Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             105 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A Contemporary Solution to Ferret Out and Obviate the Fake Messages in Vehicular Ad Hoc Networks by not Percolating through Web Server Lalitha, R.V.S.
2015
45 C p. 696-705
10 p.
artikel
2 A Cross-cultural Study of Navigational Mechanisms in Computer Based Assessment Environment Dhar, Debayan
2015
45 C p. 862-871
10 p.
artikel
3 Adaptive Testing and Performance Analysis Using Naive Bayes Classifier Agarwal, Sanjana
2015
45 C p. 70-75
6 p.
artikel
4 A Deviant Load Shedding System for Data Stream Mining Desai, Darshana
2015
45 C p. 118-126
9 p.
artikel
5 Age Group Classification of Facial Images Using Rank Based Edge Texture Unit (RETU) Babu, Ch. Rajendra
2015
45 C p. 215-225
11 p.
artikel
6 A Human Facial Expression Recognition Model Based on Eigen Face Approach De, Anurag
2015
45 C p. 282-289
8 p.
artikel
7 Analysis and Optimization of Energy of Sensor Node Using ACO in Wireless Sensor Network Arya, Rajevv
2015
45 C p. 681-686
6 p.
artikel
8 An Enhanced Authentication Mechanism to Secure Re-programming in WSN Nandu, Pooja
2015
45 C p. 397-406
10 p.
artikel
9 An EPQ Model of Deteriorating Items under Partial Trade Credit Financing and Demand Declining Market in Crisp and Fuzzy Environment Majumder, P.
2015
45 C p. 780-789
10 p.
artikel
10 Animal Classification System: A Block Based Approach Kumar, Y.H. Sharath
2015
45 C p. 336-343
8 p.
artikel
11 An Improved Memetic Algorithm for Web Search Deulkar, Khushali
2015
45 C p. 52-59
8 p.
artikel
12 An Optimized Algorithm for Association Rule Mining Using FP Tree Narvekar, Meera
2015
45 C p. 101-110
10 p.
artikel
13 A Novel Approach to Deep Packet Inspection for Intrusion Detection Parvat, Thaksen J.
2015
45 C p. 506-513
8 p.
artikel
14 A Novel Approach to Detect Android Malware Almin, Shaikh Bushra
2015
45 C p. 407-417
11 p.
artikel
15 A Novel Approach to HTML Page Creation Using Neural Network Halbe, Aparna
2015
45 C p. 197-204
8 p.
artikel
16 A Novel Term_Class Relevance Measure for Text Categorization Guru, D.S.
2015
45 C p. 13-22
10 p.
artikel
17 Application of Fuzzy-Rough Oscillation on the Field of Data Mining (Special Attention to the Crime Against Women at Tripura) Roy, Susmita
2015
45 C p. 790-799
10 p.
artikel
18 Approaches to Impose e-penalty Using Vahan Smart Card for Improving Road and Transport Safety with the Help of ICT: An E-Governanace Endeavour Goel, Shiv Kumar
2015
45 C p. 549-557
9 p.
artikel
19 A Predictive Business Ranking System: For Local Businesses Kale, Ashwini
2015
45 C p. 770-779
10 p.
artikel
20 A Predictive Model Construction for Mulberry Crop Productivity Ramya, M.C.
2015
45 C p. 156-165
10 p.
artikel
21 A Review: Analysis of Aspect Orientation and Model Driven Engineering for Code Generation Gurunule, Dhiraj
2015
45 C p. 852-861
10 p.
artikel
22 A Review of Various Approaches to Face Hallucination Autee, Ms. Prachi
2015
45 C p. 361-369
9 p.
artikel
23 Assistive E-Learning System for the Learning Disabled Pirani, Zainab
2015
45 C p. 718-727
10 p.
artikel
24 A Survey on Cluster Based Routing Protocols in Wireless Sensor Networks Singh, Santar Pal
2015
45 C p. 687-695
9 p.
artikel
25 A Survey on Emulation Testbeds for Mobile Ad-hoc Networks Patel, Kishan N.
2015
45 C p. 581-591
11 p.
artikel
26 A Theoretical Analysis of Fibonacci Coding Techniques on On-chip Data Bus Sathish, Anchula
2015
45 C p. 533-539
7 p.
artikel
27 Authentication Using Session Based Passwords Prabhu, Sanket
2015
45 C p. 460-464
5 p.
artikel
28 Automated Ration Distribution System Goradia, Jinali
2015
45 C p. 528-532
5 p.
artikel
29 Automatic Removal of Handwritten Annotations from Between-text-lines and Inside-text-line Regions of a Printed Text Document Nagabhushan, P.
2015
45 C p. 205-214
10 p.
artikel
30 Autonomous Agent Based Load Balancing Algorithm in Cloud Computing Singh, Aarti
2015
45 C p. 832-841
10 p.
artikel
31 Blind Man Stick Using Programmable Interrupt Controller (PIC) Parikh, Anuj
2015
45 C p. 558-563
6 p.
artikel
32 Bluetooth Smart Based Attendance Management System Lodha, Riya
2015
45 C p. 524-527
4 p.
artikel
33 Buying Scenario and Recommendation of Purchase by Constraint Based Sequential Pattern Mining from Time Stamp Based Sequential Dataset Desai, Niti Ashishkumar
2015
45 C p. 166-175
10 p.
artikel
34 Color Image Segmentation Using Adaptive GrowCut Method Basavaprasad, B.
2015
45 C p. 328-335
8 p.
artikel
35 Comparative Study of Circular and Hexagonal Antenna Array Synthesis Using Improved Particle Swarm Optimization Bera, Rajesh
2015
45 C p. 651-660
10 p.
artikel
36 Comparative Study of Indexing Techniques for Data Dissemination in Wireless Environment Narvekar, Meera
2015
45 C p. 671-680
10 p.
artikel
37 CompareKart Parikh, Jay
2015
45 C p. 150-155
6 p.
artikel
38 Comparison of Broadcast Scheduling Techniques in Mobile Computing Environment Narvekar, Meera
2015
45 C p. 706-711
6 p.
artikel
39 Conservation of Energy in Wireless Sensor Network by Preventing Denial of Sleep Attack Naik, Swapna
2015
45 C p. 370-379
10 p.
artikel
40 Contents 2015
45 C p. iii-vi
nvt p.
artikel
41 Covert Communication Using Arithmetic Division Operation Fernandes, Aisha
2015
45 C p. 354-360
7 p.
artikel
42 Data Classification for Achieving Security in Cloud Computing Shaikh, Rizwana
2015
45 C p. 493-498
6 p.
artikel
43 Delaunay Triangulation on Skeleton of Flowers for Classification Kumar, Y.H. Sharath
2015
45 C p. 226-235
10 p.
artikel
44 Designing and Simulation of Low Frequency Cloud to Ground Lightning Receiver for Severe Weather Monitoring Application Mayekar, Miheer
2015
45 C p. 661-670
10 p.
artikel
45 Design of a Practical Cat-righting Reflex (crr) Model Manerikar, Ankit
2015
45 C p. 514-523
10 p.
artikel
46 Detection of Glomerulosclerosis in Diabetic Nephropathy Using Contour-based Segmentation Ravi, M.
2015
45 C p. 244-249
6 p.
artikel
47 3D Gesture-recognition Based Animation Game Gosalia, Niyati
2015
45 C p. 712-717
6 p.
artikel
48 Discrete Orthonormal Stockwell Transform Based Feature Extraction for Pose Invariant Face Recognition Nithya, B.
2015
45 C p. 290-299
10 p.
artikel
49 3D Medical Application Shah, Jay
2015
45 C p. 736-744
9 p.
artikel
50 DWT-based Feature Extraction and Radon Transform Based Contrast Enhancement for Improved Iris Recognition Dhage, Swathi S.
