nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A Bespoke Approach For Face-Recognition Using PCA
|
Sheifali Gupta |
|
2010 |
|
2 |
p. 155-158 |
artikel |
2 |
A Channel Adaptive MAC Protocol with Traffic Aware Distributed Power Management in Wireless Sensor Networks
|
Binu. G. S , |
|
2010 |
|
2 |
p. 177-182 |
artikel |
3 |
A Comparison and SWOT Analysis of Towards 4G Technologies: 802.16e and 3GPP-LTE
|
Dr. Pathuru Raj |
|
2010 |
|
2 |
p. 109-114 |
artikel |
4 |
A Comparison of the TCP Variants Performance over different Routing Protocols on Mobile Ad Hoc Networks
|
S. R. Biradar |
|
2010 |
|
2 |
p. 340-344 |
artikel |
5 |
Actuality and Future of Optical Systems
|
Natasa Zivic |
|
2009 |
|
2 |
p. 62-70 |
artikel |
6 |
Adaptive Background subtraction in Dynamic Environments Using Fuzzy Logic
|
Sivabalakrishnan.M |
|
2010 |
|
2 |
p. 270-273 |
artikel |
7 |
Adaptive Routing Algorithms in Unstructured Peer-to-Peer (P2P) Systems
|
Achmad Nizar Hidayanto, |
|
2011 |
|
2 |
p. 487-505 |
artikel |
8 |
A Data Mining Perspective on the Prevalence of Polio in India
|
Neera Singh, |
|
2011 |
|
2 |
p. 580-585 |
artikel |
9 |
A Framework for Analyzing Software Quality using Hierarchical Clustering
|
Arashdeep Kaur |
|
2011 |
|
2 |
p. 854-861 |
artikel |
10 |
A Heuristic Approach to the Disease Diagnose System Using Machine Learning Algorithms (An Expert Advisory System for EMU Bird’s Diseases)
|
P.Naga Jyothi, |
|
2010 |
|
2 |
p. 256-258 |
artikel |
11 |
A Layered Approach for Watermarking in Images Based on Huffman Coding
|
D. Lalitha Bhaskari |
|
2010 |
|
2 |
p. 149-154 |
artikel |
12 |
Analytical Simulation and Performance Optimization for Spectrum Sensing in Cognitive Radio Networks
|
Ayman A. El-Saleh |
|
2011 |
|
2 |
p. 554-568 |
artikel |
13 |
An Analysis of Irregularities in Devanagari Script Writing – A Machine Recognition Perspective
|
Satish Kumar |
|
2010 |
|
2 |
p. 274-279 |
artikel |
14 |
An Analysis of Q-Learning Algorithms with Strategies of Reward Function
|
Ms.S.Manju |
|
2011 |
|
2 |
p. 814-820 |
artikel |
15 |
AN APPLICATION OF HYBRID CLUSTERING AND NEURAL BASED PREDICTION MODELLING FOR DELINEATION OF MANAGEMENT ZONES
|
Babankumar S. Bansod |
|
2011 |
|
2 |
p. 621-631 |
artikel |
16 |
An Efficient Algorithm for Reliability Upper Bound of Distributed Systems with Unreliable Nodes
|
Mohamed H. S. Mohamed, |
|
2010 |
|
2 |
p. 305-308 |
artikel |
17 |
An Efficient Automatic Attendance System using Fingerprint Verification Technique
|
Chitresh Saraswat, |
|
2010 |
|
2 |
p. 264-269 |
artikel |
18 |
An Improved Framework for Enhancing QoS in MIPv6
|
Shilpy Gupta |
|
2011 |
|
2 |
p. 632-641 |
artikel |
19 |
An Incremental framework for a Thai-English Machine Translation System using a LFG tree structure as an Interlingual
|
Tawee Chimsuk |
|
2010 |
|
2 |
p. 280-288 |
artikel |
20 |
An Integer Programming-based Local Search for Large-scale Maximal Covering Problems
