|
Issue |
Title |
|
Vol 5, No 3 (2017) |
A Review on AODV Protocol and Various Attacks in Mobile Ad Hoc Network |
Abstract
|
Saurabh Garg, Krishna Kumar Joshi |
|
Vol 6, No 3 (2018) |
A Study on Energy Efficient Coverage Aware Clustering Protocols in Wireless Sensor Networks |
Abstract
|
Amandeep Kaur Sohal, A. K. Sharma, N. Sood |
|
Vol 6, No 1 (2018) |
A Survey on Congestion Control in Mobile in Mobile Ad Hoc Network |
Abstract
|
Pooja Tripathi, Krishna Kumar Joshi |
|
Vol 6, No 2 (2018) |
AN ACTIVE SPOOF MANAGEMENT IN AN EMAIL APPLICATION |
Abstract
|
Sijimol k |
|
Vol 8, No 1 (2020) |
An Optimal Bidding Strategy for Social Welfare Maximization of Microgrid |
Abstract
|
Ankit Kumar Singh, Rajesh Panda, Prashant Kumar Tiwari |
|
Vol 7, No 3 (2019) |
APFC Unit for Industrial Power Consumption to Minimize Penalty |
Abstract
|
Piyush Agrawal, Roushan Kumar Patel, Raghuraj Kumar |
|
Vol 7, No 2 (2019) |
Automated Headlight Intensity Controller and Speed Control in Vehicles |
Abstract
|
S. Angeline Jenipher, P. Aswin, S. Gowsalya, C. Manjula Devi, D. Baskaran |
|
Vol 7, No 2 (2019) |
Automatic Identification of Obstacles and Crack Sensing Scheme in Rail Tracking System |
Abstract
|
S. Ramachandran, G. Kaviya, S. Keerthana, S. Sivaranjani |
|
Vol 6, No 3 (2018) |
Blockchain for Cryptocurrencies – A Literature Survey |
Abstract
|
Heenal Sapovadia, Adarsh Sutariya |
|
Vol 7, No 1 (2019) |
Blockchain Technology: Systematic Review of Security and Privacy Problems and Its Scope with Internet of Things (IoT) |
Abstract
|
Vishal Kumar Verma |
|
Vol 7, No 1 (2019) |
Blockchain Technology: Systematic Review of Security and Privacy Problems and Its Scope with Cloud Computing |
Abstract
|
Vishal Kumar Verma |
|
Vol 5, No 3 (2017) |
CBIR using Feature Extraction approaches and Application: A survey |
Abstract
|
Shailja Rawat, Rajendra Kumar |
|
Vol 6, No 1 (2018) |
CHMOD LEACH: INNOVATIVE TECHNIQUE FOR CLUSTER HEAD SELECTION |
Abstract
|
Abhilash Shokeen |
|
Vol 8, No 3 (2020) |
CNN based Gesture Recognition for ISL |
Abstract
|
Vaishnavi Mohan Ahire, A. A. Khaparde, V. V. Deshmukh |
|
Vol 6, No 2 (2018) |
Collision Avoidance Using Li-Fi Based Inter Vehicle Communication |
Abstract
|
Preethi S |
|
Vol 8, No 2 (2020) |
Comparative Analysis of Distributed Energy Efficient Clustering Protocols in Heterogeneous Wireless Sensor Network |
Abstract
|
Gurwinder Kaur, Diksha Rani |
|
Vol 8, No 1 (2020) |
Cyber Security for Rail Infrastructure eMaintenance: Threats and Implications |
Abstract
|
Nalli Vinaya Kumari, G.S. Pradeep Ghantasala, Raja Suresh Kumar Pitla |
|
Vol 8, No 2 (2020) |
Cybersecurity and the World of Tomorrow |
Abstract
|
James P. Embrey |
|
Vol 5, No 3 (2017) |
Data Mining Methods for Terrorist Activity |
Abstract
|
Ezhilarasi R, P. Arumugam |
|
Vol 8, No 2 (2020) |
Deep Learning Based Plant Disease Detection |
Abstract
|
Soumya Shetty, Palvi Sawant, Bhagyashree Singasane, Mahi Khemchandani |
|
Vol 8, No 1 (2020) |
Design of Folded Cascode Amplifier for SCL 180 nm Technology Node for Low Power Applications |
Abstract
|
Rajiv Ranjan Thakur, Pragati Singh, Chaitali Koley |
|
Vol 8, No 1 (2020) |
Detection of Fake Request and Response using Certificates Information and IP Address of SDN |
Abstract
|
Lal Babu Yadav, Vivek Srivastava, Ravi Shankar Pandey |
|
Vol 7, No 2 (2019) |
Digital Data Sharing Using Blockchain |
Abstract
|
S. Monisha, V. Pavithra, R. Priyanya, N. Pooranam |
|
Vol 7, No 3 (2019) |
DNA Cryptography based Data transmission |
Abstract
|
Yogendra Kumar Upadhyaya, Chetna Sinha |
|
Vol 6, No 3 (2018) |
Energy conserving Detection Model for cooperative region Attacks in Wireless detector Networks |
Abstract
|
S. Gayathri |
|
1 - 25 of 51 Items |
1 2 3 > >> |