Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             124 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A Behaviour based Framework for Worm Detection Saikia, Tonmoy
2012
6 C p. 1011-1018
8 p.
artikel
2 A Coalitional Game Theoretic Mechanism for Privacy Preserving Publishing Based on k-Anonymity Chakravarthy, Srinivasa L.
2012
6 C p. 889-896
8 p.
artikel
3 A Dynamic Fault Tolerant Threshold based Replication Mechanism in Distributed Environment Vardhan, Manu
2012
6 C p. 188-195
8 p.
artikel
4 A Framework for Outlier Detection in Evolving Data Streams by Weighting Attributes in Clustering Yogita,
2012
6 C p. 214-222
9 p.
artikel
5 A Genetic Algorithm based Approach for Topological Optimization of Interconnection Networks Tripathy, P.K.
2012
6 C p. 196-205
10 p.
artikel
6 Analysis of Clustering Algorithms for MR Image Segmentation using IQI Patel, S.
2012
6 C p. 387-396
10 p.
artikel
7 Analysis of Reconfigurable Multipliers for Integer and Galois Field Multiplication based on High Speed Adders Madhuri, Divya
2012
6 C p. 90-97
8 p.
artikel
8 Analytical Crosstalk Modelling of On-Chip RLC Global Interconnects with Skin Effect for Ramp Input Maheshwari, V.
2012
6 C p. 814-821
8 p.
artikel
9 An Analytical Model for Adaptive Multi-Guard Channel Scheme for Multi-Class Traffic in Cellular Networks with Reduced Handoff Drop Probabilities Somagari, Suresh Reddy
2012
6 C p. 690-697
8 p.
artikel
10 An Approach to Manage Mobility of Sensor Nodes in Sensor-Grid Infrastructure Bhunia, Suman Sankar
2012
6 C p. 754-762
9 p.
artikel
11 An Efficient and Tolerant Model for Real-time Transaction Management in a Cellular Environment with Random Multiple Handoffs and Frequent Short Disconnections Kayal, Abhishek
2012
6 C p. 640-649
10 p.
artikel
12 An Evolutionary Algorithm for Multi-criteria Resource Constrained Project Scheduling Problem based On PSO Bakshi, Tuli
2012
6 C p. 231-238
8 p.
artikel
13 A New and Efficient Method for Removal of High Density Salt and Pepper Noise Through Cascade Decision based Filtering Algorithm Pattnaik, Ashutosh
2012
6 C p. 108-117
10 p.
artikel
14 A New Authentication Protocol for Multi-tag RFID Applicable to Passive Tag Dhal, Subhasish
2012
6 C p. 880-888
9 p.
artikel
15 A New Soft-Thresholding Image Denoising Method Biswas, Mantosh
2012
6 C p. 10-15
6 p.
artikel
16 A New UWB Tri-Band Antenna for Cognitive Radio Pandian, S. Siva Sundara
2012
6 C p. 747-753
7 p.
artikel
17 An Improved DSDV Routing Protocol for Wireless Ad Hoc Networks Ahmed, Gulfishan Firdose
2012
6 C p. 822-831
10 p.
artikel
18 An Optimal Novel Byzantine Agreement Protocol (ONBAP) for Heterogeneous Distributed Database Processing Systems Ramesh, Dharavath
2012
6 C p. 57-66
10 p.
artikel
19 A Novel Approach for Web Service Run Time Exception Handling Thirumaran, M.
2012
6 C p. 145-152
8 p.
artikel
20 A Novel High Speed Two Stage Detector for Spectrum Sensing Geethu, S.
2012
6 C p. 682-689
8 p.
artikel
21 A Novel Multi-Classifier Layered Approach to Improve Minority Attack Detection in IDS Sharma, Neelam
2012
6 C p. 913-921
9 p.
artikel
22 A Novel Spatial Fuzzy Clustering using Delaunay Triangulation for Large Scale GIS Data (NSFCDT) Roy, Parthajit
2012
6 C p. 452-459
8 p.
artikel
23 A Novel Technique for Name Identification from Homeopathy Diagnosis Discussion Forum Majumder, Mukta
2012
6 C p. 379-386
8 p.
artikel
24 An Ultra-wideband Printed Monopole Antenna with Dual Band-Notched Characteristics Using DGS and SRR Sharma, M.M.
2012
6 C p. 778-783
6 p.
artikel
25 A Particle Swarm Optimization based Approach for Power System Transient Stability Enhancement with TCSC Rautray, S.K.
2012
6 C p. 31-38
8 p.
artikel
26 Application of Fuzzy Clustering on Software Quality using Max-min Method Pal, Jaya
2012
6 C p. 67-73
7 p.
artikel
27 Application of Multi-Objective Teaching Learning based Optimization Algorithm to Optimal Power Flow Problem Nayak, M.R.
