Issue | Title | |
Vol 11, No 3 (2019) | Time To Live (TTL) Impact on the Performance of STAR Protocol in MANETs | Abstract PDF |
C. P. V. N. J. Mohan Rao, S. Pallamsetty, P. V. G. D. Prasad Reddy | ||
Vol 2, No 1 (2010) | Towards a Complete Solution to Mobility Management for Multiple-Operability Mobile Systems | Abstract PDF |
Tejashri H. Mohite, S. V. Sankpal, A. D. Patil | ||
Vol 7, No 5 (2016) | Tracing out Cross Site Scripting Vulnerabilities in Modern Scripts | Abstract PDF |
Haneet Kour, Lalit Sen Sharma | ||
Vol 10, No 4 (2019) | Traffic Control on Cruise Ships for Autonomous Vehicles Applying Artificial Neural Network | Abstract PDF |
Ezequiel Gomez Dominguez, Jorge Cein Villanueva Guzman, Victor Manuel Arias Peregrino, Julio Cesar Romellon Cerino, Juan Carlos Arias Peregrino | ||
Vol 2, No 6 (2011) | Transmission Characteristics of Radio Over Fiber (ROF) Millimeter Wave Systems in Local Area Optical Communication Networks | Abstract PDF |
Abd El-Naser A. Mohamed, Ahmed Nabih Zaki Rashed, Mohamed S. F. Tabbour | ||
Vol 2, No 2 (2010) | Transmission Techniques for Ultra Dense Wavelength Division Multiplexing by Using Two Optical Amplifiers in Nonlinear Optical Networks | Abstract PDF |
Abd El-Naser A. Mohammed, Mohamed S. El-Mahallawy, Shaimaa S. Abaza | ||
Vol 13, No 3 (2021) | Transport Layer Performance in DASH Bottlenecks | Abstract PDF |
Koffka Khan, Leah Joseph, Emilie Ramsahai | ||
Vol 6, No 5 (2015) | Two Factor Authentications Using One Time Random Password for Secure Online Transaction | Abstract PDF |
G. Umamaheswari, A. Kangaiammal, K. K. Kavitha | ||
Vol 15, No 4 (2023) | Unmasking Deception: A Comprehensive Survey on Fake News Detection Strategies and Technologies | Abstract PDF |
Md. Faruk Abdullah AL Sohan, Nusrat Jahan Trisna, Rahul Das Joy | ||
Vol 8, No 5 (2017) | Use Case Modeling in Software Development:A Survey and Taxonomy | Abstract PDF |
Zahra Rashidi, Zeynab Rashidi, Hassan Rashidi | ||
Vol 10, No 2 (2018) | User Authentication Using Image Processing Techniques | Abstract PDF |
Nagabhushana, T. V. Aravinda, B. S. Nataraja | ||
Vol 3, No 3 (2011) | Using Digital Stethoscopes in Remote Patient Assessment via Wireless Networks:The User’s Perspective | Abstract PDF |
Raj Gururajan, Heng-Sheng Tsai, Haoyu Chen | ||
Vol 2, No 6 (2011) | Using Genetic Algorithm for Automated Efficient Software Test Case Generation for Path Testing | Abstract PDF |
Premal B. Nirpal, K. V. Kale | ||
Vol 3, No 2 (2011) | Using of Artificial Neural Networks to Recognize the Noisy Accidents Patterns of Nuclear Research Reactors | Abstract PDF |
Abdelfattah A. Ahmed, Nwal Ahmed Alfishawy, Ali Karam Eldin, Said Sh. Haggag | ||
Vol 15, No 2 (2023) | Utilization of Machine Learning Strategies in the Investigation of Suspected Credit Card Fraud | Abstract PDF |
Rifat Al Mamun Rudro, Md. Faruk Abdullah Al Sohan | ||
Vol 14, No 6 (2023) | Utilizing Deep Reinforcement Learning and QLearning Algorithms for Improved Ethereum Cybersecurity | Abstract PDF |
Gabriel Kabanda, Tendeukai Chipfumbu, Tinashe Chingoriwo | ||
Vol 3, No 4 (2012) | Validation of Internet Application:Study, Analysis and Evaluation | Abstract PDF |
Dinesh Kumar | ||
Vol 10, No 5 (2019) | Variants of the Constrained Bottleneck LAN Edge Link in Household Networks | Abstract PDF |
Koffka Khan, Wayne Goodridge | ||
Vol 10, No 5 (2019) | Video Streaming Evaluation of Path Efficient and Geographical Distance based AOMDV (PE-GD-AOMDV) Routing Protocol in MANET | Abstract PDF |
M. Kokilamani, E. Karthikeyan | ||
Vol 3, No SP 5 (2012) | Video Surveillance System Using Motion Detection-A Survey | Abstract PDF |
Radha S. Shirbhate, Nitish D. Mishra, Rasika P. Pande | ||
Vol 1, No 5 (2010) | Virtual Market Using Logistics Optimization | Abstract PDF |
Reddy Veera Babu, M. Venkata Rao | ||
Vol 5, No 4 (2014) | Voltage Sag and Swell Mitigation Using Matrix Converter with Reduced Number of Switches | Abstract PDF |
Samuel Rajesh Babu, S. Deepa | ||
Vol 2, No 5 (2011) | Watermarking Algorithm Using Sobel Edge Detection | Abstract PDF |
P. Ramesh Kumar, K. L. Sailaja | ||
Vol 3, No 3 (2011) | Wavelet Based Non LSB Steganography | Abstract PDF |
H. S. Manjunatha Reddy, K. B. Raja | ||
Vol 1, No 2 (2009) | Wavelet Scalar Quantization | Abstract PDF |
B. Karuna Kumar, K. Satya Prasad | ||
851 - 875 of 889 Items | First Previous 30 31 32 33 34 35 36 Next Last |
Browse Title Index
Scroll