|
Junha Hwang |
|
2011 |
|
2 |
p. 837-843 |
artikel |
21 |
A Novel Algorithm for Scaling up the Accuracy of Decision Trees
|
Ali Mirza Mahmood |
|
2010 |
|
2 |
p. 126-131 |
artikel |
22 |
A Novel Approach using Full Counterpropagation Neural Network for Watermarking
|
Ashish Bansal, |
|
2010 |
|
2 |
p. 289-296 |
artikel |
23 |
A Novel Density based improved k-means Clustering Algorithm – Dbkmeans
|
K. Mumtaz |
|
2010 |
|
2 |
p. 213-218 |
artikel |
24 |
A Novel Technique for Embedding Data in Spatial Domain
|
V.Madhu Viswanatham |
|
2010 |
|
2 |
p. 233-236 |
artikel |
25 |
A Permutation Gigantic Issues in Mobile Real Time Distributed Database : Consistency & Security
|
Gyanendra Kr. Gupta |
|
2011 |
|
2 |
p. 884-891 |
artikel |
26 |
Applications of Data Mining Techniques in Healthcare and Prediction of Heart Attacks
|
K.Srinivas |
|
2010 |
|
2 |
p. 250-255 |
artikel |
27 |
Applied Medical Informatics Using LabVIEW
|
Himanshu Shekhar, |
|
2010 |
|
2 |
p. 198-203 |
artikel |
28 |
A QoS-Aware Intelligent Replica Management Architecture for Content Distribution in Peer-to-Peer Overlay Networks
|
S.Ayyasamy |
|
2009 |
|
2 |
p. 71-77 |
artikel |
29 |
Architecture for efficiently streaming stored video using TCP
|
G.Srinivasa Rao, |
|
2010 |
|
2 |
p. 319-327 |
artikel |
30 |
A Secure Scheme for Aggregating Encrypted Data Against Outsider Attacks in Wireless Sensor Networks
|
Mitra Baratchi, |
|
2011 |
|
2 |
p. 844-853 |
artikel |
31 |
A Study of Image Segmentation and Edge Detection Techniques
|
PunamThakare |
|
2011 |
|
2 |
p. 899-904 |
artikel |
32 |
A Study on Scheduling in Grid Environment
|
Dr.K.Vivekanandan, |
|
2011 |
|
2 |
p. 940-950 |
artikel |
33 |
A Survey of QOS with IEEE 802.11e
|
Dr.P. Chenna Reddy, |
|
2011 |
|
2 |
p. 807-813 |
artikel |
34 |
A Survey on Optimistic Fair Digital Signature Exchange Protocols
|
Alfin Abraham |
|
2011 |
|
2 |
p. 821-825 |
artikel |
35 |
A Survey on Security Issues in Wireless Ad hoc Network Routing Protocols
|
C. Sreedhar |
|
2010 |
|
2 |
p. 224-232 |
artikel |
36 |
A System Based Approach to Efficiently Implement Color Differentiation Mechanism with Respect to Automobiles
|
MOHAMMED KHALID KALEEM, |
|
2011 |
|
2 |
p. 601-606 |
artikel |
37 |
A Voice Priority Queue (VPQ) Fair Scheduler for the VoIP over WLANs
|
Kashif Nisar |
|
2011 |
|
2 |
p. 506-518 |
artikel |
38 |
CHOICES ON DESIGNING GF (P) ELLIPTIC CURVE COPROCESSOR BENEFITING FROM MAPPING HOMOGENEOUS CURVES IN PARALLEL MULTIPLICATIONS
|
Mohammad Alkhatib, |
|
2011 |
|
2 |
p. 467-480 |
artikel |
39 |
Classification and Evaluation the Privacy Preserving Data Mining Techniques by using a Data Modification–based Framework
|
MohammadReza Keyvanpour, |
|
2011 |
|
2 |
p. 862-870 |
artikel |
40 |
Cloud Computing: A solution to Geographical Information Systems (GIS)
|
Muzafar Ahmad Bhat, |
|
2011 |
|
2 |
p. 594-600 |
artikel |
41 |
COLLABORATION IN WEB BASED LEARNING: A SOCIAL COMPUTING PERSPECTIVE
|
C.Pooranachandran |
|
2011 |
|
2 |
p. 722-727 |
artikel |
42 |
Comparative Study a Performance and Capability Scheduling Techniques in Grid Computing
|
Mohd Kamir Yusof |
|
2010 |
|
2 |
p. 121-125 |
artikel |
43 |
Comparison between k-nn and svm method for speech emotion recognition
|
Muzaffar Khan |
|
2011 |
|
2 |
p. 607-611 |
artikel |
44 |
COMPARISON OF MULTICAST ROUTING PROTOCOLS IN AD-HOC WIRELESS NETWORKS
|
Dr.V.B.Narsimha, |
|
2011 |
|
2 |
p. 871-876 |
artikel |
45 |
Computational Approaches for determination of Most Probable RNA Secondary Structure Using Different Thermodynamics Parameters
|
Binod Kumar, |
|
2010 |
|
2 |
p. 345-351 |
artikel |
46 |
Content Based Image Retrieval using Density Distribution and Mean of Binary Patterns of Walsh Transformed Color Images
|
H.B.Kekre, |
|
2011 |
|
2 |
p. 642-651 |
artikel |
47 |
Convergence of ART in Few Projections
|
Tanuja Srivastava |
|
2011 |
|
2 |
p. 705-713 |
artikel |
48 |
Copy-Move Forgery Detection in Digital Images: Progress and Challenges
|
Sunil Kumar |
|
2011 |
|
2 |
p. 652-663 |
artikel |
49 |
CRM System Using UI-AKD Approach of D3M
|
J.N.V.R.Swarup kumar, |
|
2010 |
|
2 |
p. 159-163 |
artikel |
50 |
Debugging, Advanced Debugging and Runtime Analysis
|
Salim Istyaq |
|
2010 |
|
2 |
p. 246-249 |
artikel |
51 |
Dependency through Axiomatic Approach On Rough Set Theory
|
Nilaratna Kalia |
|
2010 |
|
2 |
p. 169-172 |
artikel |
52 |
Design of Intelligent layer for flexible querying in databases
|
Mrs. Neelu Nihalani |
|
2009 |
|
2 |
p. 30-39 |
artikel |
53 |
Design of MIMO Space-Time Code for High Data Rate Wireless Communication
|
Mihir Narayan Mohanty, |
|
2011 |
|
2 |
p. 693-696 |
artikel |
54 |
Detection and Prevention of New and Unknown Malware using Honeypots
|
Shishir Kumar |
|
2009 |
|
2 |
p. 56-61 |
artikel |
55 |
Development of a Model for Technology Strategy Elaboration
|
Aliakbar Mazlomi |
|
2011 |
|
2 |
p. 519-527 |
artikel |
56 |
DEVELOPMENT OF BIO-CRYPTO KEY FROM FINGERPRINTS USING CANCELABLE TEMPLATES
|
Prof. Sunil VK Gaddam |
|
2011 |
|
2 |
p. 775-783 |
artikel |
57 |
Diabetic Retinopathy-Early Detection Using Image Processing Techniques
|
V.Vijaya Kumari, |
|
2010 |
|
2 |
p. 357-361 |
artikel |
58 |
Digital Image Search & Retrieval using FFT Sectors of Color Images
|
H. B. Kekre |
|
2010 |
|
2 |
p. 368-372 |
artikel |
59 |
Dynamic Approach for Data Scrubbing Process
|
Israr Ahmed |
|
2010 |
|
2 |
p. 416-423 |
artikel |
60 |
Efficient Power Utilization Techniques for Wireless Sensor Networks – A Survey
|
Mr. Sharad Saxena, |
|
2011 |
|
2 |
p. 905-925 |
artikel |
61 |
Efficient Storage Reduction of Frequency of Items in Vertical Data Layout
|
A.Meenakshi, |
|
2011 |
|
2 |
p. 728-738 |
artikel |
62 |
E-Learning Technology for Rural Child Development
|
S.K.Nayak |
|
2010 |
|
