Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             46 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A Landscape of XML Data from Analytics Perspective Singh, Pratima

173 C p. 392-402
artikel
2 Android Malware Detection based on Vulnerable Feature Aggregation Roy, Arindaam

173 C p. 345-353
artikel
3 Android Malware Detection using LSI-based Reduced Opcode Feature Vector Singh, Adarsh Kumar

173 C p. 291-298
artikel
4 A study of learner’s satisfaction from MOOCs through a mediation model Kumar, Parul

173 C p. 354-363
artikel
5 ASYMMETRICALLY SLOTTED, TUNABLE AND SINGLE MODE CIRCULARLY POLARISED MICROSTRIP ANTENNA FOR IoT APPLICATION Kundu, S K

173 C p. 86-93
artikel
6 Cloud Computing Tools: Inside Views and Analysis Jena, Soumya Ranjan

173 C p. 382-391
artikel
7 Community detection in Networks using Graph Embedding Agrawal, Rimjhim

173 C p. 372-381
artikel
8 Comparative Analysis of Ant Colony and Particle Swarm Optimization Algorithms for Distance Optimization Gupta, Arushi

173 C p. 245-253
artikel
9 Comparative Analysis of Bagging and Boosting Algorithms for Sentiment Analysis Sawarn, Aman

173 C p. 210-215
artikel
10 Comparison of Various Scale Invariant Crowd Count Analysis Methods Sharma, Ashish

173 C p. 113-119
artikel
11 Contents
173 C p. iii-v
artikel
12 Credit Card Fraud Detection using Pipeling and Ensemble Learning Bagga, Siddhant

173 C p. 104-112
artikel
13 Critical Analysis of Data Storage Approaches Sachdeva, Shelly

173 C p. 264-271
artikel
14 Data Life Cycle Management in Big Data Analytics Rahul, Kumar

173 C p. 364-371
artikel
15 Decentralized and Secure Communication Architecture for FANETs using Blockchain Khullar, Kashish

173 C p. 158-170
artikel
16 Denigration Bullying Resolution using Wolf Search Optimized Online Reputation Rumour Detection Sangwan, Saurabh Raj

173 C p. 305-314
artikel
17 Design and Implementation of Fast Booth-2 Multiplier on Artix FPGA Behl, Abhinav

173 C p. 140-148
artikel
18 Edge Detection using Guided Image Filtering and Enhanced Ant Colony Optimization Kumar, Akshi

173 C p. 8-17
artikel
19 EDITORIAL - PREFACE Gupta, Namita

173 C p. 1-2
artikel
20 Effect of Influential Nodes on Time Varying Opinion Formation Models Eeti,

173 C p. 120-129
artikel
21 Efficient Influence Maximization in Social-Networks Under Independent Cascade Model Trivedi, Nitesh

173 C p. 315-324
artikel
22 Employing Differentiable Neural Computers for Image Captioning and Neural Machine Translation Sharma, Rishab

173 C p. 234-244
artikel
23 Enhanced Image Restoration by GANs using Game Theory Kishore, Akshat

173 C p. 225-233
artikel
24 Estimation of Parameters in Fractional order Financial Chaotic system with Nature Inspired Algorithms Gupta, Sangeeta

173 C p. 18-27
artikel
25 Flood Damage Analysis Using Machine Learning Techniques Snehil,

173 C p. 78-85
artikel
26 Foreword
173 C p. 3-7
artikel
27 Hand Gesture Recognition using Image Processing and Feature Extraction Techniques Sharma, Ashish

173 C p. 181-190
artikel
28 Heart Disease Prediction using Exploratory Data Analysis Indrakumari, R.

173 C p. 130-139
artikel
29 Insurance Fraud Identification using Computer Vision and IoT: A Study of Field Fires Sahni, Srishti

173 C p. 56-63
artikel
30 Intelligent Learning based Opinion Mining Model for Governmental Decision Making Sharma, Abhilasha

173 C p. 216-224
artikel
31 Investigation of Artificial Intelligence Techniques in Finance and Marketing Tiwari, Raman

173 C p. 149-157
artikel
32 Lung tuberculosis detection using anti-aliased convolutional networks Singh, Jodh

173 C p. 281-290
artikel
33 Meta-heuristic based optimization of WSNs Localisation Problem- a Survey Sharma, Neha

173 C p. 36-45
artikel
34 Packet Header Compression in the Internet of Things Zahra, Syed Rameem

173 C p. 64-69
artikel
35 Peer to Peer Communication in GUI interface using Lora Technology Madaan, Aakash

173 C p. 299-304
artikel
36 Performance Analysis of Various Server Hosting Techniques Jain, Prerna

173 C p. 70-77
artikel
37 Performance Evaluation of IPv6 Network for Real-Time Applications using IS-ISv6 Routing Protocol on Riverbed Modeler Jain, Neha

173 C p. 46-55
artikel
38 Predicting Information Cascade on Twitter Using Random Walk Singh, Nidhi

173 C p. 201-209
artikel
39 Predictive Analysis of Manpower Requirements in Scrum Projects Using Regression Techniques Vaid, Kamna

173 C p. 335-344
artikel
40 Preserving the Privacy of Electronic Health Records using Blockchain Sharma, Yogesh

173 C p. 171-180
artikel
41 Real-Time Anomaly Recognition Through CCTV Using Neural Networks Singh, Virender

173 C p. 254-263
artikel
42 Reliability analysis of a 3D Printing process Siraj, Imran

173 C p. 191-200
artikel
43 Review of Clustering Techniques in Control System Singh, Saumya

173 C p. 272-280
artikel
44 Robustness in Multilayer Networks Under Strategical and Random Attacks Kumar, Rajesh

173 C p. 94-103
artikel
45 Sentimental Analysis of Twitter Data with respect to General Elections in India Sharma, Ankita

173 C p. 325-334
artikel
46 Super-Resolution using GANs for Medical Imaging Gupta, Rohit

173 C p. 28-35
artikel
                             46 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland