|
Issue |
Title |
|
Vol 4, No 1 (2022) |
Task Scheduling Algorithms in Mobile Edge Computing – A Survey |
Abstract
|
S. M. Muthukumari, Dr. E. George Dharma Prakash Raj |
|
Vol 7, No 1 (2025) |
Template based Program synthesis with Declarative Programming for RESTful APIs |
Abstract
|
Arjun Singh Saud, Tenish Shrestha |
|
Vol 7, No 2 (2025) |
THE EVOLVING CLOUD SECURITY LANDSCAPE: CHALLENGES AND SOLUTIONS |
Abstract
|
Syed Zaid, Pranav Kumar Mishra, Yogish TR, Manjunath B |
|
Vol 5, No 2 (2023) |
The principle of Image, Video Processing Practices and Techniques |
Abstract
|
JITENDRA SUNTE |
|
Vol 7, No 1 (2025) |
The Study of Fog Computing: Security and Privacy, Energy Consumption, Quality of Experience/Services, Offloading, and Task Scheduling |
Abstract
|
Choon Keat Low, Yen Phing Ng, YiQi Tew, Lim Chi Qing |
|
Vol 5, No 3 (2023) |
Trojan Malware Detection Using Steganography, Deep Learning and Machine Learning Concepts |
Abstract
|
Hari Krishnan Anil Jameni, Lekshmi Anil, Navya Asok, Jasim S, Mruthula N R |
|
Vol 3, No 1 (2021) |
Understanding the Factors Affecting the Intention to Adopt Cloud Technology among University Student of Nepal using Technology Acceptance Model |
Abstract
|
Mala Deep Upadhaya, Nilima Dahal, Sachin Byanju, Pranit Dahal, Manish Pokharel |
|
Vol 4, No 3 (2022) |
University Circulars to Higher Authorities of an Institute |
Abstract
|
Dr. Ami Tusharkant Choksi |
|
Vol 7, No 1 (2025) |
Using KNN Model and Signature-Based Model as Hybrid Model for Malware Detection |
Abstract
|
Low Choon Keat, Tan Xuan Ying |
|
Vol 7, No 1 (2025) |
Web Browser Anti-Phishing extension Based On Website Trustworthiness Evaluation |
Abstract
|
Choon Keat Low, Yen Phing NG, Lee Yan |
|
Vol 2, No 1 (2020) |
What is Client-Server System: Architecture, Issues and Challenge of Client -Server System (Review) |
Abstract
|
Sawsan Ali Hamid, Rana Alaudeen Abdulrahman, Dr.Ruaa Ali Khamees |
|
101 - 111 of 111 Items |
<< < 1 2 3 4 5 |