Browse Title Index

Issue Title
Vol 5, No 1 (2014) A Case based Practical Approach for Novel Data Transformation to Enhance Accuracy of Decision Tree Ensembles Abstract
Sandeep Kumar Budhanni, Govind Singh
Vol 12, No 1 (2021) A Deep Survey on Techniques Used to Recognize Locust Based on CNN Abstract
Aruna Devi, T. Rajasenbagam
Vol 1, No 1-3 (2011) A New Method for Measuring Overall Reliability and Performance in Growing Computer Networks with Static and Variable Connections Abstract   PDF
Baijnath Kaushik, Dr. Navdeep Kaur, Dr. Amit Kumar Kohli
Vol 1, No 1-3 (2011) A Noble Approach towards Development of e-Governance Applications Abstract   PDF
Ashis Kumar Mahapatra, Dr. Sukanta Kumar Sahoo
Vol 8, No 2 (2017) A Novel Approach for Detection and Prevention of Malicious Nodes in Mobile Ad Hoc Network Abstract
Sonam Choubey, Krishna Kumar Joshi
Vol 3, No 1 (2012) A Novel Approach for Enhancing Direct Hashing and Pruning for Association Rule Mining Abstract
K. Purna Chand, N. Krishnaiah, G. Uday Kiran, G. Narsimha
Vol 9, No 3 (2018) A Novel Approach of Tesseract-OCR Usage for Newspaper Article Images Abstract
Chaitanya Tejaswi, Bhargav Goradiya
Vol 1, No 1-3 (2011) A Novel Approach to Image Enhancement using FUZZY Set Abstract   PDF
Gunamani Jena, Prof. R Baliarsingh
Vol 7, No 2 (2016) A Page Ranking Algorithm Based on Outbound links of a Page Abstract
Shivam Nagar, Arun Solanki
Vol 8, No 3 (2017) A Personalized Mobile Search Engine Using Ontology Abstract   PDF
Sharayu D. Shende, Bhushan A. Deshpande
Vol 5, No 3 (2014) A Practical Iterative Side Channel Cube Attack on AES-128/256 Abstract
Erfan Aghaee, Shahram Jamali, Majid Rahimi, Hamed Yusefi
Vol 14, No 2 (2023) A Review on Neural Networks and its Applications Abstract
Shreyas D. K., Srivatsa N. Joshi, Vishwas H. Kumar, Vishaka Venkataramanan, Kaliprasad C. S.
Vol 8, No 2 (2017) A Review on Trust Based Approach and Various Attacks in Mobile Ad Hoc Network Abstract
Shweta Kushwah, Neelam Joshi
Vol 14, No 2 (2023) A Review Paper on Recent Cyberattacks and Proactive Steps to Prevent Attacks Abstract
Abubakar Osman, Zeeshan Malik
Vol 6, No 3 (2015) A Review Paper on Security C++ Abstract
Vikash Kumar
Vol 7, No 3 (2016) A Shareable Secure and Privacy Preserving Auditing Scheme for Cloud Storage Security Abstract
Raju Dara, Doddikousari Kumari
Vol 9, No 2 (2018) A Study of The Components of State-of-The-Art Agro-Based Management Information Systems in India Abstract
Rajesh Kapur
Vol 13, No 1 (2022) A Study on Computer Vision: Techniques, Algorithms and Application Abstract
Chaitanya Deshpande
Vol 14, No 3 (2023) A Study on Data Science Analytics: Addressing Challenges, Exploring Open Research Issues: A Literature Centric Approach Abstract
Sohan Lal Gupta, Vikram Khandelwal, Nimish Arvind, Rajesh Kumar
Vol 3, No 2 (2012) A Survey of Queuing and Scheduling Mechanism of Input-queued Switches Abstract
D. Raghupathikumar, Dr. K. BommannaRaja
Vol 12, No 3 (2021) A Survey on Deep Learning based Detection of Abnormal Human Behaviour using Computer Vision Human Activity Recognition System Abstract
Partha Ghosh, Sayantan Roy, Sombit Bose, Avisek Mondal
Vol 3, No 1 (2012) A Survey on Genetic Programming in Data Mining Tasks Abstract
Venkatadri. M, Hanumat G. Sastry, Lokanatha C. Reddy
Vol 6, No 3 (2015) A Survey on Various Security Attacks in Mobile Ad-Hoc Network Abstract
Akansha Shrivastava, Ekta Chauhan
Vol 3, No 3 (2012) A Transaction Pattern Generation Tool (TPGT) for Prediction of Online Financial Transactions Abstract
Jyotindra N. Dharwa, Ashok R. Patel
Vol 1, No 1-3 (2011) A Web-Enabled Fuzzy Expert System Shell for Flower Rose Abstract   PDF
Arun Solanki, Ela Kumar
1 - 25 of 217 Items 1 2 3 4 5 6 7 8 9 > >>