hosted by
publicationslist.org
IRGJ
IJCT
ijctcopyright@gmail.com
Home page
Journal articles
2016
Dwivedi AK
and
Prajapati GS
.
2016.
Efficient Routing and Congestion Control in Multi-Flow MANET Environment
International Journal of Computer Techniques,
3,
22-28.
Roy D
and
Verma S
.
2016.
Vampire Attacks: Detection And Prevention
International Journal of Computer Techniques,
3,
14-21.
E LN
,
E VR
and
Ph D
.
2016.
Boiler Monitoring in Power Plant Using Internet of Things
International Journal of Computer Techniques,
3,
10-13.
Singh P
,
Sharma S
,
Singh A
and
Kaur K
.
2016.
Domain Specific (Performance Perspective) Considerations of Cloud Computing
International Journal of Computer Techniques,
3,
5-9.
Sharma S
,
Kaur K
and
Singh A
.
2016.
Role of Cloud Computing in Bioinformatics
International Journal of Computer Techniques,
3,
1-4.
Singh A
and
Singh P
.
2016.
Ultrasound-Image De-noising Technique’s best mix selection using Genetic Algorithm Approach
International Journal of Computer Techniques,
3,
247-251.
Singh A
.
2016.
Taxonomy of Cross-Platform Mobile Applications Development Tools
International Journal of Computer Techniques,
3,
240-246.
Devi K
and
Sharma AK
.
2016.
Framework for Evaluation of Academic Website
International Journal of Computer Techniques,
3,
234-239.
Singh P
.
2016.
Speckle Reduction Techniques for Ultrasound Images
International Journal of Computer Techniques,
3,
226-233.
Kaur K
.
2016.
An evaluation of selective security issues in Internet of Things based on Cloud
International Journal of Computer Techniques,
3,
223-225.
Singh A
and
Singh P
.
2016.
Analysis of Various Tools in Big Data Scenario
International Journal of Computer Techniques,
3,
217-222.
Singh A
.
2016.
A Comprehensive Review on Multi-Objective Optimization Using Genetic Algorithms
International Journal of Computer Techniques,
3,
209-216.
Sharma S
.
2016.
Machine Learning Spectrum for Web Data Analytics
International Journal of Computer Techniques,
3,
205-508.
Kaur K
.
2016.
Information Security Management of an organization with a focus on Human perspective
International Journal of Computer Techniques,
3,
201-204.
KulbirKaur
and
AnureetKaur
.
2016.
An Experimental Analysis of pair programming
International Journal of Computer Techniques,
3,
195-200.
Singh P
.
2016.
A Detailed Analysis of Lossless Image Compression Techniques
International Journal of Computer Techniques,
3,
189-194.
Sharma S
.
2016.
Role of Data Mining Techniques in Human Disease Diagnosis
International Journal of Computer Techniques,
3,
184-188.
Jagadeesan MS
,
Sc M
,
MCA
,
Phil M
,
ME[CSE]
and
Rubiya S
.
2016.
Unprivileged Black-Box Detection of User-Space Key loggers
International Journal of Computer Techniques,
3,
176-183.
Abdelwahed OH
and
Wahed ME
.
2016.
Time multiplexing CNN simulator using RK7(5)
International Journal of Computer Techniques,
3,
171-175.
Kaur B
and
Sharma N
.
2016.
Design of Full Adder in 180nm Technology Using TG and Adiabatic Logic
International Journal of Computer Techniques,
3,
164-170.
Dabhade S
and
Verma S
.
2016.
A New Approach For Reducing Routing Overhead In MANET
International Journal of Computer Techniques,
3,
158-163.
Govil S
and
Rawat DP
.
2016.
Comparative Analysis of Gateway Placement Approaches for Wireless Mesh Network
International Journal of Computer Techniques,
3,
153-157.
Kumar GS
,
Mounika G
,
Rani DL
and
Kumar KT
.
2016.
Design and Analysis of Patch Antenna for Wire-Less Applications
International Journal of Computer Techniques,
3,
148-152.
Mai J
and
Li X
.
2016.
Exponential Stabilization of the Coupled Dynamical Neural Networks with Nodes of Different Dimensions and Time Delays
International Journal of Computer Techniques,
3,
141-147.
Sheela O
,
Lawrence TS
,
Selvi VP
and
Jenifer P
.
2016.
An Optimal Approach for Secure and Energy Efficient Data Transfer in WSN using Hierarchical and Dynamic Elliptic Curve Cryptosystem
International Journal of Computer Techniques,
3,
133-140.
Lai S
,
Meng X
and
Zheng D
.
2016.
Molecular dynamics Parallel simulation of Carbon Nanotubes based on GPU
International Journal of Computer Techniques,
3,
124-132.
Kumari P
and
Thakur R
.
2016.
Review Paper: Hybrid Amplifiers in FSO System
International Journal of Computer Techniques,
3,
115-123.
Jagadeesan MS
,
Sc M
,
MCA
,
Phil M
,
ME[CSE]
and
Mohan A
.
2016.
Cluster-Based License Revocation with Vindication Ability for Mobile Ad Hoc Networks
International Journal of Computer Techniques,
3,
110-114.
Liu L
and
Wu G
.
2016.
Attribute-based Encryption with Decryption and Revocation Outsource in Cloud Environment
International Journal of Computer Techniques,
3,
103-109.
Navamani C
,
MCA
,
Phil M
,
E M
and
Sindhuja J
.
2016.
Machine Learning For Real Estate Contract-Entity Recognition Using Search Engine
International Journal of Computer Techniques,
3,
95-102.
2015
2014
2015
select all
|
select none
Selected
:
Delete selected items
Export selected items to:
bibtex
|
endnote
|
Procite (RIS)
|
Mods XML
|
Plain Text
All Tags:
(no tag)
(10),
-
,
10 DOF full-car model
,
19th to 30th dynasties.
,
3 * 3 Sliding Neighborhood operation
,
3-D digital water marking
(2),
4:1 Multiplexer Using ECRL and PFAL
,
6 bar – 2 sliders mechanism
,
A-Star algorithm
,
AAM(Active Appearance Model)
,
About Base class
,
absorber tuning
,
Academic Websites
,
Accident Detection
,
Accuracy
,
Accuracy evaluation
,
Action Recognition
,
Adaboost
,
Adaptive tuned vibration absorber
,
Adhoc
,
Adhoc Network
,
Adiabatic
(2),
ADR equation
,
AES
,
Agent
,
Agile mythology
,
AM
,
AMBA_APB
,
and Categorical Data
,
and Protected
,
Android
(4),
Android application
,
Android based Mobile phone .
,
Android Chat Application
,
AODV
(2),
Appcelerator
,
Apriori
,
Apriori algorithm
,
Arabic language
,
Architecture
,
Artificial Intelligence
,
Artificial intelligence
,
Artificial Neural Network & Fuzzy Logic
,
association relation
,
Association rule (AR)
,
Association Rule Mining
,
association rules
,
Association rules
,
Asymmetric cryptography
,
attack detection
,
Attacks
,
Attribute Based Encryption
,
Attribute-based encryption
,
Audit
,
auditing
,
Authenticated Routing
,
Authentication
(2),
authentication
,
authentication server
,
Automated
,
Automatic text classification
,
Autonomous installation
,
Bat
,
Bayesian Network
,
Bayesian-shrink
,
BE
,
Bee
,
Big Data
,
Big data
,
Big data analytics
,
Binary Particle Swarm Optimization (BPSO)
,
Bioinformatics
,
Biorthogonal Wavelet Transform
,
black-box
(2),
Bluetooth
,
boundary conditions
,
Buffer Cost
,
Bundle Security
,
Business Intelligence.
,
BYOD
,
canny
,
Captcha
,
Car dynamics
,
Carbon Nano Tube (CNT)
,
CaRP
,
CC Domain
,
Central Authority
,
Central monitor station
,
CF
,
Channel
,
Character recognition
,
Chassis bounce.
,
Cinemagraphs
,
Cipher Text
,
Classification techniques
,
Clickjacking
,
Cloud
,
cloud aspects
,
Cloud based IoT
,
Cloud computing
(4),
Cloud Computing
(3),
cloud computing
,
cloud server
,
Cluster
(2),
cluster analysis
,
Clustering
(4),
Clustering.
,
CNN simulator
,
Co-operative.
(2),
COBIT
,
Collaborative filtering algorithm
,
Composite field query
,
Computational Power
,
Compute Unified Device Architecture (CUDA)
,
computer applications
,
concentration
,
Congestion
,
Content based Message Filtering
,
Context-awareness
,
control of undesirable vibrations
,
controller tuning.
(2),
Convergent Encryption
,
coupled dynamical system with time delays
,
CP-ABE
,
CR-Compression Ratio
,
credential revocation
,
crescent path.
,
Criminal Activities
,
CRONOS Model
,
Cross point cost.
,
Crossover
,
Crowdsourcing
,
Crypt analysis
,
Cryptography
,
Culture.
,
Data analysis
,
Data Analytics
(2),
data imputation
,
Data item
,
Data mining
,
data mining techniques
,
Data Mining.
,
Data processing
,
Data Protection
,
Data security
(2),
Data warehouses
,
Database security
,
database;
,
DCT
,
DCT-Discrete Cosine Transform
,
Decision tree Induction
,
Decision Trees
,
Decryption
,
decryption outsource.
,
Deduplication
,
Defuzzification.
,
Delay Scheduler
,
Delay tolerant network
,
Delay Tolerant Network
,
delayed double integrating process
(2),
DELPHI
,
Derived class
,
DES algorithm
,
Detection.
,
Development
,
DFIG
,
diabetic retinopathy
,
dictionary attack
,
Dielectric constant
,
DiffServ
,
Digital signature
,
digital signature
,
digital signature and encryption.
,
Digital Video Watermarking
(2),
digital.
,
Discrete Wavelet Transform
(2),
Discrete Wavelet Transform (DWT)
,
Discrete wavelet transform (DWT)
,
Distance Learning
,
Distributed System
,
Disturbance rejection
(2),
DNSlookup
,
Document segregation
,
dogmatiX
,
Driver bounce
,
DSDV
(2),
DSR
,
DTN
,
DTW
,
dual bands
,
duplicate detection
,
DWT
(2),
Dynamic capacity.
,
Dynamic Order Multi-field Index (DOMI)
,
dynamic vibration absorber
,
Dynamical Print
,
DynMR
,
E-Governance
,
E-learning
(2),
EAACK
,
Eclat
(2),
ECRL
(2),
ECRL and PFAL.
,
Edit Distance and Text Mining
,
Educational data mining
,
EEG signals.
,
ELGAMAL
,
Elitist Algorithm
,
Elliptic Curve Cryptography
,
Elliptical Annotation
,
Employees
,
Encryption
,
encryption
,
Energy Balance Parameter
,
Energy consumption, Lifetime of Network
,
Energy efficiency
(2),
enterprise systems
,
Entity Extraction
,
Entity Relationship Mining
,
Entity Search
,
Equivalence class
,
etc..
,
ETL Process
,
ETL tools
,
Euclidean.
(3),
expenses
,
exponential stabilization
,
extreme programming
,
Face Detection
,
FACTS
,
FAST features
,
FastReport
,
Feature Based Recognition
,
feature extraction
,
feature selection
,
Fetal monitor
,
Filtering Techniques
,
Filtering-techniques
,
financial and Sentiment
,
financial array data
,
FM
,
FOC
,
Fp Growth.
,
Fractal
,
fraction transmissibility
,
Frequent Itemset Mining
,
Frequent Pateern Mining
,
FSO
,
FSO (Free space optics)
,
Full Adder. Adiabatic Circuit
,
Fusion Rules.
,
Fuzzification
,
Fuzzy
,
Fuzzy C- Means (FCM)
,
Fuzzy logic controller
,
Fuzzy rule base database
,
Gateway Placement
,
Gaussian
,
GECC algorithm
,
Genetic Algorithm (GA)
,
Genetic algorithm (GA)
,
Genetic Algorithms
(2),
Genetic control parameters.
,
glaucoma
,
GPS network
,
Graph Scenario model
,
Graphical password
,
Greedy Search
,
Grid.
,
GSM Network
,
GUI
,
Haar Features
,
Hadoop
,
Hadoop Fair Scheduler
,
Harris features
(2),
Hashing Heterogeneity
,
Heart Disease
,
heterogeneous node
,
Heuristics
,
HFSS software
,
Hierarchical Cluster
,
Hierarchical Clustering
,
Hierarchical Clustering.
,
HL7 v3
,
homogeneity score
,
Homomorphic linear signature
,
homomorphism
,
Horizontal washing machine
,
hotspots
,
Hough transform...
,
Huffman Coding
,
hydrodynamic forces
,
IaaS
,
Identification
(2),
IDWT
,
iframe
,
Image Compression
,
Image Fusion
(2),
Image Processing
,
Image processing
,
Improve Hop-by-hop authentication
,
Improved Otsu
,
Indexing structures
,
India
,
Induction generator
,
Infographic
,
Information
,
information drilling
,
information Exchange
,
Information security
,
Information Security
,
Information Security Management
,
Information System.
,
Information Technology
,
Inheritance
,
Inspected PCB Image
,
Interactive Knowledge Mining
,
Interactive Protocol
(2),
Internet
(2),
Internet of Things
,
Interpolation
,
interpolation
,
intersections
,
Intrusion Detection
,
Intrusion detection
,
Intrusion Detection system
,
Invasive software
(2),
Inverter and NAND using CMOS
,
IoT-Internet of Things
,
IPv4
,
IPv6
,
Iris localization
(2),
Iris recognition
(2),
ISO 9126
,
IT-Governance
,
Itemset
,
Itemset utility
,
JPEG Steganography
,
K-means
,
Key
,
key
,
Key and cloud server
,
Key DES
,
Key Management
,
Key-policy
,
keylogger
(2),
Kinect
,
kinematic synthesis
,
Kinematic synthesis of planar mechanisms
,
knowledge discovery (KDD)
,
Ku bands
,
LEACH Protocol
,
Learning Media
,
Least Significant Bit (LSB)
,
leg and back
,
Levenshtein Distance
(2),
linear matrix inequality
,
link quality
,
Load Balancing
(2),
Local binary pattern algorithm.
,
Local truncation error
,
Location-Based Services
,
Log Management
,
Logistic regression
,
lossless Compression
,
Lyapunov function
,
LZW
,
Machine learning
(2),
Machine Learning
(3),
Makespan
,
MANET
(3),
MANET Bhopal
,
MapReduce
(2),
market analysis.
,
Mathematical modelling
,
MATLAB
,
MATLAB application.
,
MATLAB.
,
MD5
,
Mean Square Error (MSE)
,
Mechanical engineering history headdresses
,
medical imaging
,
Medical-Imaging
,
Membership function
,
Mesh networks
,
meta- modelling
,
Micro Blogging. Anonymous Social Networking
,
micro strip patch antenna
,
microarray data.
,
MILE
,
Mining
,
MINs (Multi Stage Interconnection Network)
,
misplaced
,
missing value
,
Mixed Dataset
,
MLMINs (Multi Layer Multi Stage Interconnection Network)
,
Mobile Ad hoc Networks
,
Mobile ad hoc networks (MANETs)
,
Mobile Ad-Hoc Network
,
Mobile Applications
,
Mobile applications
,
Mobile Apps
,
Mobile computing
,
Mobile payment
,
Mobile Phone
,
Mobile sensing
,
Mobile theft protection
,
Modification
,
Molecular dynamics
,
Most valuable itemsets
,
Motoric Skills
,
MPLS
,
MPR flooding
,
MR images
,
MSE-Mean Squared Error
,
Multi-Authority
,
Multi-bed
,
Multi-Objective Optimization
,
Multifractal
,
Multimodal
,
multimode.
,
Multiple Cloud
(2),
Multiple OCR Texts
,
multiple station.
,
Multiprocessor task scheduling (MPTS)
,
Mutation
(2),
Named Entity Extraction
,
Natural Language Processing
(2),
Natural language processing
,
Naïve bayes
,
NCPR
,
Network
,
network pruning
,
network visualization
,
Networking
,
NFC
,
node awareness
,
nodes of different dimensions
,
Noise
,
Normalization
(2),
Novel divide-and-conquer
,
NRZ (Non return to zero)
,
NRZ RC (Non return to zero raised cosine)
,
NS2
(2),
Numerical Data
,
numerical model
,
object set
,
Obstetrical
,
offset crank-slider mechanism
,
OLSR
,
Omega Network
,
Onion Routing
,
Online Social Network
,
Ontology
,
ontology
(2),
OOK (On off keying)
,
Optimal control
,
optimal synthesis
,
Optimization
,
optimum system dynamics
,
Outsourcing spatial database
,
OWL
,
P2P
,
PaaS
,
packet dropping
,
Pair programming
,
Parallel computation
,
parsing
,
Particle Swarm Optimization
,
Particle Swarm Optimization (PSO)
,
Passenger bounce
,
Passive suspension system
,
password
,
password guessing attack
,
Path finding
,
path generation
,
Patient-specific model
,
Payee list
,
PCB defects
,
PCC
(2),
PD-PI controller
(2),
Peak signal to noise ratio (PSNR).
,
peer to peer
,
performance indices.
,
Performance Parameters.
,
Performance Provisioning
,
PFAL
(2),
PhoneGap
,
pixel
,
Plain Text
,
Planar mechanisms
,
Planar mechanisms synthesis
,
Power Supply
,
power-imperfect system
,
pre-processing
,
Principal Component Analysis (PCA)
(2),
principal component analysis.
,
Private
,
private key update
,
private-key cryptosystem
,
product opinion.
,
propagation
,
Protocol Buffers
,
Provable Data Possession
(2),
Proxy account
,
Proxy Encryption
,
PSNR
,
PSNR-Peak Signal to Noise Ratio
,
PSNR.
,
Public
,
public health
,
Public-Key Cryptosystem
,
Pupil localization
(2),
Quality of Service (QoS)
,
quarter model
,
Query authentication
,
Query Optimizer.
,
Reader
,
real-time applications
,
Recommender System
,
RED
(2),
Redundancy.
,
reflection coefficient
,
Region properties
,
relative permittivity
,
Relative Profit
,
remote access
,
Remote Monitoring & Control
,
Requirements gathering
,
Resilient key distribution mechanisms(RKDM) private key
,
resilient key(public keys)
,
resolution
,
Resource Allocation
,
Resource discovery
,
Reusability
,
revocation outsource
,
RFID
,
Rhodes
,
Ride comfort
,
Risk
,
RK7(5)
,
RLE-Run Length Encoding
,
Robust PCA (RPCA)
,
Robust training and Reconstruction.
,
robustness
,
Role of Humans
,
Routing
(2),
routing
(2),
Routing overhead
,
Routing Protocol
,
RSA
,
RSA algorithm
,
RSA.
,
Rule Based Classification or mining
,
Run Length Encoding
,
RZ
,
RZ (Return to zero)
,
RZ RC (Return to zero raised cosine)
,
SaaS
,
safety and threshold
,
SAN
(2),
satellite image resolution enhancement
,
Scheduling
,
Secuirity
,
Secure Co-Processor (SCPU)
,
secure routing
,
Security
(3),
security
(4),
Security in cloud
,
Security issues in IoT
,
security mechanism
,
security primitive.
,
semantic web
,
Sensor Based Accident Detection
,
Sensor Based Traffic Prediction
,
sensor network.
,
Sensor networks
(2),
Sentiment Mining
,
separation score
,
serializing
,
SEs (Switching Elements)
,
settling frequency ratio
,
SHA;
,
Shared Storage, Dedicated Storage
,
Signal
,
Silent unattended installation
,
Simulation
(3),
Single field query
,
skin temperature
,
SLAs
,
Sliding mode control
,
Slot Allocation
,
Slot Pre Scheduler.
,
Smartphone security
,
social based routing protocol
,
social metrics
,
social networking accounts
,
social work
,
software development lifecycle (SDLC) model
,
software engineering
,
Software Quality Factors and Website Quality Factors.
,
solo programming
,
source privacy
,
Spatial Filtering
,
specific stroke, time ratio and transmission angle
,
Speckle
,
speckle noise
,
Speckle-noise
,
Spectrum modification
,
Speed-up ratio
,
SPI
,
spread out control
,
Standard humps
,
Standard PCB Image
,
STATCOM
,
Stochastic classification
,
stock markets
,
Storage Refuge
(2),
strength test
,
Subsea umbilical
,
Support and Confidence.
,
support vector machine
,
Support vector machine
,
supporting access
,
Suspiciou.
,
SVD
,
SVD-Singular Value Decomposition
,
SWT
,
SXNM
,
Sybil attack
,
Symmetric key Decryption
,
Symmetric key Encryption
,
symmetric-key cryptosystem
,
T-SPICE
(2),
Tag
,
Tags
,
tamper-proof
,
tax application
,
TCP
,
TDES
,
Template
,
Tender
,
tension and bending moments
,
testing
,
testing techniques
,
text mining
,
Texture Analysis
,
Texture Classification
,
TG
,
Threats
(2),
Throughput
,
Time efficiency
,
Time Evolving Network.
,
time series
,
time series data
,
Time window
,
Top Management
,
topology embedding
,
traffic flow
,
Traffic Prediction
,
Transaction history
,
Transfers
,
Transform Filtering
,
transmissibility adjustments
,
Trek.
,
trust value
,
Trusted DB
,
Tumor growth prediction
,
tuning condition
,
UCI Machine Learning.
,
ultra wide band.
,
ultra-flow model.
,
ultrasound
,
Uniform Embedding Distortion (UED)
,
unsupervised learning
,
Urban traffic congestion
,
URL analyzer
,
User Interface
,
User ratings
,
user set
,
Utility Mining
,
Valuable itemsets
,
Vehicle dynamics
,
Vertical data format
,
vibration control
,
vibration isolators design
,
Video Frame
(2),
vIntegrity.
,
Viola-Jones
,
virtual reality
,
Virtualization
,
VLSI
,
Voting algorithm
,
Watermark
(2),
watermarking
,
Wavelet Features
,
wavelet thresholding
,
wavelet zero padding (WZP)
,
wearable device
,
web camera
,
Web Page Segmentation
,
Wi-Fi network
,
WiFi
,
Wind energy conversion systems(WECS)
,
Wireless Media
,
Wireless Sensor Network
,
wireless sensor network (WSN)
,
Wireless Sensor Network.
,
wireless sensor networks (WSNs)
,
Xamarin
,
XML
,
XMLDup
,
Zero-knowledge
(2),
—Anonymous Routing
Authors
S A[4]
,
M Abdel-Hafiz
,
O Abdelwahed
,
T Abderrahim
,
I Abughali
,
S Adil
,
S Aggarwal
,
O Ajayi
,
S Al-Momen
,
Z Al-Zaydi
,
A Ali
,
M Anil
,
O Aribike
,
M ArunKumar
,
G Babu
,
A Bajpeye
,
S Bedi
,
S Bhapkar
,
K Bharathi
,
R Bharathi
,
B Bharathy
,
X Bin-bin
,
X Chan
,
J Chang
,
P Chaudhari
,
S Chaudhari
,
M Chavan
,
A Choubey
(2),
W Claster
,
S Dabhade
,
M Deore
,
K Devi
,
S Dhamane
,
S Dhanapriya
,
P Dharurkar
,
M Dhawale
(2),
A k Dhilawala
,
M Dinde
,
G Divya
,
V Divya
,
R Divya
,
A Dixit
,
J Dixit
,
A Dwivedi
,
M E
(5),
L E
,
V E
,
E Eddine
,
M Elavarasi
,
D Elayaraja
,
D ER-RAHA
,
E Essoufi
,
K Eswari
,
V Faseel
,
J Fiorenza
,
P G[3]
,
V Garg
,
G Garg
,
S Garud
,
M Geetalaxmi
,
L George
(2),
T George
,
H Ghadimkhani
,
R Gound
,
S Goverdhan
,
S Govil
,
V Govindaraj
,
E Gowrima
,
R Gowtham
,
D Goyal
,
M Gujarathi
,
B Gupta
,
A Habiboghli
,
C Han
,
S Han
,
G Hariharan
(2),
P Hassaan
,
G Hassaan
(9),
A Hassaan
,
M He
,
M Helonde
,
M Hema
,
Y Hendriana
,
M Hicham
,
Z Huang
,
W Huang
,
M Indra
,
M Issac
,
M Jagadeesan
(2),
A Jalota
,
M Jayaraj
,
J Jayasudha
,
P Jenifer
,
N Jeyakumar
,
P Joshi
,
K Jyoti
,
M Kakde
,
P Kale
(2),
R Kalpana
,
S Kalro[1]
,
Y Kandekar
,
K Karande
,
N Karthik
,
S Katariya
,
G Kaur
(2),
S Kaur
(2),
K Kaur
(5),
M Kaur
(2),
A Kaur
,
B Kaur
,
S Kaushal
,
D Kavitha
,
S Kavitha
,
D Kawathekar
(2),
D seema Kawathekar
,
D Khan
,
S Khattab
,
S Khurana
,
P Kiranjyoti
,
D KiranJyoti
,
D Krishnan
,
S kubra
,
R Kumar
(3),
A Kumar
,
S Kumar
,
M Kumar
(2),
P Kumar
(3),
J Kumar
,
G Kumar
,
K Kumar
,
P Kumari
,
V Kumbhakarna
,
M Kumesh
,
S Lai
,
A Lakhouili
,
V Lakshmipriya
,
L Lanjekar
,
T Lawrence
,
P Laxmi
,
L Lende
,
Z Li
,
X Li
,
L Liu
,
K Lodha
,
X Lv
,
K Madhurabhasini
,
M Madona
,
G Magesh
,
M Mahajan
,
J Mai
,
N Maksutkaliyeva
,
M Mali
,
S Malik
,
K Malika
,
R Manikandan
,
S Maniraj
,
N Mannan
,
S Marouane
,
N MCA
(3),
C MCA
,
H Medromi
,
S Mello
,
X Meng
,
C Meriyem
,
N Mohammed
,
S Mohammed
,
A Mohan
,
P Mohanapriya
,
A Mondal
,
R Moni
,
R Mostafaei
,
G Mounika
,
V MPHIL
(2),
C Mr
,
J Mrs
,
K Mrs
,
C Mrs
,
O Mrudula
,
E Mukundhan
,
P murugan
,
A Mutazinda
,
L NAJDI
,
R Naji
,
S Najlaa
,
S Nandhini
,
E Nandi
,
R Natchadalingam
,
C Navamani
,
K Naveendiran
,
B Nehru
,
R Nikam
,
F Omara
(2),
P Padmapriya
,
K Pandey
,
K Pandya
,
P Patil
(2),
N Patil
,
V Patil
,
D Ph
,
D Phaneendra[5]
,
M Phil
(11),
R Poovaraghan
,
R Prabhudev
,
A Pradeep
,
N Pradhan
,
G Prajapati
,
S Pranatahadi
,
H Prasantha
,
K Priya
,
C Pushpa
,
M Raghavendra
,
G Ragu
,
M Raj
,
P Rajeshwar
,
S Ramakrishnan
,
G Ramkumar
,
M Rani
,
S Rani
,
D Rani
,
S Ravikumar
,
K Ravikumar
(4),
D Rawat
,
P Ray
,
D Reddy
,
R Rejani
,
k RNavin
,
D Roy
,
S Rubiya
,
k Rupinder
,
M S[2]
,
M SachinBojewar
,
T Sagar
,
M Sah
,
R Sahal
,
L Saini
,
D Salam
,
S Salim
,
P Sallis
,
D Sandya
,
P Sangve
,
D Saputra
,
S Saradha
,
D Sarddar
,
M Sathya
,
S Satonkar
,
D Satyanarayana
,
M Sc
(2),
B Selvam
,
V Selvi
,
A Senthilkumar
(2),
T Shaikh
(2),
H Shaikh
,
I Shaikh
,
H Sharaf
,
S Sharma
(5),
N Sharma
(3),
A Sharma
(2),
O Sheela
,
M Shilpa
,
P Shinde
,
G Shintre
,
A Shirke
,
V Shrivastava
,
P Shukla
,
P Sigit
,
J Sindhuja
,
P Singh
(5),
A Singh
(6),
S Sivamohan
(3),
K Solanke
,
S Solanki
(2),
P Sonam
,
S Soni
,
N Soni
(2),
M Sowjanya
,
M Srimathi
,
D Srinivasan
(2),
A Srivastava
,
R Subarna
,
M Sujatha
,
M Sujitha
,
E Sukamti
,
R Sumangali
(2),
J Surekha
,
A Surendar
,
P Tambat
,
E Thakur
,
R Thakur
,
V Thamayanthi
,
S Thamizharasi
,
M Thangasivagamaselvi
,
A Thomas
,
V Ubale
,
T Ugale
,
B Umurzakov
,
H Vaghela
,
M Veeramani
,
R Veeramani
,
S Verma
(2),
K Vijayakumar
,
K Vinodhini
,
R Vinodhini
,
V Vinothkumar
,
s Vishal
,
M Wahed
,
H Wang
(2),
S Warkar
,
L Wu
,
G Wu
,
J Xiao-qi
,
R Yadu
,
L Zahrotun
,
Y Zhang
,
Q Zhang
,
J Zhang
,
D Zheng
,
ME[CSE]
(2),
Praveena
,
NiravKotadia
,
MCA
(4),
B
,
AnushriGaikwad
,
ChaitaleeAthare
,
PranaliWakchaure
,
ME
,
HuijinWang
,
YanjunZhong
,
MTech
,
YaolongShi
,
AishwaryaBadkundri
,
K
,
QingqingGan
,
YujuanQuan
,
CaiyunGuo
,
Siswantoyo
,
SnehaShegar
,
Guntur
,
VaradaDatar
,
KulbirKaur
,
AnureetKaur
,
KeyurUpadhyay
,
SonajhariaMinz
Powered by
PublicationsList.org
.