Categories

Full-Text AvailableAbstract Only

Show:
Sort By:
       141. Fingerprint authentication using graph theory
Srinivasan S, Arun Kodnani, Ayush Gaur, Harsh Bajaj and Harshit Singhal
Abstract | Pdf Category : Computing and Informatics    |   Sub Category  : Information Technology
       142. The application of Metadata for ELearning purposes
Mohammad Reza Moslehi
Abstract | Pdf Category : Computing and Informatics    |   Sub Category  : Information Technology
       143. Expert systems: human intelligence using computational means in industries
Nishant Dubey
Abstract | Pdf Category : Computing and Informatics    |   Sub Category  : Information Technology
       144. Learning Objects: Teaching with Technology
Mohammad Reza Moslehi
Abstract | Pdf Category : Computing and Informatics    |   Sub Category  : Information Technology
       145. The special heart and respiration on networks using Christina theory
T. Shantha Kumar
Abstract | Pdf Category : Computing and Informatics    |   Sub Category  : Information Technology
       146. Application of data mining to improve the efficiency of a search engine
Geetha Mary A, Rohit Singh and Sudarshan Kumar
Abstract | Pdf Category : Computing and Informatics    |   Sub Category  : Information Technology
       147. Ethical behavior of implanting electronic chip in the brain
Nidhi Bansal and A.K.Vatsa
Abstract | Pdf Category : Computing and Informatics    |   Sub Category  : Information Technology
       148. Heuristic algorithm for multi-index fixed charge fuzzy transportation problem
W.Ritha and J.Merlin Vinotha
Abstract | Pdf Category : Computing and Informatics    |   Sub Category  : Information Technology
       149. Cloud computing: The next Era of Ente rprise IT
M. Deepa, Paritosh Bapat, Shivani Dole and B.Persis Urbana Ivy
Abstract | Pdf Category : Computing and Informatics    |   Sub Category  : Information Technology
       150. Examining the possibility of rearrangement of job classes based on risk in Individual Accident Insurance using data mining techniques
Mohammad Hassan zadeh and Neda Ghazimoradi
Abstract | Pdf Category : Computing and Informatics    |   Sub Category  : Information Technology