Issue | Title | |
Vol 6 (2012) | Creating Data Warehouse for Natural Language Processing | Abstract PDF |
Namita Arora, Jaspreet Kaur Sahiwal, Sanjeev Kumar Sharma | ||
Vol 35 (2023) | Credit Card Fraud Detection through Class Balancing Framework and Machine Learning Algorithms | Abstract PDF |
Aparna Suresh, S.V Annlin Jeba | ||
Vol 30, No SP (2018) | Cross- Domain Devices Interoperability | Abstract PDF |
Muhammad Jawad Hamid Mughal, P. Amad A. S. | ||
Vol 22 (2016) | Cross Layer Integrated MAC and Routing Protocol Based on Ring Based Structure with Adaptive Sleeping for Wireless Sensor Networks | Abstract PDF |
Bindiya Jain, Gursewak Brar, Jyoteesh Malhotra | ||
Vol 21 (2016) | Culling Scientific and Technical Terms from Text Corpora for Compiling a TermBank in Bangla | Abstract PDF |
Niladri Sekhar Dash | ||
Vol 1 (2011) | Current Research Trends on Wire Electrodes for Wire Electrical Discharge Machining | Abstract PDF |
Jatinder Kapoor, Sehijpal Singh, Jaimal Singh Khamba | ||
Vol 11 (2014) | Cutting back the Wormhole Attack in Mobile Network: A Survey | Abstract PDF |
Ramandeep Kaur, Anita, Abhilasha | ||
Vol 4 (2011) | Cyber Staking:Crime and Challenge at the Cyberspace | Abstract PDF |
Anju Thapa, Raj Kumar | ||
Vol 22 (2016) | Data Hiding In 3D Barcode Image Using Steganography | Abstract PDF |
Rama Rani, Gaurav Deep | ||
Vol 4 (2011) | Data Mining Predictive Technique:CART | Abstract PDF |
Sarmishtha Das, G. P. Saradhi Varma, G. Ramesh Naidu, A. V. D. N. Murthy | ||
Vol 4 (2011) | Data Shield Algorithm (DSA) for Security against Phishing Attacks | Abstract PDF |
Ram Avtar, Bhumica Verma, Ajay Jangra | ||
Vol 13 (2014) | Data Warehousing and Data Mining in Business Applications | Abstract PDF |
Eesha Goel | ||
Vol 31, No SP (2019) | Datacenters and Its Security Measures | Abstract PDF |
Anjali Hora, Sarika Jain, Vishal Lama | ||
Vol 22 (2016) | Data-Hiding in 2D Barcode using Steganography | Abstract PDF |
Priya Sidhu, Gaurav Deep | ||
Vol 30, No SP (2018) | Daylight System Using a New Fresnel Lens Design | Abstract PDF |
Karanvir Sharma, Hitesh Sharma, Harry Garg, Harvinder Singh Dhaliwal | ||
Vol 8 (2013) | Deadwood Detection and Elimination in Text Summarization for Punjabi Language | Abstract PDF |
Mandeep Kaur, Jagroop Kaur | ||
Vol 21 (2016) | Decorative Text Words Recognition Using Neural Network | Abstract PDF |
Amandeep Kaur, Pooja, Manju Bala | ||
Vol 5 (2011) | Defense Strategy for the Detection of Black Hole Attack in Dsr | Abstract PDF |
R. Raja Karpaga Brinda, P. Chandrasekar | ||
Vol 20 (2016) | Design and Analysis of 32 Bit Regular and Improved Square Root Carry Select Adder | Abstract PDF |
Anju Bala, Sunita Rani | ||
Vol 20 (2016) | Design and Analysis of Low Leakage 1-Bit Adder for Inexact Computing | Abstract PDF |
Savinder Kaur, Candy Goyal | ||
Vol 20 (2016) | Design and Analysis of Low Leakage 64-Bit Hybrid Adder using 22nm Technology | Abstract PDF |
Khushveen Sidhu, Candy Goyal | ||
Vol 26 (2017) | Design and Analysis of New Multi Keyword Ranked Search Schema Called SSEDU in Cloud Computing | Abstract PDF |
Pawan Kumar Tanwar, Ajay Khunteta, Vishal Goar | ||
Vol 4 (2011) | Design and Comparison of Butterworth and Chebyshev Type-1 Low Pass Filter Using Matlab | Abstract PDF |
Tushar Malica, Singdha Shekhar, Zakir Ali | ||
Vol 26 (2017) | Design and Development of In-House Software for Library Automation | Abstract PDF |
Sankait Gupta | ||
Vol 4 (2011) | Design and Properties of Transaction Processing System for Web Applications in the Cloud Computing | Abstract PDF |
Liladhar R. Rewatkar, Ujwal A. Lanjewar | ||
251 - 275 of 750 Items | First Previous 6 7 8 9 10 11 12 13 14 15 Next Last |
Browse Title Index
Scroll