| Issue | Title | |
| Vol 6, No 1 (2015) | CTCHFA: Discovery of Circulating Tumor Cells in Metastatic Breast Cancer and Nonmetastatic Cancer by using Novel Hybrid Hierarchical Clustering Algorithm in Firefly Distance | Abstract |
| S. Mythili, A.V. Senthil Kumar | ||
| Vol 5, No 3 (2014) | Customization of GIS Tools through Web-based Open Source GRASS Interface | Abstract |
| Suman Sinha, Laxmi Kant Sharma, Saurabh Sharma | ||
| Vol 1, No 1-3 (2011) | Data Mining and Machine Learning in Security | Abstract PDF |
| Khulood Al Junaibi | ||
| Vol 7, No 3 (2016) | Data Security using Cloud Computing Adaption Framework | Abstract |
| Safeeda ., Savitha C. K., Prajna M. R., Ujwal U. J. | ||
| Vol 6, No 2 (2015) | Decision Fusion based Pair of Iris Recognition using Back-Propagation Learning Neural Network Algorithm | Abstract |
| Md. Rabiul Islam | ||
| Vol 4, No 1 (2013) | Design and Development of Web based Fuzzy Expert System for Diseases Diagnosis in Horticulture Sector: A Case Study of Flower Rose | Abstract |
| Arun Solanki, Ela Kumar | ||
| Vol 14, No 2 (2023) | Designing an Application for Community Assistance: WedsPay | Abstract |
| Ashish Kumar, Atrij Dixit, Harsh Maheshwari, Utkarsh Sharma | ||
| Vol 8, No 2 (2017) | Detection of Intrusion for Achieving Security in Mobile Ad Hoc Network | Abstract |
| Hemlata Kaurav, Krishna Kumar Joshi | ||
| Vol 10, No 2 (2019) | Digital Promoting in Indian Context | Abstract |
| Rahul Mishra, Seema Mishra, Mira Gohil | ||
| Vol 4, No 3 (2013) | Digital Watermarking Schemes for Authorization of Color Images using DCT | Abstract |
| Ashwani Kumar, Palvee Nayyar | ||
| Vol 6, No 2 (2015) | Dimensionality Reduction using Eigenfaces and Fisherfaces for Face Recognition Applications using Kernel LMS Algorithm | Abstract |
| Raju Dara, Ch. Satyanarayana, A. Govardhan | ||
| Vol 9, No 3 (2018) | Edge computing: Applications, Challenges and Opportunities | Abstract |
| Chetan J Jayaswal, Padmavathi Bindulal | ||
| Vol 5, No 2 (2014) | Efficient Information Retrieval based on Name and Aliases from the Web using Anchor Text Mining | Abstract |
| Likhitha S. R., Veerappa B. N., Rafi M. | ||
| Vol 14, No 3 (2023) | Elevating Security in IoT Cloud Fusion: Challenges and Remedies | Abstract |
| Ushaa Eswaran, Vivek Eswaran, Keerthna Murali, Vishal Eswaran | ||
| Vol 5, No 2 (2014) | Embedding and Extraction of Watermark in Digital Audio | Abstract |
| Rahul Palaria, Sandeep Kumar Budhanni | ||
| Vol 10, No 3 (2019) | Emerging Techniques and Trends in DNA Cryptography | Abstract |
| Shilpa George, Biji C.L., Achuthsankar S. Nair, Akhila Mathew | ||
| Vol 7, No 3 (2016) | Enabling Location Based Services with Route APIs for Efficient and Responsive Query Processing | Abstract |
| Raju Dara, Kiran Kumar Chennugani | ||
| Vol 5, No 1 (2014) | End-to-End Data Security for Multi-Tenant Cloud Environment | Abstract |
| Tushar Bhardwaj | ||
| Vol 11, No 3 (2020) | Enhancing Resolution of Artifact Image using AR-CNN and SRGAN | Abstract |
| Swagato Das, Uttam Paul, S.M. Mohidul Islam | ||
| Vol 14, No 3 (2023) | Evaluation and Scientific Investigation: Stock Market Forecasting Techniques | Abstract |
| Ananthi Sheshasaayee, Nivetha S. | ||
| Vol 14, No 2 (2023) | Evaluation of Write Sequence Reordering Based Buffer Replacement Algorithms for Flash Memory Based Systems | Abstract |
| Arjun Singh Saud, Hari Sharan Bhatt | ||
| Vol 5, No 2 (2014) | E-Voting System: (A Tool for General Elections) | Abstract |
| Amarjeet Singh, Ramakanth Kumar P. | ||
| Vol 14, No 1 (2023) | Examining the Crowd in Real-time with Deep Learning | Abstract |
| Akhilesh Kushwaha, Pravin Kumavat | ||
| Vol 10, No 3 (2019) | Experiencing 3D regions through portal using Augmented Reality | Abstract |
| Darsh Shah | ||
| Vol 6, No 3 (2015) | Face and Iris based Multimodal Person Identification using Likelihood Ratio Score Fusion Approach. | Abstract |
| Md. Rabiul Islam, Md. Abdus Sobhan, Rizoan Toufiq | ||
| 76 - 100 of 217 Items | << < 1 2 3 4 5 6 7 8 9 > >> | |


