nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A Brief Introduction on Big Data 5Vs Characteristics and Hadoop Technology
|
Ishwarappa, |
|
2015 |
48 |
C |
p. 319-324 6 p. |
artikel |
2 |
A Centralized Comparison of Energy Efficient Routing Protocol for Mobile and Static Wireless Sensor Network
|
Pandey, Sachi |
|
2015 |
48 |
C |
p. 467-471 5 p. |
artikel |
3 |
A Comparative Study of Solution of Economic Load Dispatch Problem in Power Systems in the Environmental Perspective
|
Mishra, Sarat Kumar |
|
2015 |
48 |
C |
p. 96-100 5 p. |
artikel |
4 |
A Comparison Study for File Synchronisation
|
Shial, G. |
|
2015 |
48 |
C |
p. 133-141 9 p. |
artikel |
5 |
ACS: Asthma Care Services with the Help of Case Base Reasoning Technique
|
Tyagi, Aman |
|
2015 |
48 |
C |
p. 561-567 7 p. |
artikel |
6 |
Advanced Image Retrieval with Topical Classification Strategy
|
khodaskar, Anuja |
|
2015 |
48 |
C |
p. 263-268 6 p. |
artikel |
7 |
A High Caliber Region based Routing with Parallel Collision Guided Broadcasting Protocol for MANETs
|
Devi, V. Sowmya |
|
2015 |
48 |
C |
p. 427-439 13 p. |
artikel |
8 |
A Model Ranking Based Selective Ensemble Approach for Time Series Forecasting
|
Adhikari, Ratnadip |
|
2015 |
48 |
C |
p. 14-21 8 p. |
artikel |
9 |
An Active Learning Framework for Human Hand Sign Gestures and Handling Movement Epenthesis Using Enhanced Level Building Approach
|
Elakkiya, R. |
|
2015 |
48 |
C |
p. 606-611 6 p. |
artikel |
10 |
An Adaptive Approach for Detection of Blackhole Attack in Mobile Ad hoc Network
|
Kumar, Vimal |
|
2015 |
48 |
C |
p. 472-479 8 p. |
artikel |
11 |
Analysis and Design of Subthreshold Leakage Power-aware Ripple Carry Adder at Circuit-level Using 90nm Technology
|
Amuthavalli, G. |
|
2015 |
48 |
C |
p. 660-665 6 p. |
artikel |
12 |
Analyzing and Detecting Employee's Emotion for Amelioration of Organizations
|
Subhashini, R. |
|
2015 |
48 |
C |
p. 530-536 7 p. |
artikel |
13 |
Analyzing the Data Center Efficiency by Using PUE to Make Data Centers More Energy Efficient by Reducing the Electrical Consumption and Exploring New Strategies
|
Sharma, Madhu |
|
2015 |
48 |
C |
p. 142-148 7 p. |
artikel |
14 |
An Analysis of Segmentation Techniques to Identify Herbal Leaves from Complex Background
|
Raji, I. Kiruba |
|
2015 |
48 |
C |
p. 589-599 11 p. |
artikel |
15 |
An Approach to EEG Based Emotion Recognition and Classification Using Kernel Density Estimation
|
Lahane, Prashant |
|
2015 |
48 |
C |
p. 574-581 8 p. |
artikel |
16 |
An Approach to Image Compression by Using Sparse Approximation Technique
|
Pati, Nibedita |
|
2015 |
48 |
C |
p. 769-775 7 p. |
artikel |
17 |
An Effective QoS Based Web Service Composition Algorithm for Integration of Travel & Tourism Resources
|
Sethuraman, R. |
|
2015 |
48 |
C |
p. 541-547 7 p. |
artikel |
18 |
An Efficient Cryptographic Scheme for Text Message Protection Against Brute Force and Cryptanalytic Attacks
