Categories

Full-Text AvailableAbstract Only

Show:
Sort By:
       191. An Automation Software for ECR Experiment at Cryogenics Temperatures
Rajiv Jain and J Nagaraju
Abstract | Pdf Category : Computing and Informatics    |   Sub Category  : Information Technology
       192. Analysis and evaluating of quality of Tehran university cohesive training systems
Seyed Mohammad Mahmoudi, Gholamreza Jandaghi, Zolfa Haghgooyan and Zahra Karimi Asl
Abstract | Pdf Category : Computing and Informatics    |   Sub Category  : Information Technology
       193. Phishing attack Generalization
Sumit Dhariwal, Sneha Soni and Romil Rawat
Abstract | Pdf Category : Computing and Informatics    |   Sub Category  : Information Technology
       194. Random pattern based flexible user interface for an effective secured authentication protocol
R. Sujatha and G. Arumugam
Abstract | Pdf Category : Computing and Informatics    |   Sub Category  : Information Technology
       195. A survey on effective webmining algorithms
M. Renuka Devi and S.Saravanan
Abstract | Pdf Category : Computing and Informatics    |   Sub Category  : Information Technology
       196. Automatic facial detection from input videos
S.Muralidharan and T. Dhavaselvan
Abstract | Pdf Category : Computing and Informatics    |   Sub Category  : Information Technology
       197. Detection of UDP, TCP and ICMP anomalies on real time traffic
Mahendra Kumar Rai and Vijay Shankar Mishra
Abstract | Pdf Category : Computing and Informatics    |   Sub Category  : Information Technology
       198. Speech recognition - A computer mediated approach
Sreedhar Appalabatla, Mungamuru Nirmala and Kaliyaperumal Karthikeyan
Abstract | Pdf Category : Computing and Informatics    |   Sub Category  : Information Technology
       199. A Study on Spectrum Sharing Approach Using Cognitive Radio To Enhance Throughput Efficiency of Ad Hoc Networks
L. Nagarajan and V. Jayaraj
Abstract | Pdf Category : Computing and Informatics    |   Sub Category  : Information Technology
       200. Applying adaptively reduced-order extended Kalman filter in cloud computing for intensifying its security
Masoud Ale Seyyedan
Abstract | Pdf Category : Computing and Informatics    |   Sub Category  : Information Technology