|
Issue |
Title |
|
Vol 2, No 1 (2015): Vol-2_Issue-1_January_2015 |
A Survey of Image Compression using Neural Network and Wavelet Transformation |
Abstract
PDF
|
Rajkishore Yadav, R. K. Gupta, A. P. Singh |
|
Vol 6, No 3 (2019): Vol-6-Issue-3-March-2019 |
A Survey Of Software Testing Techniques And Analysis |
Abstract
|
Mithelesh Parihar, Dr. Anu Bharti |
|
Vol 1, No 10 (2014): Vol-1_Issue-10_November_2014 |
A Survey of TCP over Routing Protocols |
Abstract
PDF
|
Shailesh Kumar Patel, R. K. Gupta, Madhulika Sharma |
|
Vol 1, No 8 (2014): Vol-1_Issue-8_September_2014 |
A Survey of the Mangrove Vegetation in the Niger Delta Region of Nigeria |
Abstract
PDF
|
J.E Amadi, M.O Adebola, C.S. Eze |
|
Vol 2, No 5 (2015): VOL-2_ISSUE-05_May_2015 |
A Survey of the Quality of Water drawn from Nine Domestic |
Abstract
PDF
|
Ahmed M. El-Naggar |
|
Vol 5, No 15 (2018): Vol-05-Issue-15-May-2018 |
A Survey on Achieving and Flexible Self Contained Data Protection in Cloud |
Abstract
PDF
|
Dhullipudi Sri Sanjusha, M.K.S. Prasad |
|
Vol 3, No 01 (2016): Vol-3_Issue-1_January_2016 |
A survey on Anomaly detection techniques for IoT based Healthcare systems in Smart Cities: Techniques, Issues, and opportunities. |
Abstract
PDF
|
V.Daya Sagar Ketaraju, DBK Kamesh |
|
Vol 5, No 12 (2018): Vol-05-Issue-12-April-2018 |
A Survey on Authentication Techniques |
Abstract
PDF
|
Kati Anil, K. Dayakar |
|
Vol 5, No 15 (2018): Vol-05-Issue-15-May-2018 |
A Survey on Big Data and DDoS Attack |
Abstract
PDF
|
Gowtham T. K, Rakesh V. S |
|
Vol 4, No 5 (2017): Vol-04_Issue-05_April_2017 |
A Survey on Building Earthquake Analysis and Design of Multi Storage System |
Abstract
PDF
|
ZIAUR RAHMAN, HAMIDUR RAHMAN AKAND, SHALIM ALI KHAN, MALIK KAMAR AHMAD, SAHMAD REJA, MOHAMMAD ISMAIL KHAN |
|
Vol 4, No 13 (2017): Vol-04-Issue-13-October-2017 |
A Survey On Cloud Email Based Conditional Identity-Based Broadcast Proxy Re-Encryption And Its Application |
Abstract
PDF
|
R. Mahesh, M. Venkatesh Naik |
|
Vol 2, No 9 (2015): VOL-2_ISSUE-09_September_2015 |
A survey on- Cloud Enabled Agricultural Management |
Abstract
PDF
|
Gorakhnath U. Waghmode, Avinash D. Harale |
|
Vol 3, No 11 (2016): Vol-3_Issue-11_July_2016 |
A Survey on Cloud Group Data sharing using Key-Aggregate Searchable Encryption (KASE) Scheme |
Abstract
PDF
|
S Saikrishna, S. Vineela Krishna |
|
Vol 4, No 2 (2017): Vol-04_Issue-02_February_2017 |
A Survey on Cloud Key Bank Privacy and Owner Sanction Enforced Key Management Framework |
Abstract
PDF
|
Malle Naveen Kumar, U. Balashivudu |
|
Vol 4, No 7 (2017): Vol-04_Issue-07_June_2017 |
A Survey on Cloud Storage Auditing Free Through Denial-Based Encryption Attribute |
Abstract
PDF
|
B. THRIVENI, D.RAJA REDDY |
|
Vol 5, No 4 (2018): Vol-05-Issue-04-February-2018 |
A Survey On Constrain Identification Resistant Graphical Authentication Scheme |
Abstract
PDF
|
Maddukuri Navya Geethika, K Goraparthi Posamma |
|
Vol 2, No 9 (2015): VOL-2_ISSUE-09_September_2015 |
A Survey on Corporate Intranet for Attractive Communication and Data Sharing in ME |
Abstract
PDF
|
Mohammad Raziuddin, T. Venkata Ramana |
|
Vol 5, No 12 (2018): Vol-05-Issue-12-April-2018 |
A Survey on Cost-Efficient Multi-Cloud Records Introducing Organization with Extraordinary Accessibility |
Abstract
PDF
|
G. SAIPRIYA, G. SIVARANJANI |
|
Vol 5, No 4 (2018): Vol-05-Issue-04-February-2018 |
A Survey on Cyber Bullying Detection on Social Media based on Denoising Auto-Encoder |
Abstract
PDF
|
Umme Khadija, Ruksar Fatima |
|
Vol 1, No 7 (2014): Vol-1_Issue-7_August_2014 |
A Survey on Data Approximation Techniques for Wireless Sensor Networks |
Abstract
PDF
|
Pavitha N |
|
Vol 4, No 5 (2017): Vol-04_Issue-05_April_2017 |
A Survey On data using convergent encryption for cloud data storage |
Abstract
PDF
|
RAASHID SHAHAB, SYED SAMEER, MIRZA SHOEB, SHAIK MAHEBOOB |
|
Vol 3, No 10 (2016): Vol-3_Issue-10_June_2016 |
A Survey on Data Warehousing Issues towards Data Store Structure |
Abstract
PDF
|
Dhanunjaya Rao Bachalakuri |
|
Vol 6, No 9 (2019): Vol-6-Issue-9-August-2019 |
A Survey on DDoS Mitigation Using Blockchain |
Abstract
PDF
|
Saee M. Joshi, Dr. K. Rajeswari |
|
Vol 3, No 13 (2016): Vol-3_Issue-13_September_2016 |
A Survey on Detecting Malicious Facebook Applications using FRAppE |
Abstract
PDF
|
S. HEMALTHA, HARI KRISHNA |
|
Vol 6, No 4 (2019): Vol-6-Issue-04-April-2019 |
A Survey on Detection of Fake News in Social Media |
Abstract
PDF
|
M. Sowmya, J.Shiva Shankar |
|
1701 - 1725 of 15699 Items |
<< < 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 > >> |