Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             134 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 Abnormal Gait Recognition Naveen Rohila
2010
5 p. 1544-1551
artikel
2 ACO Based Feature Subset Selection for Multiple k-Nearest Neighbor Classifiers Shailendra Kumar Shrivastava
2011
5 p. 1831-1838
artikel
3 A Comparative Study of Classification Algorithms for Spam Email Data Analysis Aman Sharma,
2011
5 p. 1890-1895
artikel
4 A Comparative Study of Public Key Cryptosystem based on ECC and RSA Arun kumar,
2011
5 p. 1904-1909
artikel
5 A Framework for an Ontology-Based Data- Gleaning and Agent Based Intelligent Decision Support PPDM System Employing Generalization Technique for Health Care K. Murugesan
2010
5 p. 1588-1596
artikel
6 A GENETIC ALGORITHM FOR REGRESSION TEST CASE PRIORITIZATION USING CODE COVERAGE Arvinder Kaur,
2011
5 p. 1839-1847
artikel
7 A Journey from floppy disk to cloud storage Bindu Trikha
2010
5 p. 1449-1452
artikel
8 Algorithm for Efficient Multilevel Association Rule Mining Pratima Gautam,
2010
5 p. 1700-1774
artikel
9 Algorithm for Solving Job Shop Scheduling Problem Based on machine availability constraint Kanate Ploydanai,
2010
5 p. 1919-1925
artikel
10 Ambient Noise Tomography of the Central India Abhay P. Singh,
2011
5 p. 2068-2075
artikel
11 AN ALGORITHM FOR STEERING CONTROL WITH SIMULATION RESULTS Apeksha V. Sakhare,
2010
5 p. 1435-1438
artikel
12 ANALYSIS OF ELECTRONIC VOTING SYSTEM IN VARIOUS COUNTRIES Sanjay Kumar,
2011
5 p. 1825-1830
artikel
13 Analyzing Motivation of Private Engineering College Students: A Fuzzy Logic Approach (A case study of private Engineering College) Abhishek Srivastava,
2010
5 p. 1467-1476
artikel
14 An Analysis on Preservation of Privacy in Data Mining Madhan Subramaniam
2010
5 p. 1696-1699
artikel
15 An Artificial Immune System Model for Multi Agents Resource Sharing in Distributed Environments Tejbanta Singh Chingtham
2010
5 p. 1813-1818
artikel
16 Android in opposition to iPhone Kavita Sharma
2011
5 p. 1965-1969
artikel
17 An Effective Approach for Providing Anonymity in Wireless sensor Network: Detecting Attacks and Security Measures Pooja Sharma,
2010
5 p. 1830-1835
artikel
18 AN EFFICIENT CLASSIFICATION OF GENOMES BASED ON CLASSES AND SUBCLASSES B.V. DHANDRA,
2010
5 p. 1690-1695
artikel
19 An Efficient Method for Detection of Copy-Move Forgery Using Discrete Wavelet Transform Er. Saiqa Khan
2010
5 p. 1801-1806
artikel
20 AN EFFICIENT SUPER RESOLUTION TECHNIQUE FOR LOSS LESS COMPRESSED BAYER COLOUR FILTER ARRAY IMAGES K.Chiranjeevi,
2011
5 p. 1804-1814
artikel
21 A NEW APPROACH FOR VARIANT MULTI ASSIGNMENT PROBLEM SOBHAN BABU.K,
2010
5 p. 1633-1640
artikel
22 A New Approach to Secure Data Aggregation protocol for Wireless Sensor Network Mukesh Kumar Jha
2010
5 p. 1539-1543
artikel
23 A New Look to Traversal Algorithms Using Set Construct Data Structure Vineet Kumar Sharma,
2010
5 p. 1445-1448
artikel
24 AN EXTENDED METHOD FOR ORDER REDUCTION OF LARGE SCALE MULTI VARIABLE SYSTEMS Dr. G.Saraswathi
2011
5 p. 2109-2118
artikel
25 An Implementation of I2C using VHDL for DATA surveillance Arvind Sahu,
2011
5 p. 1857-1865
artikel
26 An Improved Hop-Count Metric for Infrastructural Wireless Mesh Network Paramjeet Kaur Bedi,
2011
5 p. 1757-1763
artikel
27 A novel application for transmission of Orthogonal Embedded Images by using Morphological Transform Domain & cryptographic methods M.Venkata Kishore,
2011
5 p. 1866-1877
artikel
28 A NOVEL CODEBOOK INITIALISATION TECHNIQUE FOR GENERALIZED LLOYD ALGORITHM USING CLUSTER DENSITY K.Somasundaram
2010
5 p. 1807-1809
artikel
29 A Novel Document Clustering Algorithm Using Squared Distance Optimization Through Genetic Algorithms Harish Verma
2010
5 p. 1875-1879
artikel
30 An Overview of Side Channel Attacks and Its Countermeasures using Elliptic Curve Cryptography M.Prabu,
2010
5 p. 1492-1495
artikel
31 APPRAISAL OF QUESTION CATEGORIZATION FOR AN ADAPTIVE ASSESSMENT IN ELEARNING R. KAVITHA
2011
5 p. 1933-1937
artikel
32 A Randomized Secure Data Hiding Algorithm Using File Hybridization for Information Security K. Venkata Ramana,
2011
5 p. 1878-1889
artikel
33 A Single Fromat for Measuring different Aspects of Testing Mahwish Kundi,
2010
5 p. 1729-1732
artikel
34 A Study on Enhancement of Loadability of Large-Scale Emerging Power Systems by Using FACTS Controllers Bindeshwar Singh,
2010
5 p. 1893-1903
artikel
35 A Survey of Denial of Service Attacks and it's Countermeasures on Wireless Network Arockiam. L
2010
5 p. 1563-1571
artikel
36 A Survey On Coding Algorithms In Medical Image Compression S.Bhavani,
2010
5 p. 1429-1434
artikel
37 A Survey on Intrusion in Ad Hoc Networks and its Detection Measures Ms. Preetee K. Karmore,
2009
5 p. 1896-1903
artikel
38 A Survey on Telecommunication Technology Standards Sandeep Singh Sengar,
2011
5 p. 2061-2067
artikel
39 Automated Load Shedding Period Control System (An effective way to reduce human effort) Dwijen Rudrapal,
2011
5 p. 1764-1772
artikel
40 A VIEW ON SECURE ROUTING IN ADHOC NETWORKS V. Venkata Ramana,
2010
5 p. 1887-1892
artikel
41 A Wavelet Transform Algorithm for 2n Shades Image Aditya Kumar,
2011
5 p. 2136-2144
artikel
42 CBIR Using Kekre's Transform over Row column Mean and Variance Vectors Dr. H. B. Kekre
2010
5 p. 1609-1614
artikel
43 CCMP-AES Model with DSR routing protocol to secure Link layer and Network layer in Mobile Adhoc Networks Dr.G.Padmavathi
2010
5 p. 1524-1531
artikel
44 Classification of Different Species Families using Clustering Algorithm D.Chandravathi
2010
5 p. 1884-1886
artikel
45 CLASSIFICATION TECHNIQES IN EDUCATION DOMAIN B.Nithyasri
2010
5 p. 1679-1684
artikel
46 Clustering Mixed Data Set Using Modified MARDL Technique Mrs. J.Jayabharathy
2010
5 p. 1852-1860
artikel
47 COLLABORATIVE ANOMALY-BASED INTRUSION DETECTION IN MOBILE AD HOC NETWORKS SUNIL K. PARYANI,
2011
5 p. 2024-2027
artikel
48 Comparative and Analysis of Biometric Systems Manivannan,
2011
5 p. 2156-2162
artikel
49 COMPARATIVE STUDY OF BROWSER BASED OPEN SOURCE TESTING TOOLS WATIR AND WET Nisha Gogna,
2011
5 p. 1910-1923
artikel
50 Decentralized Service Orchestration by Continuous Message Passing R.JAYAPRAKASH
2010
5 p. 1627-1632
artikel
51 Design and Simulation for Producing Two Amplitude Matched Anti-phase Sine Waveforms Using ±2.5 V CMOS Current-Mode Approach Anil Kumar Sharma,
2010
5 p. 1482-1486
artikel
52 DESIGN MODEL OF FUZZY LOGIC MEDICAL DIAGNOSIS CONTROL SYSTEM Faran Baig,
2011
5 p. 2093-2108
artikel
53 Development of a quality design framework for usable User Interfaces Dr. S. Qamar Abbas
2010
5 p. 1763-1767
artikel
54 Development of Coalmine Safety System Using Wireless Sensor Network S.Vandana,
2011
5 p. 2076-2085
artikel
55 Differential Evolution for Optimization of PID Gains in Automatic Generation Control Dr. L.D. Arya,
2011
5 p. 1848-1856
artikel
56 Direct Processor Access for Non Dedicated Server using Multi Core Processor P. S. BALAMURUGAN,
2010
5 p. 1861-1864
artikel
57 Dynamic Resource Allocation in Desktop Grids Bismi A S,
2010
5 p. 1913-1918
artikel
58 E-Commerce Security using PKI approach Mr. Vikas Rattan
2010
5 p. 1439-1444
artikel
59 Effective Comparison and Evaluation of DES and Rijndael Algorithm (AES) Prof.N..Penchalaiah,
2010
5 p. 1641-1645
artikel
60 Effective Term Based Text Clustering Algorithms P. Ponmuthuramalingam,
2010
5 p. 1665-1673
artikel
61 Efficient Secured Hash Based Password Authentication in Multiple Websites T.S.Thangavel,
2010
5 p. 1846-1851
artikel
62 Emerging Requirements Of Reconfigurable Computing Systems For Performance Enhancement M. Aqeel Iqbal
2010
5 p. 1572-1579
artikel
63 Encoding And Decoding of a Message in the Implementation of Elliptic Curve Cryptography using Koblitz's Method Padma Bh
2010
5 p. 1904-1907
artikel
64 Enhancement of LSB based Steganography for Hiding Image in Audio Pradeep Kumar Singh
2010
5 p. 1652-1658
artikel
65 Enhancement of Network Security Techniques using Quantum Cryptography Navleen Kaur,
2011
5 p. 1960-1964
artikel
66 Evolutionary Aspects Of Windows Operating System To Enhance Existing Technology M. Asad Kayani
2010
5 p. 1504-1513
artikel
67 Exploring Issues for QoS Based Routing Algorithms Dr. Shuchita Upadhyaya
2010
5 p. 1792-1795
artikel
68 Extraction of Radiology Reports using Text mining A.V.Krishna Prasad
2010
5 p. 1558-1562
artikel
69 Facial Expression Recognition Neeta Sarode
2010
5 p. 1552-1557
artikel
70 FEATURE SELECTION METHODS AND ALGORITHMS L.Ladha,
2011
5 p. 1787-1797
artikel
71 Global Chaos Synchronization of Four-Scroll and Four-Wing Attractors by Active Nonlinear Control Dr. V. Sundarapandian
2011
5 p. 2145-2155
artikel
72 Global Chaos Synchronization of the Pehlivan Systems by Sliding Mode Control Dr. V. Sundarapandian
2011
5 p. 2163-2169
artikel
73 Grid Computing Used For Next Generation High Speed Processing Technology Muhammad Naqaash
2010
5 p. 1926-1933
artikel
74 High Performance VLSI Design Using Body Biasing in Domino Logic Circuits Salendra.Govindarajulu,
2010
5 p. 1741-1745
artikel
75 HYBRID FEATRUE SELECTION FOR NETWORK INTRUSION S.Sethuramalingam,
2011
5 p. 1773-1780
artikel
76 Hybrid Particle Swarm Optimization for Regression Testing Dr. Arvinder Kaur
2011
5 p. 1815-1824
artikel
77 Implementation and simulation of arithmetic logic unit, shifter and Multiplier in Quantum cellular automata technology Dr.E.N.Ganesh
2010
5 p. 1824-1829
artikel
78 Implementation of a Secured system with Roaming Server and Roaming Ports R. Bharathi,
2011
5 p. 1781-1786
artikel
79 Implementing Ant Colony Optimization for Test Case Selection and Prioritization Bharti Suri,
2011
5 p. 1924-1932
artikel
80 Improved Fuzzy C-Means Algorithm for MR Brain Image Segmentation P.Vasuda,
2010
5 p. 1713-1715
artikel
81 Improving Ischemic Beat Classification Using Fuzzy-Genetic Based PCA And ICA S. Murugan
2010
5 p. 1532-1538
artikel
82 Introducing a New Language for Stream Applications Mohamad Dabbagh
2011
5 p. 2119-2126
artikel
83 Intrusion Detection using unsupervised learning Kusum bharti
2010
5 p. 1865-1870
artikel
84 Investigation on Efficient Management of workflows in cloud computing Environment M.Sudha,
2010
5 p. 1841-1845
artikel
85 Investigations and Performance Evaluation of Dynamic Routing Protocol with New Proposed Protocol for WAN Vasudha,
2011
5 p. 1970-1979
artikel
86 k-dominant and Extended k-dominant Skyline Computation by Using Statistics Md. Anisuzzaman Siddique,
2010
5 p. 1934-1943
artikel
87 MESSAGE INDUCED SOFT CHEKPOINTING FOR RECOVERY IN MOBILE ENVIRONMENTS Ruchi Tuli,
2011
5 p. 1798-1803
artikel
88 MISSING DATA IMPUTATION IN CARDIAC DATA SET (SURVIVAL PROGNOSIS) R.KAVITHA KUMAR
2010
5 p. 1836-1840
artikel
89 Modeling Of Combinational Circuits Based On Ternary Multiplexer Using VHDL A.Sathish kumar,
2010
5 p. 1777-1791
artikel
90 Modern Trends Used In Operating Systems For High Speed Computing Applications Qurat-ul-Ain Malik
2010
5 p. 1514-1523
artikel
91 Modified Order Crossover (OX) Operator Ms. Monica Sehrawat,
2011
5 p. 2019-2023
artikel
92 Neuro Language Generator P. Dinadayalan
2010
5 p. 1453-1461
artikel
93 Next Generation High Speed Computing Using Photonic Based Technology Umer Farooq
2010
5 p. 1496-1503
artikel
94 On Human Intelligence M.A.Anusuya
2010
5 p. 1674-1678
artikel
95 Optimal Capacitor For Maximum Output Power Tracking Of Self Excited Induction Generator Using Fuzzy Logic Approach Mr.M.Senthilkumar
2010
5 p. 1758-1762
artikel
96 Optimizing Dependencies - A solution to Failure Proneness of software Dr.G.AppaRao,
2011
5 p. 2010-2018
artikel
97 Output Regulation of the Arneodo Chaotic System Sundarapandian Vaidyanathan
2010
5 p. 1601-1608
artikel
98 Output Regulation of the Tigan System Dr. V. Sundarapandian
2011
5 p. 2127-2135
artikel
99 Performance Comparision of Image Retrieval using Row Mean of Transformed Column Image Dr. H.B.Kekre
2010
5 p. 1908-1912
artikel
100 Performance Evaluation and Optimization of DSR Routing Algorithm over 802.11 based Wireless Mesh Network Birinder Singh,
2011
5 p. 1980-1985
artikel
101 Performance Evaluation Of Different Adaptive Filters For ECG Signal Processing Sachin singh,
2010
5 p. 1880-1883
artikel
102 PERFORMANCE EVALUATION OF DSR USING A NOVEL APPROACH Prof.S.P. Setti,
2010
5 p. 1796-1800
artikel
103 Performance evaluation of H.264 decoder on different processors H.S.Prasantha
2010
5 p. 1768-1776
artikel
104 PERFORMANCE OF MULTI SERVER AUTHENTICATION AND KEY AGREEMENT WITH USER PROTECTION IN NETWORK SECURITY NAGAMALLESWARA RAO.DASARI,
2010
5 p. 1705-1712
artikel
105 Performance of TCP/IP/ UDP adaptive header compression algorithm for wireless network Prof.N.Penchalaiah
2010
5 p. 1646-1651
artikel
106 Poly Substitution Method for Encryption and Decryption Jeetendra Kumar Ambulkar
2010
5 p. 1810-1812
artikel
107 Power Aware Scheduling for Resource Constrained Distributed Real-Time Systems Santhi Baskaran
2010
5 p. 1746-1753
artikel
108 Prediction of Profitability of Industries using Weighted SVR Divya Tomar,
2011
5 p. 1938-1945
artikel
109 Prediction of Protein Secondary Structure using Artificial Neural Network MN Vamsi Thalatam
2010
5 p. 1615-1621
artikel
110 Prediction of the Query of Search Engine Using Back Propagation Algorithm Deepti Gupta ,
2011
5 p. 1946-1959
artikel
111 Printed and Handwritten Mixed Kannada Numerals Recognition Using SVM G. G. Rajput
2010
5 p. 1622-1626
artikel
112 Quantum Black Holes and pseudotelepathy in biological organisms Monendra Grover,
2011
5 p. 1995-1998
artikel
113 Quantum Teleportation circuit using Matlab and Mathematica Ms.Swati Sharma,
2010
5 p. 1597-1600
artikel
114 Reconfigurable Computing Systems Used To Support Next Generation High Speed Applications M. Munawwar Iqbal Ch
2010
5 p. 1580-1587
artikel
115 Revisions & Altercations in the Administration of Assets for Mobile Grid Computing Aditya Vidyarthi,
2011
5 p. 2041-2045
artikel
116 Robot Assisted Wireless Sensor Network for Monitoring and Detection of Explosives in Indoor Environment Joshua D Freeman,
2011
5 p. 2046-2053
artikel
117 ROLE OF SYNUCLEIN BETA (SNCB) AND SYNUCLEIN GAMMA (SNCG) IN GLAUCOMA AND ALZHEIMER'S DISEASES – A BIOINFORMATIC APPROACH Kiran Kumar Reddi
2010
5 p. 1871-1874
artikel
118 Secure Mobile Agent based Information Gathering in Wireless Network Ashish Kumar Srivastava
2010
5 p. 1685-1689
artikel
119 Self-Healing in Dynamic Web Service Composition S.Poonguzhali,
2011
5 p. 2054-2060
artikel
120 SEMANTIC BASED MULTIPLE WEB SEARCH ENGINE MS.S.LATHA SHANMUGAVADIVU,
2010
5 p. 1722-1728
artikel
121 Sequence Related IT Functions for String Based Update Operations by New Operational Transformation Algorithms for Wide-Area Collaborative Applications Santosh kumawat
2010
5 p. 1716-1721
artikel
122 SEVERITY BASED CODE OPTIMIZATION : A DATA MINING APPROACH M.V.P. Chandra Sekhara Rao
2010
5 p. 1754-1757
artikel
123 Short Message Service using SMS Gateway Veena K.Katankar
2010
5 p. 1487-1491
artikel
124 Spam Classification using new kernel function in Support Vector Machine Surendra Kumar Rakse
2010
5 p. 1819-1823
artikel
125 SPEAKER IDENTIFICATION USING 2-D DCT, WALSH AND HAAR ON FULL AND BLOCK SPECTROGRAM Dr. H. B. Kekre,
2010
5 p. 1733-1740
artikel
126 Spectrum sensing and Spectrum shifting implementation in a Cognitive Radio based IEEE 802.22 Wireless Regional Area Network Mithun Chakraborty
2010
5 p. 1477-1481
artikel
127 Superresolution: A Novel Application to Image Restoration Sanket B.Kasturiwala,
2010
5 p. 1659-1664
artikel
128 Test Case Prioritization for Regression Testing based on Severity of Fault R. Kavitha,
2010
5 p. 1462-1466
artikel
129 The Integration and Development of the Leisure and Hospitality Information System Module with the Embedded Technology Chih-Yao Lo
2011
5 p. 1986-1994
artikel
130 Towards Learner Model Sharing Among Heterogeneous E-Learning Environments R. Sunitha,
2011
5 p. 2034-2040
artikel
131 Trust Negotiations Using Cryptographic Approach Sandeep.V,
2011
5 p. 2086-2092
artikel
132 Using Association Rule Mining for Extracting Product Sales Patterns in Retail Store Transactions Pramod Prasad,
2011
5 p. 2177-2182
artikel
133 Web Page Prediction using Hybrid Model Shreya Dubey,
2011
5 p. 2170-2176
artikel
134 ZigBee Based Industrial Automation Profile for Power Monitoring Systems Archana R. Raut,
2011
5 p. 2028-2033
artikel
                             134 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland