| Issue | Title | |
| Vol 1, No 4 (2009) | Troubleshooting Networks Using Internet Control Message Protocol | Abstract |
| M. Anand Kumar, K. Appathurai, P. Nagarajan | ||
| Vol 4, No 5 (2012) | Truncated and Optimized Pilot-to-Data Power Ratio for MIMO-OFDM Systems | Abstract |
| Prasad Rayi, T. Manikyala Rao, Ch. Madhu Sudhan | ||
| Vol 7, No 10 (2015) | Tube Rack Security Checking Using Wireless Sensor Systems | Abstract |
| H. Ambika, N. Kavitha, A. Daison Raj, S. Suguna | ||
| Vol 8, No 4 (2016) | Tuning the Cell Planning Problem in Mobile Upbringing to Optimize the Cost and Path Using Self-Motivated Algorithm | Abstract |
| T. Prince, Dr. S. Thabasu Kannan | ||
| Vol 2, No 11 (2010) | UDP based Analysis of Ad hoc On-Demand Distance Vector Protocol in MANET | Abstract |
| Annapurna Singh, Mishra Shailendra | ||
| Vol 4, No 9 (2012) | Ultra High Tech Multi-Pipelining String Matching for Deep Packet Inspection | Abstract |
| N. Kannaiya Raja, Dr.K. Arulanandam, R. Prabhu | ||
| Vol 7, No 8 (2015) | Underwater Wireless Sensor Networks (UWSN), Architecture, Routing Protocols, Simulation and Modeling Tools, Localization, Security Issues and Some Novel Trends | Abstract |
| S. EL- Rabaie, D. Nabil, R. Mahmoud, Mohammed A. Alsharqawy | ||
| Vol 4, No 11 (2012) | User Authentication Mechanism for Sharing E-Resource in Educational Clouds | Abstract |
| I. Arulmani, L. Arockiam, N. Veeraragavan | ||
| Vol 4, No 3 (2012) | User Preferred Optimal Execution Path Selection from Quality Enabled Multi-Path Web Service Composition Graph | Abstract |
| S. Justin Samuel, Dr. T. Sasipraba | ||
| Vol 3, No 11 (2011) | User-Controlled Privacy Preserving Identity Management for Cloud Computing | Abstract |
| Viswanathan Pachaiyappan, R. Chandrasekar | ||
| Vol 10, No 4 (2018) | Uses of Grid Computing in Educational Infrastructure | Abstract |
| N. M. Abroja, A. Afila Parveen, R. Sathish Kumar | ||
| Vol 4, No 8 (2012) | Validating the Rule set with BDD & Usage with GEM for Improving Efficiency of Firewalls | Abstract |
| M. Kasi Viswanadh, Dr.P. Harini | ||
| Vol 8, No 4 (2016) | Various Scheduling Algorithm Based on Admission Control for Wireless Sensor Networks | Abstract |
| K. Kowsalya, S. Sabitha | ||
| Vol 10, No 2 (2018) | Vehicle Location Estimation by Dead Reckoning Using Inertial Measurement Unit Sensor in MEMS | Abstract |
| S. Abinaya Shivani, V. Nivetha, J. Mubeena, K. Roshni Rajan, R. Prabakaran, Dr.N.J.R. Muniraj | ||
| Vol 13, No 5 (2021) | Vehicular Emergency System Using Tracking System and XBee Technologies with SDN | Abstract |
| T. Padma, S. Rajeshwari, S. Shalini | ||
| Vol 6, No 2 (2014) | Verifiable Secret Sharing protocol for Mobile Ad-hoc Networks | Abstract |
| P.V. Siva Kumar, Dr. Rajasekhara Rao Kurra, Appala Naidu Tentu | ||
| Vol 4, No 11 (2012) | Vertical Scalability Issues and Challenges in Cloud Computing: An Overview | Abstract |
| M. Bala Vaishnavi, A. Stanislas, L. Arockiam | ||
| Vol 3, No 2 (2011) | Virtual Environment Security - Considerations & Practices | Abstract |
| S. Ranjitha Kumari, V. Kathiresan | ||
| Vol 3, No 6 (2011) | Virtual Password Obscuring in Avoidance of Keyloggers | Abstract |
| J. Jeysree | ||
| Vol 1, No 6 (2009) | Virtualization: A Foundation for Cloud Computing | Abstract |
| Dr. Manoj Devare, Mehdi Sheikhalishahi, Dr. Lucio Grandinetti | ||
| Vol 7, No 6 (2015) | Visual Cryptography | Abstract |
| Priya Sethi, Shipra Kataria, Deepika Bansal | ||
| Vol 8, No 2 (2016) | Visual Exploration Based Comparative Analysis of Tag Cloud Layout | Abstract |
| Darshita S. Pathak, Vidhi Jani | ||
| Vol 9, No 3 (2017) | VLSI Implementation of Brain Tumor Segmentation Using Fuzzy C-Mean Clustering | Abstract |
| S. Preethi | ||
| Vol 4, No 1 (2012) | VLSI Implementation of Data Security Architecture | Abstract |
| Dilip Thomas, K. S. M. Panicker | ||
| Vol 5, No 4 (2013) | VM Inclusive MeBaSA for Virtualized Multi-tier Cloud | Abstract |
| Ramesh D. Kodi, M. Balavaishnavi | ||
| 926 - 950 of 963 Items | << < 33 34 35 36 37 38 39 > >> | |
ISSN: 0974 – 9616