|
Issue |
Title |
|
Vol 5, No 1 (2014) |
A Case Based Practical Approach for Novel Data Transformation to Enhance Accuracy of Decision Tree Ensembles |
Abstract
|
Sandeep K. Budhani, Govind Singh |
|
Vol 8, No 1 (2017) |
A Comparative Analysis on CBIR with its Methods and Real Life Applications |
Abstract
|
Deepika Namjoshi, Shashikant Gupta |
|
Vol 2, No 1 (2011) |
A New Method for Measuring Overall Reliability and Performance in Growing Computer Networks with Static and Variable Connections |
Abstract
|
Baijnath Kaushik, Dr. Navdeep Kaur, Dr. Amit Kumar Kohli |
|
Vol 2, No 2 (2011) |
A Noble Approach towards Development of e-Governance Applications |
Abstract
|
Dr. Ashis Kumar Mahapatra, Dr. Sukanta Kumar Sahoo |
|
Vol 8, No 2 (2017) |
A Novel Approach for Detection and Prevention of Malicious Nodes in Mobile Ad Hoc Network |
Abstract
|
Sonam Choubey, Krishna Kumar Joshi |
|
Vol 3, No 1 (2012) |
A Novel Approach for Enhancing Direct Hashing and Pruning for Association Rule Mining |
Abstract
|
K. Purna Chand, Nallam Krishnaiah, G. Uday Kiran, Dr.G. Narsimha |
|
Vol 2, No 1 (2011) |
A Novel Approach to Image Enhancement using FUZZY Set |
Abstract
|
Gunamani Jena |
|
Vol 7, No 2 (2016) |
A Page Ranking Algorithm Based on Outbound links of a Page |
Abstract
|
Shivam Nagar, Arun Solanki |
|
Vol 5, No 3 (2014) |
A Practical Iterative Side Channel Cube Attack on AES-128/256 |
Abstract
|
Erfan Aghaee, Shahram Jamali, Majid Rahimi, Hamed Yusefi |
|
Vol 8, No 1 (2017) |
A Review of Attacks and Challenges in Mobile Cloud Computing |
Abstract
|
Bandana Sharma, Neelam Joshi |
|
Vol 8, No 2 (2017) |
A Review on Trust Based Approach and Various Attacks in Mobile Ad Hoc Network |
Abstract
|
Shweta Kushwah, Neelam Joshi |
|
Vol 6, No 3 (2015) |
A Review Paper on Security C++ |
Abstract
|
Vikash Kumar |
|
Vol 7, No 3 (2016) |
A Shareable Secure and Privacy Preserving Auditing Scheme for Cloud Storage Security |
Abstract
|
Raju Dara, Doddikousari Kumari |
|
Vol 8, No 1 (2017) |
A Study on Shortest Route Planning in Road Transportation Networks Using Remote Sensing Technology |
Abstract
|
Ritu Singh, Yogesh Awasthi, Praveen Kumar |
|
Vol 3, No 2 (2012) |
A Survey of Queuing and Scheduling Mechanism of Input-Queued Switches |
Abstract
|
D. Raghupathikumar, Dr K. BommannaRaja |
|
Vol 3, No 1 (2012) |
A Survey on Genetic Programming in Data Mining Tasks |
Abstract
|
Asst. Prof. Venkatadri Marriboyina, Asst. Prof. Hanumat G. Sastry, Prof. Lokanatha C. Reddy |
|
Vol 6, No 3 (2015) |
A Survey on Various Security Attacks in Mobile Ad-Hoc Network |
Abstract
|
Akansha Shrivastava, Ekta Chauhan |
|
Vol 8, No 1 (2017) |
A Survey Paper on Gene Expression Data in Data Mining |
Abstract
|
Somesh Shakya, Anshul Atre |
|
Vol 3, No 3 (2012) |
A Transaction Pattern Generation Tool (TPGT) for Prediction of Online Financial Transactions |
Abstract
|
Dr. Jyotindra N. Dharwa, Dr. Ashok R. Patel |
|
Vol 2, No 2 (2011) |
A Web-Enabled Fuzzy Expert System Shell for Flower Rose |
Abstract
|
Arun Solanki, Dr. Ela Kumar |
|
Vol 8, No 2 (2017) |
Adoption to Big Data Analytics: Privacy Issues and Integration of PPDM to overcome it |
Abstract
|
Darshan B. Patel |
|
Vol 6, No 1 (2015) |
Alternate Web Query Generation and Refined Search Results Using Query Expansion |
Abstract
|
Senthil Kumar, Dr. Dinakaran M |
|
Vol 4, No 3 (2013) |
An Approach of Likelihood Ratio Score Fusion for Appearance and Shape based Face Recognition |
Abstract
|
Dr. Md. Rabiul Islam |
|
Vol 6, No 3 (2015) |
An Approach to Image Recognition on the Basis of Plant Diseases Ontology |
Abstract
|
Nikita Rishi, Jagbir Singh Gill |
|
Vol 5, No 3 (2014) |
An Exploration on Data Mining for Face Detection based on Real-time Face Tracking |
Abstract
|
Murugananthan Velayutham, B. L. Shivakumar |
|
1 - 25 of 110 Items |
1 2 3 4 5 > >> |