Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             117 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A Brief Introduction on Big Data 5Vs Characteristics and Hadoop Technology Ishwarappa,
2015
48 C p. 319-324
6 p.
artikel
2 A Centralized Comparison of Energy Efficient Routing Protocol for Mobile and Static Wireless Sensor Network Pandey, Sachi
2015
48 C p. 467-471
5 p.
artikel
3 A Comparative Study of Solution of Economic Load Dispatch Problem in Power Systems in the Environmental Perspective Mishra, Sarat Kumar
2015
48 C p. 96-100
5 p.
artikel
4 A Comparison Study for File Synchronisation Shial, G.
2015
48 C p. 133-141
9 p.
artikel
5 ACS: Asthma Care Services with the Help of Case Base Reasoning Technique Tyagi, Aman
2015
48 C p. 561-567
7 p.
artikel
6 Advanced Image Retrieval with Topical Classification Strategy khodaskar, Anuja
2015
48 C p. 263-268
6 p.
artikel
7 A High Caliber Region based Routing with Parallel Collision Guided Broadcasting Protocol for MANETs Devi, V. Sowmya
2015
48 C p. 427-439
13 p.
artikel
8 A Model Ranking Based Selective Ensemble Approach for Time Series Forecasting Adhikari, Ratnadip
2015
48 C p. 14-21
8 p.
artikel
9 An Active Learning Framework for Human Hand Sign Gestures and Handling Movement Epenthesis Using Enhanced Level Building Approach Elakkiya, R.
2015
48 C p. 606-611
6 p.
artikel
10 An Adaptive Approach for Detection of Blackhole Attack in Mobile Ad hoc Network Kumar, Vimal
2015
48 C p. 472-479
8 p.
artikel
11 Analysis and Design of Subthreshold Leakage Power-aware Ripple Carry Adder at Circuit-level Using 90nm Technology Amuthavalli, G.
2015
48 C p. 660-665
6 p.
artikel
12 Analyzing and Detecting Employee's Emotion for Amelioration of Organizations Subhashini, R.
2015
48 C p. 530-536
7 p.
artikel
13 Analyzing the Data Center Efficiency by Using PUE to Make Data Centers More Energy Efficient by Reducing the Electrical Consumption and Exploring New Strategies Sharma, Madhu
2015
48 C p. 142-148
7 p.
artikel
14 An Analysis of Segmentation Techniques to Identify Herbal Leaves from Complex Background Raji, I. Kiruba
2015
48 C p. 589-599
11 p.
artikel
15 An Approach to EEG Based Emotion Recognition and Classification Using Kernel Density Estimation Lahane, Prashant
2015
48 C p. 574-581
8 p.
artikel
16 An Approach to Image Compression by Using Sparse Approximation Technique Pati, Nibedita
2015
48 C p. 769-775
7 p.
artikel
17 An Effective QoS Based Web Service Composition Algorithm for Integration of Travel & Tourism Resources Sethuraman, R.
2015
48 C p. 541-547
7 p.
artikel
18 An Efficient Cryptographic Scheme for Text Message Protection Against Brute Force and Cryptanalytic Attacks Joshi, Abhishek
2015
48 C p. 360-366
7 p.
artikel
19 An Enhancement in Adaptive Median Filter for Edge Preservation Verma, Kesari
2015
48 C p. 29-36
8 p.
artikel
20 An Integrated Xbee Arduino and Differential Evolution Approach for Localization in Wireless Sensor Networks Harikrishnan, R.
2015
48 C p. 447-453
7 p.
artikel
21 A Novel ANN Based UPFC for Voltage Stability and Reactive Power Management in a Remote Hybrid System Mohanty, Asit
2015
48 C p. 555-560
6 p.
artikel
22 A Novel Approach for Analyzing the Social Network Balaguru, Saranya
2015
48 C p. 686-691
6 p.
artikel
23 A Novel Technique for Online Blood Bank Management Selvamani, K.
2015
48 C p. 568-573
6 p.
artikel
24 A Novel Technique of Feature Extraction with Dual Similarity Measures for Protein Sequence Classification Bharill, Neha
2015
48 C p. 795-801
7 p.
artikel
25 Application of a Stochastic Approach in the Design of a Rectangular Microstrip Patch Antenna Sethi, Kaibalya Kumar
2015
48 C p. 776-780
5 p.
artikel
26 Application of Credit Card Fraud Detection: Based on Bagging Ensemble Classifier Zareapoor, Masoumeh
2015
48 C p. 679-685
7 p.
artikel
27 A Probabilistic Neural Network Approach for Classification of Datasets Collected from North Coastal Districts of AP, India Using MatLab Vital, T. Panduranga
2015
48 C p. 715-721
7 p.
artikel
28 Architecture Based Materialized View Evolution: A Review Gosain, Anjana
2015
48 C p. 256-262
7 p.
artikel
29 A Review of Short Term Load Forecasting using Artificial Neural Network Models Baliyan, Arjun
2015
48 C p. 121-125
5 p.
artikel
30 A Review on Cloud Data Security and its Mitigation Techniques Selvamani, K.
2015
48 C p. 347-352
6 p.
artikel
31 A Review on Electrophysiology Based Detection of Diabetic Retinopathy Shankar, Uma
2015
48 C p. 630-637
8 p.
artikel
32 Biomedical Image Enhancement Using Wavelets Khatkar, Kirti
2015
48 C p. 513-517
5 p.
artikel
33 Chance Constraint Based Multi-objective Vendor Selection Using NSGAII Aggarwal, Remica
2015
48 C p. 699-705
7 p.
artikel
34 Comparative Analysis of the Prevention Techniques of Denial of Service Attacks in Wireless Sensor Network Patil, Ashish
2015
48 C p. 387-393
7 p.
artikel
35 Comparative Design and Analysis of Mesh, Torus and Ring NoC Jain, Arpit
2015
48 C p. 330-337
8 p.
artikel
36 Computer Aided Melanoma Skin Cancer Detection Using Image Processing Jain, Shivangi
2015
48 C p. 735-740
6 p.
artikel
37 Concept Mapping in Education and Semantic Knowledge Representation: An Illustrative Survey Katagall, Raghavendra
2015
48 C p. 638-643
6 p.
artikel
38 Contents 2015
48 C p. iii-vi
nvt p.
artikel
39 Credential Based Authentication Approach for Dynamic Group in Cloud Environment Selvamani, K.
2015
48 C p. 166-172
7 p.
artikel
40 Data Collection, Statistical Analysis and Machine Learning Studies of Cancer Dataset from North Costal Districts of AP, India Vital, T. Panduranga
2015
48 C p. 706-714
9 p.
artikel
41 Data Encryption and Authetication Using Public Key Approach Nagaraj, Srinivasan
2015
48 C p. 126-132
7 p.
artikel
42 Data Security Challenges and Its Solutions in Cloud Computing Rao, R. Velumadhava
2015
48 C p. 204-209
6 p.
artikel
43 Decision Based Adaptive Neighborhood Median Filter Samantaray, Aswini Kumar
2015
48 C p. 222-227
6 p.
artikel
44 Decision Support Model for Automated Railway Level Crossing System Using Fuzzy Logic Control Pattanaik, L.N.
2015
48 C p. 73-76
4 p.
artikel
45 Delay Tolerance in Wireless Networks through Optimal Path Routing Algorithm Sindhuja, M.
2015
48 C p. 401-407
7 p.
artikel
46 Design and Development of Multi-Tenant Web Framework Kuppusamy, Sivakumar
2015
48 C p. 180-191
12 p.
artikel
47 Design and FPGA Synthesis of Three Stage Telecommunication Switching in HDL Environment Kumar, Adesh
2015
48 C p. 454-460
7 p.
artikel
48 Differential Search Algorithm for Multiobjective Problems Kumar, Vijay
2015
48 C p. 22-28
7 p.
artikel
49 2DOF PID Controller Design for a Class of FOPTD Models–An Analysis with Heuristic Algorithms Sundaravadivu, K.
2015
48 C p. 90-95
6 p.
artikel
50 Domain Independent Framework for Automatic Text Summarization Meena, Yogesh Kumar
2015
48 C p. 722-727
6 p.
artikel
51 Dynamic Cluster Head Selection Using Fuzzy Logic on Cloud in Wireless Sensor Networks Kumar, Akshay
2015
48 C p. 497-502
6 p.
artikel
52 Editorial Patnaik, Srikanta
2015
48 C p. 3-4
2 p.
artikel
53 Effective Bug Triage–A Framework Akila, V.
2015
48 C p. 114-120
7 p.
artikel
54 E-Governance Mediated Agriculture for Sustainable Life in India Behera, Bibhu Santosh
2015
48 C p. 623-629
7 p.
artikel
55 Enhancing Security in Cloud Using Trusted Monitoring Framework Fera, M. Arun
2015
48 C p. 198-203
6 p.
artikel
56 Evaluation of Bioelectric Signals for Human Recognition Pal, Anita
2015
48 C p. 746-752
7 p.
artikel
57 Evaluation of Face Recognition Methods in Unconstrained Environments Agrawal, Amrit Kumar
2015
48 C p. 644-651
8 p.
artikel
58 Evolutionary Algorithms for Extractive Automatic Text Summarization Meena, Yogesh Kumar
2015
48 C p. 244-249
6 p.
artikel
59 Feature Priority Based Sentence Filtering Method for Extractive Automatic Text Summarization Meena, Yogesh Kumar
2015
48 C p. 728-734
7 p.
artikel
60 Fractional Order Control and Comparative Analysis of a Hybrid System Singh, Ajith B.
2015
48 C p. 37-44
8 p.
artikel
61 Fuzzy Ontology Based Multi-Modal Semantic Information Retrieval Nagarajan, G.
2015
48 C p. 101-106
6 p.
artikel
62 Hadoop, MapReduce and HDFS: A Developers Perspective Ghazi, Mohd Rehan
2015
48 C p. 45-50
6 p.
artikel
63 Hybrid Encryption Scheme (HES): An Approach for Transmitting Secure Data over Internet Singh, Rashmi
2015
48 C p. 51-57
7 p.
artikel
64 Hybrid Intrusion Detection System for Private Cloud: A Systematic Approach Rajendran, Praveen Kumar
2015
48 C p. 325-329
5 p.
artikel
65 Hybrid Partitioning Algorithm for Area Minimization in Circuits Rajine Swetha, R.
2015
48 C p. 692-698
7 p.
artikel
66 Identifying Individuals Using Multimodal Face Recognition Techniques Shyam, Radhey
2015
48 C p. 666-672
7 p.
artikel
67 Image Encryption Using Elliptic Curve Cryptograhy and Matrix Nagaraj, Srinivasan
2015
48 C p. 276-281
6 p.
artikel
68 Implementation of High Accuracy-based Image Transformation Module in Cloud Computing Reddy, A. Nanda Gopal
2015
48 C p. 518-523
6 p.
artikel
69 Implementation of K-shortest Path Algorithm in GPU Using CUDA Singh, Avadhesh Pratap
2015
48 C p. 5-13
9 p.
artikel
70 Implementing Geographical Information System to Provide Evident Support for Crime Analysis Subhashini, R.
2015
48 C p. 537-540
4 p.
artikel
71 Improved PSO Based Multi-level Thresholding for Cancer Infected Breast Thermal Images Using Otsu Raja, N. Sri Madhava
2015
48 C p. 524-529
6 p.
artikel
72 Improving the Performance of a Proxy Cache Using Very Fast Decision Tree Classifier Julian Benadit, P.
2015
48 C p. 304-312
9 p.
artikel
73 Induction Motor Control Using PSO-ANFIS Mahapatra, Sakuntala
2015
48 C p. 753-768
16 p.
artikel
74 Influence of Lexical, Syntactic and Structural Features and their Combination on Authorship Attribution for Telugu Text Prasad, S. Naga
2015
48 C p. 58-64
7 p.
artikel
75 Information Communication Technology Promoting Retail Marketing in Agriculture Sector in India as a Study Behera, Bibhu Santosh
2015
48 C p. 652-659
8 p.
artikel
76 Intrusion Detection System (IDS): Anomaly Detection Using Outlier Detection Approach Jabez, J.
2015
48 C p. 338-346
9 p.
artikel
77 Iterated Back Projection Based Super-Resolution for Iris Feature Extraction Deshpande, Anand
2015
48 C p. 269-275
7 p.
artikel
78 Literature Review of Data Model Quality Metrics of Data Warehouse Gosain, Anjana
2015
48 C p. 236-243
8 p.
artikel
79 Lowering Data Dimensionality in Big Data for the Benefit of Precision Agriculture Sabarina, K.
2015
48 C p. 548-554
7 p.
artikel
80 Mathematical Model for Transmission of Ebola Deepa, O.S.
2015
48 C p. 741-745
5 p.
artikel
81 Minimizing Privacy Disclosure in Web Services Paradigm Bhatia, Rekha
2015
48 C p. 781-788
8 p.
artikel
82 Mobility Assisted Uncertainty Reduction in MANETS Using Forward Node Optimization Sindhuja, M.
2015
48 C p. 408-413
6 p.
artikel
83 Model for Path Duration in Vehicular Ad Hoc Networks under Greedy Forwarding Strategy Shelly, Siddharth
2015
48 C p. 394-400
7 p.
artikel
84 Multi-Objective Tasks Scheduling Algorithm for Cloud Computing Throughput Optimization Lakra, Atul Vikas
2015
48 C p. 107-113
7 p.
artikel
85 Multipath QoS Routing for Traffic Splitting in MANETs Kumar, Ch. Niranjan
2015
48 C p. 414-426
13 p.
artikel
86 Multiple Information Hiding Using Circular Random Grids Gurung, Sandeep
2015
48 C p. 65-72
8 p.
artikel
87 Network Security and Types of Attacks in Network Pawar, Mohan V.
2015
48 C p. 503-506
4 p.
artikel
88 New-Fangled Alignment of Ontologies for Content Based Semantic Image Retrieval khodaskar, Anuja
2015
48 C p. 298-303
6 p.
artikel
89 ORT Broker Policy: Reduce Cost and Response Time Using Throttled Load Balancing Algorithm Tyagi, Vibhore
2015
48 C p. 217-221
5 p.
artikel
90 Part of Speech Tagging in Odia Using Support Vector Machine Das, Bishwa Ranjan
2015
48 C p. 507-512
6 p.
artikel
91 Preface Patnaik, Srikanta
2015
48 C p. 1-2
2 p.
artikel
92 Promising Large Scale Image Retrieval by Using Intelligent Semantic Binary Code Generation Technique khodaskar, Anuja
2015
48 C p. 282-287
6 p.
artikel
93 Proposal to Provide Security in MANET's DSRRouting Protocol Dholey, Milan Kumar
2015
48 C p. 440-446
7 p.
artikel
94 QoS Aware Trust Metric based Framework for Wireless Sensor Networks Prabha, R.
2015
48 C p. 373-380
8 p.
artikel
95 Quarter-Sphere Support Vector Machine for Fraud Detection in Mobile Telecommunication Networks Subudhi, Sharmila
2015
48 C p. 353-359
7 p.
artikel
96 Real Time Data Acquisition System for Performance Analysis of Modified PV Module and Derivation of Cooling Coefficients of Electrical Parameters Sharma, Madhu
2015
48 C p. 582-588
7 p.
artikel
97 Recent Developments in the Field of Bug Fixing Mittal, Varun
2015
48 C p. 288-297
10 p.
artikel
98 Reputed Packet Delivery Using Efficient Audit Misbehaviour Detection and Monitoring Method in Mobile Ad Hoc Networks Vijayakumar, A.
2015
48 C p. 489-496
8 p.
artikel
99 RETRACTED: A Novel Approavh to Discover Web Services Using WSDL and UDDI Kanimozhi, S.
2015
48 C p. 480-488
9 p.
artikel
100 Secured Network on Chip (NoC) Architecture and Routing with Modified TACIT Cryptographic Technique Kumar, Adesh
2015
48 C p. 158-165
8 p.
artikel
101 Security Issues in Data Warehouse: A Systematic Review Gosain, Anjana
2015
48 C p. 149-157
9 p.
artikel
102 Semantic Image Analysis for Intelligent Image Retrieval khodaskar, Anuja
2015
48 C p. 192-197
6 p.
artikel
103 Sign Language Unification: The Need for Next Generation Deaf Education Kumar, Vinay K.
2015
48 C p. 673-678
6 p.
artikel
104 Simulation Based Algorithm for Tracking Multi-Moving Object Using Gaussian Filtering with Lucas-Kanade Approach Mahapatra, Sakuntala
2015
48 C p. 789-794
6 p.
artikel
105 Structure Optimization Using Adaptive Particle Swarm Optimization Panigrahi, Sushanta Kumar
2015
48 C p. 802-808
7 p.
artikel
106 Subtractive Clustering Fuzzy Expert System for Engineering Applications Rao, U. Mohan
2015
48 C p. 77-83
7 p.
artikel
107 Temporal Sentiment Analysis and Causal Rules Extraction from Tweets for Event Prediction Preethi, P.G.
2015
48 C p. 84-89
6 p.
artikel
108 Test Cases Prioritization Using Open Dependency Structure Algorithm Indumathi, C.P.
2015
48 C p. 250-255
6 p.
artikel
109 Time Series Forecasting Using Hybrid ARIMA and ANN Models Based on DWT Decomposition Khandelwal, Ina
2015
48 C p. 173-179
7 p.
artikel
110 Two Factor Authentication for Secured Login Using Array Password Engender by Petri net Vaithyasubramanian, S.
2015
48 C p. 313-318
6 p.
artikel
111 VLSI Implementation and Analysis of Kidney Stone Detection by Level Set Segmentation and ANN Classification Viswanath, K.
2015
48 C p. 612-622
11 p.
artikel
112 Web Crawling through Shark-Search using PageRank Prakash, Jay
2015
48 C p. 210-216
7 p.
artikel
113 Wireless Controlled Intelligent Heating System Using HPSO Singh, Rajesh
2015
48 C p. 600-605
6 p.
artikel
114 Wireless Disaster Monitoring and Management System for Dams Anita,
2015
48 C p. 381-386
6 p.
artikel
115 Wireless Sensor Network Aided Cognitive Femtocell Networks Ghosh, Joydev
2015
48 C p. 461-466
6 p.
artikel
116 XNDDF: Towards a Framework for Flexible Near-Duplicate Document Detection Using Supervised and Unsupervised Learning Pamulaparty, Lavanya
2015
48 C p. 228-235
8 p.
artikel
117 ZigBee and Bluetooth Network based Sensory Data Acquisition System Choudhury, Sushabhan
2015
48 C p. 367-372
6 p.
artikel
                             117 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland