Browse Title Index


 
Issue Title
 
Vol 13, No 3 (2021) Problems and Task of Cyber Protection and Cybercrime Abstract
Dr. M. Renuka Devi, U. S. Abisek, L. Divyadarshini, E. Kaviya
 
Vol 8, No 2 (2016) Proof of Data Integrity Using No-SQL Database in Cloud Storage: A Survey Abstract
Mahesh E. Pore, Amit B. Chougule
 
Vol 7, No 4 (2015) Proposed Spectrum Handoff Algorithm in Cognitive Radio Networks Using Fuzzy Logic Control Abstract
Shimaa Ali, Mona Shokair, Moawad I. Dessouky, Nagy Messiha, Hala S. El-sayed
 
Vol 8, No 5 (2016) Protection against Network Infection, Modeling and Restraining Network Using Malware Propagation Technique Abstract
M. Sudha, Neelima Jhavar
 
Vol 4, No 4 (2012) Prototyping and Detection of Concealing Worm Abstract
RaviTeja Gaddam, K. Ruth Mary Poornima
 
Vol 2, No 10 (2010) Providing Data Security through LED Technique in Wireless Sensor Networks Abstract
Dr.Ch.G.V.N. Prasad, K. Venkatesh Sharma, V. Prema Tulasi
 
Vol 5, No 11 (2013) Providing High Performance for Network Processing By Using DDR3 Based Look-Up Circuit Abstract
T. Jagadeesh, Dr.P. Ramana Reddy
 
Vol 1, No 6 (2009) Providing QOS for Mobile Ad-Hoc Network Abstract
A. Boomarani Malany, Dr. R. M. Chandrasekaran
 
Vol 2, No 6 (2010) Providing Security to Wireless Sensor Networks by Identifying and Preventing Malicious Node Abstract
A. Asha Joshia, I. Shahanaz Begumb
 
Vol 2, No 11 (2010) Providing Usage of Electronic Resources and Internet Services Offered By Tamil Nadu the Self Finance Engineering Colleges: With Special Reference to Villupuram District Abstract
Dr.V. Ramesh Babu, Dr.M. Nagarajan
 
Vol 2, No 8 (2010) PSPICE Simulation of Effect of Ground Bounce in PCB Abstract
G. Veera Senthil Kumar, P. Senthil Kumar, Dr. N. Suresh Kumar
 
Vol 3, No 10 (2011) QoS Service Selection, Binding and Mediation for Support Management in VRESCo Process Abstract
V. Padmavathi, M. Siva Sundara Vinayaga Moorthy
 
Vol 1, No 6 (2009) Qualitative Comparison of 2-Dimensional and 3-Dimensional Directed Geographical IP Traceback with Generalization to N Directions Abstract
A. Rajiv Kannan, Dr. K. Duaraiswamy, E. Sasikala
 
Vol 12, No 9-10 (2020) Quantum Resistant Cryptography – A Perspective on its Impact in Security Abstract
Changhyun Pang, Sang Moon Kim
 
Vol 6, No 1 (2014) RAA: Task Scheduling Algorithm in Grid Computing Environment Abstract
J. Abuthahir, S. Vaaheedha Kfatheen, Dr. M. Nazreen Banu
 
Vol 5, No 11 (2013) RAMAF Wired and Wireless Network Abstract
Dr.R. Gandhiraja
 
Vol 3, No 13 (2011) Raw Era in Cloud Computing Abstract
K. Srinivasa Rao, Dr. Shaik Nazeer, Syed Ziaur Rahman
 
Vol 1, No 1 (2009) Reactive Congestion Control Active Queue Management Schemes - Survey Abstract
G. Maria Priscilla, Dr. Antony Selvadoss Thanamani
 
Vol 8, No 4 (2016) Real Time Traffic Analysis of Online Social Networks Abstract
K. Ramesh
 
Vol 4, No 14 (2012) Real Time Traffic Management through Agent based Modeling Cloud Abstract
G. Poornima, P.V. Subba Reddy
 
Vol 8, No 7 (2016) Real-Time Big Data Analytical Architecture for Remote Sensing Application Abstract
Tipti Bharathi, Ramya Ramya, N. Mohana Priya
 
Vol 13, No 4 (2021) Real-Time Eye Tracking For Password Authentication Abstract
Anusha D Souza, R. Bhavana, Nikitha M Gaikwad, A. Harshitha, Dr. Bhagyashri R. Hanji
 
Vol 4, No 7 (2012) Real-Time Task Scheduling for the Performance Evaluation of Distributed Systems Abstract
Sagar Gulati, Kamal Deep, Anish Soni
 
Vol 4, No 1 (2012) Real-Time Wireless Sensor Network for Temperature Monitoring Abstract
Swati Mahabole, Dr. Sanjay Patil
 
Vol 3, No 10 (2011) Recognizing and Concatenating of the Tamil Syllables Using FPGA Abstract
Balachandra Pattanaik, C. Bhaskar
 
751 - 775 of 963 Items << < 26 27 28 29 30 31 32 33 34 35 > >> 


ISSN: 0974 – 9616