nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A Contemporary Solution to Ferret Out and Obviate the Fake Messages in Vehicular Ad Hoc Networks by not Percolating through Web Server
|
Lalitha, R.V.S. |
|
2015 |
45 |
C |
p. 696-705 10 p. |
artikel |
2 |
A Cross-cultural Study of Navigational Mechanisms in Computer Based Assessment Environment
|
Dhar, Debayan |
|
2015 |
45 |
C |
p. 862-871 10 p. |
artikel |
3 |
Adaptive Testing and Performance Analysis Using Naive Bayes Classifier
|
Agarwal, Sanjana |
|
2015 |
45 |
C |
p. 70-75 6 p. |
artikel |
4 |
A Deviant Load Shedding System for Data Stream Mining
|
Desai, Darshana |
|
2015 |
45 |
C |
p. 118-126 9 p. |
artikel |
5 |
Age Group Classification of Facial Images Using Rank Based Edge Texture Unit (RETU)
|
Babu, Ch. Rajendra |
|
2015 |
45 |
C |
p. 215-225 11 p. |
artikel |
6 |
A Human Facial Expression Recognition Model Based on Eigen Face Approach
|
De, Anurag |
|
2015 |
45 |
C |
p. 282-289 8 p. |
artikel |
7 |
Analysis and Optimization of Energy of Sensor Node Using ACO in Wireless Sensor Network
|
Arya, Rajevv |
|
2015 |
45 |
C |
p. 681-686 6 p. |
artikel |
8 |
An Enhanced Authentication Mechanism to Secure Re-programming in WSN
|
Nandu, Pooja |
|
2015 |
45 |
C |
p. 397-406 10 p. |
artikel |
9 |
An EPQ Model of Deteriorating Items under Partial Trade Credit Financing and Demand Declining Market in Crisp and Fuzzy Environment
|
Majumder, P. |
|
2015 |
45 |
C |
p. 780-789 10 p. |
artikel |
10 |
Animal Classification System: A Block Based Approach
|
Kumar, Y.H. Sharath |
|
2015 |
45 |
C |
p. 336-343 8 p. |
artikel |
11 |
An Improved Memetic Algorithm for Web Search
|
Deulkar, Khushali |
|
2015 |
45 |
C |
p. 52-59 8 p. |
artikel |
12 |
An Optimized Algorithm for Association Rule Mining Using FP Tree
|
Narvekar, Meera |
|
2015 |
45 |
C |
p. 101-110 10 p. |
artikel |
13 |
A Novel Approach to Deep Packet Inspection for Intrusion Detection
|
Parvat, Thaksen J. |
|
2015 |
45 |
C |
p. 506-513 8 p. |
artikel |
14 |
A Novel Approach to Detect Android Malware
|
Almin, Shaikh Bushra |
|
2015 |
45 |
C |
p. 407-417 11 p. |
artikel |
15 |
A Novel Approach to HTML Page Creation Using Neural Network
|
Halbe, Aparna |
|
2015 |
45 |
C |
p. 197-204 8 p. |
artikel |
16 |
A Novel Term_Class Relevance Measure for Text Categorization
|
Guru, D.S. |
|
2015 |
45 |
C |
p. 13-22 10 p. |
artikel |
17 |
Application of Fuzzy-Rough Oscillation on the Field of Data Mining (Special Attention to the Crime Against Women at Tripura)
|
Roy, Susmita |
|
2015 |
45 |
C |
p. 790-799 10 p. |
artikel |
18 |
Approaches to Impose e-penalty Using Vahan Smart Card for Improving Road and Transport Safety with the Help of ICT: An E-Governanace Endeavour
|
Goel, Shiv Kumar |
|
2015 |
45 |
C |
p. 549-557 9 p. |
artikel |
19 |
A Predictive Business Ranking System: For Local Businesses
|
Kale, Ashwini |
|
2015 |
45 |
C |
p. 770-779 10 p. |
artikel |
20 |
A Predictive Model Construction for Mulberry Crop Productivity
|
Ramya, M.C. |
|
2015 |
45 |
C |
p. 156-165 10 p. |
artikel |
21 |
A Review: Analysis of Aspect Orientation and Model Driven Engineering for Code Generation
|
Gurunule, Dhiraj |
|
2015 |
45 |
C |
p. 852-861 10 p. |
artikel |
22 |
A Review of Various Approaches to Face Hallucination
|
Autee, Ms. Prachi |
|
2015 |
45 |
C |
p. 361-369 9 p. |
artikel |
23 |
Assistive E-Learning System for the Learning Disabled
|
Pirani, Zainab |
|
2015 |
45 |
C |
p. 718-727 10 p. |
artikel |
24 |
A Survey on Cluster Based Routing Protocols in Wireless Sensor Networks
|
Singh, Santar Pal |
|
2015 |
45 |
C |
p. 687-695 9 p. |
artikel |
25 |
A Survey on Emulation Testbeds for Mobile Ad-hoc Networks
|
Patel, Kishan N. |
|
2015 |
45 |
C |
p. 581-591 11 p. |
artikel |
26 |
A Theoretical Analysis of Fibonacci Coding Techniques on On-chip Data Bus
|
Sathish, Anchula |
|
2015 |
45 |
C |
p. 533-539 7 p. |
artikel |
27 |
Authentication Using Session Based Passwords
|
Prabhu, Sanket |
|
2015 |
45 |
C |
p. 460-464 5 p. |
artikel |
28 |
Automated Ration Distribution System
|
Goradia, Jinali |
|
2015 |
45 |
C |
p. 528-532 5 p. |
artikel |
29 |
Automatic Removal of Handwritten Annotations from Between-text-lines and Inside-text-line Regions of a Printed Text Document
|
Nagabhushan, P. |
|
2015 |
45 |
C |
p. 205-214 10 p. |
artikel |
30 |
Autonomous Agent Based Load Balancing Algorithm in Cloud Computing
|
Singh, Aarti |
|
2015 |
45 |
C |
p. 832-841 10 p. |
artikel |
31 |
Blind Man Stick Using Programmable Interrupt Controller (PIC)
|
Parikh, Anuj |
|
2015 |
45 |
C |
p. 558-563 6 p. |
artikel |
32 |
Bluetooth Smart Based Attendance Management System
|
Lodha, Riya |
|
2015 |
45 |
C |
p. 524-527 4 p. |
artikel |
33 |
Buying Scenario and Recommendation of Purchase by Constraint Based Sequential Pattern Mining from Time Stamp Based Sequential Dataset
|
Desai, Niti Ashishkumar |
|
2015 |
45 |
C |
p. 166-175 10 p. |
artikel |
34 |
Color Image Segmentation Using Adaptive GrowCut Method
|
Basavaprasad, B. |
|
2015 |
45 |
C |
p. 328-335 8 p. |
artikel |
35 |
Comparative Study of Circular and Hexagonal Antenna Array Synthesis Using Improved Particle Swarm Optimization
|
Bera, Rajesh |
|
2015 |
45 |
C |
p. 651-660 10 p. |
artikel |
36 |
Comparative Study of Indexing Techniques for Data Dissemination in Wireless Environment
|
Narvekar, Meera |
|
2015 |
45 |
C |
p. 671-680 10 p. |
artikel |
37 |
CompareKart
|
Parikh, Jay |
|
2015 |
45 |
C |
p. 150-155 6 p. |
artikel |
38 |
Comparison of Broadcast Scheduling Techniques in Mobile Computing Environment
|
Narvekar, Meera |
|
2015 |
45 |
C |
p. 706-711 6 p. |
artikel |
39 |
Conservation of Energy in Wireless Sensor Network by Preventing Denial of Sleep Attack
|
Naik, Swapna |
|
2015 |
45 |
C |
p. 370-379 10 p. |
artikel |
40 |
Contents
|
|
|
2015 |
45 |
C |
p. iii-vi nvt p. |
artikel |
41 |
Covert Communication Using Arithmetic Division Operation
|
Fernandes, Aisha |
|
2015 |
45 |
C |
p. 354-360 7 p. |
artikel |
42 |
Data Classification for Achieving Security in Cloud Computing
