|
Issue |
Title |
|
Vol 5, No 4: August 2015 |
A Comparative Study: Change Detection and Querying Dynamic XML Documents |
Abstract
PDF
|
Vijay R Sonawane, D.R. Rao |
|
Vol 8, No 5: October 2018 |
A Comparative Study: Taxonomy of High Performance Computing (HPC) |
Abstract
PDF
|
Ranjit Rajak |
|
Vol 11, No 1: February 2021 |
A comparison of activation functions in multilayer neural network for predicting the production and consumption of electricity power |
Abstract
PDF
|
Abdulwahed Salam, Abdelaaziz El Hibaoui, Abdulgabbar Saif |
|
Vol 8, No 6: December 2018 |
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing |
Abstract
PDF
|
T. Francis |
|
Vol 10, No 4: August 2020 |
A comparison of single phase standalone square waveform solar inverter topologies: half bridge and full bridge |
Abstract
PDF
|
Aicha Chemseddine, Noureddine Benabadji, Ali Cheknane, Salah Eddine Mankour |
|
Vol 6, No 1: February 2016 |
A Comparison of the Query Execution Algorithms in Secure Database System |
Abstract
PDF
|
Young-Dal Jang, Ji-Hong Kim |
|
Vol 8, No 6: December 2018 |
A Comparison Study of Reactive Power Control Strategies in Wind Farms with SVC and STATCOM |
Abstract
PDF
|
Nazha Cherkaoui, Touria Haidi, Abdelaziz Belfqih, Faissal El Mariami, Jamal Boukherouaa |
|
Vol 9, No 6: December 2019 |
A comparitive study on handover probability analysis for future HetNets |
Abstract
PDF
|
Neeraja Sajja, A. Abhishiktha |
|
Vol 8, No 2: April 2018 |
A Comprehensive Analysis of Partial Shading Effect on Output Parameters of a Grid-connected PV System |
Abstract
PDF
|
H. Rahimi Mirazizi, M. A. Shafiyi |
|
Vol 12, No 4: August 2022 |
A comprehensive fuzzy-based scheme for online detection of operational and topological changes |
Abstract
PDF
|
Amin Damanjani, Mohamad Hosseini Abardeh, Azita Azarfar, Mehrdad Hojjat |
|
Vol 10, No 3: June 2020 |
A comprehensive insight towards Pre-processing Methodologies applied on GPS data |
Abstract
PDF
|
R. Prabha, Mohan G Kabadi |
|
Vol 11, No 2: April 2021 |
A comprehensive review on hybrid network traffic prediction model |
Abstract
PDF
|
Jinmei Shi, Yu Beng Leau, Kun Li, Joe Henry Obit |
|
Vol 10, No 4: August 2020 |
A comprehensive study of distributed Denial-of-Service attack with the detection techniques |
Abstract
PDF
|
H. H. Ibrahim, A. E. Hamzah, H. A. Saeed, H. H. Qasim, O. S. Hamed, Hussein Yahya Alkhalaf, M. I. Hamza |
|
Vol 10, No 4: August 2020 |
A comprehensive study on disease risk predictions in machine learning |
Abstract
PDF
|
G. Saranya, A. Pravin |
|
Vol 8, No 4: August 2018 |
A Comprehensive Survey on Exiting Solution Approaches towards Security and Privacy Requirements of IoT |
Abstract
PDF
|
Rajani Chetan, Ramesh Shahabadkar |
|
Vol 9, No 5: October 2019 |
A compressive sensing algorithm for hardware trojan detection |
Abstract
PDF
|
priyatharishini m, M. Nirmala Devi |
|
Vol 8, No 6: December 2018 |
A Computational Analysis of ECC Based Novel Authentication Scheme in VANET |
Abstract
PDF
|
Sachin P. Godse, Parikshit N. Mahalle |
|
Vol 9, No 6: December 2019 |
A computational analysis of short sentences based on ensemble similarity model |
Abstract
PDF
|
Arifah Che Alhadi, Aziz Deraman, Masita Masila Abdul Jalil, Wan Nural Jawahir Wan Yussof, Rosmayati Mohemad |
|
Vol 9, No 5: October 2019 |
A computationally efficient detector for MIMO systems |
Abstract
PDF
|
Samer Alabed |
|
Vol 12, No 5: October 2022 |
A computationally efficient learning model to classify audio signal attributes |
Abstract
PDF
|
Maha Veera Vara Prasad Kantipud, Satish Kumar |
|
Vol 8, No 6: December 2018 |
A Context-based Numeral Reading Technique for Text to Speech Systems |
Abstract
PDF
|
Soumya Priyadarsini Panda, Ajit Kumar Nayak |
|
Vol 8, No 3: June 2018 |
A Cooperative Cache Management Scheme for IEEE802.15.4 based Wireless Sensor Networks |
Abstract
PDF
|
Piyush Charan, Tahsin Usmani, Rajeev Paulus, Syed Hasan Saeed |
|
Vol 8, No 5: October 2018 |
A CORDIC based QR Decomposition Technique for MIMO Detection |
Abstract
PDF
|
Shirly Edward A., Malarvizhi S. |
|
Vol 9, No 2: April 2019 |
A cost effective computational design of maximum power point tracking for photo-voltaic cell |
Abstract
PDF
|
Yoganandini A. P., Anitha G. S. |
|
Vol 9, No 5: October 2019 |
A cost-effective 2-tier security paradigm to safeguard cloud data with faster authentication |
Abstract
PDF
|
Veena R.S, Ramachandra V. Pujeri, Indiramma M |
|
51 - 75 of 4335 Items |
<< < 1 2 3 4 5 6 7 8 9 10 > >> |