Issue | Title | |
Vol 4, No 1 (2012) | Rule Based Expert System for Diagnosis of Neuromuscular Disorders | Abstract PDF |
Rajdeep Borgohain, Sugata Sanyal | ||
Vol 6, No 6 (2015) | SAFETY:A Framework for Secure IaaS Clouds | Abstract PDF |
Vivek Shrivastava, D. S. Bhilare | ||
Vol 9, No 3 (2017) | SAND and Cloud-Based Strategies for Adaptive Video Streaming | Abstract PDF |
Koffka Khan, Wayne Goodridge | ||
Vol 14, No 3 (2022) | Sarcasm Detection with A New CNN+BiLSTM Hybrid Neural Network and BERT Classification Model. | Abstract |
Sule Kaya, Bilal Alatas | ||
Vol 11, No 1 (2019) | Scalability of M/M/c Queue based Cloud-Fog Distributed Internet of Things Middleware | Abstract PDF |
Dilip Rathod, Girish Chowdhary | ||
Vol 3, No 4 (2012) | Scheduling Tasks to Minimize the Total Computation and Communication Makespan | Abstract PDF |
Teofilo F. Gonzalez | ||
Vol 11, No 4 (2020) | Scientific Trends and Role of Robots in the Agricultural Sector | Abstract PDF |
E. Mamatha, S. Saritha, Krishna Anand, C. S. Reddy | ||
Vol 7, No 2 (2015) | SDN and Mininet: Some Basic Concepts | Abstract PDF |
Pooja, Manu Sood | ||
Vol 5, No 2 (2013) | Secure and Efficient Vertical Handover in Heterogeneous Wireless Networks | Abstract PDF |
Muhammad Waseem Khan | ||
Vol 2, No 3 (2010) | Secure and Faster Clustering Environment for Advanced Image Compression | Abstract PDF |
D. Kesavaraja, R. Balasubramanian, D. Jeyabharathi, D. Sasireka | ||
Vol 13, No 4 (2022) | Secure and Reliable Election Process to Stop Vote Rigging and Tampering | Abstract PDF |
Lomat Haider Chowdhury, Santa Maria Shithil, Mashiwat Tabassum Waishy | ||
Vol 10, No SP 5 (2019) | Secure and Supportable Burden Adjusting of Edge Server Centers in Fog Computing | Abstract PDF |
P. Vinothagan, Rajeev Ranjan | ||
Vol 7, No 6 (2016) | Secure Authorised De-Duplication using Convergent Encryption Technique | Abstract PDF |
B. Sangeetha, E. S. K. Vijay Anand | ||
Vol 13, No 1 (2021) | Secure Group Key Management Scheme for Dynamic Vehicular Cloud Computing | Abstract PDF |
Nayana Hegde, Sunilkumar S. Manvi | ||
Vol 11, No 6 (2020) | Secure Handover Protocol for High Speed 5G Networks | Abstract PDF |
Vincent Omollo Nyangaresi, Anthony J. Rodrigues, Silvance O. Abeka | ||
Vol 7, No 1 (2015) | Secure Management of Logs in Internet of Things | Abstract PDF |
Udit Gupta | ||
Vol 8, No 6 (2017) | Secure Modern Healthcare System Based on Internet of Things and Secret Sharing of IoT Healthcare Data | Abstract PDF |
Aaditya Jain, Bhupendra Kumar Soni | ||
Vol 11, No 5 (2020) | Secure Online Electronic Civil Registration Using Cloud Computing: A Conceptual Framework | Abstract PDF |
Ojo Olanrewaju, Akinade Abigail Oluwatoyin, O. Tokunbo-cole Mary | ||
Vol 8, No 6 (2017) | SECURE:An Ameliorated SQL Semiotic for Security | Abstract PDF |
Ajeet A. Chikkamannur, Shivanand M. Handigund | ||
Vol 10, No 2 (2018) | Secured Dynamic Clustering using Light Weighted Key Authentication for Target Tracking | Abstract PDF |
D. Ramesh, G. S. Biradar | ||
Vol 3, No 4 (2012) | Secured Reconfigurable Software Defined Radio Using OTA Software Download | Abstract PDF |
V. Jeyalakshmi, G. Vijayakumari | ||
Vol 1, No 2 (2009) | Secured Rekeying in B-Tree and NSBHO Tree | Abstract PDF |
P. Ramesh Kumar, P. Srinivasulu | ||
Vol 6, No 2 (2014) | Securing Cloud from Cloud Drain | Abstract PDF |
Niva Das, Tanmoy Sarkar | ||
Vol 7, No 6 (2016) | Securing Mobile Data using Cryptography | Abstract PDF |
Shikhar Bhagoliwal, Jyotirmoy Karjee | ||
Vol 4, No 2 (2012) | Securing Oracle Database from Search Engines Attack | Abstract PDF |
N. M. A. Ayad, H. M. Klash, S. Sorour | ||
751 - 775 of 889 Items | First Previous 26 27 28 29 30 31 32 33 34 35 Next Last |
Browse Title Index
Scroll