1Nitasha Varshney, 2Dr. Manoj Kumar
Category: Past
ANALYSIS ON CYBER SECURITY IN INFORMATION TECHNOLOGY ORGANIZATIONS
Download FileJeevan Prasad Adhikari1, Dr. Arvind Kumar Sharma2
EFFECTIVE MEMORY OPTIMIZATION TECHNIQUES FOR EMBEDDED SYSTEMS AND ITS APPLICATIONS
Download FileVanitha Padala, Dr. Amit Jain2
ANALYSIS ON CYBER SECURITY IN INFORMATION TECHNOLOGY ORGANIZATIONS
Download FileJeevan Prasad Adhikari1, Dr. Arvind Kumar Sharma2
EXPLORING DIFFERENT DATA MINING TECHNIQUES FOR PROTEIN AND FOREST FIRE DATA
Download FileVRATNAKUMARI1, DR. ARVIND KUMAR SHARMA2
PERFORMANCE ANALYSIS USING ARTIFICIAL INTELLIGENCE IN WIRELESS NETWORK SYSTEM AND ITS BENEFITS
Download FileSagar1, Dr. Amit Jain2
A STUDY ON PROJECT MANAGER SKILL DEVELOPMENT IN CONSTRUCTION COMPANIES IN CHENNAI REGION
Download FileR.Balamurugan,
SIMULATION OF EVALUATED EFFECTIVE SOLUTIONS TO SECURITY PROBLEMS IN EMBEDDED MICROCONTROLLER SYSTEM
Download FileRavi M K1, Dr. Amit Kumar Jain2
EXPLORING VARIOUS THERAPIES FOR DIABETES TREATMENT
Download FileManash Bhakta1, Dr. Anil Middha2
Review of Offshore Pipeline Span creation mechanism
Download FileA. A. Shittu1, F. Kara2
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
Page 52 of 166