Issue | Title | |
Vol 13, No 3 (2021) | Problems and Task of Cyber Protection and Cybercrime | Abstract |
Dr. M. Renuka Devi, U. S. Abisek, L. Divyadarshini, E. Kaviya | ||
Vol 8, No 2 (2016) | Proof of Data Integrity Using No-SQL Database in Cloud Storage: A Survey | Abstract |
Mahesh E. Pore, Amit B. Chougule | ||
Vol 7, No 4 (2015) | Proposed Spectrum Handoff Algorithm in Cognitive Radio Networks Using Fuzzy Logic Control | Abstract |
Shimaa Ali, Mona Shokair, Moawad I. Dessouky, Nagy Messiha, Hala S. El-sayed | ||
Vol 8, No 5 (2016) | Protection against Network Infection, Modeling and Restraining Network Using Malware Propagation Technique | Abstract |
M. Sudha, Neelima Jhavar | ||
Vol 4, No 4 (2012) | Prototyping and Detection of Concealing Worm | Abstract |
RaviTeja Gaddam, K. Ruth Mary Poornima | ||
Vol 2, No 10 (2010) | Providing Data Security through LED Technique in Wireless Sensor Networks | Abstract |
Dr.Ch.G.V.N. Prasad, K. Venkatesh Sharma, V. Prema Tulasi | ||
Vol 5, No 11 (2013) | Providing High Performance for Network Processing By Using DDR3 Based Look-Up Circuit | Abstract |
T. Jagadeesh, Dr.P. Ramana Reddy | ||
Vol 1, No 6 (2009) | Providing QOS for Mobile Ad-Hoc Network | Abstract |
A. Boomarani Malany, Dr. R. M. Chandrasekaran | ||
Vol 2, No 6 (2010) | Providing Security to Wireless Sensor Networks by Identifying and Preventing Malicious Node | Abstract |
A. Asha Joshia, I. Shahanaz Begumb | ||
Vol 2, No 11 (2010) | Providing Usage of Electronic Resources and Internet Services Offered By Tamil Nadu the Self Finance Engineering Colleges: With Special Reference to Villupuram District | Abstract |
Dr.V. Ramesh Babu, Dr.M. Nagarajan | ||
Vol 2, No 8 (2010) | PSPICE Simulation of Effect of Ground Bounce in PCB | Abstract |
G. Veera Senthil Kumar, P. Senthil Kumar, Dr. N. Suresh Kumar | ||
Vol 3, No 10 (2011) | QoS Service Selection, Binding and Mediation for Support Management in VRESCo Process | Abstract |
V. Padmavathi, M. Siva Sundara Vinayaga Moorthy | ||
Vol 1, No 6 (2009) | Qualitative Comparison of 2-Dimensional and 3-Dimensional Directed Geographical IP Traceback with Generalization to N Directions | Abstract |
A. Rajiv Kannan, Dr. K. Duaraiswamy, E. Sasikala | ||
Vol 12, No 9-10 (2020) | Quantum Resistant Cryptography – A Perspective on its Impact in Security | Abstract |
Changhyun Pang, Sang Moon Kim | ||
Vol 6, No 1 (2014) | RAA: Task Scheduling Algorithm in Grid Computing Environment | Abstract |
J. Abuthahir, S. Vaaheedha Kfatheen, Dr. M. Nazreen Banu | ||
Vol 5, No 11 (2013) | RAMAF Wired and Wireless Network | Abstract |
Dr.R. Gandhiraja | ||
Vol 3, No 13 (2011) | Raw Era in Cloud Computing | Abstract |
K. Srinivasa Rao, Dr. Shaik Nazeer, Syed Ziaur Rahman | ||
Vol 1, No 1 (2009) | Reactive Congestion Control Active Queue Management Schemes - Survey | Abstract |
G. Maria Priscilla, Dr. Antony Selvadoss Thanamani | ||
Vol 8, No 4 (2016) | Real Time Traffic Analysis of Online Social Networks | Abstract |
K. Ramesh | ||
Vol 4, No 14 (2012) | Real Time Traffic Management through Agent based Modeling Cloud | Abstract |
G. Poornima, P.V. Subba Reddy | ||
Vol 8, No 7 (2016) | Real-Time Big Data Analytical Architecture for Remote Sensing Application | Abstract |
Tipti Bharathi, Ramya Ramya, N. Mohana Priya | ||
Vol 13, No 4 (2021) | Real-Time Eye Tracking For Password Authentication | Abstract |
Anusha D Souza, R. Bhavana, Nikitha M Gaikwad, A. Harshitha, Dr. Bhagyashri R. Hanji | ||
Vol 4, No 7 (2012) | Real-Time Task Scheduling for the Performance Evaluation of Distributed Systems | Abstract |
Sagar Gulati, Kamal Deep, Anish Soni | ||
Vol 4, No 1 (2012) | Real-Time Wireless Sensor Network for Temperature Monitoring | Abstract |
Swati Mahabole, Dr. Sanjay Patil | ||
Vol 3, No 10 (2011) | Recognizing and Concatenating of the Tamil Syllables Using FPGA | Abstract |
Balachandra Pattanaik, C. Bhaskar | ||
751 - 775 of 963 Items | << < 26 27 28 29 30 31 32 33 34 35 > >> |
ISSN: 0974 – 9616