|
Issue |
Title |
|
Vol 6, No 1 (2015) |
CTCHFA: Discovery of Circulating Tumor Cells in Metastatic Breast Cancer and Nonmetastatic Cancer by using Novel Hybrid Hierarchical Clustering Algorithm in Firefly Distance |
Abstract
|
S. Mythili, A.V. Senthil Kumar |
|
Vol 5, No 3 (2014) |
Customization of GIS Tools through Web-based Open Source GRASS Interface |
Abstract
|
Suman Sinha, Laxmi Kant Sharma, Saurabh Sharma |
|
Vol 1, No 1-3 (2011) |
Data Mining and Machine Learning in Security |
Abstract
PDF
|
Khulood Al Junaibi |
|
Vol 7, No 3 (2016) |
Data Security using Cloud Computing Adaption Framework |
Abstract
|
Safeeda ., Savitha C. K., Prajna M. R., Ujwal U. J. |
|
Vol 6, No 2 (2015) |
Decision Fusion based Pair of Iris Recognition using Back-Propagation Learning Neural Network Algorithm |
Abstract
|
Md. Rabiul Islam |
|
Vol 4, No 1 (2013) |
Design and Development of Web based Fuzzy Expert System for Diseases Diagnosis in Horticulture Sector: A Case Study of Flower Rose |
Abstract
|
Arun Solanki, Ela Kumar |
|
Vol 14, No 2 (2023) |
Designing an Application for Community Assistance: WedsPay |
Abstract
|
Ashish Kumar, Atrij Dixit, Harsh Maheshwari, Utkarsh Sharma |
|
Vol 8, No 2 (2017) |
Detection of Intrusion for Achieving Security in Mobile Ad Hoc Network |
Abstract
|
Hemlata Kaurav, Krishna Kumar Joshi |
|
Vol 10, No 2 (2019) |
Digital Promoting in Indian Context |
Abstract
|
Rahul Mishra, Seema Mishra, Mira Gohil |
|
Vol 4, No 3 (2013) |
Digital Watermarking Schemes for Authorization of Color Images using DCT |
Abstract
|
Ashwani Kumar, Palvee Nayyar |
|
Vol 6, No 2 (2015) |
Dimensionality Reduction using Eigenfaces and Fisherfaces for Face Recognition Applications using Kernel LMS Algorithm |
Abstract
|
Raju Dara, Ch. Satyanarayana, A. Govardhan |
|
Vol 9, No 3 (2018) |
Edge computing: Applications, Challenges and Opportunities |
Abstract
|
Chetan J Jayaswal, Padmavathi Bindulal |
|
Vol 5, No 2 (2014) |
Efficient Information Retrieval based on Name and Aliases from the Web using Anchor Text Mining |
Abstract
|
Likhitha S. R., Veerappa B. N., Rafi M. |
|
Vol 14, No 3 (2023) |
Elevating Security in IoT Cloud Fusion: Challenges and Remedies |
Abstract
|
Ushaa Eswaran, Vivek Eswaran, Keerthna Murali, Vishal Eswaran |
|
Vol 5, No 2 (2014) |
Embedding and Extraction of Watermark in Digital Audio |
Abstract
|
Rahul Palaria, Sandeep Kumar Budhanni |
|
Vol 10, No 3 (2019) |
Emerging Techniques and Trends in DNA Cryptography |
Abstract
|
Shilpa George, Biji C.L., Achuthsankar S. Nair, Akhila Mathew |
|
Vol 7, No 3 (2016) |
Enabling Location Based Services with Route APIs for Efficient and Responsive Query Processing |
Abstract
|
Raju Dara, Kiran Kumar Chennugani |
|
Vol 5, No 1 (2014) |
End-to-End Data Security for Multi-Tenant Cloud Environment |
Abstract
|
Tushar Bhardwaj |
|
Vol 11, No 3 (2020) |
Enhancing Resolution of Artifact Image using AR-CNN and SRGAN |
Abstract
|
Swagato Das, Uttam Paul, S.M. Mohidul Islam |
|
Vol 14, No 3 (2023) |
Evaluation and Scientific Investigation: Stock Market Forecasting Techniques |
Abstract
|
Ananthi Sheshasaayee, Nivetha S. |
|
Vol 14, No 2 (2023) |
Evaluation of Write Sequence Reordering Based Buffer Replacement Algorithms for Flash Memory Based Systems |
Abstract
|
Arjun Singh Saud, Hari Sharan Bhatt |
|
Vol 5, No 2 (2014) |
E-Voting System: (A Tool for General Elections) |
Abstract
|
Amarjeet Singh, Ramakanth Kumar P. |
|
Vol 14, No 1 (2023) |
Examining the Crowd in Real-time with Deep Learning |
Abstract
|
Akhilesh Kushwaha, Pravin Kumavat |
|
Vol 10, No 3 (2019) |
Experiencing 3D regions through portal using Augmented Reality |
Abstract
|
Darsh Shah |
|
Vol 6, No 3 (2015) |
Face and Iris based Multimodal Person Identification using Likelihood Ratio Score Fusion Approach. |
Abstract
|
Md. Rabiul Islam, Md. Abdus Sobhan, Rizoan Toufiq |
|
76 - 100 of 217 Items |
<< < 1 2 3 4 5 6 7 8 9 > >> |