Collection's Items (Sorted by Submit Date in Descending order): 601 to 620 of 754
Preview | Issue Date | Title | Author(s) |
| 2016-08 | BOTNET DETECTION AND OPTIMIZATION USING HONEYPOT | SRIVASTAVA, PRAKHAR |
| 2016-08 | ROTATION AND SCALE INVARIANT OBJECT DETECTION | CHOUDHARY, SUCHITRA |
| 2016-08 | COGNITIVE PACKET NETWORK | DIXIT, KISHORE CHANDRA |
| 2016-08 | WEB APPLICATION TESTING | MADAN, SANSKRITI |
| 2016-08 | DEFECT SEVERITY PREDICTION USING TEXT MINING | SRIVASTAVA, YOGESH KUMAR |
| 2016-07 | SOFTWARE TEST DATA GENERATION USING GENETIC ALGORITHM | GUPTA, ASHISH |
| 2016-07 | INVESTIGATING THE EFFECTS OF REFACTORING ON SOFTWARE MAINTAINABILITY | GAUR, SACHIN |
| 2016-07 | EMPIRICAL VALIDATION OF OBJECT ORIENTED METRICS USING MACHINE LEARNING METHODS | SHARMA, KAPIL |
| 2016-07 | FEDERAL IDENTITY MANAGEMENT USING HIERARCHICAL IDENTITYBASED CRYPTOGRAPHY (HIBC) | GOEL, AARTI |
| 2016-07 | VEHICLE ROUTING PROBLEM WITH CAPACITY CONSTRAINT | JAKHAR, SACHIN |
| 2016-07 | MAINTAINABILITY AND QUALITY ANALYSIS OF WEB APPLICATION | DHIMAN, POONAM |
| 2016-07 | COST ESTIMATION MODEL FOR AGILE SOFTWARE DEVELOPMENT PROJECTS USING EXPLORATORY FACTOR ANALYSIS AND CONSTRAINT PROGRAMMING APPROACH FACTOR ANALYSIS AND CONSTRAINT PROGRAMMING APPROACH | GARG, SAKSHI |
| 2016-07 | USE OF DSS WITH STATION TO STATION KEY AGREEMENT AND CLOUD MANAGER TO ENHANCE SECURITY IN CLOUD COMPUTING | ASIWAL, KRANTI |
| 2016-07 | MOBILE DATA COMPRESSION USING E-CLOUD | JATIN |
| 2016-07 | CUSTOMER RETENTION ANALYSIS | NEHA |
| 2016-07 | ON-TO-METHODOLOGY: A GENERIC ONTOLOGY DEVELOPMENT | TEWARI, ANUPRIYA |
| 2016-07 | LIGHTWEIGHT ENCRYPTION SCHEME FOR RFID | CHUDHARY, SWARNA |
| 2016-07 | TASK SCHEDULING IN CLOUD COMPUTING | KUSHWAHA, VEENA |
| 2016-07 | MODEL FOR ACCURATE SENSOR NODE LOCALIZATION USING MCB WITH SPEED AND DIRECTION CALCULATION | KUMAR, AMIT |
| 2016-06 | FUZZY CLUSTERING USING GRAVITATIONAL SEARCH ALGORITHM | KAUL, HIMANSHU |
Collection's Items (Sorted by Submit Date in Descending order): 601 to 620 of 754