Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             127 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A Bespoke Approach For Face-Recognition Using PCA Sheifali Gupta
2010
2 p. 155-158
artikel
2 A Channel Adaptive MAC Protocol with Traffic Aware Distributed Power Management in Wireless Sensor Networks Binu. G. S ,
2010
2 p. 177-182
artikel
3 A Comparison and SWOT Analysis of Towards 4G Technologies: 802.16e and 3GPP-LTE Dr. Pathuru Raj
2010
2 p. 109-114
artikel
4 A Comparison of the TCP Variants Performance over different Routing Protocols on Mobile Ad Hoc Networks S. R. Biradar
2010
2 p. 340-344
artikel
5 Actuality and Future of Optical Systems Natasa Zivic
2009
2 p. 62-70
artikel
6 Adaptive Background subtraction in Dynamic Environments Using Fuzzy Logic Sivabalakrishnan.M
2010
2 p. 270-273
artikel
7 Adaptive Routing Algorithms in Unstructured Peer-to-Peer (P2P) Systems Achmad Nizar Hidayanto,
2011
2 p. 487-505
artikel
8 A Data Mining Perspective on the Prevalence of Polio in India Neera Singh,
2011
2 p. 580-585
artikel
9 A Framework for Analyzing Software Quality using Hierarchical Clustering Arashdeep Kaur
2011
2 p. 854-861
artikel
10 A Heuristic Approach to the Disease Diagnose System Using Machine Learning Algorithms (An Expert Advisory System for EMU Bird’s Diseases) P.Naga Jyothi,
2010
2 p. 256-258
artikel
11 A Layered Approach for Watermarking in Images Based on Huffman Coding D. Lalitha Bhaskari
2010
2 p. 149-154
artikel
12 Analytical Simulation and Performance Optimization for Spectrum Sensing in Cognitive Radio Networks Ayman A. El-Saleh
2011
2 p. 554-568
artikel
13 An Analysis of Irregularities in Devanagari Script Writing – A Machine Recognition Perspective Satish Kumar
2010
2 p. 274-279
artikel
14 An Analysis of Q-Learning Algorithms with Strategies of Reward Function Ms.S.Manju
2011
2 p. 814-820
artikel
15 AN APPLICATION OF HYBRID CLUSTERING AND NEURAL BASED PREDICTION MODELLING FOR DELINEATION OF MANAGEMENT ZONES Babankumar S. Bansod
2011
2 p. 621-631
artikel
16 An Efficient Algorithm for Reliability Upper Bound of Distributed Systems with Unreliable Nodes Mohamed H. S. Mohamed,
2010
2 p. 305-308
artikel
17 An Efficient Automatic Attendance System using Fingerprint Verification Technique Chitresh Saraswat,
2010
2 p. 264-269
artikel
18 An Improved Framework for Enhancing QoS in MIPv6 Shilpy Gupta
2011
2 p. 632-641
artikel
19 An Incremental framework for a Thai-English Machine Translation System using a LFG tree structure as an Interlingual Tawee Chimsuk
2010
2 p. 280-288
artikel
20 An Integer Programming-based Local Search for Large-scale Maximal Covering Problems Junha Hwang
2011
2 p. 837-843
artikel
21 A Novel Algorithm for Scaling up the Accuracy of Decision Trees Ali Mirza Mahmood
2010
2 p. 126-131
artikel
22 A Novel Approach using Full Counterpropagation Neural Network for Watermarking Ashish Bansal,
2010
2 p. 289-296
artikel
23 A Novel Density based improved k-means Clustering Algorithm – Dbkmeans K. Mumtaz
2010
2 p. 213-218
artikel
24 A Novel Technique for Embedding Data in Spatial Domain V.Madhu Viswanatham
2010
2 p. 233-236
artikel
25 A Permutation Gigantic Issues in Mobile Real Time Distributed Database : Consistency & Security Gyanendra Kr. Gupta
2011
2 p. 884-891
artikel
26 Applications of Data Mining Techniques in Healthcare and Prediction of Heart Attacks K.Srinivas
2010
2 p. 250-255
artikel
27 Applied Medical Informatics Using LabVIEW Himanshu Shekhar,
2010
2 p. 198-203
artikel
28 A QoS-Aware Intelligent Replica Management Architecture for Content Distribution in Peer-to-Peer Overlay Networks S.Ayyasamy
2009
2 p. 71-77
artikel
29 Architecture for efficiently streaming stored video using TCP G.Srinivasa Rao,
2010
2 p. 319-327
artikel
30 A Secure Scheme for Aggregating Encrypted Data Against Outsider Attacks in Wireless Sensor Networks Mitra Baratchi,
2011
2 p. 844-853
artikel
31 A Study of Image Segmentation and Edge Detection Techniques PunamThakare
2011
2 p. 899-904
artikel
32 A Study on Scheduling in Grid Environment Dr.K.Vivekanandan,
2011
2 p. 940-950
artikel
33 A Survey of QOS with IEEE 802.11e Dr.P. Chenna Reddy,
2011
2 p. 807-813
artikel
34 A Survey on Optimistic Fair Digital Signature Exchange Protocols Alfin Abraham
2011
2 p. 821-825
artikel
35 A Survey on Security Issues in Wireless Ad hoc Network Routing Protocols C. Sreedhar
2010
2 p. 224-232
artikel
36 A System Based Approach to Efficiently Implement Color Differentiation Mechanism with Respect to Automobiles MOHAMMED KHALID KALEEM,
2011
2 p. 601-606
artikel
37 A Voice Priority Queue (VPQ) Fair Scheduler for the VoIP over WLANs Kashif Nisar
2011
2 p. 506-518
artikel
38 CHOICES ON DESIGNING GF (P) ELLIPTIC CURVE COPROCESSOR BENEFITING FROM MAPPING HOMOGENEOUS CURVES IN PARALLEL MULTIPLICATIONS Mohammad Alkhatib,
2011
2 p. 467-480
artikel
39 Classification and Evaluation the Privacy Preserving Data Mining Techniques by using a Data Modification–based Framework MohammadReza Keyvanpour,
2011
2 p. 862-870
artikel
40 Cloud Computing: A solution to Geographical Information Systems (GIS) Muzafar Ahmad Bhat,
2011
2 p. 594-600
artikel
41 COLLABORATION IN WEB BASED LEARNING: A SOCIAL COMPUTING PERSPECTIVE C.Pooranachandran
2011
2 p. 722-727
artikel
42 Comparative Study a Performance and Capability Scheduling Techniques in Grid Computing Mohd Kamir Yusof
2010
2 p. 121-125
artikel
43 Comparison between k-nn and svm method for speech emotion recognition Muzaffar Khan
2011
2 p. 607-611
artikel
44 COMPARISON OF MULTICAST ROUTING PROTOCOLS IN AD-HOC WIRELESS NETWORKS Dr.V.B.Narsimha,
2011
2 p. 871-876
artikel
45 Computational Approaches for determination of Most Probable RNA Secondary Structure Using Different Thermodynamics Parameters Binod Kumar,
2010
2 p. 345-351
artikel
46 Content Based Image Retrieval using Density Distribution and Mean of Binary Patterns of Walsh Transformed Color Images H.B.Kekre,
2011
2 p. 642-651
artikel
47 Convergence of ART in Few Projections Tanuja Srivastava
2011
2 p. 705-713
artikel
48 Copy-Move Forgery Detection in Digital Images: Progress and Challenges Sunil Kumar
2011
2 p. 652-663
artikel
49 CRM System Using UI-AKD Approach of D3M J.N.V.R.Swarup kumar,
2010
2 p. 159-163
artikel
50 Debugging, Advanced Debugging and Runtime Analysis Salim Istyaq
2010
2 p. 246-249
artikel
51 Dependency through Axiomatic Approach On Rough Set Theory Nilaratna Kalia
2010
2 p. 169-172
artikel
52 Design of Intelligent layer for flexible querying in databases Mrs. Neelu Nihalani
2009
2 p. 30-39
artikel
53 Design of MIMO Space-Time Code for High Data Rate Wireless Communication Mihir Narayan Mohanty,
2011
2 p. 693-696
artikel
54 Detection and Prevention of New and Unknown Malware using Honeypots Shishir Kumar
2009
2 p. 56-61
artikel
55 Development of a Model for Technology Strategy Elaboration Aliakbar Mazlomi
2011
2 p. 519-527
artikel
56 DEVELOPMENT OF BIO-CRYPTO KEY FROM FINGERPRINTS USING CANCELABLE TEMPLATES Prof. Sunil VK Gaddam
2011
2 p. 775-783
artikel
57 Diabetic Retinopathy-Early Detection Using Image Processing Techniques V.Vijaya Kumari,
2010
2 p. 357-361
artikel
58 Digital Image Search & Retrieval using FFT Sectors of Color Images H. B. Kekre
2010
2 p. 368-372
artikel
59 Dynamic Approach for Data Scrubbing Process Israr Ahmed
2010
2 p. 416-423
artikel
60 Efficient Power Utilization Techniques for Wireless Sensor Networks – A Survey Mr. Sharad Saxena,
2011
2 p. 905-925
artikel
61 Efficient Storage Reduction of Frequency of Items in Vertical Data Layout A.Meenakshi,
2011
2 p. 728-738
artikel
62 E-Learning Technology for Rural Child Development S.K.Nayak
2010
2 p. 208-212
artikel
63 ENHANCED DISTRIBUTED SERVICE MODEL FOR POWER SYSTEM STATE ESTIMATION V.Gomathi
2011
2 p. 481-486
artikel
64 Entropy Based Texture Features Useful for Automatic Script Identification M.C. Padma
2010
2 p. 115-120
artikel
65 Evaluation of Next Generation Networks Mohsen Gerami
2010
2 p. 378-381
artikel
66 Evaluation of Varrying Mobility Models & Network Loads on DSDV Protocol of MANETs C.P.Agrawal
2009
2 p. 40-46
artikel
67 Fault Predictions in Object Oriented Software Bremananth R
2009
2 p. 81-88
artikel
68 Fault Tolerance in Real Time Distributed System Arvind Kumar
2011
2 p. 933-939
artikel
69 Feature Extraction in Medical Image using Ant Colony Optimization : A Study A. Amali Asha,
2011
2 p. 714-721
artikel
70 Frequent Data Generation Using Relative Data Analysis R.ARCHANA
2010
2 p. 382-386
artikel
71 Grid Scheduling Using Enhanced PSO Algorithm Mr. P.Mathiyalagan
2010
2 p. 140-145
artikel
72 High payload using mixed codebooks of Vector Quantization H. B. Kekre,
2010
2 p. 352-356
artikel
73 Honeypot based Secure Network System Yogendra Kumar Jain
2011
2 p. 612-620
artikel
74 Human Gait Recognition Using Bezier Curves Pratibha Mishra,
2011
2 p. 969-975
artikel
75 Hybrid approach for Image Encryption Using SCAN Patterns and Carrier Images Panduranga H.T
2010
2 p. 297-300
artikel
76 Ideal Strategy to Improve Datawarehouse Performance Fahad Sultan
2010
2 p. 409-415
artikel
77 Impact Analysis of Recent DDoS Attacks Ketki Arora
2011
2 p. 877-883
artikel
78 Implementation of Multiplatform RIA using User Interface Components K.MuthuManickam M.E.,
2010
2 p. 204-207
artikel
79 Improved Digital Watermarking Techniques and Data Embedding In Multimedia Ajay Goel
2010
2 p. 164-168
artikel
80 Infrastructural Map for Information Security Sabah Al-Fedaghi,
2011
2 p. 789-796
artikel
81 INTEGRATING INTELLIGENT PREDICTIVE CACHING AND STATIC PREFETCHING IN WEB PROXY SERVERS J. B. PATIL
2011
2 p. 697-704
artikel
82 Intelligent Data Compression Approach in Multidimensional Data Warehouse Walid MOUDANI
2011
2 p. 951-960
artikel
83 Invariant Moments based War Scene Classification using ANN and SVM: A Comparative Study Daniel Madan Raja S
2011
2 p. 767-774
artikel
84 Message Encryption Using Deceptive Text and Randomized Hashing VAMSIKRISHNA YENIKAPATI,
2011
2 p. 760-766
artikel
85 Modeling Academic Performance Evaluation Using Soft Computing Techniques: A Fuzzy Logic Approach Ramjeet Singh Yadav
2011
2 p. 676-686
artikel
86 Modified Ant Colony Algorithm for Grid Scheduling Mr. P.Mathiyalagan
2010
2 p. 132-139
artikel
87 Modified Kalman Filter-based Approach in Comparison with Traditional Speech Enhancement Algorithms from Adverse Noisy Environments G. Ramesh Babu,
2011
2 p. 744-759
artikel
88 MRI Brain Abnormalities Segmentation using K-Nearest Neighbors (k-NN) Noor Elaiza Abdul Khalid
2011
2 p. 980-990
artikel
89 Multimodal Authentication For High End Security K.Elumalai
2011
2 p. 687-692
artikel
90 Natural Language Query Processing using Semantic Grammar Gauri Rao
2010
2 p. 219-223
artikel
91 Nonlinear H∞ controller for flexible joint robots with using feedback linearization M.E.Akbari
2011
2 p. 451-466
artikel
92 Obstacle Avoidance of mobile robot using PSO based Neuro Fuzzy Technique Sourav Dutta
2010
2 p. 301-304
artikel
93 On the Use of MCDM Technique for Identifying Key Technology: A case of Auto Company Aliakbar Mazlomi,
2011
2 p. 528-539
artikel
94 Optimizing Hidden Markov Model for Failure Prediction– Comparison of Gaine’s optimization and Minimum message length Estimator N.Muthumani,
2011
2 p. 892-898
artikel
95 Organizational improvement using Organizational paradigms with the support of people paradigms Md. Shariful Alam
2011
2 p. 991-996
artikel
96 Performance Comparison and Analysis of DSDV and AODV for MANET V.Ramesh
2010
2 p. 183-188
artikel
97 PERFORMANCE CONTRIBUTION BASED SCHEDULING FRAMEWORK FOR PRECEDENCE CONSTRAINT TASKS IN REAL TIME SYSTEM RADHAKRISHNA NAIK
2011
2 p. 664-675
artikel
98 Performance Evaluation and Comparison of AODV and AOMDV S. R. Biradar
2010
2 p. 373-377
artikel
99 Performance Metrics Analysis of Torus Embedded Hypercube Interconnection Network N. Gopalakrishna Kini
2009
2 p. 78-80
artikel
100 PKI Implementation Issues: A Comparative Study of Pakistan with some Asian Countries Nasir Mahmood Malik
2009
2 p. 105-110
artikel
101 Public Key Cryptosystem based on Pell’s Equation Using The Gnu Mp Library K V S S R S S Sarma
2011
2 p. 739-743
artikel
102 Rank Based Clustering For Document Retrieval From Biomedical Databases Jayanthi Manicassamy
2009
2 p. 111-115
artikel
103 Record Matching Over Query Results Using Fuzzy Ontological Document Clustering V.Vijayaraja
2011
2 p. 926-932
artikel
104 Safety Measures Using Sextic Curve Cryptography W. R. Sam Emmanuel,
2011
2 p. 800-806
artikel
105 Sampling based Association Rules Mining- A Recent Overview V.Umarani,
2010
2 p. 314-318
artikel
106 Security Enhancement Using Mutual Authentication in Existing CDMA Systems L. Krishna Bharathi
2010
2 p. 237-245
artikel
107 Security Visualization for peer-to-peer resource sharing applications DANG TRAN TRI
2009
2 p. 47-55
artikel
108 Semantic Inference Model For Database Inference Detection Violation Rupali Chopade
2011
2 p. 830-836
artikel
109 SERVICE ORIENTED APPLICATION IN AGENT BASED VIRTUAL KNOWLEDGE COMMUNITY L. O. Yusuf
2011
2 p. 569-579
artikel
110 Sliding window approach based Text Binarisation from Complex Textual images Chitrakala Gopalan
2010
2 p. 309-313
artikel
111 Software Reliability Growth Model with Logistic-Exponential Test-Effort Function and Analysis of Software Release Policy Shaik.Mohammad Rafi
2010
2 p. 387-399
artikel
112 Source Feature Based Gender Identification System Using GMM R. RAJESHWARA RAO,
2011
2 p. 586-593
artikel
113 Speech Quality Requirements over DSL Networks Ibrahiem M. M. El Emary
2010
2 p. 189-197
artikel
114 SSL-MAP: A More Secure Gossamer-based Mutual Authentication Protocol for Passive RFID Tags Rama N
2010
2 p. 363-367
artikel
115 Survey of Attacks on Mobile AdhocWireless Networks Vikas Solomon Abel
2011
2 p. 826-829
artikel
116 Survey of clustering algorithms for MANET Ratish Agarwal
2009
2 p. 98-104
artikel
117 Synthesis of supervised classification algorithm using intelligent and statistical tools Ali Douik
2009
2 p. 89-97
artikel
118 The CAC Model and QoS Management in Wireless Multiservice Network Sonia Ben Rejeb
2010
2 p. 333-339
artikel
119 The proposed quantum computational basis of deep ecology: its implications for agriculture Monendra Grover
2011
2 p. 797-799
artikel
120 The Role and Issues of Clustering Technique in Designing Maintainable Object Oriented System A. K. Malviya
2011
2 p. 784-788
artikel
121 The role of Ethics in the process of Technology Transfer and Development of 206 Peugeot Aliakbar Mazlomi
2011
2 p. 540-453
artikel
122 The State of Information and Communication Technology in Iran Mohsen Gerami
2010
2 p. 328-332
artikel
123 The Trust-Based MAC-Layer Security Protocol for Mobile Ad hoc Networks A.Rajaram
2010
2 p. 400-408
artikel
124 Tree-kNN: A Tree-Based Algorithm for Protein Sequence Classification Khaddouja Boujenfa,
2011
2 p. 961-968
artikel
125 Trust Based Security Routing in Mobile Adhoc Networks K.Seshadri Ramana,
2010
2 p. 259-263
artikel
126 WaveCluster for Remote Sensing Image Retrieval Priti Maheshwary
2011
2 p. 976-979
artikel
127 Weightage Factor Based Scheme for Performance Improvement in Ad Hoc Networks Pushpa
2010
2 p. 146-148
artikel
                             127 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland