|
Issue |
Title |
|
Vol 5, No 3 (2022) |
Implications of Data Privacy among Business and Customers |
Abstract
|
Thirumurugan G, Jayasree M |
|
Vol 5, No 3 (2022) |
Improving Data and Identity Privacy in Online Social Networks |
Abstract
|
S. Meera, R. Sharmikha Sree |
|
Vol 6, No 2 (2023) |
IMPROVING NETWORK SECURITY IN SMALL AND MEDIUM-SIZED BUSINESSES THROUGH LOG ANALYSIS USING ELK |
Abstract
|
A.M. A.P Amarasinghe |
|
Vol 3, No 3 (2020) |
In MANET, talk about the ways in which AODV. |
Abstract
|
Aditi Dastkar |
|
Vol 3, No 2 (2020) |
Introduction to Big Data and Hadoop Technology |
Abstract
|
Shreya Rajiv Kulkarni, Sangram A. Patil, Ajinkya S. Shewale |
|
Vol 7, No 1 (2024) |
IP Address Validation between IPV4 & IPV6 |
Abstract
|
Sudipta Saha, Kazi Muntashir Fahad, Jannatuil Ferdouse Jannat, Effat Ara Tanzin, Ajoy Roy |
|
Vol 6, No 3 (2023) |
Keyword Search mechanism Using Multiple Authorities on Encrypted Cloud Data |
Abstract
|
Anupama T A, Megha M A |
|
Vol 5, No 1 (2022) |
Mind Growth Recognition Utilizing k-implies grouping and Fluffy C-implies Calculation |
Abstract
|
Md. Fakrul Hasan |
|
Vol 6, No 1 (2023) |
Moral System for Network safety |
Abstract
|
Harshitha Suresh, Pooja M R |
|
Vol 4, No 3 (2021) |
Multimodal Biometric System: A Comparative Study of Different Traits |
Abstract
|
Oyelakun T. A, Agbaje, M. O., Akande O, Izang, A. A. |
|
Vol 7, No 1 (2024) |
Navigating the Labyrinth: Choosing Your PhD Supervisor |
Abstract
|
T. Aditya Sai Srinivas, M. Bharathi |
|
Vol 4, No 1 (2021) |
Network Configuration by Utilizing Cisco Technologies with Proper Segmentation of Broadcast Domain in FNAS-UMYUK Nigeria |
Abstract
|
Aminu Aminu Muazu, Umar Ismaila Audi |
|
Vol 5, No 2 (2022) |
Network Interruption Recognition and Countermeasure Determination in Virtual Organization Frameworks |
Abstract
|
Dhanlaxmi N |
|
Vol 4, No 1 (2021) |
Network Security Enhancement through Effective Log Analysis using Elk for Small and Medium-Sized Business Environments |
Abstract
|
G.L.D. Maduranga |
|
Vol 3, No 3 (2020) |
Network with Wireless Sensor |
Abstract
|
Anita. S. Chordia, Shinde Megha Bajirao |
|
Vol 6, No 1 (2023) |
ONLINE MENTOR MONITORING SYSTEM WITH DATA MINING |
Abstract
|
M. Fathima, Ariya Varghese, S. Sangeetha, A. Aafiya Thahaseen |
|
Vol 1, No 2 (2018) |
Optimal Utilization of Dynamic Hop-Aware Buffer Management Scheme for Manet |
Abstract
|
R. Manikandan |
|
Vol 4, No 3 (2021) |
Optimization Algorithm in Cloud Computing Environment |
Abstract
|
K.W Ayeni |
|
Vol 5, No 3 (2022) |
Personal Data Protection of Educational Records for Students in Postgraduate Studies with Blockchain Scheme |
Abstract
|
Abusalem Reem Naeem F, Nor Fazlida Mohd Sani |
|
Vol 5, No 2 (2022) |
Plan and Execution of Development based Video cutting computation for noticing Surviellance Video Moves |
Abstract
|
Dhananjay Palliwal |
|
Vol 4, No 3 (2021) |
Plan and Implementation of Movement based Video Cutting Calculation for Checking Surviellance Video Transfers |
Abstract
|
Ashwani K |
|
Vol 1, No 1 (2018) |
Prognostication of STROKE using Data Mining Classification Techniques |
Abstract
|
A. Kalaiselvi |
|
Vol 1, No 2 (2018) |
Reactive Monitoring Adaptation for Dynamic Dataflow on Variable Infrastructure |
Abstract
|
Piyush Kumar |
|
Vol 3, No 2 (2020) |
Real Time Performance Statistics in Virtual Machines for Vmware DRS |
Abstract
|
Praveen Kumar K C, Suraksha S |
|
Vol 2, No 2 (2019) |
Restaurant Visitor Prediction Using Data Mining |
Abstract
|
Pramod Harkar |
|
51 - 75 of 100 Items |
<< < 1 2 3 4 > >> |