|
Joshi, Abhishek |
|
2015 |
48 |
C |
p. 360-366 7 p. |
artikel |
19 |
An Enhancement in Adaptive Median Filter for Edge Preservation
|
Verma, Kesari |
|
2015 |
48 |
C |
p. 29-36 8 p. |
artikel |
20 |
An Integrated Xbee Arduino and Differential Evolution Approach for Localization in Wireless Sensor Networks
|
Harikrishnan, R. |
|
2015 |
48 |
C |
p. 447-453 7 p. |
artikel |
21 |
A Novel ANN Based UPFC for Voltage Stability and Reactive Power Management in a Remote Hybrid System
|
Mohanty, Asit |
|
2015 |
48 |
C |
p. 555-560 6 p. |
artikel |
22 |
A Novel Approach for Analyzing the Social Network
|
Balaguru, Saranya |
|
2015 |
48 |
C |
p. 686-691 6 p. |
artikel |
23 |
A Novel Technique for Online Blood Bank Management
|
Selvamani, K. |
|
2015 |
48 |
C |
p. 568-573 6 p. |
artikel |
24 |
A Novel Technique of Feature Extraction with Dual Similarity Measures for Protein Sequence Classification
|
Bharill, Neha |
|
2015 |
48 |
C |
p. 795-801 7 p. |
artikel |
25 |
Application of a Stochastic Approach in the Design of a Rectangular Microstrip Patch Antenna
|
Sethi, Kaibalya Kumar |
|
2015 |
48 |
C |
p. 776-780 5 p. |
artikel |
26 |
Application of Credit Card Fraud Detection: Based on Bagging Ensemble Classifier
|
Zareapoor, Masoumeh |
|
2015 |
48 |
C |
p. 679-685 7 p. |
artikel |
27 |
A Probabilistic Neural Network Approach for Classification of Datasets Collected from North Coastal Districts of AP, India Using MatLab
|
Vital, T. Panduranga |
|
2015 |
48 |
C |
p. 715-721 7 p. |
artikel |
28 |
Architecture Based Materialized View Evolution: A Review
|
Gosain, Anjana |
|
2015 |
48 |
C |
p. 256-262 7 p. |
artikel |
29 |
A Review of Short Term Load Forecasting using Artificial Neural Network Models
|
Baliyan, Arjun |
|
2015 |
48 |
C |
p. 121-125 5 p. |
artikel |
30 |
A Review on Cloud Data Security and its Mitigation Techniques
|
Selvamani, K. |
|
2015 |
48 |
C |
p. 347-352 6 p. |
artikel |
31 |
A Review on Electrophysiology Based Detection of Diabetic Retinopathy
|
Shankar, Uma |
|
2015 |
48 |
C |
p. 630-637 8 p. |
artikel |
32 |
Biomedical Image Enhancement Using Wavelets
|
Khatkar, Kirti |
|
2015 |
48 |
C |
p. 513-517 5 p. |
artikel |
33 |
Chance Constraint Based Multi-objective Vendor Selection Using NSGAII
|
Aggarwal, Remica |
|
2015 |
48 |
C |
p. 699-705 7 p. |
artikel |
34 |
Comparative Analysis of the Prevention Techniques of Denial of Service Attacks in Wireless Sensor Network
|
Patil, Ashish |
|
2015 |
48 |
C |
p. 387-393 7 p. |
artikel |
35 |
Comparative Design and Analysis of Mesh, Torus and Ring NoC
|
Jain, Arpit |
|
2015 |
48 |
C |
p. 330-337 8 p. |
artikel |
36 |
Computer Aided Melanoma Skin Cancer Detection Using Image Processing
|
Jain, Shivangi |
|
2015 |
48 |
C |
p. 735-740 6 p. |
artikel |
37 |
Concept Mapping in Education and Semantic Knowledge Representation: An Illustrative Survey
|
Katagall, Raghavendra |
|
2015 |
48 |
C |
p. 638-643 6 p. |
artikel |
38 |
Contents
|
|
|
2015 |
48 |
C |
p. iii-vi nvt p. |
artikel |
39 |
Credential Based Authentication Approach for Dynamic Group in Cloud Environment
|
Selvamani, K. |
|
2015 |
48 |
C |
p. 166-172 7 p. |
artikel |
40 |
Data Collection, Statistical Analysis and Machine Learning Studies of Cancer Dataset from North Costal Districts of AP, India
|
Vital, T. Panduranga |
|
2015 |
48 |
C |
p. 706-714 9 p. |
artikel |
41 |
Data Encryption and Authetication Using Public Key Approach
|
Nagaraj, Srinivasan |
|
2015 |
48 |
C |
p. 126-132 7 p. |
artikel |
42 |
Data Security Challenges and Its Solutions in Cloud Computing
|
Rao, R. Velumadhava |
|
2015 |
48 |
C |
p. 204-209 6 p. |
artikel |
43 |
Decision Based Adaptive Neighborhood Median Filter
|
Samantaray, Aswini Kumar |
|
2015 |
48 |
C |
p. 222-227 6 p. |
artikel |
44 |
Decision Support Model for Automated Railway Level Crossing System Using Fuzzy Logic Control
|
Pattanaik, L.N. |
|
2015 |
48 |
C |
p. 73-76 4 p. |
artikel |
45 |
Delay Tolerance in Wireless Networks through Optimal Path Routing Algorithm
|
Sindhuja, M. |
|
2015 |
48 |
C |
p. 401-407 7 p. |
artikel |
46 |
Design and Development of Multi-Tenant Web Framework
|
Kuppusamy, Sivakumar |
|
2015 |
48 |
C |
p. 180-191 12 p. |
artikel |
47 |
Design and FPGA Synthesis of Three Stage Telecommunication Switching in HDL Environment
|
Kumar, Adesh |
|
2015 |
48 |
C |
p. 454-460 7 p. |
artikel |
48 |
Differential Search Algorithm for Multiobjective Problems
|
Kumar, Vijay |
|
2015 |
48 |
C |
p. 22-28 7 p. |
artikel |
49 |
2DOF PID Controller Design for a Class of FOPTD Models–An Analysis with Heuristic Algorithms
|
Sundaravadivu, K. |
|
2015 |
48 |
C |
p. 90-95 6 p. |
artikel |
50 |
Domain Independent Framework for Automatic Text Summarization
|
Meena, Yogesh Kumar |
|
2015 |
48 |
C |
p. 722-727 6 p. |
artikel |
51 |
Dynamic Cluster Head Selection Using Fuzzy Logic on Cloud in Wireless Sensor Networks
|
Kumar, Akshay |
|
2015 |
48 |
C |
p. 497-502 6 p. |
artikel |
52 |
Editorial
|
Patnaik, Srikanta |
|
2015 |
48 |
C |
p. 3-4 2 p. |
artikel |
53 |
Effective Bug Triage–A Framework
|
Akila, V. |
|
2015 |
48 |
C |
p. 114-120 7 p. |
artikel |
54 |
E-Governance Mediated Agriculture for Sustainable Life in India
|
Behera, Bibhu Santosh |
|
2015 |
48 |
C |
p. 623-629 7 p. |
artikel |
55 |
Enhancing Security in Cloud Using Trusted Monitoring Framework
|
Fera, M. Arun |
|
2015 |
48 |
C |
p. 198-203 6 p. |
artikel |
56 |
Evaluation of Bioelectric Signals for Human Recognition
|
Pal, Anita |
|
2015 |
48 |
C |
p. 746-752 7 p. |
artikel |
57 |
Evaluation of Face Recognition Methods in Unconstrained Environments
|
Agrawal, Amrit Kumar |
|
2015 |
48 |
C |
p. 644-651 8 p. |
artikel |
58 |
Evolutionary Algorithms for Extractive Automatic Text Summarization
|
Meena, Yogesh Kumar |
|
2015 |
48 |
C |
p. 244-249 6 p. |
artikel |
59 |
Feature Priority Based Sentence Filtering Method for Extractive Automatic Text Summarization
|
Meena, Yogesh Kumar |
|
2015 |
48 |
C |
p. 728-734 7 p. |
artikel |
60 |
Fractional Order Control and Comparative Analysis of a Hybrid System
|
Singh, Ajith B. |
|
2015 |
48 |
C |
p. 37-44 8 p. |
artikel |
61 |
Fuzzy Ontology Based Multi-Modal Semantic Information Retrieval
|
Nagarajan, G. |
|
2015 |
48 |
C |
p. 101-106 6 p. |
artikel |
62 |
Hadoop, MapReduce and HDFS: A Developers Perspective
|
Ghazi, Mohd Rehan |
|
2015 |
48 |
C |
p. 45-50 6 p. |
artikel |
63 |
Hybrid Encryption Scheme (HES): An Approach for Transmitting Secure Data over Internet
|
Singh, Rashmi |
|
2015 |
48 |
C |
p. 51-57 7 p. |
artikel |
64 |
Hybrid Intrusion Detection System for Private Cloud: A Systematic Approach
|
Rajendran, Praveen Kumar |
|
2015 |
48 |
C |
p. 325-329 5 p. |
artikel |
65 |
Hybrid Partitioning Algorithm for Area Minimization in Circuits
|
Rajine Swetha, R. |
|
2015 |
48 |
C |
p. 692-698 7 p. |
artikel |
66 |
Identifying Individuals Using Multimodal Face Recognition Techniques
|
Shyam, Radhey |
|
2015 |
48 |
C |
p. 666-672 7 p. |
artikel |
67 |
Image Encryption Using Elliptic Curve Cryptograhy and Matrix
|
Nagaraj, Srinivasan |
|
2015 |
48 |
C |
p. 276-281 6 p. |
artikel |
68 |
Implementation of High Accuracy-based Image Transformation Module in Cloud Computing
|
Reddy, A. Nanda Gopal |
|
2015 |
48 |
C |
p. 518-523 6 p. |
artikel |
69 |
Implementation of K-shortest Path Algorithm in GPU Using CUDA
|
Singh, Avadhesh Pratap |
|
2015 |
48 |
C |
p. 5-13 9 p. |
artikel |
70 |
Implementing Geographical Information System to Provide Evident Support for Crime Analysis
|
Subhashini, R. |
|
2015 |
48 |
C |
p. 537-540 4 p. |
artikel |
71 |
Improved PSO Based Multi-level Thresholding for Cancer Infected Breast Thermal Images Using Otsu
|
Raja, N. Sri Madhava |
|
2015 |
48 |
C |
p. 524-529 6 p. |
artikel |
72 |
Improving the Performance of a Proxy Cache Using Very Fast Decision Tree Classifier
|
Julian Benadit, P. |
|
2015 |
48 |
C |
p. 304-312 9 p. |
artikel |
73 |
Induction Motor Control Using PSO-ANFIS
|
Mahapatra, Sakuntala |
|
2015 |
48 |
C |
p. 753-768 16 p. |
artikel |
74 |
Influence of Lexical, Syntactic and Structural Features and their Combination on Authorship Attribution for Telugu Text
|
Prasad, S. Naga |
|
2015 |
48 |
C |
p. 58-64 7 p. |
artikel |
75 |
Information Communication Technology Promoting Retail Marketing in Agriculture Sector in India as a Study
|
Behera, Bibhu Santosh |
|
2015 |
48 |
C |
p. 652-659 8 p. |
artikel |
76 |
Intrusion Detection System (IDS): Anomaly Detection Using Outlier Detection Approach
|
Jabez, J. |
|
2015 |
48 |
C |
p. 338-346 9 p. |
artikel |
77 |
Iterated Back Projection Based Super-Resolution for Iris Feature Extraction
|
Deshpande, Anand |
|
2015 |
48 |
C |
p. 269-275 7 p. |
artikel |
78 |
Literature Review of Data Model Quality Metrics of Data Warehouse