2 |
p. 208-212 |
artikel |
63 |
ENHANCED DISTRIBUTED SERVICE MODEL FOR POWER SYSTEM STATE ESTIMATION
|
V.Gomathi |
|
2011 |
|
2 |
p. 481-486 |
artikel |
64 |
Entropy Based Texture Features Useful for Automatic Script Identification
|
M.C. Padma |
|
2010 |
|
2 |
p. 115-120 |
artikel |
65 |
Evaluation of Next Generation Networks
|
Mohsen Gerami |
|
2010 |
|
2 |
p. 378-381 |
artikel |
66 |
Evaluation of Varrying Mobility Models & Network Loads on DSDV Protocol of MANETs
|
C.P.Agrawal |
|
2009 |
|
2 |
p. 40-46 |
artikel |
67 |
Fault Predictions in Object Oriented Software
|
Bremananth R |
|
2009 |
|
2 |
p. 81-88 |
artikel |
68 |
Fault Tolerance in Real Time Distributed System
|
Arvind Kumar |
|
2011 |
|
2 |
p. 933-939 |
artikel |
69 |
Feature Extraction in Medical Image using Ant Colony Optimization : A Study
|
A. Amali Asha, |
|
2011 |
|
2 |
p. 714-721 |
artikel |
70 |
Frequent Data Generation Using Relative Data Analysis
|
R.ARCHANA |
|
2010 |
|
2 |
p. 382-386 |
artikel |
71 |
Grid Scheduling Using Enhanced PSO Algorithm
|
Mr. P.Mathiyalagan |
|
2010 |
|
2 |
p. 140-145 |
artikel |
72 |
High payload using mixed codebooks of Vector Quantization
|
H. B. Kekre, |
|
2010 |
|
2 |
p. 352-356 |
artikel |
73 |
Honeypot based Secure Network System
|
Yogendra Kumar Jain |
|
2011 |
|
2 |
p. 612-620 |
artikel |
74 |
Human Gait Recognition Using Bezier Curves
|
Pratibha Mishra, |
|
2011 |
|
2 |
p. 969-975 |
artikel |
75 |
Hybrid approach for Image Encryption Using SCAN Patterns and Carrier Images
|
Panduranga H.T |
|
2010 |
|
2 |
p. 297-300 |
artikel |
76 |
Ideal Strategy to Improve Datawarehouse Performance
|
Fahad Sultan |
|
2010 |
|
2 |
p. 409-415 |
artikel |
77 |
Impact Analysis of Recent DDoS Attacks
|
Ketki Arora |
|
2011 |
|
2 |
p. 877-883 |
artikel |
78 |
Implementation of Multiplatform RIA using User Interface Components
|
K.MuthuManickam M.E., |
|
2010 |
|
2 |
p. 204-207 |
artikel |
79 |
Improved Digital Watermarking Techniques and Data Embedding In Multimedia
|
Ajay Goel |
|
2010 |
|
2 |
p. 164-168 |
artikel |
80 |
Infrastructural Map for Information Security
|
Sabah Al-Fedaghi, |
|
2011 |
|
2 |
p. 789-796 |
artikel |
81 |
INTEGRATING INTELLIGENT PREDICTIVE CACHING AND STATIC PREFETCHING IN WEB PROXY SERVERS
|
J. B. PATIL |
|
2011 |
|
2 |
p. 697-704 |
artikel |
82 |
Intelligent Data Compression Approach in Multidimensional Data Warehouse
|
Walid MOUDANI |
|
2011 |
|
2 |
p. 951-960 |
artikel |
83 |
Invariant Moments based War Scene Classification using ANN and SVM: A Comparative Study
|
Daniel Madan Raja S |
|
2011 |
|
2 |
p. 767-774 |
artikel |
84 |
Message Encryption Using Deceptive Text and Randomized Hashing
|
VAMSIKRISHNA YENIKAPATI, |
|
2011 |
|
2 |
p. 760-766 |
artikel |
85 |
Modeling Academic Performance Evaluation Using Soft Computing Techniques: A Fuzzy Logic Approach
|
Ramjeet Singh Yadav |
|
2011 |
|
2 |
p. 676-686 |
artikel |
86 |
Modified Ant Colony Algorithm for Grid Scheduling
|
Mr. P.Mathiyalagan |
|
2010 |
|
2 |
p. 132-139 |
artikel |
87 |
Modified Kalman Filter-based Approach in Comparison with Traditional Speech Enhancement Algorithms from Adverse Noisy Environments
|
G. Ramesh Babu, |
|
2011 |
|
2 |
p. 744-759 |
artikel |
88 |
MRI Brain Abnormalities Segmentation using K-Nearest Neighbors (k-NN)
|
Noor Elaiza Abdul Khalid |
|
2011 |
|
2 |
p. 980-990 |
artikel |
89 |
Multimodal Authentication For High End Security
|
K.Elumalai |
|
2011 |
|
2 |
p. 687-692 |
artikel |
90 |
Natural Language Query Processing using Semantic Grammar
|
Gauri Rao |
|
2010 |
|
2 |
p. 219-223 |
artikel |
91 |
Nonlinear H∞ controller for flexible joint robots with using feedback linearization
|
M.E.Akbari |
|
2011 |
|
2 |
p. 451-466 |
artikel |
92 |
Obstacle Avoidance of mobile robot using PSO based Neuro Fuzzy Technique
|
Sourav Dutta |
|
2010 |
|
2 |
p. 301-304 |
artikel |
93 |
On the Use of MCDM Technique for Identifying Key Technology: A case of Auto Company
|
Aliakbar Mazlomi, |
|
2011 |
|
2 |
p. 528-539 |
artikel |
94 |
Optimizing Hidden Markov Model for Failure Prediction– Comparison of Gaine’s optimization and Minimum message length Estimator
|
N.Muthumani, |
|
2011 |
|
2 |
p. 892-898 |
artikel |
95 |
Organizational improvement using Organizational paradigms with the support of people paradigms
|
Md. Shariful Alam |
|
2011 |
|
2 |
p. 991-996 |
artikel |
96 |
Performance Comparison and Analysis of DSDV and AODV for MANET
|
V.Ramesh |
|
2010 |
|
2 |
p. 183-188 |
artikel |
97 |
PERFORMANCE CONTRIBUTION BASED SCHEDULING FRAMEWORK FOR PRECEDENCE CONSTRAINT TASKS IN REAL TIME SYSTEM
|
RADHAKRISHNA NAIK |
|
2011 |
|
2 |
p. 664-675 |
artikel |
98 |
Performance Evaluation and Comparison of AODV and AOMDV
|
S. R. Biradar |
|
2010 |
|
2 |
p. 373-377 |
artikel |
99 |
Performance Metrics Analysis of Torus Embedded Hypercube Interconnection Network
|
N. Gopalakrishna Kini |
|
2009 |
|
2 |
p. 78-80 |
artikel |
100 |
PKI Implementation Issues: A Comparative Study of Pakistan with some Asian Countries
|
Nasir Mahmood Malik |
|
2009 |
|
2 |
p. 105-110 |
artikel |
101 |
Public Key Cryptosystem based on Pell’s Equation Using The Gnu Mp Library
|
K V S S R S S Sarma |
|
2011 |
|
2 |
p. 739-743 |
artikel |
102 |
Rank Based Clustering For Document Retrieval From Biomedical Databases
|
Jayanthi Manicassamy |
|
2009 |
|
2 |
p. 111-115 |
artikel |
103 |
Record Matching Over Query Results Using Fuzzy Ontological Document Clustering
|
V.Vijayaraja |
|
2011 |
|
2 |
p. 926-932 |
artikel |
104 |
Safety Measures Using Sextic Curve Cryptography
|
W. R. Sam Emmanuel, |
|
2011 |
|
2 |
p. 800-806 |
artikel |
105 |
Sampling based Association Rules Mining- A Recent Overview
|
V.Umarani, |
|
2010 |
|
2 |
p. 314-318 |
artikel |
106 |
Security Enhancement Using Mutual Authentication in Existing CDMA Systems
|
