|
Issue |
Title |
|
Vol 5, No 22 (2018): Vol-5-Issue-22-November-2018 |
Network Intrusion Detection Using Machine Learning Techniques |
Abstract
PDF
|
Sayi sruthi.k, Liston Deva Glindis |
|
Vol 2, No 8 (2015): VOL-2_ISSUE-08_August_2015 |
Network Monitoring Risk Assessment |
Abstract
PDF
|
Naman Gupta, Richa Mehta, Dr Priti Puri |
|
Vol 4, No 17 (2017): Vol-04-Issue-17-December-2017 |
Network on Chip Routers for Permanent Faults in First in First out (Fifo) Buffers In Test Fields |
Abstract
PDF
|
N. Chandrashekhar, Salluri Narmada |
|
Vol 5, No 12 (2018): Vol-05-Issue-12-April-2018 |
Network Oriented Junk Data Discovery for Digital Media Reviews |
Abstract
PDF
|
Narasimhulu K, Naimullah Khan |
|
Vol 1, No 9 (2014): Vol-1_Issue-9_October_2014 |
Network Security |
Abstract
PDF
|
Anuj kumar Bishnoi, Priyanka Khatri |
|
Vol 1, No 10 (2014): Vol-1_Issue-10_November_2014 |
Network Security |
Abstract
PDF
|
Megha Verma, Palak Sharma, Neha Sundriyal, Jyoti Chauhan |
|
Vol 1, No 11 (2014): Vol-1_Issue-11_December_2014 |
Network Security |
Abstract
PDF
|
Shashank Thakur, Shivani Chauhan, Sheetal Rana, Saurav Sharma |
|
Vol 1, No 11 (2014): Vol-1_Issue-11_December_2014 |
Network security attacks Ad hoc wireless Networks |
Abstract
PDF
|
Mr. Hiteshwer, Mr Sanny, Ekta Sharma, Monika Chauhan |
|
Vol 4, No 5 (2017): Vol-04_Issue-05_April_2017 |
Network Security in Organizations |
Abstract
PDF
|
Narmeen Ijaz, Nadia Iftikhar, Sidra Anwar |
|
Vol 1, No 10 (2014): Vol-1_Issue-10_November_2014 |
Network Security Issues and Cryptography |
Abstract
PDF
|
Priya Trivedi, Sanya Harneja |
|
Vol 3, No 01 (2016): Vol-3_Issue-1_January_2016 |
Network Security using NAC on Threats Plagiarism Sabotage Data breaches |
Abstract
PDF
|
Supriya Menon, Spurthi. K |
|
Vol 2, No 5 (2015): VOL-2_ISSUE-05_May_2015 |
Network Topologies of Software Engineering |
Abstract
PDF
|
Aishwarya Kharbanda, Kinshuk Dudeja |
|
Vol 1, No 10 (2014): Vol-1_Issue-10_November_2014 |
Network Topologies or Error Performance Monitoring in SDH Technology |
Abstract
PDF
|
Shiva Sharma |
|
Vol 1, No 10 (2014): Vol-1_Issue-10_November_2014 |
Networking Topologies |
Abstract
PDF
|
Pankaj Bhatt, Prashant Chaudhary, Manik Walia Singh |
|
Vol 1, No 11 (2014): Vol-1_Issue-11_December_2014 |
Networking Topologies |
Abstract
PDF
|
Pankaj Bhatt, Prashant Chaudhary, Manik Singh Walia |
|
Vol 1, No 10 (2014): Vol-1_Issue-10_November_2014 |
Neural Network- A Study |
Abstract
PDF
|
Nikita Pahuja, Rashmi Dewan, Shivangi Kukreja |
|
Vol 5, No 01 (2018): Vol-05-Issue-01-January-2018 |
Neural Network in Image Compression |
Abstract
PDF
|
Vimokshavardhan A Daware, R.N. Patil |
|
Vol 1, No 8 (2014): Vol-1_Issue-8_September_2014 |
Neural Networks |
Abstract
PDF
|
Sanjay Yadav, Ritika Manchanda, Stela Sarkar |
|
Vol 2, No 11 (2015): VOL-2_ISSUE-11_November_2015 |
Neural Networks in power system operation and control |
Abstract
PDF
|
D. Prasad, P. Rahul Reddy |
|
Vol 7, No 2 (2020): Vol-7-Issue-2-February-2020 |
Neuro fuzzy based interline dynamic voltage restorer for multiline power system |
Abstract
PDF
|
A.Sathish Kumar, Birru Devender |
|
Vol 3, No 12 (2016): Vol-3_Issue-12_August_2016 |
Neurological activity of flowers of Salvia officinalis in dementia related to Alzheimer disease |
Abstract
PDF
|
M. Shamnas, V.N. Jayesh, Rahul Shukla |
|
Vol 3, No 10 (2016): Vol-3_Issue-10_June_2016 |
New Approach for Bypassing the Exact Locality of Ip Spoofers |
Abstract
PDF
|
S Sravani, Y. Harinath |
|
Vol 5, No 7 (2018): Vol-05-Issue-07-March-2018 |
New Architecture for Mobile Users to Protect Information in Data Objects |
Abstract
|
POOLA SUSHMITHA, G. THIRUPATHIA |
|
Vol 6, No 8 (2019): Vol-6-Issue-08-July-2019 |
New Association Proposition for Role implicit in Cloud Environment |
Abstract
PDF
|
Pallepogu Anitha, G.Anantha Rao |
|
Vol 4, No 14 (2017): Vol-04-Issue-14-November-2017 |
New BER Analysis of DCSK System |
Abstract
PDF
|
A. Revathi, B . Kiran Kumar |
|
10601 - 10625 of 15699 Items |
<< < 413 414 415 416 417 418 419 420 421 422 423 424 425 426 427 428 429 430 431 432 433 434 435 436 437 > >> |