|
Issue |
Title |
|
Vol 2, No 3 (2011): September |
Formal Notation for Metric Space Based Software Testing Strategy |
Abstract
PDF
|
Mirza Mahmood Baig |
|
Vol 2, No 3 (2011): September |
Fuzzy Logic and Neural Network Control Systems for Backing up a Truck and a Trailer |
Abstract
PDF
|
Chamilka Rajith Jayarathna, Janaka Wijayakulasooriya, Saluka Kodituwakku |
|
Vol 4, No 1 (2013): March |
Identification of Corneal Aberrations by using Computer Techniques |
Abstract
PDF
|
Baki Koyuncu, Pınar Kocabaşoglu |
|
Vol 3, No 4 (2012): December |
Image Classification and Optimized Image |
Abstract
PDF
|
jaswinder singh dilawari |
|
Vol 2, No 4 (2011): December Issue |
Improving Offshore-Outsourced Software Development requirement Risk Prioritization,Scheduling and Prediction |
Abstract
PDF
|
zeynab shima salarian, Hassan Rashidi |
|
Vol 3, No 3 (2012): September |
Information Centric Networks - Design Issues, Principles and Approaches |
Abstract
PDF
|
Fernando Luis Ferreira Almeida, Justino Marques Lourenço |
|
Vol 4, No 3 (2013): September |
Intrusion Detection System Based on User Behavior Using Data Mining Techniques |
Abstract
PDF
|
Hind Alsharif, Omar Batarfi |
|
Vol 2, No 3 (2011): September |
Major E-Governance Projects in an Indian State (Rajasthan) |
Abstract
PDF
|
SANJAY TEJASVEE |
|
Vol 4, No 1 (2013): March |
Maximizing a Lifetime of Wireless Sensor Network by Scheduling |
Abstract
PDF
|
Rakhi Khedikar |
|
Vol 3, No 1 (2012): March |
Mobile Marketing and Consumer Behavior Current Research Trends |
Abstract
PDF
|
Antoine Lamarre, Simon Galarneau and Harold Boeck |
|
Vol 3, No 1 (2012): March |
Modeling of Employee Recruitment Process through UML |
Abstract
PDF
|
Gufran Ahmad Ansari, Mohammad Al-shabi |
|
Vol 2, No 3 (2011): September |
New Routing Protocol by using of Cellular Automata In Wireless Sensor Network |
Abstract
PDF
|
Hadi To0fani |
|
Vol 2, No 4 (2011): December Issue |
On Hwang and Yang’s Definition of Entropy of Fuzzy sets |
Abstract
PDF
|
Mamoni Dhar |
|
Vol 3, No 2 (2012): June |
OPTIMIZATION INTO UI APPLICATION DEVELOPMENT USING CONTROL ARRAY, INHERITANCE AND POLYMORPHISM IN OOP’S |
Abstract
PDF
|
devendra gahlot |
|
Vol 2, No 4 (2011): December Issue |
Performance Analysis of Artificial Immune System With Skewed Class Data |
Abstract
PDF
|
Sridevi Singaravelon |
|
Vol 2, No 4 (2011): December Issue |
Performance Analysis Of SSK and Trellis Coded Spatial Modulation In MIMO |
Abstract
PDF
|
Ancy Marzla |
|
Vol 2, No 3 (2011): September |
Performance Tuning Mechanisms for Implementation a Successful Data Warehouse |
Abstract
PDF
|
Vishal Gour |
|
Vol 3, No 2 (2012): June |
Power Industry Computer Control System Design and Implementation Problems: A Case Study of Poland |
Abstract
PDF
|
Man-Wook Han, Jozef Bohdan Lewoc, Antoni Izworski, Slawomir Skowronski, Antonina Kieleczawa |
|
Vol 2, No 3 (2011): September |
Radial Basis Artificial Neural Network Computer Engineering Methodology for Predicting Shelf Life of Brown Milk Cakes Decorated with Almonds |
Abstract
PDF
|
Sumit Goyal |
|
Vol 4, No 2 (2013): June |
Recognition of mischievous data packets In the networking |
Abstract
PDF
|
G.Bala Venkata Kishore, B. Purnaiah, B.kishore Babu |
|
Vol 3, No 2 (2012): June |
Scalable Storage Architecture for Multiple Streaming I/O Applications |
Abstract
PDF
|
Han Gyoo Kim |
|
Vol 2, No 3 (2011): September |
Secure Data Transfer Based On Conventional Encryption Technique Including Random Number Key Generation |
Abstract
PDF
|
Satyanarayana Reddy Beeram |
|
Vol 4, No 2 (2013): June |
Securing Layer-3 Wormhole Attacks in Ad-Hoc Networks |
Abstract
PDF
|
T. Krishna Rao |
|
Vol 2, No 3 (2011): September |
Simulation of Regression Analysis by an Automated System utilizing Artificial Neural Networks |
Abstract
PDF
|
Dhanamalee Kanchana Bandara, Roshan Darshana Yapa, Saluka Kodituwakku |
|
Vol 2, No 3 (2011): September |
Spatial Masking in No Reference Mode |
Abstract
PDF
|
Muhammad Tahir Qadri |
|
26 - 50 of 57 Items |
<< < 1 2 3 > >> |