Browse Title Index


 
Issue Title
 
Vol 5, No 1 (2014) A Case based Practical Approach for Novel Data Transformation to Enhance Accuracy of Decision Tree Ensembles Abstract
Sandeep Kumar Budhanni, Govind Singh
 
Vol 12, No 1 (2021) A Deep Survey on Techniques Used to Recognize Locust Based on CNN Abstract
Aruna Devi, T. Rajasenbagam
 
Vol 1, No 1-3 (2011) A New Method for Measuring Overall Reliability and Performance in Growing Computer Networks with Static and Variable Connections Abstract   PDF
Baijnath Kaushik, Dr. Navdeep Kaur, Dr. Amit Kumar Kohli
 
Vol 1, No 1-3 (2011) A Noble Approach towards Development of e-Governance Applications Abstract   PDF
Ashis Kumar Mahapatra, Dr. Sukanta Kumar Sahoo
 
Vol 8, No 2 (2017) A Novel Approach for Detection and Prevention of Malicious Nodes in Mobile Ad Hoc Network Abstract
Sonam Choubey, Krishna Kumar Joshi
 
Vol 3, No 1 (2012) A Novel Approach for Enhancing Direct Hashing and Pruning for Association Rule Mining Abstract
K. Purna Chand, N. Krishnaiah, G. Uday Kiran, G. Narsimha
 
Vol 9, No 3 (2018) A Novel Approach of Tesseract-OCR Usage for Newspaper Article Images Abstract
Chaitanya Tejaswi, Bhargav Goradiya
 
Vol 1, No 1-3 (2011) A Novel Approach to Image Enhancement using FUZZY Set Abstract   PDF
Gunamani Jena, Prof. R Baliarsingh
 
Vol 7, No 2 (2016) A Page Ranking Algorithm Based on Outbound links of a Page Abstract
Shivam Nagar, Arun Solanki
 
Vol 8, No 3 (2017) A Personalized Mobile Search Engine Using Ontology Abstract   PDF
Sharayu D. Shende, Bhushan A. Deshpande
 
Vol 5, No 3 (2014) A Practical Iterative Side Channel Cube Attack on AES-128/256 Abstract
Erfan Aghaee, Shahram Jamali, Majid Rahimi, Hamed Yusefi
 
Vol 14, No 2 (2023) A Review on Neural Networks and its Applications Abstract
Shreyas D. K., Srivatsa N. Joshi, Vishwas H. Kumar, Vishaka Venkataramanan, Kaliprasad C. S.
 
Vol 8, No 2 (2017) A Review on Trust Based Approach and Various Attacks in Mobile Ad Hoc Network Abstract
Shweta Kushwah, Neelam Joshi
 
Vol 14, No 2 (2023) A Review Paper on Recent Cyberattacks and Proactive Steps to Prevent Attacks Abstract
Abubakar Osman, Zeeshan Malik
 
Vol 6, No 3 (2015) A Review Paper on Security C++ Abstract
Vikash Kumar
 
Vol 7, No 3 (2016) A Shareable Secure and Privacy Preserving Auditing Scheme for Cloud Storage Security Abstract
Raju Dara, Doddikousari Kumari
 
Vol 9, No 2 (2018) A Study of The Components of State-of-The-Art Agro-Based Management Information Systems in India Abstract
Rajesh Kapur
 
Vol 13, No 1 (2022) A Study on Computer Vision: Techniques, Algorithms and Application Abstract
Chaitanya Deshpande
 
Vol 14, No 3 (2023) A Study on Data Science Analytics: Addressing Challenges, Exploring Open Research Issues: A Literature Centric Approach Abstract
Sohan Lal Gupta, Vikram Khandelwal, Nimish Arvind, Rajesh Kumar
 
Vol 3, No 2 (2012) A Survey of Queuing and Scheduling Mechanism of Input-queued Switches Abstract
D. Raghupathikumar, Dr. K. BommannaRaja
 
Vol 12, No 3 (2021) A Survey on Deep Learning based Detection of Abnormal Human Behaviour using Computer Vision Human Activity Recognition System Abstract
Partha Ghosh, Sayantan Roy, Sombit Bose, Avisek Mondal
 
Vol 3, No 1 (2012) A Survey on Genetic Programming in Data Mining Tasks Abstract
Venkatadri. M, Hanumat G. Sastry, Lokanatha C. Reddy
 
Vol 6, No 3 (2015) A Survey on Various Security Attacks in Mobile Ad-Hoc Network Abstract
Akansha Shrivastava, Ekta Chauhan
 
Vol 3, No 3 (2012) A Transaction Pattern Generation Tool (TPGT) for Prediction of Online Financial Transactions Abstract
Jyotindra N. Dharwa, Ashok R. Patel
 
Vol 1, No 1-3 (2011) A Web-Enabled Fuzzy Expert System Shell for Flower Rose Abstract   PDF
Arun Solanki, Ela Kumar
 
1 - 25 of 217 Items 1 2 3 4 5 6 7 8 9 > >>