreyas D. K., Srivatsa N. Joshi, Vishwas H. Kumar, Vishaka Venkataramanan, Kaliprasad C. S. |
|
Vol 8, No 2 (2017) |
A Review on Trust Based Approach and Various Attacks in Mobile Ad Hoc Network |
Abstract
|
Shweta Kushwah, Neelam Joshi |
|
Vol 14, No 2 (2023) |
A Review Paper on Recent Cyberattacks and Proactive Steps to Prevent Attacks |
Abstract
|
Abubakar Osman, Zeeshan Malik |
|
Vol 6, No 3 (2015) |
A Review Paper on Security C++ |
Abstract
|
Vikash Kumar |
|
Vol 7, No 3 (2016) |
A Shareable Secure and Privacy Preserving Auditing Scheme for Cloud Storage Security |
Abstract
|
Raju Dara, Doddikousari Kumari |
|
Vol 9, No 2 (2018) |
A Study of The Components of State-of-The-Art Agro-Based Management Information Systems in India |
Abstract
|
Rajesh Kapur |
|
Vol 13, No 1 (2022) |
A Study on Computer Vision: Techniques, Algorithms and Application |
Abstract
|
Chaitanya Deshpande |
|
Vol 14, No 3 (2023) |
A Study on Data Science Analytics: Addressing Challenges, Exploring Open Research Issues: A Literature Centric Approach |
Abstract
|
Sohan Lal Gupta, Vikram Khandelwal, Nimish Arvind, Rajesh Kumar |
|
Vol 3, No 2 (2012) |
A Survey of Queuing and Scheduling Mechanism of Input-queued Switches |
Abstract
|
D. Raghupathikumar, Dr. K. BommannaRaja |
|
Vol 12, No 3 (2021) |
A Survey on Deep Learning based Detection of Abnormal Human Behaviour using Computer Vision Human Activity Recognition System |
Abstract
|
Partha Ghosh, Sayantan Roy, Sombit Bose, Avisek Mondal |
|
Vol 3, No 1 (2012) |
A Survey on Genetic Programming in Data Mining Tasks |
Abstract
|
Venkatadri. M, Hanumat G. Sastry, Lokanatha C. Reddy |
|
Vol 6, No 3 (2015) |
A Survey on Various Security Attacks in Mobile Ad-Hoc Network |
Abstract
|
Akansha Shrivastava, Ekta Chauhan |
|
Vol 3, No 3 (2012) |
A Transaction Pattern Generation Tool (TPGT) for Prediction of Online Financial Transactions |
Abstract
|
Jyotindra N. Dharwa, Ashok R. Patel |
|
Vol 1, No 1-3 (2011) |
A Web-Enabled Fuzzy Expert System Shell for Flower Rose |
Abstract
PDF
|
Arun Solanki, Ela Kumar |
|
1 - 25 of 217 Items |
1 2 3 4 5 6 7 8 9 > >> |