|
Issue |
Title |
|
Vol 1, No 7 (2014): Vol-1_Issue-7_August_2014 |
Use of the Family Romances by Salman Rushdie in Midnight’s Children and The Moor’s Last Sigh |
Abstract
PDF
|
Chirag M. Patel |
|
Vol 5, No 10 (2018): Vol-05-Issue-10-March-2018-International-Conference-on-Innovations-in-Information-and-Communication-Technology-2018 |
Use Of Unmanned Aerial Vehicle (Drones) For Search Operations Aiding Disaster Management |
Abstract
PDF
|
R. Ramya, M.R. Shrinithi, V.Sharath Kumar, Yeshwanth Saai V.V.S, S.Richard Jebasingh |
|
Vol 5, No 17 (2018): Vol-05-Issue-17-July-2018 |
Use of Waste Fibre as Complement Incorporate In Concrete |
Abstract
PDF
|
Siriki Naga Sowmya, A. Karthik |
|
Vol 5, No 13 (2018): Vol-05-Issue-13-April-2018 International Conference on Innovation and Research in Engineering, Science & Technology |
Use Of Waste Plastic In Bituminous Road |
Abstract
PDF
|
Abhishek V. Nayak, Alisha S. Dhoke, Mohit Singh Katoch |
|
Vol 7, No 4 (2020): Vol-7-Issue-4-April-2020 |
Use Of Web Technologies In Creating Parallax Effect |
Abstract
PDF
|
Eshmurodov Azamat G’uzorovich, Xoliqulov Bekzod Jovliyevich |
|
Vol 4, No 8 (2017): Vol-04_Issue-08_July_2017 |
User Action Reporting Model for Immersive Environment |
Abstract
PDF
|
Mohammad Reza Khishadeh |
|
Vol 4, No 17 (2017): Vol-04-Issue-17-December-2017 |
User Awareness Semantic Search Based on Approximate Methodology in Massive Storage System |
Abstract
PDF
|
Kommu Anusha, P. Lalitha Surya Kumari |
|
Vol 5, No 13 (2018): Vol-05-Issue-13-April-2018 International Conference on Innovation and Research in Engineering, Science & Technology |
User Behaviour Tracking System |
Abstract
PDF
|
Aniket Anil Ganvir, Rajesh BABU |
|
Vol 1, No 10 (2014): Vol-1_Issue-10_November_2014 |
User Centric Rapid Application Development |
Abstract
PDF
|
Sumit Kumar, Tanya Sharma |
|
Vol 3, No 01 (2016): Vol-3_Issue-1_January_2016 |
User Customized Privacy Protection in Personalized Web Search |
Abstract
PDF
|
Kenche Vamshi Krishna, T. Malathi |
|
Vol 4, No 14 (2017): Vol-04-Issue-14-November-2017 |
User Data Recovery and Secure Data Distribution in the Cloud |
Abstract
PDF
|
Anuj Rapaka |
|
Vol 5, No 01 (2018): Vol-05-Issue-01-January-2018 |
User Identity Verification for Secure Internet Services using CASHMA |
Abstract
PDF
|
Develapalli Shushma, Joshi Padma N, Suresh Akella |
|
Vol 3, No 12 (2016): Vol-3_Issue-12_August_2016 |
User Identity Verification using CASHMA |
Abstract
PDF
|
G. Vasavi, V. Ramesh, Dr. I. Satyanarayana |
|
Vol 4, No 10 (2017): Vol-04_Issue-10_September_2017 |
User Level Simulation of Scheduling Algorithms in Multicore |
Abstract
PDF
|
Dhruva R. Rinku, M. AshaRani, N. Kavya |
|
Vol 5, No 15 (2018): Vol-05-Issue-15-May-2018 |
User Ranking and Prediction in Social Networks through Network Approach |
Abstract
PDF
|
Naga Jyothi, Ashok Reddy |
|
Vol 5, No 15 (2018): Vol-05-Issue-15-May-2018 |
User Ranking and Prediction in Social Networks through Network Approach |
Abstract
PDF
|
Naga Jyothi, Ashok Reddy |
|
Vol 4, No 14 (2017): Vol-04-Issue-14-November-2017 |
User Related Rare Sequential Topic Pattern Using Data Mining |
Abstract
PDF
|
M.Lakshmi Shireesha, N. Satyavathi |
|
Vol 4, No 9 (2017): Vol-4_Issue-09_August_2017 |
User Revocation Mechanism on Anonymous Abe in Cloud Computing |
Abstract
PDF
|
Kavitha Guda, Doolam Ramdarshan |
|
Vol 5, No 12 (2018): Vol-05-Issue-12-April-2018 |
User Vitality Ranking and Prediction in Social Networking Services: a Dynamic Network Perspective |
Abstract
PDF
|
N.Manoj Kumar, Pallam Ravi, G.Vishnu Murthy |
|
Vol 4, No 13 (2017): Vol-04-Issue-13-October-2017 |
Uses of Drugs and Its Effects on Sports Person: An Overview |
Abstract
PDF
|
Naveen Sangwan |
|
Vol 3, No 10 (2016): Vol-3_Issue-10_June_2016 |
Using Anonymous Authentication Securely Storing Data In To Cloud Through Decentralized Access Control |
Abstract
PDF
|
K. Rubiya Alam, B. Partha Vijay |
|
Vol 6, No 5 (2019): 3rd EduINDEX International Multidisciplinary Conference |
USING CASE-METHOD TO TEACH OXIDATION-REDUCTION (REDOX) REACTIONS AT A SECONDARY SCHOOL |
Abstract
PDF
|
Makaeva Zulfiya Damirovna, Iskandarov Aybek Yuldashevich |
|
Vol 4, No 17 (2017): Vol-04-Issue-17-December-2017 |
Using Circuit Cipher text-Policy Hybrid Encryption with Data Sharing in Cloud Computing |
Abstract
PDF
|
K. Moulika, S . Neelima, Ch.N. Santhosh Kumar |
|
Vol 5, No 16 (2018): Vol-05-Issue-16-June-2018 |
Using Data Mining Methods (Neural Network) in Tehran Fuel Consumption Analysis in Public Transportation |
Abstract
PDF
|
Ali horshad, Ali Khosravi moghddam |
|
Vol 5, No 6 (2018): Vol-05-Issue-06-March-2018-Special-Issue-Conference-Papers |
Using Data Mining Techniques in Software Bug Detection |
Abstract
PDF
|
Bhukya. Krishna, M. Chalapathi Rao |
|
15226 - 15250 of 15699 Items |
<< < 598 599 600 601 602 603 604 605 606 607 608 609 610 611 612 613 614 615 616 617 618 619 620 621 622 > >> |