Showing results 2 to 21 of 141
< previous
next >
Preview | Issue Date | Title | Author(s) | Institute Name | Level | Country |
| 2012 | Analysis and Performance Evaluation of Real Time Disk Scheduling Algorithms | Jha, Dipendra Kumar | Central Department of Computer Science and Information Technology | Masters | - |
| 2011 | Analysis and Prevention of SQL Injection Attacks | Bhandari, Ram Kumar | Central Department of Computer Science and Information Technology | Masters | - |
| 2011 | Analysis of Adhoc on demand distance vector (AODV) and dynamic source (DSR) routing algorithms in mobile Adhoc networks | Pokhrel, Vivek | Central Department of Computer Science and Information Technology | Masters | - |
| 2011 | Analysis of authorization framework and its implementation | Bhandari, Pushpendra Singh | Central Department of Computer Science and Information Technology | Masters | - |
| 2011 | Analysis of Dedicated Cryptographic Hash Functions–MD5 and SHA-1 | Gautam, Sudhir | Central Department of Computer Science and Information Technology | Masters | - |
| 2019 | Analysis of Frequency Domain Image Steganography Using DCT, DWT and DCT With DWT | Maharjan, Sajina | Central Department of Computer Science and Information Technology | Masters | - |
| 2018 | Analysis of Image Encryption using Chaotic, Hybrid Chaotic and Block Cipher Approach | Chaudhary, Nirmal Kumar | Central Department of Computer Science and Information Technology | Masters | - |
| 2016 | Analysis of MST based clustering algorithm with different threshold values | Pant, Lalit | Central Department of Computer Science and Information Technology | Masters | - |
| 2014 | Analysis of Queries Routing in Super-Super-Peer Based P2P Architecture Using NBTree: The Hybrid Algorithm | Dewan, Abhishek | Central Department of Computer Science and Information Technology | Masters | - |
| 2007 | Analytical Evaluation of Round Robin Algorithm to Find the Optimal Quantum Size | Pandey, Dhiraj Kedar | Central Department of Computer Science and Information Technology | Masters | - |
| 2008 | Analytical Evaluation ofPriority-Based Real-TimeSchedulingAlgorithms forIndependentPeriodicTasks | Singh, Rajesh | Central Department of Computer Science and Information Technology | Masters | - |
| 2007 | Analytical Study of IEEE 802.11i and its Improvement | Awale, Anil | Central Department of Computer Science and Information Technology | Masters | - |
| 2013 | Analyzing anomalous behavior of least recently frequently used (LRFU) page replacement algorithm | Thapa, Kepisee | Central Department of Computer Science and Information Technology | Masters | - |
| 2008 | Ananalysis of Legacy Database Updatingthroughdatabase Wrapping Technologies-A Programming Technique | Aryal, Hem Raj | Central Department of Computer Science and Information Technology | Masters | - |
| 2019 | Automated Live Migration of Virtual Machines in Cloud Data Center | Tamang, Ramesh | Central Department of Computer Science and Information Technology | Masters | - |
| 2010 | Automatic construction of dictionary on English-Nepali parallel corpus | Saud, Lokendra Bahadur | Central Department of Computer Science and Information Technology | Masters | - |
| 2012 | Automatic Data Extraction from Online Social Network and Track the Changes in Vulnerability | Maharjan, Satya Bahadur | Central Department of Computer Science and Information Technology | Masters | - |
| 2010 | Automatic generation of basis set of paths for white box unit testing | Karki, Suraj | Central Department of Computer Science and Information Technology | Masters | - |
| 2013 | Automatic Text Summarization System for Nepali Language Based on Sentence Extraction | Lamichhane, Rajendra | Central Department of Computer Science and Information Technology | Masters | - |
| 2010 | Blocking SQL Injection in Database Stored Procedures | Manandhar, Sanu | Central Department of Computer Science and Information Technology | Masters | - |