|
Shaikh, Rizwana |
|
2015 |
45 |
C |
p. 493-498 6 p. |
artikel |
43 |
Delaunay Triangulation on Skeleton of Flowers for Classification
|
Kumar, Y.H. Sharath |
|
2015 |
45 |
C |
p. 226-235 10 p. |
artikel |
44 |
Designing and Simulation of Low Frequency Cloud to Ground Lightning Receiver for Severe Weather Monitoring Application
|
Mayekar, Miheer |
|
2015 |
45 |
C |
p. 661-670 10 p. |
artikel |
45 |
Design of a Practical Cat-righting Reflex (crr) Model
|
Manerikar, Ankit |
|
2015 |
45 |
C |
p. 514-523 10 p. |
artikel |
46 |
Detection of Glomerulosclerosis in Diabetic Nephropathy Using Contour-based Segmentation
|
Ravi, M. |
|
2015 |
45 |
C |
p. 244-249 6 p. |
artikel |
47 |
3D Gesture-recognition Based Animation Game
|
Gosalia, Niyati |
|
2015 |
45 |
C |
p. 712-717 6 p. |
artikel |
48 |
Discrete Orthonormal Stockwell Transform Based Feature Extraction for Pose Invariant Face Recognition
|
Nithya, B. |
|
2015 |
45 |
C |
p. 290-299 10 p. |
artikel |
49 |
3D Medical Application
|
Shah, Jay |
|
2015 |
45 |
C |
p. 736-744 9 p. |
artikel |
50 |
DWT-based Feature Extraction and Radon Transform Based Contrast Enhancement for Improved Iris Recognition
|
Dhage, Swathi S. |
|
2015 |
45 |
C |
p. 256-265 10 p. |
artikel |
51 |
Dynamic Recommendation System Using Web Usage Mining for E-commerce Users
|
Lopes, Prajyoti |
|
2015 |
45 |
C |
p. 60-69 10 p. |
artikel |
52 |
E-commerce Website Ranking Using Semantic Web Mining and Neural Computing
|
Verma, Neha |
|
2015 |
45 |
C |
p. 42-51 10 p. |
artikel |
53 |
Efficient Selective Mapping PAPR Reduction Technique
|
Mhatre, Kavita |
|
2015 |
45 |
C |
p. 620-627 8 p. |
artikel |
54 |
Elliptic Curves for Data Provenance
|
Srivastava, Kriti |
|
2015 |
45 |
C |
p. 470-476 7 p. |
artikel |
55 |
Enhanced Security for ATM Machine with OTP and Facial Recognition Features
|
Karovaliya, Mohsin |
|
2015 |
45 |
C |
p. 390-396 7 p. |
artikel |
56 |
Evaluation of Music Features for PUK Kernel Based Genre Classification
|
Chapaneri, Santosh |
|
2015 |
45 |
C |
p. 186-196 11 p. |
artikel |
57 |
Evolving Fuzzy Min-max Neural Network for Outlier Detection
|
Upasani, Nilam |
|
2015 |
45 |
C |
p. 753-761 9 p. |
artikel |
58 |
Face Recognition Using Gabor Filter Based Feature Extraction with Anisotropic Diffusion as a Pre-processing Technique
|
Abhishree, T.M. |
|
2015 |
45 |
C |
p. 312-321 10 p. |
artikel |
59 |
Fatigue Analysis of the Knee Joint
|
Shah, Yash |
|
2015 |
45 |
C |
p. 250-255 6 p. |
artikel |
60 |
Feature Selection Based Hybrid Anomaly Intrusion Detection System Using K Means and RBF Kernel Function
|
Ravale, Ujwala |
|
2015 |
45 |
C |
p. 428-435 8 p. |
artikel |
61 |
Frequent Item Set Mining Using INC_MINE in Massive Online Analysis Frame Work
|
Srimani, P.K. |
|
2015 |
45 |
C |
p. 133-142 10 p. |
artikel |
62 |
Fuzzy Multi-criteria Approach for Component Selection of Fault Tolerant Software System under Consensus Recovery Block Scheme
|
Kaur, Ramandeep |
|
2015 |
45 |
C |
