nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A Bar Code Design and Encoding for Fingerprints
|
Bhattacharya, Samayita |
|
2013 |
10 |
C |
p. 672-679 8 p. |
artikel |
2 |
A Closed Loop Supply Chain System with Flexible Manufacturing and Reverse Logistics Operation under Shortages for Deteriorating Items
|
Singh, S.R. |
|
2013 |
10 |
C |
p. 330-339 10 p. |
artikel |
3 |
A Computational and Mathematical Approach towards the Design and Synthesis of Uniform Au Seed Decorated Fe3O4 Nanoparticle for Potential Bio-application
|
Chatterjee, Saptarshi |
|
2013 |
10 |
C |
p. 457-463 7 p. |
artikel |
4 |
A Genetic Algorithm based Steganography Using Discrete Cosine Transformation (GASDCT)
|
Khamrui, Amrita |
|
2013 |
10 |
C |
p. 105-111 7 p. |
artikel |
5 |
A Genetic Algorithm (GA) based Load Balancing Strategy for Cloud Computing
|
Dasgupta, Kousik |
|
2013 |
10 |
C |
p. 340-347 8 p. |
artikel |
6 |
Agent based Resource Monitoring System in IaaS Cloud Environment
|
Meera, A. |
|
2013 |
10 |
C |
p. 200-207 8 p. |
artikel |
7 |
A GIS Anchored System for Selection of Utility Service Stations through Hierarchical Clustering
|
Chakraborty, Anirban |
|
2013 |
10 |
C |
p. 762-772 11 p. |
artikel |
8 |
A Light Weight Trust based Secure and Energy Efficient Clustering in Wireless Sensor Network: Honey Bee Mating Intelligence Approach
|
Sahoo, Rashmi Ranjan |
|
2013 |
10 |
C |
p. 515-523 9 p. |
artikel |
9 |
An Agentmining Framework for Intelligent Vehicular System
|
Lanka, Swathi |
|
2013 |
10 |
C |
p. 425-432 8 p. |
artikel |
10 |
An Algorithm for Generating only Desired Permutations for Solving Sudoku Puzzle
|
Maji, Arnab Kumar |
|
2013 |
10 |
C |
p. 392-399 8 p. |
artikel |
11 |
Analysis of Features from Protein-protein Hetero-complex Structures to Predict Protein Interaction Interfaces Using Machine Learning
|
Bagchi, Angshuman |
|
2013 |
10 |
C |
p. 62-66 5 p. |
artikel |
12 |
Analytical Design of Feature based Ranking
|
Guha, Sutirtha Kumar |
|
2013 |
10 |
C |
p. 773-780 8 p. |
artikel |
13 |
An Effective Approach: Image Quality Enhancement for Microaneurysms Detection of Non-dilated Retinal Fundus Image
|
Datta, Niladri Sekhar |
|
2013 |
10 |
C |
p. 731-737 7 p. |
artikel |
14 |
An Improved Minimum Redundancy Maximum Relevance Approach for Feature Selection in Gene Expression Data
|
Mandal, Monalisa |
|
2013 |
10 |
C |
p. 20-27 8 p. |
artikel |
15 |
An Improved Parallel Prefix Computation on 2D-Mesh Network
|
Jha, Sudhanshu Kumar |
|
2013 |
10 |
C |
p. 919-926 8 p. |
artikel |
16 |
An Integrated Model with Variable Production and Demand Rate under Inflation
|
Singh, S.R. |
|
2013 |
10 |
C |
p. 381-391 11 p. |
artikel |
17 |
A Non-adaptive Partial Encryption of Grayscale Images based on Chaos
|
Som, Sukalyan |
|
2013 |
10 |
C |
p. 663-671 9 p. |
artikel |
18 |
A Novel Approach for Text Steganography: Generating Text Summary Using Reflection Symmetry
|
Majumder, Anandaprova |
|
2013 |
10 |
C |
p. 112-120 9 p. |
artikel |
19 |
A Novel EMD based Watermarking of Fingerprint Biometric Using GEP
|
