Browse Title Index

Issue Title
Vol 5, No 4: August 2015 A Comparative Study: Change Detection and Querying Dynamic XML Documents Abstract   PDF
Vijay R Sonawane, D.R. Rao
Vol 8, No 5: October 2018 A Comparative Study: Taxonomy of High Performance Computing (HPC) Abstract   PDF
Ranjit Rajak
Vol 11, No 1: February 2021 A comparison of activation functions in multilayer neural network for predicting the production and consumption of electricity power Abstract   PDF
Abdulwahed Salam, Abdelaaziz El Hibaoui, Abdulgabbar Saif
Vol 8, No 6: December 2018 A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing Abstract   PDF
T. Francis
Vol 10, No 4: August 2020 A comparison of single phase standalone square waveform solar inverter topologies: half bridge and full bridge Abstract   PDF
Aicha Chemseddine, Noureddine Benabadji, Ali Cheknane, Salah Eddine Mankour
Vol 6, No 1: February 2016 A Comparison of the Query Execution Algorithms in Secure Database System Abstract   PDF
Young-Dal Jang, Ji-Hong Kim
Vol 8, No 6: December 2018 A Comparison Study of Reactive Power Control Strategies in Wind Farms with SVC and STATCOM Abstract   PDF
Nazha Cherkaoui, Touria Haidi, Abdelaziz Belfqih, Faissal El Mariami, Jamal Boukherouaa
Vol 9, No 6: December 2019 A comparitive study on handover probability analysis for future HetNets Abstract   PDF
Neeraja Sajja, A. Abhishiktha
Vol 8, No 2: April 2018 A Comprehensive Analysis of Partial Shading Effect on Output Parameters of a Grid-connected PV System Abstract   PDF
H. Rahimi Mirazizi, M. A. Shafiyi
Vol 12, No 4: August 2022 A comprehensive fuzzy-based scheme for online detection of operational and topological changes Abstract   PDF
Amin Damanjani, Mohamad Hosseini Abardeh, Azita Azarfar, Mehrdad Hojjat
Vol 10, No 3: June 2020 A comprehensive insight towards Pre-processing Methodologies applied on GPS data Abstract   PDF
R. Prabha, Mohan G Kabadi
Vol 11, No 2: April 2021 A comprehensive review on hybrid network traffic prediction model Abstract   PDF
Jinmei Shi, Yu Beng Leau, Kun Li, Joe Henry Obit
Vol 10, No 4: August 2020 A comprehensive study of distributed Denial-of-Service attack with the detection techniques Abstract   PDF
H. H. Ibrahim, A. E. Hamzah, H. A. Saeed, H. H. Qasim, O. S. Hamed, Hussein Yahya Alkhalaf, M. I. Hamza
Vol 10, No 4: August 2020 A comprehensive study on disease risk predictions in machine learning Abstract   PDF
G. Saranya, A. Pravin
Vol 8, No 4: August 2018 A Comprehensive Survey on Exiting Solution Approaches towards Security and Privacy Requirements of IoT Abstract   PDF
Rajani Chetan, Ramesh Shahabadkar
Vol 9, No 5: October 2019 A compressive sensing algorithm for hardware trojan detection Abstract   PDF
priyatharishini m, M. Nirmala Devi
Vol 8, No 6: December 2018 A Computational Analysis of ECC Based Novel Authentication Scheme in VANET Abstract   PDF
Sachin P. Godse, Parikshit N. Mahalle
Vol 9, No 6: December 2019 A computational analysis of short sentences based on ensemble similarity model Abstract   PDF
Arifah Che Alhadi, Aziz Deraman, Masita Masila Abdul Jalil, Wan Nural Jawahir Wan Yussof, Rosmayati Mohemad
Vol 9, No 5: October 2019 A computationally efficient detector for MIMO systems Abstract   PDF
Samer Alabed
Vol 12, No 5: October 2022 A computationally efficient learning model to classify audio signal attributes Abstract   PDF
Maha Veera Vara Prasad Kantipud, Satish Kumar
Vol 8, No 6: December 2018 A Context-based Numeral Reading Technique for Text to Speech Systems Abstract   PDF
Soumya Priyadarsini Panda, Ajit Kumar Nayak
Vol 8, No 3: June 2018 A Cooperative Cache Management Scheme for IEEE802.15.4 based Wireless Sensor Networks Abstract   PDF
Piyush Charan, Tahsin Usmani, Rajeev Paulus, Syed Hasan Saeed
Vol 8, No 5: October 2018 A CORDIC based QR Decomposition Technique for MIMO Detection Abstract   PDF
Shirly Edward A., Malarvizhi S.
Vol 9, No 2: April 2019 A cost effective computational design of maximum power point tracking for photo-voltaic cell Abstract   PDF
Yoganandini A. P., Anitha G. S.
Vol 9, No 5: October 2019 A cost-effective 2-tier security paradigm to safeguard cloud data with faster authentication Abstract   PDF
Veena R.S, Ramachandra V. Pujeri, Indiramma M
51 - 75 of 4335 Items << < 1 2 3 4 5 6 7 8 9 10 > >>