|
Gosain, Anjana |
|
2015 |
48 |
C |
p. 236-243 8 p. |
artikel |
79 |
Lowering Data Dimensionality in Big Data for the Benefit of Precision Agriculture
|
Sabarina, K. |
|
2015 |
48 |
C |
p. 548-554 7 p. |
artikel |
80 |
Mathematical Model for Transmission of Ebola
|
Deepa, O.S. |
|
2015 |
48 |
C |
p. 741-745 5 p. |
artikel |
81 |
Minimizing Privacy Disclosure in Web Services Paradigm
|
Bhatia, Rekha |
|
2015 |
48 |
C |
p. 781-788 8 p. |
artikel |
82 |
Mobility Assisted Uncertainty Reduction in MANETS Using Forward Node Optimization
|
Sindhuja, M. |
|
2015 |
48 |
C |
p. 408-413 6 p. |
artikel |
83 |
Model for Path Duration in Vehicular Ad Hoc Networks under Greedy Forwarding Strategy
|
Shelly, Siddharth |
|
2015 |
48 |
C |
p. 394-400 7 p. |
artikel |
84 |
Multi-Objective Tasks Scheduling Algorithm for Cloud Computing Throughput Optimization
|
Lakra, Atul Vikas |
|
2015 |
48 |
C |
p. 107-113 7 p. |
artikel |
85 |
Multipath QoS Routing for Traffic Splitting in MANETs
|
Kumar, Ch. Niranjan |
|
2015 |
48 |
C |
p. 414-426 13 p. |
artikel |
86 |
Multiple Information Hiding Using Circular Random Grids
|
Gurung, Sandeep |
|
2015 |
48 |
C |
p. 65-72 8 p. |
artikel |
87 |
Network Security and Types of Attacks in Network
|
Pawar, Mohan V. |
|
2015 |
48 |
C |
p. 503-506 4 p. |
artikel |
88 |
New-Fangled Alignment of Ontologies for Content Based Semantic Image Retrieval
|
khodaskar, Anuja |
|
2015 |
48 |
C |
p. 298-303 6 p. |
artikel |
89 |
ORT Broker Policy: Reduce Cost and Response Time Using Throttled Load Balancing Algorithm
|
Tyagi, Vibhore |
|
2015 |
48 |
C |
p. 217-221 5 p. |
artikel |
90 |
Part of Speech Tagging in Odia Using Support Vector Machine
|
Das, Bishwa Ranjan |
|
2015 |
48 |
C |
p. 507-512 6 p. |
artikel |
91 |
Preface
|
Patnaik, Srikanta |
|
2015 |
48 |
C |
p. 1-2 2 p. |
artikel |
92 |
Promising Large Scale Image Retrieval by Using Intelligent Semantic Binary Code Generation Technique
|
khodaskar, Anuja |
|
2015 |
48 |
C |
p. 282-287 6 p. |
artikel |
93 |
Proposal to Provide Security in MANET's DSRRouting Protocol
|
Dholey, Milan Kumar |
|
2015 |
48 |
C |
p. 440-446 7 p. |
artikel |
94 |
QoS Aware Trust Metric based Framework for Wireless Sensor Networks
|
Prabha, R. |
|
2015 |
48 |
C |
p. 373-380 8 p. |
artikel |
95 |
Quarter-Sphere Support Vector Machine for Fraud Detection in Mobile Telecommunication Networks
|
Subudhi, Sharmila |
|
2015 |
48 |
C |
p. 353-359 7 p. |
artikel |
96 |
Real Time Data Acquisition System for Performance Analysis of Modified PV Module and Derivation of Cooling Coefficients of Electrical Parameters
|
Sharma, Madhu |
|
2015 |
48 |
C |
p. 582-588 7 p. |
artikel |
97 |
Recent Developments in the Field of Bug Fixing
|
Mittal, Varun |
|
2015 |
48 |
C |
p. 288-297 10 p. |
artikel |
98 |
Reputed Packet Delivery Using Efficient Audit Misbehaviour Detection and Monitoring Method in Mobile Ad Hoc Networks
|
Vijayakumar, A. |
|
2015 |
48 |
C |
p. 489-496 8 p. |
artikel |
99 |
RETRACTED: A Novel Approavh to Discover Web Services Using WSDL and UDDI
|
Kanimozhi, S. |
|
2015 |
48 |
C |
p. 480-488 9 p. |
artikel |
100 |
Secured Network on Chip (NoC) Architecture and Routing with Modified TACIT Cryptographic Technique
|
Kumar, Adesh |
|
2015 |
48 |
C |
p. 158-165 8 p. |
artikel |
101 |
Security Issues in Data Warehouse: A Systematic Review
|
Gosain, Anjana |
|
2015 |
48 |
C |
p. 149-157 9 p. |
artikel |
102 |
Semantic Image Analysis for Intelligent Image Retrieval
|
khodaskar, Anuja |
|
2015 |
48 |
C |
p. 192-197 6 p. |
artikel |
103 |
Sign Language Unification: The Need for Next Generation Deaf Education
|
Kumar, Vinay K. |
|
2015 |
48 |
C |
p. 673-678 6 p. |
artikel |
104 |
Simulation Based Algorithm for Tracking Multi-Moving Object Using Gaussian Filtering with Lucas-Kanade Approach
|
Mahapatra, Sakuntala |
|
2015 |
48 |
C |
p. 789-794 6 p. |
artikel |
105 |
Structure Optimization Using Adaptive Particle Swarm Optimization
|
Panigrahi, Sushanta Kumar |
|
2015 |
48 |
C |
p. 802-808 7 p. |
artikel |
106 |
Subtractive Clustering Fuzzy Expert System for Engineering Applications
|
Rao, U. Mohan |
|
2015 |
48 |
C |
p. 77-83 7 p. |
artikel |
107 |
Temporal Sentiment Analysis and Causal Rules Extraction from Tweets for Event Prediction
|
Preethi, P.G. |
|
2015 |
48 |
C |
p. 84-89 6 p. |
artikel |
108 |
Test Cases Prioritization Using Open Dependency Structure Algorithm
|
Indumathi, C.P. |
|
2015 |
48 |
C |
p. 250-255 6 p. |
artikel |
109 |
Time Series Forecasting Using Hybrid ARIMA and ANN Models Based on DWT Decomposition
|
Khandelwal, Ina |
|
2015 |
48 |
C |
p. 173-179 7 p. |
artikel |
110 |
Two Factor Authentication for Secured Login Using Array Password Engender by Petri net
|
Vaithyasubramanian, S. |
|
2015 |
48 |
C |
p. 313-318 6 p. |
artikel |
111 |
VLSI Implementation and Analysis of Kidney Stone Detection by Level Set Segmentation and ANN Classification
|
Viswanath, K. |
|
2015 |
48 |
C |
p. 612-622 11 p. |
artikel |
112 |
Web Crawling through Shark-Search using PageRank
|
Prakash, Jay |
|
2015 |
48 |
C |
p. 210-216 7 p. |
artikel |
113 |
Wireless Controlled Intelligent Heating System Using HPSO
|
Singh, Rajesh |
|
2015 |
48 |
C |
p. 600-605 6 p. |
artikel |
114 |
Wireless Disaster Monitoring and Management System for Dams
|
Anita, |
|
2015 |
48 |
C |
p. 381-386 6 p. |
artikel |
115 |
Wireless Sensor Network Aided Cognitive Femtocell Networks
|
Ghosh, Joydev |
|
2015 |
48 |
C |
p. 461-466 6 p. |
artikel |
116 |
XNDDF: Towards a Framework for Flexible Near-Duplicate Document Detection Using Supervised and Unsupervised Learning
|
Pamulaparty, Lavanya |
|
2015 |
48 |
C |
p. 228-235 8 p. |
artikel |
117 |
ZigBee and Bluetooth Network based Sensory Data Acquisition System
|
Choudhury, Sushabhan |
|
2015 |
48 |
C |
p. 367-372 6 p. |
artikel |