Shaw, Anil Kumar |
|
2013 |
10 |
C |
p. 172-183 12 p. |
artikel |
20 |
A Novel Hash based Technique for Thermal Image Authentication
|
Sengupta, Madhumita |
|
2013 |
10 |
C |
p. 147-156 10 p. |
artikel |
21 |
A Novel Selective Scale Space based Fuzzy C-means Model for Spatial Clustering
|
Roy, Parthajit |
|
2013 |
10 |
C |
p. 596-603 8 p. |
artikel |
22 |
Approximate Data Mining Using Sketches for Massive Data
|
Gupta, Parul |
|
2013 |
10 |
C |
p. 781-787 7 p. |
artikel |
23 |
A Region-to-pixel based Multi-sensor Image Fusion
|
Pramanik, Sourav |
|
2013 |
10 |
C |
p. 654-662 9 p. |
artikel |
24 |
A Revised Multi-choice Goal Programming Framework for Economic-environmental Power Generation and Dispatch Problem
|
Pal, Bijay Baran |
|
2013 |
10 |
C |
p. 637-645 9 p. |
artikel |
25 |
Artificial Neural Networks based Prediction of Insolation on Horizontal Surfaces for Bangladesh
|
Islam, Md. Shafiqul |
|
2013 |
10 |
C |
p. 482-491 10 p. |
artikel |
26 |
Assignment of Static Light Trail in WDM Networks
|
Bhadra, Sampa Rani |
|
2013 |
10 |
C |
p. 910-918 9 p. |
artikel |
27 |
A Text based Steganography Technique with Indian Root
|
Roy, Souvik |
|
2013 |
10 |
C |
p. 167-171 5 p. |
artikel |
28 |
Authentication Through Hough Transformation Generated Signature on G-Let D3 Domain (AHSG)
|
Sengupta, Madhumita |
|
2013 |
10 |
C |
p. 121-130 10 p. |
artikel |
29 |
Automated PC-based Control and Monitoring of Radio Observations Using LPDA
|
Bhattacharya, A.B. |
|
2013 |
10 |
C |
p. 348-355 8 p. |
artikel |
30 |
Automatic Detection of Atrial Fibrillation Using Empirical Mode Decomposition and Statistical Approach
|
Maji, U. |
|
2013 |
10 |
C |
p. 45-52 8 p. |
artikel |
31 |
Automatic Eye Detection Using Fast Corner Detector of North East Indian (NEI) Face Images
|
Majumder, Goutam |
|
2013 |
10 |
C |
p. 646-653 8 p. |
artikel |
32 |
A Virtual Model for Currency Tracking Using Fuzzy Inference Rule in a Unique Identity Environment
|
Nandi, Sutanu |
|
2013 |
10 |
C |
p. 628-636 9 p. |
artikel |
33 |
Building and Querying Microbial Ontology
|
Biswas, Sreekumar |
|
2013 |
10 |
C |
p. 13-19 7 p. |
artikel |
34 |
Cardiac Arrhythmia Classification Using Neural Networks with Selected Features
|
Mitra, Malay |
|
2013 |
10 |
C |
p. 76-84 9 p. |
artikel |
35 |
Chaos based Edge Adaptive Image Steganography
|
Roy, Ratnakirti |
|
2013 |
10 |
C |
p. 138-146 9 p. |
artikel |
36 |
Classification of Heart Disease Using K- Nearest Neighbor and Genetic Algorithm
|
jabbar, M. Akhil |
|
2013 |
10 |
C |
p. 85-94 10 p. |
artikel |
37 |
Classifying Electrooculogram to Detect Directional Eye Movements
|
Banerjee, Anwesha |
|
2013 |
10 |
C |
p. 67-75 9 p. |
artikel |
38 |
Clustering Ensemble: A Multiobjective Genetic Algorithm based Approach
|
Chatterjee, Sujoy |
|
2013 |
10 |
C |
p. 443-449 7 p. |
artikel |
39 |
Computational Intelligence based Triple Layer Perceptron Model Coordinated PSO Guided Metamorphosed based Application in Cryptographic Technique for Secured Communication (TLPPSO)
|
Sarkar, Arindam |
|
2013 |
10 |
C |