L. Krishna Bharathi |
|
2010 |
|
2 |
p. 237-245 |
artikel |
107 |
Security Visualization for peer-to-peer resource sharing applications
|
DANG TRAN TRI |
|
2009 |
|
2 |
p. 47-55 |
artikel |
108 |
Semantic Inference Model For Database Inference Detection Violation
|
Rupali Chopade |
|
2011 |
|
2 |
p. 830-836 |
artikel |
109 |
SERVICE ORIENTED APPLICATION IN AGENT BASED VIRTUAL KNOWLEDGE COMMUNITY
|
L. O. Yusuf |
|
2011 |
|
2 |
p. 569-579 |
artikel |
110 |
Sliding window approach based Text Binarisation from Complex Textual images
|
Chitrakala Gopalan |
|
2010 |
|
2 |
p. 309-313 |
artikel |
111 |
Software Reliability Growth Model with Logistic-Exponential Test-Effort Function and Analysis of Software Release Policy
|
Shaik.Mohammad Rafi |
|
2010 |
|
2 |
p. 387-399 |
artikel |
112 |
Source Feature Based Gender Identification System Using GMM
|
R. RAJESHWARA RAO, |
|
2011 |
|
2 |
p. 586-593 |
artikel |
113 |
Speech Quality Requirements over DSL Networks
|
Ibrahiem M. M. El Emary |
|
2010 |
|
2 |
p. 189-197 |
artikel |
114 |
SSL-MAP: A More Secure Gossamer-based Mutual Authentication Protocol for Passive RFID Tags
|
Rama N |
|
2010 |
|
2 |
p. 363-367 |
artikel |
115 |
Survey of Attacks on Mobile AdhocWireless Networks
|
Vikas Solomon Abel |
|
2011 |
|
2 |
p. 826-829 |
artikel |
116 |
Survey of clustering algorithms for MANET
|
Ratish Agarwal |
|
2009 |
|
2 |
p. 98-104 |
artikel |
117 |
Synthesis of supervised classification algorithm using intelligent and statistical tools
|
Ali Douik |
|
2009 |
|
2 |
p. 89-97 |
artikel |
118 |
The CAC Model and QoS Management in Wireless Multiservice Network
|
Sonia Ben Rejeb |
|
2010 |
|
2 |
p. 333-339 |
artikel |
119 |
The proposed quantum computational basis of deep ecology: its implications for agriculture
|
Monendra Grover |
|
2011 |
|
2 |
p. 797-799 |
artikel |
120 |
The Role and Issues of Clustering Technique in Designing Maintainable Object Oriented System
|
A. K. Malviya |
|
2011 |
|
2 |
p. 784-788 |
artikel |
121 |
The role of Ethics in the process of Technology Transfer and Development of 206 Peugeot
|
Aliakbar Mazlomi |
|
2011 |
|
2 |
p. 540-453 |
artikel |
122 |
The State of Information and Communication Technology in Iran
|
Mohsen Gerami |
|
2010 |
|
2 |
p. 328-332 |
artikel |
123 |
The Trust-Based MAC-Layer Security Protocol for Mobile Ad hoc Networks
|
A.Rajaram |
|
2010 |
|
2 |
p. 400-408 |
artikel |
124 |
Tree-kNN: A Tree-Based Algorithm for Protein Sequence Classification
|
Khaddouja Boujenfa, |
|
2011 |
|
2 |
p. 961-968 |
artikel |
125 |
Trust Based Security Routing in Mobile Adhoc Networks
|
K.Seshadri Ramana, |
|
2010 |
|
2 |
p. 259-263 |
artikel |
126 |
WaveCluster for Remote Sensing Image Retrieval
|
Priti Maheshwary |
|
2011 |
|
2 |
p. 976-979 |
artikel |
127 |
Weightage Factor Based Scheme for Performance Improvement in Ad Hoc Networks
|
Pushpa |
|
2010 |
|
2 |
p. 146-148 |
artikel |