| Issue | Title | |
| Vol 9, No 2 (2017) | Ransomware of Things (RoT) | Abstract |
| D. Kavya | ||
| Vol 10, No 3 (2018) | Real Time Implementation of Fuzzy Based PID Controller Tuning for Continuous Stirred Tank Heater (CSTH) Process | Abstract |
| A V Divya Priya, G. M. TamilSelvan, T Rajesh | ||
| Vol 8, No 5 (2016) | Reducing Global Warming and Producing Green Environment with Solar Energy | Abstract |
| K. Nivetha, S. Sivachandiran | ||
| Vol 6, No 1 (2014) | Reduction of Energy Losses in Low Voltage Distribution Network Using Labview | Abstract |
| B. Sankar, G. Jayapoornima | ||
| Vol 3, No 3 (2011) | Remedy for Effective Cure of Diseases Using Combined Fuzzy Relational Maps | Abstract |
| M.R. Bivin, N. Saivaraju, K.S. Ravichandran | ||
| Vol 9, No 6 (2017) | Renewable Energy Source in Home | Abstract |
| S. Jegan, UL. Arunkumar, M. Kowsapandian, S. Prabhakaran, R. Santhoshkumar | ||
| Vol 6, No 2 (2014) | Resistive EM Wave Absorber using Phase Cancellation Technique | Abstract |
| E. Krishna Kumar, N. Rajesh, S. Balamurali | ||
| Vol 9, No 8 (2017) | Results on Fuzzy δ - Semi Preseparated Sets and Fuzzy Semi δ - Preseparation Axioms | Abstract |
| Dr. Runu Dhar | ||
| Vol 10, No 9 (2018) | Review of Fundamental Matrix Estimation Methods | Abstract |
| N. Mohamed Abdul Kader Jailani | ||
| Vol 11, No 2 (2019) | Safety Precautions for Driving | Abstract |
| M. Kowshike, Srimathi Srimathi, K. Nanthini, Thulasiviswanathan Thulasiviswanathan | ||
| Vol 7, No 3 (2015) | Secure Channel Aware Routing Protocol to Detect Malicious Nodes in Wireless Networks | Abstract |
| Amrutha Mohan, K. Siva Kumar | ||
| Vol 6, No 3 (2014) | Secure Cloud Architecture for Hospital Information System | Abstract |
| C. Menaka, R.S. Ponmagal | ||
| Vol 3, No 8 (2011) | Secure Data Communication Using Random Bit Substitution | Abstract |
| J. Asha, A. Poonam Baid | ||
| Vol 4, No 4 (2012) | Securing Wireless Sensor Networks Using Cryptographic Functions | Abstract |
| Arunlal Nadar, S. Janani | ||
| Vol 5, No 7 (2013) | Security and Privacy in Wired and Wireless Networks, Hybrid, Sensor and Adhoc Networks | Abstract |
| M. Bala humsika, M. Deepthi | ||
| Vol 5, No 7 (2013) | Security in Cloud Computing and Social Network | Abstract |
| B. Rajdeepa, M. Premavathi | ||
| Vol 6, No 1 (2014) | Semantic Image Segmentation and Web Supervised Visual Learning | Abstract |
| R. Raja Guru, D. Pravin Kumar | ||
| Vol 10, No 3 (2018) | Sentiment Analysis On Twitter Using Dynamic Fuzzy Approach | Abstract |
| S. Indhu, S. R. Lavanya | ||
| Vol 10, No 9 (2018) | Sentimental Analysis using Asymmetric Least Squares Twin Support Vector Machine (LSTSVM) | Abstract |
| N. Saranya, Dr. R. Gunavathi | ||
| Vol 10, No 9 (2018) | Serverless: The Game Changer | Abstract |
| Lalit Kumar Sharma, R. Pinaka Pani | ||
| Vol 9, No 8 (2017) | Shortest Path Calculation Using Swarm Techniques for Communication among Agents in a Network | Abstract |
| Abhishek Sachan, Bineet Kumar Gupta | ||
| Vol 9, No 6 (2017) | Smart Android Application for Tank Level System | Abstract |
| G. K. Jenira, S. Uma Maheswari, B. Santhosh kumar, V. Kalaaranjini | ||
| Vol 9, No 1 (2017) | Soft Computing | Abstract |
| Dr. R. Khanchana, P. Roja, S. Narmadha | ||
| Vol 3, No 1 (2011) | Soft Computing Techniques based Recursive Error Correcting Output Code for Multi-Class Pattern Classification | Abstract |
| D. Chandrakala, Dr.S. Sumathi, S. Karthi | ||
| Vol 3, No 8 (2011) | Software Effort Estimation Using Sizing Method | Abstract |
| M. Balasubramanian, G. Rajarajeswari | ||
| 251 - 275 of 312 Items | << < 6 7 8 9 10 11 12 13 > >> | |
ISSN: 0974 – 9608