|
Issue |
Title |
|
Vol 5, No 7 (2018): Vol-05-Issue-07-March-2018 |
Searching Trajectories by Regions of Interest |
Abstract
PDF
|
P. Shruthi, R. Sowjanya, P. Shreya, Ch. Likith, V. Sudha Rani |
|
Vol 5, No 12 (2018): Vol-05-Issue-12-April-2018 |
Seasonal Variation in the water quality parameters of Fish Ponds at Fisheries Research and Training Institute (FR & TI), Lahore Pakistan |
Abstract
PDF
|
Muhammad Arfan Hadyait, Asif Ali, Muhammad Zafar Ullah, Aqeela Yousaf, Ehsan Mahmood Bhatti |
|
Vol 3, No 17 (2016): Vol-3_Issue-17_November_2016 |
Seclusion Maintainance & Public Verification for Recreating Code Based Cloud Storage |
Abstract
PDF
|
MAHALDAR FOUZAN HASSAN, K. JANARDHAN |
|
Vol 4, No 17 (2017): Vol-04-Issue-17-December-2017 |
Second Order Hbc Prototype For Front- End Photo voltaic systems |
Abstract
PDF
|
Desamsettivv Naga Durgaraju, Pampana Siva Sankar |
|
Vol 5, No 15 (2018): Vol-05-Issue-15-May-2018 |
SECRBAC: Secure Data In The Clouds |
Abstract
PDF
|
SURESH ESTHARAKULA, DR. J M S V RAVI KUMAR |
|
Vol 3, No 11 (2016): Vol-3_Issue-11_July_2016 |
Secrecy Protecting Rated Multi-Keyword Inspection for Various Data Holders in Cloud Computing |
Abstract
PDF
|
T. SRIKANTH, B. MANJULA |
|
Vol 5, No 15 (2018): Vol-05-Issue-15-May-2018 |
Secret Image sharing by use of Chaos based Visual Cryptography |
Abstract
PDF
|
Aartika Chandrakar, Manoj Kumar Singh |
|
Vol 5, No 22 (2018): Vol-5-Issue-22-November-2018 |
Secret Key Management Framework by Using a Cloud Key for Owner and Privacy Authorization |
Abstract
PDF
|
Mr. Karusala Dathanandana, K. Mohanrao |
|
Vol 5, No 01 (2018): Vol-05-Issue-01-January-2018 |
Secret Sharing Algorithm Implementation on Single to Multi Cloud |
Abstract
PDF
|
V. Srikanth |
|
Vol 4, No 8 (2017): Vol-04_Issue-08_July_2017 |
Secret-Fragment-Visible Mosaic Image Based Innovative Data Hiding Algorithm Implementation in the Digital Information Era |
Abstract
PDF
|
Dr. S. A. Mohammad Gazni, Fasiha Shereen, Juveria Bushra |
|
Vol 2, No 12 (2015): VOL-2_ISSUE-12_December_2015 |
Secret-Portion-Visible Mosaic Image by Using Novel Secure Image Transmission Technique |
Abstract
PDF
|
Koka Bheemesh, Y. Raghuram Prasad |
|
Vol 4, No 7 (2017): Vol-04_Issue-07_June_2017 |
Sectarian and Domestic Violence, Political and Cultural Issues in Shashi Tharoor’s Riot: A Novel |
Abstract
PDF
|
Iqbal Singh |
|
Vol 5, No 22 (2018): Vol-5-Issue-22-November-2018 |
Sectoral Analysis of Foreign Direct Investments and Balance Of Payments in Nigeria |
Abstract
PDF
|
Emmanuel Uzoma Makwe |
|
Vol 5, No 7 (2018): Vol-05-Issue-07-March-2018 |
Sector-Wise Changes in Output and Employment in Rural India- A Case Study |
Abstract
PDF
|
K. Venkataiah, Patel Godavari |
|
Vol 3, No 8 (2016): Vol-3_Issue-8_April_2016 |
Secularism- A Phoenix which never rose from its Ashes |
Abstract
PDF
|
Vikrant Rehani, Jagmeet Bawa |
|
Vol 4, No 6 (2017): Vol-04_Issue-06_May_2017 |
Secularism-Under Constitution of India |
Abstract
PDF
|
Promila Kumari |
|
Vol 4, No 14 (2017): Vol-04-Issue-14-November-2017 |
Secure Data Access In Cloud With Multi-User Encrypted Sql Operations |
Abstract
PDF
|
Mustafa Abdulrazzaq Radhi Almusawi |
|
Vol 2, No 9 (2015): VOL-2_ISSUE-09_September_2015 |
Secure Access of Health Data through Mobiles in Cloud |
Abstract
PDF
|
P. Prabha, R. Suresh |
|
Vol 3, No 10 (2016): Vol-3_Issue-10_June_2016 |
Secure Adverbial Anomaly Detection Schema for Web-Based Recovery Attacks |
Abstract
PDF
|
B. Divya Rani, K. Katyayani, M. Eranna |
|
Vol 4, No 6 (2017): Vol-04_Issue-06_May_2017 |
Secure Analysis Of Data Aggregation Technique For Wireless Sensor Network |
Abstract
PDF
|
M. Pranitha, D. Upender, P.Srinivas Rao |
|
Vol 4, No 8 (2017): Vol-04_Issue-08_July_2017 |
Secure And Authenticated Message Dissemination In VANETS |
Abstract
PDF
|
Divya Boya, Sravya Boya |
|
Vol 5, No 16 (2018): Vol-05-Issue-16-June-2018 |
Secure and Efficient Across Different Tenants For Sharing Of Resources in Cloud Computing |
Abstract
PDF
|
Md Imran, Md Ateeq Ur Rahman |
|
Vol 4, No 14 (2017): Vol-04-Issue-14-November-2017 |
Secure and Efficient Data Communication Protocol for Wireless Body Area Networks |
Abstract
PDF
|
M. Anusha, K. Pavani, V. Janaki |
|
Vol 4, No 6 (2017): Vol-04_Issue-06_May_2017 |
Secure and Efficient Deduplication Using Hybrid Cloud Approach |
Abstract
PDF
|
AL-GARA’AWI AHMED HADI HUSSEIN |
|
Vol 3, No 12 (2016): Vol-3_Issue-12_August_2016 |
Secure And Efficient Fraud Detection And Cryptosystem Implimentation In Cloud |
Abstract
PDF
|
Ayat Hekmat Lateef |
|
12776 - 12800 of 15699 Items |
<< < 500 501 502 503 504 505 506 507 508 509 510 511 512 513 514 515 516 517 518 519 520 521 522 523 524 > >> |