Collection's Items (Sorted by Submit Date in Descending order): 21 to 40 of 408
Issue Date | Title | Author(s) |
2017-05 | Restful Web Service Protocol Testing Using TTCN3 | Bal, Prabhjot Singh; Singh, Dalwinder |
2017-06 | An Optimized Approach to Improve the Quality of Education | Babbar, Priya; Singh, Barjinder |
2016-12 | Virtualizing Hadoop Map Reduce Framework Using Virtual Box To Enhance the Performance | Madhuri; Devaser, Virrat |
2017-05 | An Improved Approch for Congestion Control in Wireless Sensor Network | Kapoor, Gaurav; Singh, Mandeep |
2015-05 | Job Scheduling Algorithm For Computational Grid in Grid Computing Environment | Kumari, Seema; Kumar, Gulshan |
2015-05 | NDTALGO: Enhancement of Decision Tree Algorithm Based on Mobile Services | Singh, Sukhchain; Kaur, Manjit |
2015-06 | A Technique to Enhance the Privacy Issues in Cloud Computing | Devi, Promila; Mann, Deep |
2015-06 | Compositional Semantics Tool for Automatic Title Generation in English Language using NLP | Seema; Agrawal, Prateek |
2015-05 | Development of Liver Cancer Ontology (LCO) Using Ontology Based Tools | Kaur, Parminder; Khamparia, Aditya |
2015-04 | Multi - Assignment Clustering of Boolean data | Nahar, Suraj; Kaur, Karanvir |
2015-05 | Risk Analysis and Augmentation of CRM Using Association Rule Mining | Singh, Amarjit; Vashisht, Sheveta |
2015-05 | Controlling Mouse Pointer Using Gesture Recognition | Kaur, Manpreet; Kaur, Sandeep |
2015-06 | Enhance K-Mean Clustering Algorithm for Rough Sub-spaces | Kaur, Harjinder; Kaur, Karanvir |
2015-06 | Adaptive Neuro-Fuzzy (ANFIS) Approach for Effective Selection of Job Applicants at Certain Offered Post | Verma, Rajni; Singh, Sanjay Kumar |
2015-05 | Automatic Rule Based Approach for Solving Verbal Reasoning Blood Relationship Problems | Narang, Neha; Kaur, Darvinder |
2015-05 | Efficient Scheme for Recognition and Eviction of Sybil Attack in VANET | Narang, Sagar; Munjal, Kundan |
2015-05 | Image Encryption Algorithm Based on Modified AES | Sidhu, Sumit; Ravishanker |
2015-04 | A DBS Intrusion Detection and Prevention System in Wireless Sensor Network | Singh, Amanpreet; Sharma, Sangeeta |
2015-05 | Prevention and Detection of SQL Injection Attacks using an Advanced Version of Aho-Corasick Algorithm | Nitika; Srivastava, Roshan |
2015-05 | To Reduce Processing time to generate frequent itemset using Laplace equation in Apriori algorithm | Singla, Shilpi; Malik, Arun |
Collection's Items (Sorted by Submit Date in Descending order): 21 to 40 of 408