Issue | Title | |
Vol 9, No 2 (2017) | Ransomware of Things (RoT) | Abstract |
D. Kavya | ||
Vol 10, No 3 (2018) | Real Time Implementation of Fuzzy Based PID Controller Tuning for Continuous Stirred Tank Heater (CSTH) Process | Abstract |
A V Divya Priya, G. M. TamilSelvan, T Rajesh | ||
Vol 8, No 5 (2016) | Reducing Global Warming and Producing Green Environment with Solar Energy | Abstract |
K. Nivetha, S. Sivachandiran | ||
Vol 6, No 1 (2014) | Reduction of Energy Losses in Low Voltage Distribution Network Using Labview | Abstract |
B. Sankar, G. Jayapoornima | ||
Vol 3, No 3 (2011) | Remedy for Effective Cure of Diseases Using Combined Fuzzy Relational Maps | Abstract |
M.R. Bivin, N. Saivaraju, K.S. Ravichandran | ||
Vol 9, No 6 (2017) | Renewable Energy Source in Home | Abstract |
S. Jegan, UL. Arunkumar, M. Kowsapandian, S. Prabhakaran, R. Santhoshkumar | ||
Vol 6, No 2 (2014) | Resistive EM Wave Absorber using Phase Cancellation Technique | Abstract |
E. Krishna Kumar, N. Rajesh, S. Balamurali | ||
Vol 9, No 8 (2017) | Results on Fuzzy δ - Semi Preseparated Sets and Fuzzy Semi δ - Preseparation Axioms | Abstract |
Dr. Runu Dhar | ||
Vol 10, No 9 (2018) | Review of Fundamental Matrix Estimation Methods | Abstract |
N. Mohamed Abdul Kader Jailani | ||
Vol 11, No 2 (2019) | Safety Precautions for Driving | Abstract |
M. Kowshike, Srimathi Srimathi, K. Nanthini, Thulasiviswanathan Thulasiviswanathan | ||
Vol 7, No 3 (2015) | Secure Channel Aware Routing Protocol to Detect Malicious Nodes in Wireless Networks | Abstract |
Amrutha Mohan, K. Siva Kumar | ||
Vol 6, No 3 (2014) | Secure Cloud Architecture for Hospital Information System | Abstract |
C. Menaka, R.S. Ponmagal | ||
Vol 3, No 8 (2011) | Secure Data Communication Using Random Bit Substitution | Abstract |
J. Asha, A. Poonam Baid | ||
Vol 4, No 4 (2012) | Securing Wireless Sensor Networks Using Cryptographic Functions | Abstract |
Arunlal Nadar, S. Janani | ||
Vol 5, No 7 (2013) | Security and Privacy in Wired and Wireless Networks, Hybrid, Sensor and Adhoc Networks | Abstract |
M. Bala humsika, M. Deepthi | ||
Vol 5, No 7 (2013) | Security in Cloud Computing and Social Network | Abstract |
B. Rajdeepa, M. Premavathi | ||
Vol 6, No 1 (2014) | Semantic Image Segmentation and Web Supervised Visual Learning | Abstract |
R. Raja Guru, D. Pravin Kumar | ||
Vol 10, No 3 (2018) | Sentiment Analysis On Twitter Using Dynamic Fuzzy Approach | Abstract |
S. Indhu, S. R. Lavanya | ||
Vol 10, No 9 (2018) | Sentimental Analysis using Asymmetric Least Squares Twin Support Vector Machine (LSTSVM) | Abstract |
N. Saranya, Dr. R. Gunavathi | ||
Vol 10, No 9 (2018) | Serverless: The Game Changer | Abstract |
Lalit Kumar Sharma, R. Pinaka Pani | ||
Vol 9, No 8 (2017) | Shortest Path Calculation Using Swarm Techniques for Communication among Agents in a Network | Abstract |
Abhishek Sachan, Bineet Kumar Gupta | ||
Vol 9, No 6 (2017) | Smart Android Application for Tank Level System | Abstract |
G. K. Jenira, S. Uma Maheswari, B. Santhosh kumar, V. Kalaaranjini | ||
Vol 9, No 1 (2017) | Soft Computing | Abstract |
Dr. R. Khanchana, P. Roja, S. Narmadha | ||
Vol 3, No 1 (2011) | Soft Computing Techniques based Recursive Error Correcting Output Code for Multi-Class Pattern Classification | Abstract |
D. Chandrakala, Dr.S. Sumathi, S. Karthi | ||
Vol 3, No 8 (2011) | Software Effort Estimation Using Sizing Method | Abstract |
M. Balasubramanian, G. Rajarajeswari | ||
251 - 275 of 312 Items | << < 6 7 8 9 10 11 12 13 > >> |
ISSN: 0974 – 9608