nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A Landscape of XML Data from Analytics Perspective
|
Singh, Pratima |
|
|
173 |
C |
p. 392-402 |
artikel |
2 |
Android Malware Detection based on Vulnerable Feature Aggregation
|
Roy, Arindaam |
|
|
173 |
C |
p. 345-353 |
artikel |
3 |
Android Malware Detection using LSI-based Reduced Opcode Feature Vector
|
Singh, Adarsh Kumar |
|
|
173 |
C |
p. 291-298 |
artikel |
4 |
A study of learner’s satisfaction from MOOCs through a mediation model
|
Kumar, Parul |
|
|
173 |
C |
p. 354-363 |
artikel |
5 |
ASYMMETRICALLY SLOTTED, TUNABLE AND SINGLE MODE CIRCULARLY POLARISED MICROSTRIP ANTENNA FOR IoT APPLICATION
|
Kundu, S K |
|
|
173 |
C |
p. 86-93 |
artikel |
6 |
Cloud Computing Tools: Inside Views and Analysis
|
Jena, Soumya Ranjan |
|
|
173 |
C |
p. 382-391 |
artikel |
7 |
Community detection in Networks using Graph Embedding
|
Agrawal, Rimjhim |
|
|
173 |
C |
p. 372-381 |
artikel |
8 |
Comparative Analysis of Ant Colony and Particle Swarm Optimization Algorithms for Distance Optimization
|
Gupta, Arushi |
|
|
173 |
C |
p. 245-253 |
artikel |
9 |
Comparative Analysis of Bagging and Boosting Algorithms for Sentiment Analysis
|
Sawarn, Aman |
|
|
173 |
C |
p. 210-215 |
artikel |
10 |
Comparison of Various Scale Invariant Crowd Count Analysis Methods
|
Sharma, Ashish |
|
|
173 |
C |
p. 113-119 |
artikel |
11 |
Contents
|
|
|
|
173 |
C |
p. iii-v |
artikel |
12 |
Credit Card Fraud Detection using Pipeling and Ensemble Learning
|
Bagga, Siddhant |
|
|
173 |
C |
p. 104-112 |
artikel |
13 |
Critical Analysis of Data Storage Approaches
|
Sachdeva, Shelly |
|
|
173 |
C |
p. 264-271 |
artikel |
14 |
Data Life Cycle Management in Big Data Analytics
|
Rahul, Kumar |
|
|
173 |
C |
p. 364-371 |
artikel |
15 |
Decentralized and Secure Communication Architecture for FANETs using Blockchain
|
Khullar, Kashish |
|
|
173 |
C |
p. 158-170 |
artikel |
16 |
Denigration Bullying Resolution using Wolf Search Optimized Online Reputation Rumour Detection
|
Sangwan, Saurabh Raj |
|
|
173 |
C |
p. 305-314 |
artikel |
17 |
Design and Implementation of Fast Booth-2 Multiplier on Artix FPGA
|
Behl, Abhinav |
|
|
173 |
C |
p. 140-148 |
artikel |
18 |
Edge Detection using Guided Image Filtering and Enhanced Ant Colony Optimization
|
Kumar, Akshi |
|
|
173 |
C |
p. 8-17 |
artikel |
19 |
EDITORIAL - PREFACE
|
Gupta, Namita |
|
|
173 |
C |
p. 1-2 |
artikel |
20 |
Effect of Influential Nodes on Time Varying Opinion Formation Models
|
Eeti, |
|
|
173 |
C |
p. 120-129 |
artikel |
21 |
Efficient Influence Maximization in Social-Networks Under Independent Cascade Model
|
Trivedi, Nitesh |
|
|
173 |
C |
p. 315-324 |
artikel |
22 |
Employing Differentiable Neural Computers for Image Captioning and Neural Machine Translation
|
Sharma, Rishab |
|
|
173 |
C |
p. 234-244 |
artikel |
23 |
Enhanced Image Restoration by GANs using Game Theory
|
Kishore, Akshat |
|
|
173 |
C |
p. 225-233 |
artikel |
24 |
Estimation of Parameters in Fractional order Financial Chaotic system with Nature Inspired Algorithms
|
Gupta, Sangeeta |
|
|
173 |
C |
p. 18-27 |
artikel |
25 |
Flood Damage Analysis Using Machine Learning Techniques
|
Snehil, |
|
|
173 |
C |
p. 78-85 |
artikel |
26 |
Foreword
|
|
|
|
173 |
C |
p. 3-7 |
artikel |
27 |
Hand Gesture Recognition using Image Processing and Feature Extraction Techniques
|
Sharma, Ashish |
|
|
173 |
C |
p. 181-190 |
artikel |
28 |
Heart Disease Prediction using Exploratory Data Analysis
|
Indrakumari, R. |
|
|
173 |
C |
p. 130-139 |
artikel |
29 |
Insurance Fraud Identification using Computer Vision and IoT: A Study of Field Fires
|
Sahni, Srishti |
|
|
173 |
C |
p. 56-63 |
artikel |
30 |
Intelligent Learning based Opinion Mining Model for Governmental Decision Making
|
Sharma, Abhilasha |
|
|
173 |
C |
p. 216-224 |
artikel |
31 |
Investigation of Artificial Intelligence Techniques in Finance and Marketing
|
Tiwari, Raman |
|
|
173 |
C |
p. 149-157 |
artikel |
32 |
Lung tuberculosis detection using anti-aliased convolutional networks
|
Singh, Jodh |
|
|
173 |
C |
p. 281-290 |
artikel |
33 |
Meta-heuristic based optimization of WSNs Localisation Problem- a Survey
|
Sharma, Neha |
|
|
173 |
C |
p. 36-45 |
artikel |
34 |
Packet Header Compression in the Internet of Things
|
Zahra, Syed Rameem |
|
|
173 |
C |
p. 64-69 |
artikel |
35 |
Peer to Peer Communication in GUI interface using Lora Technology
|
Madaan, Aakash |
|
|
173 |
C |
p. 299-304 |
artikel |
36 |
Performance Analysis of Various Server Hosting Techniques
|
Jain, Prerna |
|
|
173 |
C |
p. 70-77 |
artikel |
37 |
Performance Evaluation of IPv6 Network for Real-Time Applications using IS-ISv6 Routing Protocol on Riverbed Modeler
|
Jain, Neha |
|
|
173 |
C |
p. 46-55 |
artikel |
38 |
Predicting Information Cascade on Twitter Using Random Walk
|
Singh, Nidhi |
|
|
173 |
C |
p. 201-209 |
artikel |
39 |
Predictive Analysis of Manpower Requirements in Scrum Projects Using Regression Techniques
|
Vaid, Kamna |
|
|
173 |
C |
p. 335-344 |
artikel |
40 |
Preserving the Privacy of Electronic Health Records using Blockchain
|
Sharma, Yogesh |
|
|
173 |
C |
p. 171-180 |
artikel |
41 |
Real-Time Anomaly Recognition Through CCTV Using Neural Networks
|
Singh, Virender |
|
|
173 |
C |
p. 254-263 |
artikel |
42 |
Reliability analysis of a 3D Printing process
|
Siraj, Imran |
|
|
173 |
C |
p. 191-200 |
artikel |
43 |
Review of Clustering Techniques in Control System
|
Singh, Saumya |
|
|
173 |
C |
p. 272-280 |
artikel |
44 |
Robustness in Multilayer Networks Under Strategical and Random Attacks
|
Kumar, Rajesh |
|
|
173 |
C |
p. 94-103 |
artikel |
45 |
Sentimental Analysis of Twitter Data with respect to General Elections in India
|
Sharma, Ankita |
|
|
173 |
C |
p. 325-334 |
artikel |
46 |
Super-Resolution using GANs for Medical Imaging
|
Gupta, Rohit |
|
|
173 |
C |
p. 28-35 |
artikel |