p. 842-851 10 p. |
artikel |
63 |
Handwritten Marathi Character Recognition Using R-HOG Feature
|
Kamble, Parshuram M. |
|
2015 |
45 |
C |
p. 266-274 9 p. |
artikel |
64 |
Hysteretic Boundary Conditions for PSO of Antenna Array Pattern Synthesis
|
Chakravorty, Pragnan |
|
2015 |
45 |
C |
p. 628-634 7 p. |
artikel |
65 |
Identifying Concept-drift in Twitter Streams
|
Lifna, C.S. |
|
2015 |
45 |
C |
p. 86-94 9 p. |
artikel |
66 |
Implementation of Fuzzy Keyword Search over Encrypted Data in Cloud Computing
|
Shekokar, Narendra |
|
2015 |
45 |
C |
p. 499-505 7 p. |
artikel |
67 |
Implementation of Pattern Matching Algorithm to Defend SQLIA
|
Patel, Nency |
|
2015 |
45 |
C |
p. 453-459 7 p. |
artikel |
68 |
Implementing and Improving the Performance of AODV by Receive Reply Method and Securing it from Black Hole Attack
|
Choudhury, Debarati Roy |
|
2015 |
45 |
C |
p. 564-570 7 p. |
artikel |
69 |
Insider Threat Detection Using Log Analysis and Event Correlation
|
Ambre, Amruta |
|
2015 |
45 |
C |
p. 436-445 10 p. |
artikel |
70 |
Internet Based Interactive Society Monitoring System Using Dynamic IP in Real Time
|
Patil, Vaishali U. |
|
2015 |
45 |
C |
p. 611-619 9 p. |
artikel |
71 |
Introducing Hybrid Technique for Optimization of Book Recommender System
|
Chandak, Manisha |
|
2015 |
45 |
C |
p. 23-31 9 p. |
artikel |
72 |
Migration Performance of Cloud Applications- A Quantitative Analysis
|
Kumar, Narander |
|
2015 |
45 |
C |
p. 823-831 9 p. |
artikel |
73 |
Modeling and Simulation of Optical Coherence Tomography on Virtual OCT
|
Rao, Yogesh |
|
2015 |
45 |
C |
p. 644-650 7 p. |
artikel |
74 |
Modeling Melody Similarity Using Music Synthesis and Perception
|
Velankar, M.R. |
|
2015 |
45 |
C |
p. 728-735 8 p. |
artikel |
75 |
Normalization of Noisy Text Data
|
Desai, Neelmay |
|
2015 |
45 |
C |
p. 127-132 6 p. |
artikel |
76 |
Online Social Network Bullying Detection Using Intelligence Techniques
|
Nandhini, B. Sri |
|
2015 |
45 |
C |
p. 485-492 8 p. |
artikel |
77 |
Parallel Text Mining in Multicore Systems Using FP-tree Algorithm
|
Gadia, Krishna |
|
2015 |
45 |
C |
p. 111-117 7 p. |
artikel |
78 |
Passive Marker Based Optical System for Gait Kinematics for Lower Extremity
|
Prakash, Chandra |
|
2015 |
45 |
C |
p. 176-185 10 p. |
artikel |
79 |
Performance Analysis of a Computer System with Imperfect Fault Detection of Hardware
|
Kumar, Ashish |
|
2015 |
45 |
C |
p. 602-610 9 p. |
artikel |
80 |
Performance Comparison of Two Recently Proposed Adaptive Differential Evolution Algorithms on Space Only Low Sidelobe Synthesis Problem of Concentric Regular Hexagonal Antenna Arrays
|
Das, Sudipta |
|
2015 |
45 |
C |
p. 635-643 9 p. |
artikel |
81 |
Predicting User's Web Navigation Behavior Using Hybrid Approach
|
Narvekar, Meera |
|
2015 |
45 |
C |
p. 3-12 10 p. |
artikel |
82 |
Preface
|
Vasudevan, Hari |
|
2015 |
45 |
C |
p. 1-2 2 p. |
artikel |
83 |
Remote Monitoring of Maize Crop through Satellite Multispectral Imagery
|
Nandibewoor, Archana |
|
2015 |
45 |
C |
p. 344-353 10 p. |
artikel |
84 |
Removal of Duplicate Rules for Association Rule Mining from Multilevel Dataset
|
Chandanan, A.K. |
|
2015 |
45 |
C |
p. 143-149 7 p. |
artikel |
85 |
Review of Duckworth Lewis Method
|
Shah, Harshil |
|
2015 |
45 |
C |
p. 95-100 6 p. |
artikel |
86 |
Review of Illumination and Skew Correction Techniques for Scanned Documents
|
Verma, Rajeev N. |
|
2015 |
45 |
C |
p. 322-327 6 p. |
artikel |
87 |
Rotator on Chip (RoC) Design Based on Ring Topological NoC
|
Kumar, Adesh |
|
2015 |
45 |
C |
p. 540-548 9 p. |
artikel |
88 |
Secure Smartphone Unlocking Using NFC
|
Jambusaria, Utsav |
|
2015 |
45 |
C |
p. 465-469 5 p. |
artikel |
89 |
Securing Text & Image Password Using the Combinations of Persuasive Cued Click Points with Improved Advanced Encryption Standard
|
Chaturvedi, Smita |
|
2015 |
45 |
C |
p. 418-427 10 p. |
artikel |
90 |
Segmentation and Classification of Skin Lesions for Disease Diagnosis
|
Sumithra, R. |
|
2015 |
45 |
C |
p. 76-85 10 p. |
artikel |
91 |
Sentiment Analysis: Measuring Opinions
|
Bhadane, Chetashri |
|
2015 |
45 |
C |
p. 808-814 7 p. |
artikel |
92 |
Shoulder-surfing Resistant Graphical Password System
|
Shah, Amish |
|
2015 |
45 |
C |
p. 477-484 8 p. |
artikel |
93 |
Skew Detection and Correction of Devanagari Script Using Hough Transform
|
Jundale, Trupti A. |
|
2015 |
45 |
C |
p. 305-311 7 p. |
artikel |
94 |
SmartGlass: Visual Commerce Application (Android)
|
Shah, Jay |
|
2015 |
45 |
C |
p. 236-243 8 p. |
artikel |
95 |
Smart Sensing Using Bayesian Network for Computer Aided Diagnostic Systems
|
Jagdale, Sheetal |
|
2015 |
45 |
C |
p. 762-769 8 p. |
artikel |
96 |
Studies on Effect of Cutting Parameters on Surface Roughness of Al-Cu-TiC MMCs: An Artificial Neural Network Approach
|
Das, Biswajit |
|
2015 |
45 |
C |
p. 745-752 8 p. |
artikel |
97 |
Study on Grid Resource Monitoring and Prediction
|
Sreeja, S.R. |
|
2015 |
45 |
C |
p. 815-822 8 p. |
artikel |
98 |
Testing Data Integrity in Distributed Systems
|
Mittal, Manika |
|
2015 |
45 |
C |
p. 446-452 7 p. |
artikel |
99 |
Throughput Characteristics of WiMAX Video Surveillance Systems
|
Lubobya, Smart C. |
|
2015 |
45 |
C |
p. 571-580 10 p. |
artikel |
100 |
Tracking of Entities in Multi-sport Field
|
Vyas, Khyati K. |
|
2015 |
45 |
C |
p. 300-304 5 p. |
artikel |
101 |
Trust Based Approaches for Secure Routing in VANET: A Survey
|
Patel, Nirav J. |
|
2015 |
45 |
C |
p. 592-601 10 p. |
artikel |
102 |
Trust Model for Measuring Security Strength of Cloud Computing Service
|
Shaikh, Rizwana |
|
2015 |
45 |
C |
p. 380-389 10 p. |
artikel |
103 |
Twitterati Identification System
|
Main, Winnie |
|
2015 |
45 |
C |
p. 32-41 10 p. |
artikel |
104 |
Video Summarization Using Higher Order Color Moments (VSUHCM)
|
Jadhav, Mrs. Poonam S. |
|
2015 |
45 |
C |
p. 275-281 7 p. |
artikel |
105 |
Word Problem Solver System Using Artificial Intelligence
|
Miyani, Mitesh |
|
2015 |
45 |
C |
p. 800-807 8 p. |
artikel |