| Issue | Title | |
| Vol 5, No 1 (2014) | A Case based Practical Approach for Novel Data Transformation to Enhance Accuracy of Decision Tree Ensembles | Abstract |
| Sandeep Kumar Budhanni, Govind Singh | ||
| Vol 12, No 1 (2021) | A Deep Survey on Techniques Used to Recognize Locust Based on CNN | Abstract |
| Aruna Devi, T. Rajasenbagam | ||
| Vol 1, No 1-3 (2011) | A New Method for Measuring Overall Reliability and Performance in Growing Computer Networks with Static and Variable Connections | Abstract PDF |
| Baijnath Kaushik, Dr. Navdeep Kaur, Dr. Amit Kumar Kohli | ||
| Vol 1, No 1-3 (2011) | A Noble Approach towards Development of e-Governance Applications | Abstract PDF |
| Ashis Kumar Mahapatra, Dr. Sukanta Kumar Sahoo | ||
| Vol 8, No 2 (2017) | A Novel Approach for Detection and Prevention of Malicious Nodes in Mobile Ad Hoc Network | Abstract |
| Sonam Choubey, Krishna Kumar Joshi | ||
| Vol 3, No 1 (2012) | A Novel Approach for Enhancing Direct Hashing and Pruning for Association Rule Mining | Abstract |
| K. Purna Chand, N. Krishnaiah, G. Uday Kiran, G. Narsimha | ||
| Vol 9, No 3 (2018) | A Novel Approach of Tesseract-OCR Usage for Newspaper Article Images | Abstract |
| Chaitanya Tejaswi, Bhargav Goradiya | ||
| Vol 1, No 1-3 (2011) | A Novel Approach to Image Enhancement using FUZZY Set | Abstract PDF |
| Gunamani Jena, Prof. R Baliarsingh | ||
| Vol 7, No 2 (2016) | A Page Ranking Algorithm Based on Outbound links of a Page | Abstract |
| Shivam Nagar, Arun Solanki | ||
| Vol 8, No 3 (2017) | A Personalized Mobile Search Engine Using Ontology | Abstract PDF |
| Sharayu D. Shende, Bhushan A. Deshpande | ||
| Vol 5, No 3 (2014) | A Practical Iterative Side Channel Cube Attack on AES-128/256 | Abstract |
| Erfan Aghaee, Shahram Jamali, Majid Rahimi, Hamed Yusefi | ||
| Vol 14, No 2 (2023) | A Review on Neural Networks and its Applications | Abstract |
| Shreyas D. K., Srivatsa N. Joshi, Vishwas H. Kumar, Vishaka Venkataramanan, Kaliprasad C. S. | ||
| Vol 8, No 2 (2017) | A Review on Trust Based Approach and Various Attacks in Mobile Ad Hoc Network | Abstract |
| Shweta Kushwah, Neelam Joshi | ||
| Vol 14, No 2 (2023) | A Review Paper on Recent Cyberattacks and Proactive Steps to Prevent Attacks | Abstract |
| Abubakar Osman, Zeeshan Malik | ||
| Vol 6, No 3 (2015) | A Review Paper on Security C++ | Abstract |
| Vikash Kumar | ||
| Vol 7, No 3 (2016) | A Shareable Secure and Privacy Preserving Auditing Scheme for Cloud Storage Security | Abstract |
| Raju Dara, Doddikousari Kumari | ||
| Vol 9, No 2 (2018) | A Study of The Components of State-of-The-Art Agro-Based Management Information Systems in India | Abstract |
| Rajesh Kapur | ||
| Vol 13, No 1 (2022) | A Study on Computer Vision: Techniques, Algorithms and Application | Abstract |
| Chaitanya Deshpande | ||
| Vol 14, No 3 (2023) | A Study on Data Science Analytics: Addressing Challenges, Exploring Open Research Issues: A Literature Centric Approach | Abstract |
| Sohan Lal Gupta, Vikram Khandelwal, Nimish Arvind, Rajesh Kumar | ||
| Vol 3, No 2 (2012) | A Survey of Queuing and Scheduling Mechanism of Input-queued Switches | Abstract |
| D. Raghupathikumar, Dr. K. BommannaRaja | ||
| Vol 12, No 3 (2021) | A Survey on Deep Learning based Detection of Abnormal Human Behaviour using Computer Vision Human Activity Recognition System | Abstract |
| Partha Ghosh, Sayantan Roy, Sombit Bose, Avisek Mondal | ||
| Vol 3, No 1 (2012) | A Survey on Genetic Programming in Data Mining Tasks | Abstract |
| Venkatadri. M, Hanumat G. Sastry, Lokanatha C. Reddy | ||
| Vol 6, No 3 (2015) | A Survey on Various Security Attacks in Mobile Ad-Hoc Network | Abstract |
| Akansha Shrivastava, Ekta Chauhan | ||
| Vol 3, No 3 (2012) | A Transaction Pattern Generation Tool (TPGT) for Prediction of Online Financial Transactions | Abstract |
| Jyotindra N. Dharwa, Ashok R. Patel | ||
| Vol 1, No 1-3 (2011) | A Web-Enabled Fuzzy Expert System Shell for Flower Rose | Abstract PDF |
| Arun Solanki, Ela Kumar | ||
| 1 - 25 of 217 Items | 1 2 3 4 5 6 7 8 9 > >> | |