2012
6 C p. 255-264
10 p.
artikel
28 A Prototype-Based Modified DBSCAN for Gene Clustering Edla, Damodar Reddy
2012
6 C p. 485-492
8 p.
artikel
29 Architecture Design and FPGA Implementation of CORDIC Algorithm for Fingerprint Recognition Applications Revathi, P.
2012
6 C p. 371-378
8 p.
artikel
30 A Real-time Model for Multiple Human Face Tracking from Low-resolution Surveillance Videos Sarkar, Rajib
2012
6 C p. 1004-1010
7 p.
artikel
31 A Resilient Authentication and Trojan Detection Technique for Hard IP Saha, Debasri
2012
6 C p. 24-30
7 p.
artikel
32 A Segment based Technique for Detecting Exudate from Retinal Fundus Image Kumar, Atul
2012
6 C p. 1-9
9 p.
artikel
33 Assessment of Software Quality: Choquet Integral Approach Pasrija, Vatesh
2012
6 C p. 153-162
10 p.
artikel
34 A Survey on Monochrome Image Segmentation Methods Sridevi, M.
2012
6 C p. 548-555
8 p.
artikel
35 A Transliteration of CRF based Manipuri POS Tagging Nongmeikapam, Kishorjit
2012
6 C p. 582-589
8 p.
artikel
36 Automatic System for Classification of Erythrocytes Infected with Malaria and Identification of Parasite's Life Stage Savkare, S.S.
2012
6 C p. 405-410
6 p.
artikel
37 Binarization based Image Edge Detection using Bacterial Foraging Algorithm Verma, Om Prakash
2012
6 C p. 315-323
9 p.
artikel
38 Block Encoding of Color Histogram for Content based Image Retrieval Applications Shaila, S.G.
2012
6 C p. 526-533
8 p.
artikel
39 CellTCS:A Secure Threshold Cryptography Scheme based on Non-linear Hybrid Cellular Automata Jakhar, Jyoti
2012
6 C p. 947-953
7 p.
artikel
40 Crosstalk Aware Bandwidth Modelling for VLSI RC Global Interconnects using 2-π Model Maheshwari, V.
2012
6 C p. 832-839
8 p.
artikel
41 Design and Development of an Ontology based Personal Web Search Engine Priya, T. Sakthi
2012
6 C p. 299-306
8 p.
artikel
42 Designing Trust Propagation Algorithms based on Simple Multiplicative Strategy for Social Networks Chakraborty, Partha Sarathi
2012
6 C p. 534-539
6 p.
artikel
43 Design of RSA-CA Based E-Health System for Supporting HIPAA Privacy-Security Regulations Ray, Sangram
2012
6 C p. 954-961
8 p.
artikel
44 Design of Trapezoidal Monopole Antenna with Truncated Ground Plane for 2.5GHz Band Rajendran, Jolly
2012
6 C p. 650-657
8 p.
artikel
45 Design Pattern for Dynamic Reconfiguration of Component-based Autonomic Computing Systems using RMI Mannava, Vishnuvardhan
2012
6 C p. 590-597
8 p.
artikel
46 Dual Mode VLSI Architecture for Spread Spectrum Image Watermarking using Binary Watermark Ghosh, Sudip
2012
6 C p. 784-791
8 p.
artikel
47 Duplication with Trapdoor Sensitive Attribute Values: A New Approach for Privacy Preserving Data Publishing Purushothama, B.R.
2012
6 C p. 970-977
8 p.
artikel
48 DWT based Feature Extraction using Edge Tracked Scale Normalization for Enhanced Face Recognition Rinky, B.P.
2012
6 C p. 344-353
10 p.
artikel
49 DWT Feature Extraction Based Face Recognition using Intensity Mapped Unsharp Masking and Laplacian of Gaussian Filtering with Scalar Multiplier Yaji, Gautham Sitaram
2012
6 C p. 475-484
10 p.
artikel
50 Dynamic Particle Swarm Optimization to Solve Multi-objective Optimization Problem Urade, Hemlata S.
2012
6 C p. 283-290
8 p.
artikel
51 Edge Strength Extraction using Orthogonal Vectors for Shot Boundary Detection Priya, G.G. Lakshmi
2012
6 C p. 247-254
8 p.
artikel
52 Effectiveness of Software Metrics for Object-oriented System Suresh, Yeresime
2012
6 C p. 420-427
8 p.
artikel
53 Effect of Harmony Search Parameters’ Variation in Clustering Kumar, Vijay
2012
6 C p. 265-274
10 p.
artikel
54 Efficiently Mining of Effective Web Traversal Patterns with Average Utility Thilagu, M.
2012
6 C p. 444-451
8 p.
artikel
55 Energy Efficient Load-Balanced Clustering Algorithm for Wireless Sensor Networks Kuila, Pratyay
2012
6 C p. 771-777
7 p.
artikel
56 Energy Efficient Routing in Wireless Sensor Network Das, Subhajit
2012
6 C p. 731-738
8 p.
artikel
57 Energy Efficient Target Tracking Mechanism using Rotational Camera Sensor in WMSN De, Debashis
2012
6 C p. 674-681
8 p.
artikel
58 Entropy based Log Chromaticity Projection for Real-time Stereo Matching Raghavendra, U.
2012
6 C p. 223-230
8 p.
artikel
59 Evaluation of Change Factors for Web Service Change Management Thirumaran, M.
2012
6 C p. 163-170
8 p.
artikel
60 Evolution of Degree of Purity in Programming Languages RajasekharaBabu, M.
2012
6 C p. 354-361
8 p.
artikel
61 Face Recognition using Geometric Measurements, Directional Edges and Directional Multiresolution Information Maheshkar, Vikas
2012
6 C p. 939-946
8 p.
artikel
62 Face Recognition using Threshold Based DWT Feature Extraction and Selective Illumination Enhancement Technique Vidya, V.
2012
6 C p. 334-343
10 p.
artikel
63 Fault Tolerant Decentralized Scheduling Algorithm for P2P Grid Chauhan, Piyush
2012
6 C p. 698-707
10 p.
artikel
64 Feature Binding Technique for Integration of Biological Databases with Optimized Search and Retrieve Rao, A Chandra Sekhara
2012
6 C p. 622-629
8 p.
artikel
65 Feature Extraction using Normalized Difference Vegetation Index (NDVI): A Case Study of Jabalpur City Bhandari, A.K.
2012
6 C p. 612-621
10 p.
artikel
66 Formal Verification of IEEE 802.11w Authentication Protocol Kumari, V. Valli
2012
6 C p. 716-722
7 p.
artikel
67 Formulating Particle Swarm Optimization based Generalized Kernel Function for Kernel-Linear Discriminant Analysis Gopi, E.S.
2012
6 C p. 517-525
9 p.
artikel
68 FPGA based Real Time Human Hand Gesture Recognition System Gupta, Amit
2012
6 C p. 98-107
10 p.
artikel
69 Genetic Algorithm Driven ANN Model for Runoff Estimation Dhamge, Nina R.
2012
6 C p. 501-508
8 p.
artikel
70 Gravitational Search Algorithm for Optimal Economic Dispatch Swain, R.K.
2012
6 C p. 411-419
9 p.
artikel
71 Heuristic Frequent Term-Based Clustering of News Headlines Bora, Nibir Nayan
2012
6 C p. 436-443
8 p.
artikel
72 Hierarchy Classification for Data Warehouse: A Survey Talwar, Kanika
2012
6 C p. 460-468
9 p.
artikel
73 Hybrid Approach for Detection of Anomaly Network Traffic using Data Mining Techniques Agarwal, Basant
2012
6 C p. 996-1003
8 p.
artikel
74 Image Retrieval from WWW using Attributes in HTML TAGs Vadivu, P. Shanmuga
2012
6 C p. 509-516
8 p.
artikel
75 Improvement of Initial Cluster Center of C-means using Teaching Learning based Optimization Naik, Anima
2012
6 C p. 428-435
8 p.
artikel
76 Improvisation of the Document Summarization by Combining the IR Techniques with “Code-Quantity Memory and Attention” Linguistic Principles Reddy, Pranitha
2012
6 C p. 118-125
8 p.
artikel
77 Incremental Indexing for High-Dimensional Data using Tree Structure Priya, R Vishnu
2012
6 C p. 540-547
8 p.
artikel
78 Integrating Signature Apriori based Network Intrusion Detection System (NIDS) in Cloud Computing Modi, Chirag N.
2012
6 C p. 905-912
8 p.
artikel
79 Inter Cipher Block Diffusion: A Novel Transformation for Proposed Parallel AES Srivastava, Shashank
2012
6 C p. 872-879
8 p.
artikel
80 Inverted File Compression using EGC and FEGC Domnic, S.
2012
6 C p. 493-500
8 p.
artikel
81 Joint Precoding and Decoding in MU-MIMO Downlink Systems with Perfect Channel State Information (CSI) M.Raja,
2012
6 C p. 708-715
8 p.
artikel
82 Joint Robust and Reversible Watermarking for Medical Images Maity, Hirak Kumar
2012
6 C p. 275-282
8 p.
artikel
83 Learnable Focused Meta Crawling Through Web Kumar, Mukesh
2012
6 C p. 606-611
6 p.
artikel
84 Mathematical Modeling, Equivalent Circuit Analysis and Genetic Algorithm Optimization of an N-sided Regular Polygon Split Ring Resonator (NRPSRR) Bose, Sumanta
2012
6 C p. 763-770
8 p.
artikel
85 Mobility Aided Cooperative MIMO Transmission in Wireless Sensor Networks Medhi, N.
2012
6 C p. 362-370
9 p.
artikel
86 Modified Gate Diffusion Input Technique: A New Technique for Enhancing Performance in Full Adder Circuits Uma, R.
2012
6 C p. 74-81
8 p.
artikel
87 Multiobjective Optimization for Biomedical Named Entity Recognition and Classification Ekbal, Asif
2012
6 C p. 206-213
8 p.
artikel
88 Negative Correlation Aided Network Module Extraction Ahmed, Hasin Afzal
2012
6 C p. 658-665
8 p.
artikel
89 Network Status Aware Routing in 3D-CGIN Borkar, Meenal A.
2012
6 C p. 630-639
10 p.
artikel
90 Non Blind Digital Watermarking Technique Using DWT and Cross Chaos Pradhan, Chittaranjan
2012
6 C p. 897-904
8 p.
artikel
91 Non-uniform Concentric Circular Antenna Array Design using IPSO Technique for Side Lobe Reduction Mandal, Durbadal
2012
6 C p. 856-863
8 p.
artikel
92 On-line Electronic Payment System using signcryption Mazumdar, Arpita
2012
6 C p. 930-938
9 p.
artikel
93 Optimal Design of Zig-Zag Antenna Using Nonlinear Segment Length and Pitch Angle Anjitha, V.
2012
6 C p. 799-805
7 p.
artikel
94 Optimized Hybrid Optical Communication System for First Mile and Last Mile Problem Solution of Today's Optical Network Patnaik, Bijayananda
2012
6 C p. 723-730
8 p.
artikel
95 Optimum Design of Exponentially Varying Helical Antenna with Non Uniform Pitch Profile Jimisha, K.
2012
6 C p. 792-798
7 p.
artikel
96 Outlier Detection in Microarray Data Using Hybrid Evolutionary Algorithm Rao, A Chandra Sekhara
2012
6 C p. 291-298
8 p.
artikel
97 Outlier Identification using Symmetric Neighborhoods Gogoi, Prasanta
2012
6 C p. 239-246
8 p.
artikel
98 Performance Evaluation of Synchronous Energy Efficient MAC Protocols for Wireless Sensor Networks Roy, Alak
2012
6 C p. 806-813
8 p.
artikel
99 Plant Identification based on Fractal Refinement Technique (FRT) Jobin, Antony
2012
6 C p. 171-179
9 p.
artikel
100 Predictive Queue-based Technique for Network Latency Optimization in Established TCP/IP Gigabit Ethernet Stations Ekpenyong, Moses
2012
6 C p. 739-746
8 p.
artikel
101 Privacy Preservation for Global Cyclic Associations in Distributed Databases Nanavati, Nirali
2012
6 C p. 962-969
8 p.
artikel
102 Pruning Strategies to Refine Resource List for NN Queries in Location based Services Saravanan, A.
2012
6 C p. 598-605
8 p.
artikel
103 Q-Learning Approach for Minutiae Extraction from Fingerprint Image Tiwari, Sandeep
2012
6 C p. 82-89
8 p.
artikel
104 Reduced Feature Based Efficient Cancer Classification Using Single Layer Neural Network Mahapatra, Rosalin
2012
6 C p. 180-187
8 p.
artikel
105 Relational Database Watermarking for Ownership Protection Rao, Udai Pratap
2012
6 C p. 988-995
8 p.
artikel
106 Robust Distributed Learning in Wireless Sensor Network using Efficient Step Size Panigrahi, T.
2012
6 C p. 864-871
8 p.
artikel
107 Scalable Rough-fuzzy Weighted Leader based Non-parametric Methods for Large Data Sets Veluru, Suresh
2012
6 C p. 307-314
8 p.
artikel
108 Secure Data Aggregation in Vehicular-Adhoc Networks: A Survey Mohanty, Sagarika
2012
6 C p. 922-929
8 p.
artikel
109 Security Frameworks for Wireless Sensor Networks-Review Sharma, Gaurav
2012
6 C p. 978-987
10 p.
artikel
110 Semiautomatic Method for Segmenting Pedicles in Vertebral Radiographs Kumar, Sampath
2012
6 C p. 39-48
10 p.
artikel
111 Simulation and Performance Analysis of Various IEEE 802.11 Backoff Algorithms Nithya, B.
2012
6 C p. 840-847
8 p.
artikel
112 Smart Applications of Context Services using Automatic Adaptive Module and Making users Profiles Garg, Neeraj
2012
6 C p. 324-333
10 p.
artikel
113 Soft Output Decoding Algorithm for Turbo Codes Implementation in Mobile Wi-Max Environment Kene, Jagdish D.
2012
6 C p. 666-673
8 p.
artikel
114 Speckle Noise Reduction using Local Binary Pattern Mandava, Ajay K.
2012
6 C p. 574-581
8 p.
artikel
115 Speech Coding Based on Orthogonal and Biorthogonal Wavelet Joseph, Shijo M.
2012
6 C p. 397-404
8 p.
artikel
116 Test Case Design Using Slicing of UML Interaction Diagram Swain, Ranjita Kumari
2012
6 C p. 136-144
9 p.
artikel
117 The Lion's Algorithm: A New Nature-Inspired Search Algorithm Rajakumar, B.R.
2012
6 C p. 126-135
10 p.
artikel
118 Thinned Concentric Circular Antenna Array Synthesis using Particle Swarm Optimization Mandal, D.
2012
6 C p. 848-855
8 p.
artikel
119 Towards Improving Self-adaptive Differential Evolution for Numerical Optimization: A Progress Note Saha, Indrajit
2012
6 C p. 49-56
8 p.
artikel
120 Towards Optimized Placement of Cameras for Gait Pattern Recognition Raman, Rahul
2012
6 C p. 1019-1025
7 p.
artikel
121 TRANS Outperforms MTF for Two Special Types of Request Sequence Without Locality of Reference Mohanty, Rakesh
2012
6 C p. 556-563
8 p.
artikel
122 Using the Triangle Inequality to Accelerate Density based Outlier Detection Method Patra, Bidyut Kr.
2012
6 C p. 469-474
6 p.
artikel
123 Visible Spectrum, Bi-Modal Ocular Biometrics Tankasala, Sriram Pavan
2012
6 C p. 564-573
10 p.
artikel
124 WiMAX-UMTS Converging Architecture with IMS Signalling Analysis to Achieve QoS Vijayalakshmy, G.
2012
6 C p. 16-23
8 p.
artikel
                             124 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland