|
Issue |
Title |
|
Vol 6, No 7 (2019): Vol-6-Issue-7-June-2019 |
Detecting Rumor in Social Networks Using SVM and Comparing with Supervised Techniques |
Abstract
PDF
|
Prashanth Donda, Dr.R. UshaRani |
|
Vol 6, No 3 (2019): Vol-6-Issue-3-March-2019 |
Detecting Stress Based on Social Interactions in Social Networks |
Abstract
PDF
|
Naila kaleem, Farhath Unnisa, Madiha Amreen, Mir Mustafa Ali |
|
Vol 2, No 12 (2015): VOL-2_ISSUE-12_December_2015 |
Detecting the Emerging topic from Social Network |
Abstract
PDF
|
Pallavi Chakinala, B. Malathi |
|
Vol 3, No 17 (2016): Vol-3_Issue-17_November_2016 |
Detecting Truthfulness Of Packet Dropping Attacks Using Public Auditing System In Wireless Ad Hoc Networks |
Abstract
PDF
|
A. Vanaja, T . Venkata Naga Jayudu |
|
Vol 4, No 9 (2017): Vol-4_Issue-09_August_2017 |
Detection and Counting of Vehicles in A High Way Traffic Videos |
Abstract
PDF
|
Challa. Hariprasad, Sri M. Devendra |
|
Vol 3, No 17 (2016): Vol-3_Issue-17_November_2016 |
Detection and Location of Faults In Power Transmission Lines To Protection And Maintenance of A Power System |
Abstract
PDF
|
Mohammed Shamkhy Shareef |
|
Vol 2, No 12 (2015): VOL-2_ISSUE-12_December_2015 |
Detection and Prevention of DOS Attacks Using Preventive Approach |
Abstract
PDF
|
Manraj kaur, Parvinder Singh |
|
Vol 4, No 6 (2017): Vol-04_Issue-06_May_2017 |
Detection and Prevention of the Sybil Attack in Wireless Sensor Networks using Modified RSSI Scheme |
Abstract
PDF
|
Mandeep Kaur, Avinash Jethi |
|
Vol 5, No 4 (2018): Vol-05-Issue-04-February-2018 |
Detection and Prevention of Wormholes Based on Range-Free Localization Scheme |
Abstract
PDF
|
Nnochiri I. U |
|
Vol 5, No 12 (2018): Vol-05-Issue-12-April-2018 |
Detection and Resolution of Negotiable Multi Party User Access Control in Social Media |
Abstract
PDF
|
Manne Naveen Kumar, M.Ahalya Rani |
|
Vol 4, No 17 (2017): Vol-04-Issue-17-December-2017 |
Detection of ARMD and Grading of Maculopathy Severity Levels from Retinal Fundus Images |
Abstract
PDF
|
G Rajinikanth Reddy, M Narsing Yadav, R Raja Kishore |
|
Vol 4, No 17 (2017): Vol-04-Issue-17-December-2017 |
Detection of ARMD and Grading of Maculopathy Severity Levels from Retinal Fundus Images |
Abstract
PDF
|
G Rajinikanth Reddy, M Narsing Yadav |
|
Vol 1, No 8 (2014): Vol-1_Issue-8_September_2014 |
Detection of Bacteria Associated with the Spoilage of Ready-To-EatInstant Noodles |
Abstract
PDF
|
A. C Okafor, T. C. Sunday, |
|
Vol 3, No 10 (2016): Vol-3_Issue-10_June_2016 |
Detection of Cut in Wireless Sensor Networks |
Abstract
PDF
|
Fahmi Mhawi Khudhair |
|
Vol 4, No 14 (2017): Vol-04-Issue-14-November-2017 |
Detection of Cyber bulling Based on the Automatic Code of Marginalized Denoising Improved Semantic |
Abstract
PDF
|
KEESARI CHAMANTHI, V. RAMESH BABU |
|
Vol 3, No 11 (2016): Vol-3_Issue-11_July_2016 |
Detection of Fake Grade in Mobile Application Environment |
Abstract
PDF
|
K. VINAY KUMAR REDDY, C B SUSHMA |
|
Vol 3, No 3 (2016): International Conference on Research and Recent Trends in Engineering and Technology. (ICRRTET) 2016 |
Detection of Fault by Three Phase Technique |
Abstract
PDF
|
Nikhil. M. Kaurati, Mahesh. G. Khandalkar, Sanghratna. R. Tembhekar, Nitesh Khobragade |
|
Vol 4, No 17 (2017): Vol-04-Issue-17-December-2017 |
Detection of Forgery Region by using Feature Extraction with SURF and Its Comparative Analysis with SIFT technique |
Abstract
PDF
|
C. Pushpakalyani, P. Vishnukumar |
|
Vol 4, No 6 (2017): Vol-04_Issue-06_May_2017 |
Detection Of Fraud Ranking For Mobile Apps |
Abstract
PDF
|
N. Archana, P. Anand Kumar, P. Srinivas Rao |
|
Vol 5, No 7 (2018): Vol-05-Issue-07-March-2018 |
Detection of Image Forgery Using Adaptive Over Segmentation and Feature Point Matching |
Abstract
PDF
|
P. Swetha |
|
Vol 3, No 13 (2016): Vol-3_Issue-13_September_2016 |
Detection of Intrusion by Using Behaviour Rule Specification Based Technique for Providing Security to MCPS |
Abstract
PDF
|
Varun Revuri, Gondrala Sree Anjani |
|
Vol 2, No 11 (2015): VOL-2_ISSUE-11_November_2015 |
Detection of Macro and Micro Elements in Selected Traditional Medicinal Plants of India |
Abstract
PDF
|
Arish Khanam |
|
Vol 1, No 4 (2014): Vol-1_Issue-4_May_2014 |
Detection of Malicious Nodes in Mobile Adhoc Network |
Abstract
PDF
|
Vijendra Pratap Singh, Sanjay Sachan |
|
Vol 5, No 4 (2018): Vol-05-Issue-04-February-2018 |
Detection of Malicious Nodes in Wireless Sensor Networks |
Abstract
PDF
|
Nnochiri I. U |
|
Vol 4, No 14 (2017): Vol-04-Issue-14-November-2017 |
Detection of Malware Entry with High Security |
Abstract
PDF
|
S. Divya, Md. Hameed Pasha |
|
5926 - 5950 of 15699 Items |
<< < 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 > >> |