2015
45 C p. 256-265
10 p.
artikel
51 Dynamic Recommendation System Using Web Usage Mining for E-commerce Users Lopes, Prajyoti
2015
45 C p. 60-69
10 p.
artikel
52 E-commerce Website Ranking Using Semantic Web Mining and Neural Computing Verma, Neha
2015
45 C p. 42-51
10 p.
artikel
53 Efficient Selective Mapping PAPR Reduction Technique Mhatre, Kavita
2015
45 C p. 620-627
8 p.
artikel
54 Elliptic Curves for Data Provenance Srivastava, Kriti
2015
45 C p. 470-476
7 p.
artikel
55 Enhanced Security for ATM Machine with OTP and Facial Recognition Features Karovaliya, Mohsin
2015
45 C p. 390-396
7 p.
artikel
56 Evaluation of Music Features for PUK Kernel Based Genre Classification Chapaneri, Santosh
2015
45 C p. 186-196
11 p.
artikel
57 Evolving Fuzzy Min-max Neural Network for Outlier Detection Upasani, Nilam
2015
45 C p. 753-761
9 p.
artikel
58 Face Recognition Using Gabor Filter Based Feature Extraction with Anisotropic Diffusion as a Pre-processing Technique Abhishree, T.M.
2015
45 C p. 312-321
10 p.
artikel
59 Fatigue Analysis of the Knee Joint Shah, Yash
2015
45 C p. 250-255
6 p.
artikel
60 Feature Selection Based Hybrid Anomaly Intrusion Detection System Using K Means and RBF Kernel Function Ravale, Ujwala
2015
45 C p. 428-435
8 p.
artikel
61 Frequent Item Set Mining Using INC_MINE in Massive Online Analysis Frame Work Srimani, P.K.
2015
45 C p. 133-142
10 p.
artikel
62 Fuzzy Multi-criteria Approach for Component Selection of Fault Tolerant Software System under Consensus Recovery Block Scheme Kaur, Ramandeep
2015
45 C p. 842-851
10 p.
artikel
63 Handwritten Marathi Character Recognition Using R-HOG Feature Kamble, Parshuram M.
2015
45 C p. 266-274
9 p.
artikel
64 Hysteretic Boundary Conditions for PSO of Antenna Array Pattern Synthesis Chakravorty, Pragnan
2015
45 C p. 628-634
7 p.
artikel
65 Identifying Concept-drift in Twitter Streams Lifna, C.S.
2015
45 C p. 86-94
9 p.
artikel
66 Implementation of Fuzzy Keyword Search over Encrypted Data in Cloud Computing Shekokar, Narendra
2015
45 C p. 499-505
7 p.
artikel
67 Implementation of Pattern Matching Algorithm to Defend SQLIA Patel, Nency
2015
45 C p. 453-459
7 p.
artikel
68 Implementing and Improving the Performance of AODV by Receive Reply Method and Securing it from Black Hole Attack Choudhury, Debarati Roy
2015
45 C p. 564-570
7 p.
artikel
69 Insider Threat Detection Using Log Analysis and Event Correlation Ambre, Amruta
2015
45 C p. 436-445
10 p.
artikel
70 Internet Based Interactive Society Monitoring System Using Dynamic IP in Real Time Patil, Vaishali U.
2015
45 C p. 611-619
9 p.
artikel
71 Introducing Hybrid Technique for Optimization of Book Recommender System Chandak, Manisha
2015
45 C p. 23-31
9 p.
artikel
72 Migration Performance of Cloud Applications- A Quantitative Analysis Kumar, Narander
2015
45 C p. 823-831
9 p.
artikel
73 Modeling and Simulation of Optical Coherence Tomography on Virtual OCT Rao, Yogesh
2015
45 C p. 644-650
7 p.
artikel
74 Modeling Melody Similarity Using Music Synthesis and Perception Velankar, M.R.
2015
45 C p. 728-735
8 p.
artikel
75 Normalization of Noisy Text Data Desai, Neelmay
2015
45 C p. 127-132
6 p.
artikel
76 Online Social Network Bullying Detection Using Intelligence Techniques Nandhini, B. Sri
2015
45 C p. 485-492
8 p.
artikel
77 Parallel Text Mining in Multicore Systems Using FP-tree Algorithm Gadia, Krishna
2015
45 C p. 111-117
7 p.
artikel
78 Passive Marker Based Optical System for Gait Kinematics for Lower Extremity Prakash, Chandra
2015
45 C p. 176-185
10 p.
artikel
79 Performance Analysis of a Computer System with Imperfect Fault Detection of Hardware Kumar, Ashish
2015
45 C p. 602-610
9 p.
artikel
80 Performance Comparison of Two Recently Proposed Adaptive Differential Evolution Algorithms on Space Only Low Sidelobe Synthesis Problem of Concentric Regular Hexagonal Antenna Arrays Das, Sudipta
2015
45 C p. 635-643
9 p.
artikel
81 Predicting User's Web Navigation Behavior Using Hybrid Approach Narvekar, Meera
2015
45 C p. 3-12
10 p.
artikel
82 Preface Vasudevan, Hari
2015
45 C p. 1-2
2 p.
artikel
83 Remote Monitoring of Maize Crop through Satellite Multispectral Imagery Nandibewoor, Archana
2015
45 C p. 344-353
10 p.
artikel
84 Removal of Duplicate Rules for Association Rule Mining from Multilevel Dataset Chandanan, A.K.
2015
45 C p. 143-149
7 p.
artikel
85 Review of Duckworth Lewis Method Shah, Harshil
2015
45 C p. 95-100
6 p.
artikel
86 Review of Illumination and Skew Correction Techniques for Scanned Documents Verma, Rajeev N.
2015
45 C p. 322-327
6 p.
artikel
87 Rotator on Chip (RoC) Design Based on Ring Topological NoC Kumar, Adesh
2015
45 C p. 540-548
9 p.
artikel
88 Secure Smartphone Unlocking Using NFC Jambusaria, Utsav
2015
45 C p. 465-469
5 p.
artikel
89 Securing Text & Image Password Using the Combinations of Persuasive Cued Click Points with Improved Advanced Encryption Standard Chaturvedi, Smita
2015
45 C p. 418-427
10 p.
artikel
90 Segmentation and Classification of Skin Lesions for Disease Diagnosis Sumithra, R.
2015
45 C p. 76-85
10 p.
artikel
91 Sentiment Analysis: Measuring Opinions Bhadane, Chetashri
2015
45 C p. 808-814
7 p.
artikel
92 Shoulder-surfing Resistant Graphical Password System Shah, Amish
2015
45 C p. 477-484
8 p.
artikel
93 Skew Detection and Correction of Devanagari Script Using Hough Transform Jundale, Trupti A.
2015
45 C p. 305-311
7 p.
artikel
94 SmartGlass: Visual Commerce Application (Android) Shah, Jay
2015
45 C p. 236-243
8 p.
artikel
95 Smart Sensing Using Bayesian Network for Computer Aided Diagnostic Systems Jagdale, Sheetal
2015
45 C p. 762-769
8 p.
artikel
96 Studies on Effect of Cutting Parameters on Surface Roughness of Al-Cu-TiC MMCs: An Artificial Neural Network Approach Das, Biswajit
2015
45 C p. 745-752
8 p.
artikel
97 Study on Grid Resource Monitoring and Prediction Sreeja, S.R.
2015
45 C p. 815-822
8 p.
artikel
98 Testing Data Integrity in Distributed Systems Mittal, Manika
2015
45 C p. 446-452
7 p.
artikel
99 Throughput Characteristics of WiMAX Video Surveillance Systems Lubobya, Smart C.
2015
45 C p. 571-580
10 p.
artikel
100 Tracking of Entities in Multi-sport Field Vyas, Khyati K.
2015
45 C p. 300-304
5 p.
artikel
101 Trust Based Approaches for Secure Routing in VANET: A Survey Patel, Nirav J.
2015
45 C p. 592-601
10 p.
artikel
102 Trust Model for Measuring Security Strength of Cloud Computing Service Shaikh, Rizwana
2015
45 C p. 380-389
10 p.
artikel
103 Twitterati Identification System Main, Winnie
2015
45 C p. 32-41
10 p.
artikel
104 Video Summarization Using Higher Order Color Moments (VSUHCM) Jadhav, Mrs. Poonam S.
2015
45 C p. 275-281
7 p.
artikel
105 Word Problem Solver System Using Artificial Intelligence Miyani, Mitesh
2015
45 C p. 800-807
8 p.
artikel
                             105 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland