15445 |
Aarti Singh |
artificial intelligence
IJRDO
3785-0855
Vol2 4 april2015
|
15445 |
Aarti Singh |
operation research
IJRIAT
2487-1504
vol1,issue1,may2015
|
15445 |
Aarti Singh |
web development
IJRDO
3785-0855
Vol2 4 april2015
|
15445 |
Aarti Singh |
software engineering
IJRDO
3785-0855
Vol2 4april2015
|
15445 |
Aarti Singh |
multiple access techniques
IJRIAT
2487-1504
vol1,issue1,may2015
|
15445 |
Aarti Singh |
networking protocols
IJRIAT
2487-1504
vol1,issue1,may2015
|
15446 |
Abhinav Batra |
expert system
ijiriet
2319-8753
issue april2015
|
15446 |
Abhinav Batra |
software reliabilty
ijiriet
2319-8753
issue april2015
|
15446 |
Abhinav Batra |
vrml
ijr
2348-6848
vol2 issue-04
|
15446 |
Abhinav Batra |
computer aided software engineering
ijirt
2349-6002
vol1 issue12 may2015
|
15446 |
Abhinav Batra |
introduction to wireless communication
ijr
2348-6848
vol2 issue-04
|
15446 |
Abhinav Batra |
network file system
ijr
2348-6848
vol2 issue-04
|
15447 |
Abhishek Gupta |
artificial intelligence applied for prediction of laser cutting orocess
IJRIAT
2487-1504
Vol-1,Issue-1
|
15447 |
Abhishek Gupta |
Enhanced version of growth model in web based software reliability Engineering
IJRIAT
2487-1504
Vol-1,Issue-1
|
15447 |
Abhishek Gupta |
network programming in java using socket
IJRIAT
2487-1504
Vol-1,Issue-1
|
15447 |
Abhishek Gupta |
Basics of operating system and common operating sysytem
IJRIAT
2487-1504
Vol-1,Issue-1
|
15447 |
Abhishek Gupta |
New coverage area in Handoff Region
IJRIAT
2487-1504
Vol-1,Issue-1
|
15447 |
Abhishek Gupta |
Low Level and High Level Languages and unix os
IJRIAT
2487-1504
Vol-1,Issue-1
|
15448 |
Abhishek Singh |
Securities associated with various server side scripting programming languages
IJIRIET
2379-1564
vol-2,issue-3
|
15448 |
Abhishek Singh |
Implementation of new security protocol in wireless communication system
IJSRD
2321-0613
vol-3,issue 3
|
15450 |
Aditya Kuhar |
artificial intelligence applied for Operating System Virtualization:Practice and Experience
IJRIAT
2487-1504
Vol-1,Issue-1
|
15450 |
Aditya Kuhar |
Enhanced version of growth model in web based software reliability Engineering
IJRIAT
2487-1504
Vol-1,Issue-1
|
15450 |
Aditya Kuhar |
Managing Networked software Development
IJRIAT
2487-1504
Vol-1,Issue-1
|
15450 |
Aditya Kuhar |
New coverage area in Handoff Region
IJRIAT
2487-1504
Vol-1,Issue-1
|
15450 |
Aditya Kuhar |
network programming in java using socket
IJRIAT
2487-1504
Vol-1,Issue-1
|
15454 |
Amritanshu Sharan |
Artificial Intelligence apply for prediction of Laser cutting Process
IJRIAT
2487-1504
Vol-1,Issue-1
|
15454 |
Amritanshu Sharan |
Operating System Virtualization:Practice and Experience
IJRIAT
2487-1504
Vol-1,Issue-1
|
15454 |
Amritanshu Sharan |
Enhanced version of growth model in web based software reliability Engineering
IJRIAT
2487-1504
Vol-1,Issue-1
|
15454 |
Amritanshu Sharan |
Managing Networked software Development
IJRIAT
2487-1504
Vol-1,Issue-1
|
15454 |
Amritanshu Sharan |
Introduction of new coverage area in handoff region to reduce Handoff Failure
IJRIAT
2487-1504
Vol-1,Issue-1
|
15454 |
Amritanshu Sharan |
network programming in java using socket
IJRIAT
2487-1504
Vol-1,Issue-1
|
15455 |
Ananya Anikesh |
artificial intelligence
IJRDO
3785-0855
Vol2 4april2015
|
15455 |
Ananya Anikesh |
operation research
IJRIAT
2487-1504
vol1,issue1,may2015
|
15455 |
Ananya Anikesh |
web development
IJRDO
3785-0855
Vol2 4april2015
|
15455 |
Ananya Anikesh |
software engineering
IJRDO
3785-0855
Vol2 4april2015
|
15455 |
Ananya Anikesh |
multiple access techniques
IJRIAT
2487-1504
vol1,issue1,may2015
|
15455 |
Ananya Anikesh |
networking protocols
IJRIAT
2487-1504
vol1,issue1,may2015
|
15457 |
Ankit Saxena |
Securities associated with various server side scripting programming languages
IJIRIET
2379-1564
vol2 ,issue 3, may 2015
|
15457 |
Ankit Saxena |
Implementation of new security protocol in wireless communication system
IJSRD
2321-0613
vol3,issue 3, may 2015
|
15462 |
Ayush Singla |
operation research/linear proggraming
ijirt
issn:2487-1504
vol 1 may 2015
|
15462 |
Ayush Singla |
virtual reality modeling language
ijrit
issn:2487-1504
vol 1 may 2015
|
15462 |
Ayush Singla |
importance of software testing in software
ijrit
issn:2487-1504
vol 1 may 2015
|
15462 |
Ayush Singla |
role of cognitive radio on 4g
ijrit
issn:2487-1504
vol 1 may 2015
|
15462 |
Ayush Singla |
socket programming
ijrit
issn:2487-1504
vol 1 may 2015
|
15464 |
Deepak Kumar |
research paper on artificial neural network
ijirt
issn:2349-6002
vol.1 issue 12 may 2015
|
15464 |
Deepak Kumar |
on duckworth lewis rule
ijirt
issn:2349-6002
vol. 1 issue 12 may 2015
|
15464 |
Deepak Kumar |
methods for java scrtkipt security
ijirt
issn:2349-6002
vol. 1 issue 12 may 2015
|
15464 |
Deepak Kumar |
study of software testing
ijirt
issn:2349-6002
vol. 1 issue 12 may 2015
|
15464 |
Deepak Kumar |
review of vhandover schemes
ijirt
issn:2349-6002
vol. 1 issue 12 may 2015
|
15464 |
Deepak Kumar |
socket programming
ijirt
issn:2349-6002
vol. 1 issue 12 may 2015
|
15465 |
Deepesh |
Artificial intelligence
ijtre
issn:2347-4718
vol 2 issue 9 may 2015
|
15465 |
Deepesh |
Operation Research in Passenger Railway Transportation
ijriat
issn:2487-1504
vol 1 issue 1 may 2012
|
15465 |
Deepesh |
Web technologies
ijtre
issn:2347-4718
vol 2 issue 9 may 2015
|
15465 |
Deepesh |
Engineering and Software Engineering
ijriat
issn:2487-1504
vol 1 issue 1 may 2012
|
15465 |
Deepesh |
The evolution of mobile,GSM
ijtre
issn:2347-4718
vol 2 issue 9 may 2015
|
15465 |
Deepesh |
A design and implementation of active network Socket Programming
ijriat
issn:2487-1504
vol 1 issue 1 may 2012
|
15466 |
Devesh Agrawal |
Human-Robot Interaction
IJIRT
2349-6002
Vol-1,Issue-10
|
15466 |
Devesh Agrawal |
4G cellular systems LTE advanced
IJIRT
2349-6002
Vol-1,Issue-10
|
15469 |
Divya Singla |
Human - Robot Interaction
IJIRT
2349-6002
Vol-1,Issue-10
|
15469 |
Divya Singla |
4G Cellular Systems: LTE Advanced
IJIRT
2349-6002
Vol-1,Issue-10
|
15470 |
Gagan Mendiratta |
Operation Research in Passenger Railway Transportation
IJRIAT
2487-1504
Vol 1, Issue 1
|
15470 |
Gagan Mendiratta |
Engineering and Software Engineering
IJRIAT
2487-1504
Vol 1, Issue 1
|
15470 |
Gagan Mendiratta |
A design and implementation of active network socket programming
IJRIAT
2487-1504
Vol 1, Issue 1
|
15471 |
Gagandeep Singh |
Convergence of AI
IJIRT
2349-6002
Vol 1, Issue 10
|
15471 |
Gagandeep Singh |
Operations Research
IJIRT
2349-6002
Vol 1, Issue 10
|
15471 |
Gagandeep Singh |
Virtual Reality Modeling Language and JAVA
IJIRT
2349-6002
Vol 1, Issue 10
|
15471 |
Gagandeep Singh |
Importance of Software Testing in SDLC
IJIRT
2349-6002
Vol 1, Issue 10
|
15471 |
Gagandeep Singh |
Role of Cognitive Radio on 4 G
IJIRT
2349-6002
Vol 1, Issue 10
|
15471 |
Gagandeep Singh |
Programming in Socket
IJIRT
2349-6002
Vol 1, Issue 10
|
15472 |
Gourav Singh Rana |
Convergence of AI
IJIRT
2349-6002
Vol 1, Issue 10
|
15472 |
Gourav Singh Rana |
Operations Research
IJIRT
2349-6002
Vol 1, Issue 10
|
15472 |
Gourav Singh Rana |
Virtual Reality Modeling Language and JAVA
IJIRT
2349-6002
Vol 1, Issue 10
|
15472 |
Gourav Singh Rana |
Importance of Software Testing in SDLC
IJIRT
2349-6002
Vol 1, Issue 10
|
15472 |
Gourav Singh Rana |
Role of Cognitive Radio on 4 G
IJIRT
2349-6002
Vol 1, Issue 10
|
15472 |
Gourav Singh Rana |
Programming in Socket
IJIRT
2349-6002
Vol 1, Issue 10
|
15474 |
Himanshi Grover |
Human - Robot Interaction
IJIRT
2349-6002
Vol 1, Issue 10
|
15474 |
Himanshi Grover |
4G Cellular Systems: LTE Advanced
IJIRT
2349-6002
Vol 1, Issue 10
|
15475 |
Himanshi Jhamb |
Security Associated with various Server Side Scripting Languages
IJIRIET
2376-1364
Vol 2, Issue 3
|
15475 |
Himanshi Jhamb |
Implementation of Security Protocol for Wireless Communication
IJSRD
2321-0613
Vol 3, Issue 3
|
15478 |
Jyoti Gahlot |
Software Testing Techniques and Types
IJIRT
2349-6002
Vol 1, Issue 11
|
15478 |
Jyoti Gahlot |
Wireless Network , Its Security and Issues
IJIRT
2349-6002
Vol 1, Issue 11
|
15480 |
Kimmi Makkar |
Robotics in AI and its Applications
IJIRT
2349-6002
Vol 1, Issue 2 May 2015
|
15480 |
Kimmi Makkar |
Design Pattern for Distributed Control System
IJIRT
2349-6002
Vol 2, Issue 2 May 2015
|
15481 |
Kirti Sharma |
Software Testing Techniques and Types
IJIRT
2349-6002
Vol 1, Issue 11
|
15481 |
Kirti Sharma |
Wireless Network , Its Security and Issues
IJIRT
2349-6002
Vol 1, Issue 11
|
15482 |
Kunal Ahuja |
Basics of OS and Common OS
IJRIAT
2487-1504
Vol 1, Issue 1
|
15482 |
Kunal Ahuja |
Low level and High Level Language and UNIX OS
IJRIAT
2487-1504
Vol 1, Issue 1
|
15485 |
Mamta Mandal |
Human and Social Issue
IJRIAT
2487-1504
Vol 1, Issue 1
|
15488 |
Meenakshi Janghu |
Process Models in Software Engineering
IJRIAT
2487-1504
Vol 1, Issue 1
|
15488 |
Meenakshi Janghu |
New Approach for Wireless Communication Security Protocol
IJRIAT
2487-1504
Vol 1, Issue 1
|
15490 |
Mitasha Sapra |
Basics of OS and Common OS
IJRIAT
2487-1504
Vol 1, Issue 1
|
15490 |
Mitasha Sapra |
Low level and High Level Language and UNIX OS
IJRIAT
2487-1504
Vol 1, Issue 1
|
15491 |
Neeraj Kumar |
Neural Network And Evolutionary Computing
IJIRT
2487-1504
VOL 1 MAY 2015
|
15491 |
Neeraj Kumar |
Operation Research
IJIRT
2487-1504
VOL 1 MAY 2015
|
15491 |
Neeraj Kumar |
Virtual Reality Modeling Language in Jave
IJIRT
2487-1504
VOL 1 MAY 2015
|
15491 |
Neeraj Kumar |
Importance of Software Testing in SDLC
IJIRT
2487-1504
VOL 1 MAY 2015
|
15491 |
Neeraj Kumar |
Role of Radio on 4G Communication
IJIRT
2487-1504
VOL 1 MAY 2015
|
15491 |
Neeraj Kumar |
Socket Programming
IJIRT
2487-1504
VOL 1 MAY 2015
|
15473 |
Hemant |
Basics of Artificial Neural Network
IJIRT
2487-1504
VOL 1 MAY 2015
|
15473 |
Hemant |
Duckworth-Lewis Rule
IJIRT
2487-1504
VOL 1 MAY 2015
|
15473 |
Hemant |
Methods for JAVA Script Security
IJIRT
2487-1504
VOL 1 MAY 2015
|
15473 |
Hemant |
Study of Software Testing Techniques
IJIRT
2487-1504
VOL 1 MAY 2015
|
15473 |
Hemant |
Handover Schemes
IJIRT
2487-1504
VOL 1 MAY 2015
|
15473 |
Hemant |
Socket Programming
IJIRT
2487-1504
VOL 1 MAY 2015
|
15492 |
Neha Agarwal |
Software Reliability
IJIRT
2349-6002
Vol 4, Issue 3
|
15492 |
Neha Agarwal |
JAVA
IJE
2319-7757
Vol 12
|
15492 |
Neha Agarwal |
Network Security
IJE
2319-7757
Vol 12
|
15493 |
Nidhi Sharma |
Human and Social Issue
IJRIAT
2487-1504
Vol 1, Issue 1
|
15493 |
Nidhi Sharma |
Network Infrastructure for E-Commerce
IJRIAT
2487-1504
Vol 1, Issue 1
|
15497 |
Nonika Sharma |
Operation Research
IJR
2348-6848
Vol2, Issue 4
|
15497 |
Nonika Sharma |
PROLOG
IJRIT
2001-5569
Vol 3, Issue 4
|
15497 |
Nonika Sharma |
Introduction to JAVA
IJIRT
2349-6002
Vol 1, Issue 11
|
15497 |
Nonika Sharma |
Internet Ethics
IJTRI
2034-8762
Vol 4, Issue 1
|
15497 |
Nonika Sharma |
Generaton of Computers
JIAATS
5563-1682
Vol 16, April 2015
|
15497 |
Nonika Sharma |
ISTN
IJRDO
3785-0855
Vol 2, Issue 4
|
15498 |
Pankaj Gupta |
System Reliability Model
IJTRE
2347-4718
Vol 2, Issue 8
|
15498 |
Pankaj Gupta |
Artificial Neural Network
IJRDO
3785-0855
Vol 2, Issue 5
|
15498 |
Pankaj Gupta |
VRML
IJIRT
2349-6002
Vol 1, Issue 12
|
15498 |
Pankaj Gupta |
Software Engineering
IJTRE
2347-4718
Vol 2, Issue 8
|
15498 |
Pankaj Gupta |
Data Communicaion
IJIRT
2349-6002
Vol 1, Issue 12
|
15498 |
Pankaj Gupta |
RARP
IJRDO
3785-0855
Vol 2, Issue 5
|
15499 |
Piyush Bhatia |
Securities Associated with various server side scripting programming languages
IJIRIET
2379-1564
Vol 2, Issue 3
|
15499 |
Piyush Bhatia |
Implementation of New Security Protocol for wireless communication
IJSRD
2321-0613
Vol 3, Issue 3
|
15500 |
Poonam |
Process Models in Software Engineering
IJRIAT
2487-1504
Vol 1, Issue 1
|
15500 |
Poonam |
New Approach for Wireless Communication Security Protocol by using Manual Authentication
IJRIAT
2487-1504
Vol 1, Issue 1
|
15502 |
Priyanka Sahni |
Software Reliability
IJIRIET
2319-8753
April, 2015
|
15502 |
Priyanka Sahni |
Expert Systems
IJIRIET
2319-8753
April, 2015
|
15502 |
Priyanka Sahni |
VRML
IJR
2348-6848
Vol 2, Issue 4
|
15502 |
Priyanka Sahni |
Computer Aided Software Engineering
IJIRT
2349-6002
Vol 1, Issue 12
|
15502 |
Priyanka Sahni |
Introduction to Wireless Communication
IJR
2348-6848
Vol 2, Issue 4
|
15502 |
Priyanka Sahni |
Network File System
IJR
2348-6848
Vol 2, Issue 4
|
15504 |
Rashika Kaul Kothidar |
Operation Research
IJR
2348-6848
Vol 2, Issue 4
|
15504 |
Rashika Kaul Kothidar |
PROLOG
IJRIT
2001-5569
Vol 3, Issue 4
|
15504 |
Rashika Kaul Kothidar |
Introduction to JAVA
IJIRT
2349-6002
Vol 1, Issue 11
|
15504 |
Rashika Kaul Kothidar |
Internet Ethics
IJTRI
2034-8762
Vol 4, Issue 1
|
15504 |
Rashika Kaul Kothidar |
ISTN
IJRDO
3785-0855
Vol 2, Issue 4
|
15505 |
Ravi Sangwan |
JavaScript Security
IJTRI
2034-8762
Vol 4, Issue 1
|
15506 |
Ravishu Yadav |
System Reliability Model
IJTRE
2347-4718
Vol 2, Issue 8
|
15506 |
Ravishu Yadav |
Artificial Neural Network
IJRDO
3785-0855
Vol 2, Issue 5
|
15506 |
Ravishu Yadav |
VRML
IJIRT
2349-6002
Vol 1, Issue 12
|
15506 |
Ravishu Yadav |
Software Engineering
IJTRE
2347-4718
Vol 2, Issue 8
|
15506 |
Ravishu Yadav |
Data Communicaion
IJIRT
2349-6002
Vol 1, Issue 12
|
15506 |
Ravishu Yadav |
RARP
IJRDO
3785-0855
Vol 2, Issue 5
|
15510 |
Rohit Saini |
Operation Research in Passenger Railway Transportation
IJRIAT
2487-1504
Vol 1, Issue 1
|
15510 |
Rohit Saini |
Artificial Intelligence
IJTRT
2347-4718
Vol 2, Issue 9
|
15510 |
Rohit Saini |
Web Technologies
IJTRT
2347-4718
Vol 2, Issue 9
|
15510 |
Rohit Saini |
Engineering and Software Engineering
IJRIAT
2487-1504
Vol 1, Issue 1
|
15510 |
Rohit Saini |
The Evolution of Mobile GSM
IJTRT
2347-4718
Vol 2, Issue 9
|
15510 |
Rohit Saini |
A design and implementation of active Network Socket Programming
IJRIAT
2487-1504
Vol 1, Issue 1
|
15514 |
Sandeep Singh |
Information Theory and Digital Age
IJIRT
2349-6002
Vol 1, Issue 12
|
15514 |
Sandeep Singh |
Managing networked software development
IJIRT
2349-6002
Vol 1, Issue 12
|
15514 |
Sandeep Singh |
Programming in Sockets
IJIRT
2349-6002
Vol 1, Issue 12
|
15524 |
Sonali Samanta |
m/m/1/n queuing system with reverse balking
IJTRI
2001-5569
Vol 1, Issue 5, May 2015
|
15524 |
Sonali Samanta |
artificial intelligence
IJRIT
2349-6002
Vol 1,Issue 1, 11April 2015
|
15524 |
Sonali Samanta |
Information Securty
IJRIT
2349-6002
Vol 1,Issue 1, 11April 2015
|
15524 |
Sonali Samanta |
Wireless Communication System using Cognitive radio
IJTRI
2001-5569
Vol 1, Issue 5, May 2015
|
15525 |
Sonarka Maini |
Software Relaibility in operation research
IJRIT
2321-9854
Vol 3,Issue 5, May 2015
|
15527 |
Sweety Sen |
m/m/1/n queuing system with reverse balking
IJTRI
2001-5569
Vol 1, Issue 5, May 2015
|
15527 |
Sweety Sen |
artificial intelligence
IJRIT
2349-6002
Vol 1,Issue 1, 11April 2015
|
15527 |
Sweety Sen |
Information Securty
IJRIT
2349--6002
Vol 1,Issue 1,11April 2015
|
15527 |
Sweety Sen |
Wireless Communication System using Cognitive radio
IJTRI
2001-5569
Vol 1, Issue 5, May 2015
|
--- |
Vijender |
java
IJE
2319-7757
Vol-12
|
--- |
Vijender |
NETWORK SECURITY
IJE
2319-7757
Vol-12
|
--- |
Vijender |
System Reliablity Model
IJTRE
2347-4718
Vol-2,Issue8
|
15535 |
Rahul Sehrawat |
Basic Of Artificial Intelligence
IJRDO
3785-0855
Vol2 Issue5
|
15535 |
Rahul Sehrawat |
VRML
IJIRT
2349-6002
Vol 1, Issue 12
|
15535 |
Rahul Sehrawat |
Software Engineering
IJTRE
2347-4718
Vol-2,Issue8
|
15535 |
Rahul Sehrawat |
Data Communication GSM
IJIRT
2349-6002
Vol 1, Issue12
|
15535 |
Rahul Sehrawat |
RARP
IJRDO
3785-0855
Vol 2, Issue 5
|
15536 |
Priya Kumari |
java
IJE
2319-7757
Vol-12
|
15536 |
Priya Kumari |
NETWORK SECURITY
IJE
2319-7757
Vol-12
|
15536 |
Priya Kumari |
Information Theory and Digital Age
IJIRT
2349-6002
Vol 1, Issue 12
|
15961 |
Hemant |
Managing networked software development
IJIRT
2349-6002
Vol 1, Issue12
|
15961 |
Hemant |
Programming in Socket
IJIRT
2349-6002
Vol 1, Issue12
|