p. 433-442 10 p. |
artikel |
40 |
Computational Study on the Effect of Blade Cutback on the Performance of the Centrifugal Compressor
|
Seralathan, S. |
|
2013 |
10 |
C |
p. 400-408 9 p. |
artikel |
41 |
Construction of GA-optimized Radial Basis Neural Network from HIV-1 Vpr Mutant Microarray Gene Expression Data
|
Barman, Bandana |
|
2013 |
10 |
C |
p. 450-456 7 p. |
artikel |
42 |
Cost Optimized Set of Primes Generation with Cellular Automata for Stress Testing in Distributed Computing
|
Mitra, Arnab |
|
2013 |
10 |
C |
p. 365-372 8 p. |
artikel |
43 |
Design and Implementation of Visualizers for TinyOS
|
Gupta, Atrayee |
|
2013 |
10 |
C |
p. 409-416 8 p. |
artikel |
44 |
Design and Simulation of Single Electron Threshold Logic Gate based Programmable Logic Array
|
Ghosh, Arpita |
|
2013 |
10 |
C |
p. 866-874 9 p. |
artikel |
45 |
Detection of Abnormal Findings in Human RBC in Diagnosing Sickle Cell Anaemia Using Image Processing
|
Rakshit, Pranati |
|
2013 |
10 |
C |
p. 28-36 9 p. |
artikel |
46 |
Detection of Blackhole Behaviour Using Triangular Encryption in NS2
|
Chatterjee, Nabarun |
|
2013 |
10 |
C |
p. 524-529 6 p. |
artikel |
47 |
Detection of Profile-injection Attacks in Recommender Systems Using Outlier Analysis
|
Chakraborty, Parthasarathi |
|
2013 |
10 |
C |
p. 963-969 7 p. |
artikel |
48 |
Duo Triangle Shaped Microstrip Patch Antenna Analysis for WiMAX Lower Band Application
|
Srivastava, Stuti |
|
2013 |
10 |
C |
p. 554-563 10 p. |
artikel |
49 |
Embedded System of DC Motor Closed Loop Speed Control based on 8051 Microcontroller
|
Mondal, Reetam |
|
2013 |
10 |
C |
p. 840-848 9 p. |
artikel |
50 |
Enhancing Coverage Ratio Using Mobility in Heterogeneous Wireless Sensor Network
|
Nudurupati, Durga Pavan |
|
2013 |
10 |
C |
p. 538-545 8 p. |
artikel |
51 |
Estimating Air Shower Fluctuations from the Monte Carlo Simulation Code CORSIKA
|
Dey, R.K. |
|
2013 |
10 |
C |
p. 236-241 6 p. |
artikel |
52 |
Estimating Correlation Dimension Using Multi Layered Grid and Damped Window Model Over Data Streams
|
Yarlagadda, Anuradha |
|
2013 |
10 |
C |
p. 797-804 8 p. |
artikel |
53 |
Evaluation of Power Efficient FIR Filter for FPGA based DSP Applications
|
Bhattacharjee, Subhankar |
|
2013 |
10 |
C |
p. 856-865 10 p. |
artikel |
54 |
Facial Expression Recognition Using Eigenspaces
|
Chakrabarti, Debasmita |
|
2013 |
10 |
C |
p. 755-761 7 p. |
artikel |
55 |
Feature Accentuation Using Uniform Morphological Correction as Pre-processing Technique for DWT based Face Recognition
|
Roohi, S.T. |
|
2013 |
10 |
C |
p. 690-698 9 p. |
artikel |
56 |
Feature Points Extraction of Thermal Face Using Harris Interest Point Detection
|
Bhowmik, Mrinal Kanti |
|
2013 |
10 |
C |
p. 724-730 7 p. |
artikel |
57 |
FGP Approach for Solving Fractional Multiobjective Decision Making Problems Using GA with Tournament Selection and Arithmetic Crossover
|
Chakraborti, Debjani |
|
2013 |
10 |
C |
p. 505-514 10 p. |
artikel |
58 |
Finite Element Method based Modeling of a Sensory System for Detection of Atherosclerosis in Human Using Electrical Impedance Tomography
|
Chakraborty, Deborshi |
|
2013 |
10 |
C |
p. 262-270 9 p. |
artikel |
59 |
Fusion of Directional Spatial Discriminant Features for Face Recognition
|
Dey, Aniruddha |
|
2013 |
10 |
C |
p. 747-754 8 p. |
artikel |
60 |
Fusion of Electronic Nose and Tongue Response Using Fuzzy based Approach for Black Tea Classification
|
(Roy), Runu Banerjee |
|
2013 |
10 |
C |
p. 615-622 8 p. |
artikel |
61 |
GA based FGP Approach for Optimal Reactive Power Dispatch
|
Pal, Bijay Baran |
|
2013 |
10 |
C |
p. 464-473 10 p. |
artikel |
62 |
Generalization of Booth's Algorithm for Efficient Multiplication
|
Biswas, Barun |
|
2013 |
10 |
C |
p. 304-310 7 p. |
artikel |
63 |
Generation of AES S-boxes with Various Modulus and Additive Constant Polynomials and Testing their Randomization
|
Das, S. |
|
2013 |
10 |
C |
p. 957-962 6 p. |
artikel |
64 |
Genetic Algorithm based Approach for Serving Maximum Number of Customers Using Limited Resources
|
Atta, Soumen |
|
2013 |
10 |
C |
p. 492-497 6 p. |
artikel |
65 |
Genetic Algorithm based Resource Broker for Computational Grid
|
Singh, Susmita |
|
2013 |
10 |
C |
p. 572-580 9 p. |
artikel |
66 |
Gravitational Search Algorithm and Lyapunov Theory based Stable Adaptive Fuzzy Logic Controller
|
Roy, Ananya |
|
2013 |
10 |
C |
p. 581-586 6 p. |
artikel |
67 |
Green Supply Chain Model with Product Remanufacturing under Volume Flexible Environment
|
Urvashi, |
|
2013 |
10 |
C |
p. 216-226 11 p. |
artikel |
68 |
Handwritten and Printed Word Identification Using Gray-scale Feature Vector and Decision Tree Classifier
|
Malakar, Samir |
|
2013 |
10 |
C |
p. 831-839 9 p. |
artikel |
69 |
HelloMsgC: A Practical Implementation of Hello Message Protocol in Wireless Sensor Network
|
Babu, Shaik Sahil |
|
2013 |
10 |
C |
p. 546-553 8 p. |
artikel |
70 |
Hiding & Analyzing Data in Image Using Extended PMM
|
Banerjee, Indradip |
|
2013 |
10 |
C |
p. 157-166 10 p. |
artikel |
71 |
Hybrid Computational Simulation and Modeling Assisted Structural Analysis of Anti-tubercular Molecules
|
Mondal, Sudipta |
|
2013 |
10 |
C |
p. 53-61 9 p. |
artikel |
72 |
Image Compression based on Block Truncation Coding Using Clifford Algebra
|
Sau, Kartik |
|
2013 |
10 |
C |
p. 699-706 8 p. |
artikel |
73 |
Interval Goal Programming Approach to Multiobjective Fuzzy Goal Programming Problem with Interval Weights
|
Sen, Shyamal |
|
2013 |
10 |
C |
p. 587-595 9 p. |
artikel |
74 |
iSENSE: Intelligent Sensor Monitoring Services with Integrated WSN Testbed
|
Bisoi, Sovan |
|
2013 |
10 |
C |
p. 564-571 8 p. |
artikel |
75 |
Measurement of Power Frequency with Higher Accuracy Using PIC Microcontroller
|
Alam, Khairul |
|
2013 |
10 |
C |
p. 849-855 7 p. |
artikel |
76 |
Modelling and Simulation: Cyber War
|
Mishra, Bimal Kumar |
|
2013 |
10 |
C |
p. 987-997 11 p. |
artikel |
77 |
Modelling and Simulation of Cost Effective Sensorless Drive for Brushless DC Motor
|
Chowdhury, Debjyoti |
|
2013 |
10 |
C |
p. 279-286 8 p. |
artikel |
78 |
Modified Compression Techniques Based on Optimality of LZW Code (MOLZW)
|
Nandi, Utpal |
|
2013 |
10 |
C |
p. 949-956 8 p. |
artikel |
79 |
Modified Shuffled Frog Leaping Algorithm based 6DOF Motion for Underwater Mobile Robot
|
Kundu, Shubhasri |
|
2013 |
10 |
C |
p. 295-303 9 p. |
artikel |
80 |
Multicast Traffic Grooming based Light-tree in WDM Mesh Networks
|
Pradhan, Ashok Kumar |
|
2013 |
10 |
C |
p. 900-909 10 p. |
artikel |
81 |
Multi-Echelon Supply Chain Management for Deteriorating items with Partial Backordering under Inflationary Environment
|
Shastri, Aditya |
|
2013 |
10 |
C |
p. 320-329 10 p. |
artikel |
82 |
Multi-scale Speaker Transformation Using Radial Basis Function
|
Nirmal, Jagannath |
|
2013 |
10 |
C |
p. 311-319 9 p. |
artikel |
83 |
Neural Network Modeling of Color Array Filter for Digital Forgery Detection Using Kernel LDA
|
S, Vinoth |
|
2013 |
10 |
C |
p. 498-504 7 p. |
artikel |
84 |
Offline Signature Verification Using Pixel Matching Technique
|
Bhattacharya, Indrajit |
|
2013 |
10 |
C |
p. 970-977 8 p. |
artikel |
85 |
Optimized Video Steganography Using Genetic Algorithm (GA)
|
Dasgupta, Kousik |
|
2013 |
10 |
C |
p. 131-137 7 p. |
artikel |
86 |
PAPR Reduction in SC-FDMA Using NCT Technique
|
Shukla, Sandeep |
|
2013 |
10 |
C |
p. 927-934 8 p. |
artikel |
87 |
Performance Analysis of Object Shape Classification and Matching from Tactile Images Using Wavelet Energy Features
|
Datta, Shreyasi |
|
2013 |
10 |
C |
p. 805-812 8 p. |
artikel |
88 |
Performance Comparison of Cosine, Haar, Walsh-hadamard, Fourier and Wavelet Transform for Shape based Image Retrieval Using Fuzzy Similarity Measure
|
Banerjee, Alina |
|
2013 |
10 |
C |
p. 623-627 5 p. |
artikel |
89 |
Plagiarism Detection by Identifying the Equations
|
Bhattacharjee, Debotosh |
|
2013 |
10 |
C |
p. 715-723 9 p. |
artikel |
90 |
Prediction of Flow Regime for Air-water Flow in Circular Micro Channels Using ANN
|
Bar, Nirjhar |
|
2013 |
10 |
C |
p. 242-252 11 p. |
artikel |
91 |
Prediction of Frictional Pressure Drop Using Artificial Neural Network for Air-water Flow through U-bends
|
Bar, Nirjhar |
|
2013 |
10 |
C |
p. 813-821 9 p. |
artikel |
92 |
Prediction of Prostate Cancer Cells based on Principal Component Analysis Technique
|
Ghosh, A. |
|
2013 |
10 |
C |
p. 37-44 8 p. |
artikel |
93 |
Preface
|
Mandal, Jyotsna Kumar |
|
2013 |
10 |
C |
p. 1-2 2 p. |
artikel |
94 |
Preservation of IPR of Songs through Embedding Secret Song (IPRSESS)
|
Mondal, Uttam Kr. |
|
2013 |
10 |
C |
p. 978-986 9 p. |
artikel |
95 |
Prioritization of Clusters for Post-genomic Analysis
|
Bhattacharyya, Malay |
|
2013 |
10 |
C |
p. 3-12 10 p. |
artikel |
96 |
QoS of MANet Through Trust based AODV Routing Protocol by Exclusion of Black Hole Attack
|
Bar, Radha Krishna |
|
2013 |
10 |
C |
p. 530-537 8 p. |
artikel |
97 |
Random Polygon Generation through Convex Layers
|
Sadhu, Sanjib |
|
2013 |
10 |
C |
p. 356-364 9 p. |
artikel |
98 |
Random Walks based Image Segmentation Using Color Space Graphs
|
Jha, Sonu Kumar |
|
2013 |
10 |
C |
p. 271-278 8 p. |
artikel |
99 |
Research and Reviews in Question Answering System
|
Dwivedi, Sanjay K. |
|
2013 |
10 |
C |
p. 417-424 8 p. |
artikel |
100 |
Resistivity Imaging of a Phantom with Irregular Inhomogeneities with 32 Silver Electrodes based Sensory System in Two Dimensional Electrical Impedance Tomography
|
Chakraborty, Deborshi |
|
2013 |
10 |
C |
p. 191-199 9 p. |
artikel |
101 |
Risk Analysis in Construction Sites Using Fuzzy Reasoning and Fuzzy Analytic Hierarchy Process
|
Majumder, Debasish |
|
2013 |
10 |
C |
p. 604-614 11 p. |
artikel |
102 |
Robust Technique for Image Encryption and Decryption Using Discrete Fractional Fourier Transform with Random Phase Masking
|
Ashutosh, |
|
2013 |
10 |
C |
p. 707-714 8 p. |
artikel |
103 |
SaaS Oriented Generic Cloud Compiler
|
Banerjee, Chandan |
|
2013 |
10 |
C |
p. 253-261 9 p. |
artikel |
104 |
Salient Features of Cluster based Routing for Mobile Networks
|
Thakurt, Parag Kumar Guha |
|
2013 |
10 |
C |
p. 875-881 7 p. |
artikel |
105 |
Securing Message Using Recursive Modulo-2 and Key Rotation Operation (RMRO)
|
Mandal, J.K. |
|
2013 |
10 |
C |
p. 935-941 7 p. |
artikel |
106 |
Security based Domotics
|
Das, Rishabh |
|
2013 |
10 |
C |
p. 942-948 7 p. |
artikel |
107 |
Segmentation of Connected Components in Arabic Handwritten Documents
|
Aouadi, N. |
|
2013 |
10 |
C |
p. 738-746 9 p. |
artikel |
108 |
Shift Invariance based Feature Extraction and Weighted BPSO based Feature Selection for Enhanced Face Recognition
|
Shetty, Santhosh |
|
2013 |
10 |
C |
p. 822-830 9 p. |
artikel |
109 |
Signal Processing Approach for Music Synthesis Using Bird's Sounds
|
Sharma, Hemant |
|
2013 |
10 |
C |
p. 287-294 8 p. |
artikel |
110 |
Stirling Transform based Color Image Authentication
|
Ghosal, S.K. |
|
2013 |
10 |
C |
p. 95-104 10 p. |
artikel |
111 |
The Path Length Prediction of MANET Using Moving Average Model
|
Pal, Arindrajit |
|
2013 |
10 |
C |
p. 882-889 8 p. |
artikel |
112 |
Time Efficient Optimal Tunning through Various Learning Rules in Unify Computing (TEOTLRUC)
|
Mandal, J.K. |
|
2013 |
10 |
C |
p. 474-481 8 p. |
artikel |
113 |
Towards Bengali DBpedia
|
Sarkar, Arup |
|
2013 |
10 |
C |
p. 890-899 10 p. |
artikel |
114 |
Two Level of Trade Credit
|
Singh, S.R. |
|
2013 |
10 |
C |
p. 227-235 9 p. |
artikel |
115 |
Two Storage Production Model with Imperfect Quality for Decaying Items Under Preservation
|
Singh, S.R. |
|
2013 |
10 |
C |
p. 208-215 8 p. |
artikel |
116 |
Two-warehouse Inventory Model with Multivariate Demand and K-release Rule
|
Kumar, Neeraj |
|
2013 |
10 |
C |
p. 788-796 9 p. |
artikel |
117 |
UDDI Extensions for Temporally Customized Web Services
|
Marwaha, Preeti |
|
2013 |
10 |
C |
p. 184-190 7 p. |
artikel |
118 |
Updation of Activation Sequence of a Chip after its Deployment for Access Control
|
Saha, Debasri |
|
2013 |
10 |
C |
p. 373-380 8 p. |
artikel |
119 |
Wavelet based Denoising of Medical Images Using Sub-band Adaptive Thresholding through Genetic Algorithm
|
Mukhopadhyay, Somnath |
|
2013 |
10 |
C |
p. 680-689 10 p. |
artikel |