nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
ACM Based ROI Extraction for Pedestrian Detection with Partial Occlusion Handling
|
Viswanath, Viswajith P. |
|
2015 |
46 |
C |
p. 45-52 |
artikel |
2 |
A Cognitive Femto Cell Access Point in HetNets to Mitigate Interference
|
Viswanadh, Konjeti |
|
2015 |
46 |
C |
p. 1417-1424 |
artikel |
3 |
A Combined Wavelet and Neural Network Based Model for Classifying Depth of Anaesthesia
|
Benzy, V.K. |
|
2015 |
46 |
C |
p. 1610-1617 |
artikel |
4 |
A Coplanar Stripline Fed Compact UWB Antenna
|
Roshna, T.K. |
|
2015 |
46 |
C |
p. 1365-1370 |
artikel |
5 |
Adaptive Gradient Descent Backpropagation for Classification of Breast Tumors in Ultrasound Imaging
|
Singh, Bikesh Kumar |
|
2015 |
46 |
C |
p. 1601-1609 |
artikel |
6 |
Adaptive PSO Based Association Rule Mining Technique for Software Defect Classification Using ANN
|
Dhanalaxmi, B. |
|
2015 |
46 |
C |
p. 432-442 |
artikel |
7 |
A Distributed Self-Adaptive Intrusion Detection System for Mobile Ad-hoc Networks Using Tamper Evident Mobile Agents
|
Krishnan, Deepa |
|
2015 |
46 |
C |
p. 1203-1208 |
artikel |
8 |
A Dual Band SIR Coupled Dipole Antenna for 2.4/5.2/5.8GHz Applications
|
Deepak, U. |
|
2015 |
46 |
C |
p. 1311-1316 |
artikel |
9 |
A Fuzzy Approach to Decision Fusion in Cognitive Radio
|
Jacob, Jaison |
|
2015 |
46 |
C |
p. 425-431 |
artikel |
10 |
Age Estimation from Face Image Using Wrinkle Features
|
Jana, Ranjan |
|
2015 |
46 |
C |
p. 1754-1761 |
artikel |
11 |
AgentTab: An Agent Based Approach to Detect Tabnabbing Attack
|
Sarika, S. |
|
2015 |
46 |
C |
p. 574-581 |
artikel |
12 |
A Hierarchical Framework for the Classification of Multispectral Imagery
|
Saritha, S. |
|
2015 |
46 |
C |
p. 78-85 |
artikel |
13 |
A Hybrid Backbone Based Clustering Algorithm for Vehicular Ad-Hoc Networks
|
Singh, Jaskaran Preet |
|
2015 |
46 |
C |
p. 1005-1013 |
artikel |
14 |
Aiding Effective Encrypted Document Manipulation Incorporated with Document Categorization Technique in Cloud
|
Mathew, Samantha Susan |
|
2015 |
46 |
C |
p. 668-675 |
artikel |
15 |
A Lexical Approach for Text Categorization of Medical Documents
|
Jindal, Rajni |
|
2015 |
46 |
C |
p. 314-320 |
artikel |
16 |
A Low Cost Implementation of Multi-label Classification Algorithm Using Mathematica on Raspberry Pi
|
John, Neethu |
|
2015 |
46 |
C |
p. 306-313 |
artikel |
17 |
A Method for Text Steganography Using Malayalam Text
|
Vidhya, P.M. |
|
2015 |
46 |
C |
p. 524-531 |
artikel |
18 |
A Method to Find Optimum Number of Clusters Based on Fuzzy Silhouette on Dynamic Data Set
|
Subbalakshmi, Chatti |
|
2015 |
46 |
C |
p. 346-353 |
artikel |
19 |
An Approach for QoS Based Fault Reconfiguration in Service Oriented Architecture
|
Shrivastava, Saurabh |
|
2015 |
46 |
C |
p. 766-773 |
artikel |
20 |
An Approach to Detect the Region of Interest of Expressive Face Images
|
Saha, Priya |
|
2015 |
46 |
C |
p. 1739-1746 |
artikel |
21 |
An Approach to Implementation of Intelligent Signaling for Automatic Blocking System in Railway Sectors Using Mobile Agents
|
Rajkumar, R. Immanuel |
|
2015 |
46 |
C |
p. 337-345 |
artikel |
22 |
An Efficient CRM-Data Mining Framework for the Prediction of Customer Behaviour
|
Bahari, T. Femina |
|
2015 |
46 |
C |
p. 725-731 |
artikel |
23 |
An Efficient Multipath Dynamic Routing Protocol for Mobile WSNs
|
Kaur, Ravinder |
|
2015 |
46 |
C |
p. 1032-1040 |
artikel |
24 |
A New Algorithm in Association Mining, Amoeba for Finding Frequent Patterns Using Functional Dependency and Probability
|
Tirumalasetty, Sudhir |
|
2015 |
46 |
C |
p. 31-36 |
artikel |
25 |
A New Mathematical Model in Image Enhancement Problem
|
Gopalan, Sasi |
|
2015 |
46 |
C |
p. 1786-1793 |
artikel |
26 |
A New Reversible Data Hiding Scheme with Improved Capacity Based on Directional Interpolation and Difference Expansion
|
Govind, P.V. Sabeen |
|
2015 |
46 |
C |
p. 491-498 |
artikel |
27 |
An Experimental Study on Channel Estimation and Synchronization to Reduce Error Rate in OFDM Using GNU Radio
|
Anjana, C. |
|
2015 |
46 |
C |
p. 1056-1063 |
artikel |
28 |
An Improved Automatic Detection of True Comets for DNA Damage Analysis
|
Sreelatha, G. |
|
2015 |
46 |
C |
p. 135-142 |
artikel |
29 |
An Improved DNA Based Dual Cover Steganography
|
Das, Prasenjit |
|
2015 |
46 |
C |
p. 604-611 |
artikel |
30 |
An Improved SRL Based Plagiarism Detection Technique Using Sentence Ranking
|
Paul, Merin |
|
2015 |
46 |
C |
p. 223-230 |
artikel |
31 |
A Normalized Approach for Service Discovery
|
Sambasivam, G. |
|
2015 |
46 |
C |
p. 876-883 |
artikel |
32 |
A Novel Approach for Removal of Pectoral Muscles in Digital Mammogram
|
Sreedevi, S. |
|
2015 |
46 |
C |
p. 1724-1731 |
artikel |
33 |
A Novel Approach to Improve the Processor Performance with Page Replacement Method
|
Abraham, Jisha P. |
|
2015 |
46 |
C |
p. 1371-1376 |
artikel |
34 |
A Novel DNA Computing Based Encryption and Decryption Algorithm
|
UbaidurRahman, Noorul Hussain |
|
2015 |
46 |
C |
p. 463-475 |
artikel |
35 |
A Novel DWT Based Image Securing Method Using Steganography
|
Baby, Della |
|
2015 |
46 |
C |
p. 612-618 |
artikel |
36 |
A Novel Family Genetic Approach for Virtual Machine Allocation
|
Joseph, Christina Terese |
|
2015 |
46 |
C |
p. 558-565 |
artikel |
37 |
A Novel String Matrix Data Structure for DNA Encoding Algorithm
|
UbaidurRahman, Noorul Hussain |
|
2015 |
46 |
C |
p. 820-832 |
artikel |
38 |
A Novel Texture Based Automated Histogram Specification for Color Image Enhancement Using Image Fusion
|
Raji, R. |
|
2015 |
46 |
C |
p. 1501-1509 |
artikel |
39 |
A Perspective to Adopt Continuous Dynamic Cognition for Malicious Node Detection in Heterogeneous Networks
|
Sunilkumar, G. |
|
2015 |
46 |
C |
p. 997-1004 |
artikel |
40 |
A Proactive Approach to Reversible Data Hiding in Encrypted Images
|
Nair, Nirmal S. |
|
2015 |
46 |
C |
p. 1510-1517 |
artikel |
41 |
A Robust Novel Method for Face Recognition from 2D Depth Images Using DWT and DCT Fusion
|
Naveen, S. |
|
2015 |
46 |
C |
p. 1518-1528 |
artikel |
42 |
ARSkNN-A k-NN Classifier Using Mass Based Similarity Measure
|
Kumar, Ashish |
|
2015 |
46 |
C |
p. 457-462 |
artikel |
43 |
A Semi-automated Segmentation of Soil X-ray Microtomography
|
Mandava, Ajay K. |
|
2015 |
46 |
C |
p. 1468-1475 |
artikel |
44 |
A Semi Blind DWT-SVD Video Watermarking
|
Thind, Divjot Kaur |
|
2015 |
46 |
C |
p. 1661-1667 |
artikel |
45 |
A Simple and Robust Colour Based Video Copy Detection on Summarized Videos
|
Thomas, Renu Mary |
|
2015 |
46 |
C |
p. 1668-1675 |
artikel |
46 |
A Two Pass Scheduling Policy Based Resource Allocation for MapReduce
|
Raj, Ebin Deni |
|
2015 |
46 |
C |
p. 627-634 |
artikel |
47 |
A Unified Software Framework for Automatic Precise Georeferencing of Large Remote Sensing Image Archives
|
Misra, Indranil |
|
2015 |
46 |
C |
p. 812-819 |
artikel |
48 |
Automated Prediction of RCT (Root Canal Treatment) Using Data Mining Techniques: ICT in Health Care
|
Choudhary, Kavita |
|
2015 |
46 |
C |
p. 682-688 |
artikel |
49 |
Automatic Characterization of Benign and Malignant Masses in Mammography
|
Vaidehi, K. |
|
2015 |
46 |
C |
p. 1762-1769 |
artikel |
50 |
Automatic Classification of Cardiac Views in Echocardiogram Using Histogram and Statistical Features
|
Balaji, G.N. |
|
2015 |
46 |
C |
p. 1569-1576 |
artikel |
51 |
A VDM-based Approach for Specifying and Testing Requirements of Web-applications
|
Sengupta, Souvik |
|
2015 |
46 |
C |
p. 774-783 |
artikel |
52 |
Bayesian Classifier Structure-learning Using Several General Algorithms
|
Bouhamed, Heni |
|
2015 |
46 |
C |
p. 476-482 |
artikel |
53 |
Biometric Based Unique ID Generation and One to One Verification for Security Documents
|
Ambadiyil, Sajan |
|
2015 |
46 |
C |
p. 507-516 |
artikel |
54 |
Biometric Security System for Watchlist Surveillance
|
Singh, Anshul Kumar |
|
2015 |
46 |
C |
p. 596-603 |
artikel |
55 |
Building Inter Cluster Movement Estimation (ICME) Model-A Step by Step Approach
|
Rajee, A.M. |
|
2015 |
46 |
C |
p. 210-215 |
artikel |
56 |
Case Based Reasoning in the Detection of Retinal Abnormalities Using Decision Trees
|
Banerjee, Sreeparna |
|
2015 |
46 |
C |
p. 402-408 |
artikel |
57 |
Centroid Mutation Embedded Shuffled Frog-Leaping Algorithm
|
Sharma, Shweta |
|
2015 |
46 |
C |
p. 127-134 |
artikel |
58 |
Circularly Polarized Sector- shaped Patch Antenna for WLAN Applications
|
Mathew, Sumitha |
|
2015 |
46 |
C |
p. 1274-1277 |
artikel |
59 |
Circular Quorum Systems for Write Dominant Data Replication Protocols under Serial Isolation Using Quorum Consensus Approach
|
Kumar, Vinit |
|
2015 |
46 |
C |
p. 867-875 |
artikel |
60 |
Classification of ECG Signal during Atrial Fibrillation Using Autoregressive Modeling
|
Padmavathi, K. |
|
2015 |
46 |
C |
p. 53-59 |
artikel |
61 |
Cloud Data Security for Goal Driven Global Software Engineering Projects
|
Patil, Shruti |
|
2015 |
46 |
C |
p. 548-557 |
artikel |
62 |
Clustering Models for Data Stream Mining
|
Mythily, R. |
|
2015 |
46 |
C |
p. 619-626 |
artikel |
63 |
Compact Dual Band Antenna for GSM1800/1900/ UMTS/ LTE/ UWB
|
Aravind, S. |
|
2015 |
46 |
C |
p. 1349-1356 |
artikel |
64 |
Compact Tunable Filters for Broadband Applications
|
Ramya, T.K. |
|
2015 |
46 |
C |
p. 957-964 |
artikel |
65 |
Concept Networks for Personalized Web Search Using Genetic Algorithm
|
Babu, K.R. Remesh |
|
2015 |
46 |
C |
p. 566-573 |
artikel |
66 |
Construction of Membership Function for Software Metrics
|
Yadav, Harikesh Bahadur |
|
2015 |
46 |
C |
p. 933-940 |
artikel |
67 |
Contents
|
|
|
2015 |
46 |
C |
p. iii-x |
artikel |
68 |
Controlled Expansion of Neighborhood in Trust Based Recommender Systems
|
Jain, Deepali |
|
2015 |
46 |
C |
p. 68-77 |
artikel |
69 |
Conventional Entropy Quantifier and Modified Entropy Quantifiers for Face Recognition
|
Gubbi, Abdullah |
|
2015 |
46 |
C |
p. 1529-1536 |
artikel |
70 |
Coplanar Waveguide Filter using Stub Resonators for Ultra Wide Band Applications
|
Bindu, C.J. |
|
2015 |
46 |
C |
p. 1230-1237 |
artikel |
71 |
Cost Efficient Algorithm for ONU Placement in Fiber-Wireless (FiWi) Access Networks
|
Bhatt, Uma Rathore |
|
2015 |
46 |
C |
p. 1303-1310 |
artikel |
72 |
Coupling Enhancement of Waveguide fed Dielectric Resonator Antenna using Tapered Section of Waveguide
|
Jasmine, P.M. |
|
2015 |
46 |
C |
p. 1278-1284 |
artikel |
73 |
Credit Based Scheduling Algorithm in Cloud Computing Environment
|
Thomas, Antony |
|
2015 |
46 |
C |
p. 913-920 |
artikel |
74 |
Customer Facilitated Cost-based Scheduling (CFCSC) in Cloud
|
Amalarethinam, D.I. George |
|
2015 |
46 |
C |
p. 660-667 |
artikel |
75 |
Defogging of Visual Images Using SAMEER-TU Database
|
Pal, Tannistha |
|
2015 |
46 |
C |
p. 1676-1683 |
artikel |
76 |
Design and Implementation of an On-Chip Test Generation Scheme Based on Reconfigurable Run-Time Programmable and Multiple Twisted-Ring Counters
|
Tharakan, Aida S. |
|
2015 |
46 |
C |
p. 1409-1416 |
artikel |
77 |
Design and Implementation of Embedded Logic Flip-Flop for Low Power Applications
|
Sudheer, A. |
|
2015 |
46 |
C |
p. 1393-1400 |
artikel |
78 |
Design and Implementation of MOEMS Based Ground to Satellite Free Space Optical Link Under Turbulence Condition
|
Viswanath, Anjitha |
|
2015 |
46 |
C |
p. 1216-1222 |
artikel |
79 |
Design and Parametric Study of Depressed Core Optical Fiber
|
Palodiya, Vikram |
|
2015 |
46 |
C |
p. 1385-1392 |
artikel |
80 |
Design of Hash Algorithm Using Latin Square
|
Ghosh, Rajib |
|
2015 |
46 |
C |
p. 759-765 |
artikel |
81 |
Design of Software Fault Prediction Model Using BR Technique
|
Mahajan, Rohit |
|
2015 |
46 |
C |
p. 849-858 |
artikel |
82 |
Detection of Malicious Nodes (DMN) in Vehicular Ad-Hoc Networks
|
Khan, Uzma |
|
2015 |
46 |
C |
p. 965-972 |
artikel |
83 |
Development of Ontology in Laptop Domain for Knowledge Representation
|
Dhingra, Vandana |
|
2015 |
46 |
C |
p. 249-256 |
artikel |
84 |
Discovery of Classification Rules Using Distributed Genetic Algorithm
|
Sharma, Priyanka |
|
2015 |
46 |
C |
p. 276-284 |
artikel |
85 |
Distributed Optimization of Solar Micro-grid Using Multi Agent Reinforcement Learning
|
Raju, Leo |
|
2015 |
46 |
C |
p. 231-239 |
artikel |
86 |
DNA Based Multi-secret Image Sharing
|
Anbarasi, L. Jani |
|
2015 |
46 |
C |
p. 1794-1801 |
artikel |
87 |
Domain Ontology Driven Fuzzy Semantic Information Retrieval
|
Remi, S. |
|
2015 |
46 |
C |
p. 676-681 |
artikel |
88 |
Duration Modelling Using Neural Networks for Hindi TTS System Considering Position of Syllable in a Word
|
Shreekanth, T. |
|
2015 |
46 |
C |
p. 60-67 |
artikel |
89 |
Dynamic MAPT Approach for Vertical Handover Optimization in Heterogeneous Network for CBR and VBR QoS Guarantees
|
Tamijetchelvy, R. |
|
2015 |
46 |
C |
p. 1164-1172 |
artikel |
90 |
Eclectic Method for Developing Optimum ANN's
|
Mota-Hernández, C.I. |
|
2015 |
46 |
C |
p. 1827-1834 |
artikel |
91 |
Editorial & Keynote Abstracts
|
Samuel, Philip |
|
2015 |
46 |
C |
p. 1-11 |
artikel |
92 |
Efficient Knowledge Transformation System Using Pair of Classifiers for Prediction of Students Career Choice
|
Ade, Roshani |
|
2015 |
46 |
C |
p. 176-183 |
artikel |
93 |
Energy Balanced Heuristic Approach for Path Selection Using Graph Theory
|
Mahajan, Shilpa |
|
2015 |
46 |
C |
p. 101-108 |
artikel |
94 |
Energy Efficient Data Mining Scheme for High Dimensional Data
|
Alwadi, Mohammad |
|
2015 |
46 |
C |
p. 483-490 |
artikel |
95 |
Enhanced Associative Classification of XML Documents Supported by Semantic Concepts
|
Thasleena, N.T. |
|
2015 |
46 |
C |
p. 194-201 |
artikel |
96 |
Enhanced Attribute Based Encryption for Cloud Computing
|
Kumar, N. Saravana |
|
2015 |
46 |
C |
p. 689-696 |
artikel |
97 |
Enhanced Noise Shaping based Band-Pass Cross-Coupled ΣΔ Modulators for Advanced Wireless Transceivers
|
Ansel, V. Paul |
|
2015 |
46 |
C |
p. 1254-1260 |
artikel |
98 |
Enhanced Performance Capability in a Dual Redundant Avionics Platform – Fault Tolerant Scheduling with Comparative Evaluation
|
Sreekumar, Archana |
|
2015 |
46 |
C |
p. 921-932 |
artikel |
99 |
Enhancement of Fingerprint Using FFT×|FFT|n Filter
|
Neethu, S. |
|
2015 |
46 |
C |
p. 1561-1568 |
artikel |
100 |
Enhancing Cooperation in MANET Using the Backbone Group Model (An Application of Maximum Coverage Problem)
|
Akhtar, Md. Amir Khusru |
|
2015 |
46 |
C |
p. 1022-1031 |
artikel |
101 |
Evaluation of Features on Sentimental Analysis
|
Shahana, P.H. |
|
2015 |
46 |
C |
p. 1585-1592 |
artikel |
102 |
Evaluation of Named Entity Features for Punjabi Language
|
Kaur, Amandeep |
|
2015 |
46 |
C |
p. 159-166 |
artikel |
103 |
Face Detection, Registration and Feature Localization Experiments with RGB-D Face Database
|
Bodhi, S.R. |
|
2015 |
46 |
C |
p. 1778-1785 |
artikel |
104 |
Face Recognition Using Block Based Feature Extraction with CZT and Goertzel-algorithm as a Preprocessing Technique
|
Varadarajan, K.K. |
|
2015 |
46 |
C |
p. 1458-1467 |
artikel |
105 |
Face Recognition Using Hough Transform Based Feature Extraction
|
Varun, R. |
|
2015 |
46 |
C |
p. 1491-1500 |
artikel |
106 |
Facial Mole Detection: An Approach towards Face Identification
|
Gogoi, Usha Rani |
|
2015 |
46 |
C |
p. 1546-1553 |
artikel |
107 |
FAMACRO: Fuzzy and Ant Colony Optimization Based MAC/Routing Cross-layer Protocol for Wireless Sensor Networks
|
Gajjar, Sachin |
|
2015 |
46 |
C |
p. 1014-1021 |
artikel |
108 |
Fault Tolerant Scheduling of Mixed Criticality Real-time Tasks under Error Bursts
|
Thekkilakattil, Abhilash |
|
2015 |
46 |
C |
p. 1148-1155 |
artikel |
109 |
Fault Tolerant Spectrum Assignment in Cognitive Radio Networks
|
Pareek, Himanshu |
|
2015 |
46 |
C |
p. 1188-1195 |
artikel |
110 |
Fine Grained Access Control and Revocation for Secure Cloud Environment – A Polynomial Based Approach
|
Mohan, Lija |
|
2015 |
46 |
C |
p. 719-724 |
artikel |
111 |
“Fortune at the Bottom of the Classifier Pyramid”: A Novel Approach to Human Activity Recognition
|
Borges, Vijay |
|
2015 |
46 |
C |
p. 37-44 |
artikel |
112 |
Foundational UML Behavioral Specification with Java
|
George, Renu |
|
2015 |
46 |
C |
p. 941-948 |
artikel |
113 |
Framework for Traffic Personnel Gesture Recognition
|
Sathya, R. |
|
2015 |
46 |
C |
p. 1700-1707 |
artikel |
114 |
Fuzzy Clustering Algorithms for cDNA Microarray Image Spots Segmentation
|
Biju, V.G. |
|
2015 |
46 |
C |
p. 417-424 |
artikel |
115 |
Fuzzy Inference System Based Robust Digital Image Watermarking Technique Using Discrete Cosine Transform
|
Jagadeesh, B. |
|
2015 |
46 |
C |
p. 1618-1625 |
artikel |
116 |
Fuzzy Rule Based Enhancement in the SMRT Domain for Low Contrast Images
|
Jaya, V.L. |
|
2015 |
46 |
C |
p. 1747-1753 |
artikel |
117 |
Genetic Algorithm Based Design of Combinational Logic Circuits Using Universal Logic Modules
|
Vijayakumari, C.K. |
|
2015 |
46 |
C |
p. 1246-1253 |
artikel |
118 |
Go Green with WEEE: Eco-friendly Approach for Handling E- waste
|
Jaiswal, Anand |
|
2015 |
46 |
C |
p. 1317-1324 |
artikel |
119 |
Grid Based Adaptive Sleep for Prolonging Network Lifetime in Wireless Sensor Network
|
Nitesh, Kumar |
|
2015 |
46 |
C |
p. 1140-1147 |
artikel |
120 |
Guard Antenna Design
|
Joseph, Ann Maria |
|
2015 |
46 |
C |
p. 1325-1332 |
artikel |
121 |
Handover Efficiency Improvement in Proxy Mobile IPv6(PMIPv6) Networks
|
Ahmad, Asiya |
|
2015 |
46 |
C |
p. 1064-1071 |
artikel |
122 |
Hardware Efficient Parallel Substitution Box for Block Ciphers with Static and Dynamic Properties
|
Jithendra, K.B. |
|
2015 |
46 |
C |
p. 540-547 |
artikel |
123 |
High Throughput MAC Protocol Using Sequential Collision Resolution and Outband Signalling
|
Preetha, P. |
|
2015 |
46 |
C |
p. 1116-1125 |
artikel |
124 |
Hybrid Approach for Emotion Classification of Audio Conversation Based on Text and Speech Mining
|
Bhaskar, Jasmine |
|
2015 |
46 |
C |
p. 635-643 |
artikel |
125 |
Identifying Knowledge Indicators in Higher Education Organization
|
Gupta, Preeti |
|
2015 |
46 |
C |
p. 449-456 |
artikel |
126 |
Identity of User Thrashing and Privacy Protection of Fingerprints
|
Reshma, K.V. |
|
2015 |
46 |
C |
p. 652-659 |
artikel |
127 |
Image Authentication by Content Preserving Robust Image Hashing Using Local and Global Features
|
Sebastian, Lima S. |
|
2015 |
46 |
C |
p. 1554-1560 |
artikel |
128 |
Image Compression Using SPIHT with Modified Spatial Orientation Trees
|
Rema, N.R. |
|
2015 |
46 |
C |
p. 1732-1738 |
artikel |
129 |
Image Denoising Using Multiresolution Singular Value Decomposition Transform
|
Malini, S. |
|
2015 |
46 |
C |
p. 1708-1715 |
artikel |
130 |
Image Processing Based Detection of Fungal Diseases in Plants
|
Pujari, Jagadeesh D. |
|
2015 |
46 |
C |
p. 1802-1808 |
artikel |
131 |
Image Watermarking Using Diffie Hellman Key Exchange Algorithm
|
Aparna, J.R. |
|
2015 |
46 |
C |
p. 1684-1691 |
artikel |
132 |
Impact of Primary User Duty Cycle in Generalized Fading Channels on Spectrum Sensing in Cognitive Radio
|
Kumar, Vaibhav |
|
2015 |
46 |
C |
p. 1196-1202 |
artikel |
133 |
Implementation of CDMA in GNU Radio
|
Kavitha, P. |
|
2015 |
46 |
C |
p. 981-988 |
artikel |
134 |
Implementation of KDL Inverse Kinematics Routine on the Atlas Humanoid Robot
|
Khokar, Karan |
|
2015 |
46 |
C |
p. 1441-1448 |
artikel |
135 |
Improved Segmentation of Suspicious Regions of Masses in Mammograms by Watershed Transform
|
Anuradha, P.V. |
|
2015 |
46 |
C |
p. 1483-1490 |
artikel |
136 |
Improving Performance of Text Summarization
|
Babar, S.A. |
|
2015 |
46 |
C |
p. 354-363 |
artikel |
137 |
Improving the Performance of a Proxy Cache Using Tree Augmented Naive Bayes Classifier
|
Benadit, P. Julian |
|
2015 |
46 |
C |
p. 184-193 |
artikel |
138 |
Improving the Routing Performance of Mobile Ad hoc Networks Using Domination Set
|
Preetha, K.G. |
|
2015 |
46 |
C |
p. 1209-1215 |
artikel |
139 |
Improvised Apriori Algorithm Using Frequent Pattern Tree for Real Time Applications in Data Mining
|
Bhandari, Akshita |
|
2015 |
46 |
C |
p. 644-651 |
artikel |
140 |
Integrated Static and Dynamic Analysis for Malware Detection
|
Shijo, P.V. |
|
2015 |
46 |
C |
p. 804-811 |
artikel |
141 |
Investigation of Feature Selection Methods for Android Malware Analysis
|
Deepa, K. |
|
2015 |
46 |
C |
p. 841-848 |
artikel |
142 |
Keyword Based Tweet Extraction and Detection of Related Topics
|
Benny, Amrutha |
|
2015 |
46 |
C |
p. 364-371 |
artikel |
143 |
Labeling of Web Search Result Clusters Using Heuristic Search and Frequent Itemset
|
Alam, Mansaf |
|
2015 |
46 |
C |
p. 216-222 |
artikel |
144 |
Low Leakage and High Performance tag Comparator Implemented in 180nm CMOS Technology
|
Koshy, Lidiya Mariam |
|
2015 |
46 |
C |
p. 1261-1267 |
artikel |
145 |
Measurement of Package-changeability by Mining Change-history
|
Parashar, Anshu |
|
2015 |
46 |
C |
p. 443-448 |
artikel |
146 |
Measurement of Soil Moisture Content at Microwave Frequencies
|
Mohan, R. Rajesh |
|
2015 |
46 |
C |
p. 1238-1245 |
artikel |
147 |
Metaheuristic Algorithms and Polynomial Turing Reductions: A Case Study Based on Ant Colony Optimization
|
Prakasam, Anandkumar |
|
2015 |
46 |
C |
p. 388-395 |
artikel |
148 |
Model Based Distributed Testing of Object Oriented Programs
|
Kumar, K.S. Vipin |
|
2015 |
46 |
C |
p. 859-866 |
artikel |
149 |
Multimodal Face Recognition System Using Spectral Transformation of 2D Texture Feature and Statistical Processing of Face Range Images
|
Naveen, S. |
|
2015 |
46 |
C |
p. 1537-1545 |
artikel |
150 |
Multiple Classifier System for Offline Malayalam Character Recognition
|
Chacko, Anitha Mary M.O. |
|
2015 |
46 |
C |
p. 86-92 |
artikel |
151 |
Multi-source Energy Harvesting System for Underwater Wireless Sensor Networks
|
Srujana, B. Sai |
|
2015 |
46 |
C |
p. 1041-1048 |
artikel |
152 |
Music Information Retrieval for Polyphonic Signals Using Hidden Markov Model
|
Chithra, S. |
|
2015 |
46 |
C |
p. 381-387 |
artikel |
153 |
Natural Computation for Optimal Scheduling with ILP Modeling in High Level Synthesis
|
Shilpa, K.C. |
|
2015 |
46 |
C |
p. 167-175 |
artikel |
154 |
NOLE: An AOM Weaver for Aspect Oriented Modeling of Real-time System
|
Machta, Naoufel |
|
2015 |
46 |
C |
p. 742-748 |
artikel |
155 |
Online and Offline Signature Verification: A Combined Approach
|
Radhika, K.S. |
|
2015 |
46 |
C |
p. 1593-1600 |
artikel |
156 |
Ontology-based Document Mining System for IT Support Service
|
Shanavas, Niloofer |
|
2015 |
46 |
C |
p. 329-336 |
artikel |
157 |
Open Issues in Software Defect Prediction
|
Arora, Ishani |
|
2015 |
46 |
C |
p. 906-912 |
artikel |
158 |
Overloading Prediction in Symmetric Cross Coupled Low-Pass Sigma Delta Modulators
|
Sabarinath, |
|
2015 |
46 |
C |
p. 1223-1229 |
artikel |
159 |
Paragraph Ranking Based on Eigen Analysis
|
Reshma, O.K. |
|
2015 |
46 |
C |
p. 532-539 |
artikel |
160 |
Parallel for Loop and Parallel Reduction: An SMP Comparison of four Languages
|
Paul, Tomsy |
|
2015 |
46 |
C |
p. 900-905 |
artikel |
161 |
Parameter Value Optimization of Ad-hoc on Demand Multipath Distance Vector Routing Using Particle Swarm Optimization
|
Lobiyal, D.K. |
|
2015 |
46 |
C |
p. 151-158 |
artikel |
162 |
Particle Swarm Optimization over Back Propagation Neural Network for Length of Stay Prediction
|
Suresh, Abhijit |
|
2015 |
46 |
C |
p. 268-275 |
artikel |
163 |
Path Generation for Robot Navigation using a Single Camera
|
Deepu, R. |
|
2015 |
46 |
C |
p. 1425-1432 |
artikel |
164 |
Pattern Extraction in Segmented Satellite Images By Reducing Semantic Gap Using Relevance Feedback Mechanism
|
Deepika, N.P. |
|
2015 |
46 |
C |
p. 1809-1816 |
artikel |
165 |
Performance Analysis of Support Vector Machine and Neural Networks in Detection of Myocardial Infarction
|
Bhaskar, Nitin Aji |
|
2015 |
46 |
C |
p. 20-30 |
artikel |
166 |
Performance Comparison of Variational Mode Decomposition over Empirical Wavelet Transform for the Classification of Power Quality Disturbances Using Support Vector Machine
|
Aneesh, C. |
|
2015 |
46 |
C |
p. 372-380 |
artikel |
167 |
Performance Evaluation of Different Routing Protocols in IPv4 and IPv6 Networks on the Basis of Packet Sizes
|
Chauhan, Dipti |
|
2015 |
46 |
C |
p. 1072-1078 |
artikel |
168 |
Performance Evaluation of Survivable Fiber-Wireless (FiWi) Access Network
|
Bhatt, Uma Rathore |
|
2015 |
46 |
C |
p. 1049-1055 |
artikel |
169 |
Performance Improvement of ALU using D3L Logic
|
Raj, Ancy J. |
|
2015 |
46 |
C |
p. 1341-1348 |
artikel |
170 |
Performance of Clock Mesh Under Dynamic Voltage and Frequency Scaling
|
Harsha, P. |
|
2015 |
46 |
C |
p. 1433-1440 |
artikel |
171 |
Pixel and Edge Based Illuminant Color Estimation for Image Forgery Detection
|
Youseph, Shahana N. |
|
2015 |
46 |
C |
p. 1635-1642 |
artikel |
172 |
Plagiarism Detection for Java Programs without Source Codes
|
Anjali, V. |
|
2015 |
46 |
C |
p. 749-758 |
artikel |
173 |
Plan Restructuring in Multi Agent Planning
|
Chouhan, Satyendra Singh |
|
2015 |
46 |
C |
p. 396-401 |
artikel |
174 |
Power-aware Design of Logarithmic Prefix Adders in Sub-threshold Regime: A Comparative Analysis
|
Gupta, Priya |
|
2015 |
46 |
C |
p. 1401-1408 |
artikel |
175 |
Preserving Core Components of Object-oriented Packages while Maintaining Structural Quality
|
Amarjeet, |
|
2015 |
46 |
C |
p. 833-840 |
artikel |
176 |
Programming Smart Environments Using π-calculus
|
Lekshmy, V. Geetha |
|
2015 |
46 |
C |
p. 884-891 |
artikel |
177 |
Prostate Disease Diagnosis from CT Images Using GA Optimized SMRT Based Texture Features
|
Manju, B. |
|
2015 |
46 |
C |
p. 1692-1699 |
artikel |
178 |
Quantitative Evaluation of Big Data Categorical Variables through R
|
Pandey, Rajiv |
|
2015 |
46 |
C |
p. 582-588 |
artikel |
179 |
Quantitative Trait Specific Differential Expression (qtDE)
|
Sarkar, Mrityunjay |
|
2015 |
46 |
C |
p. 706-718 |
artikel |
180 |
Random Forest and Stochastic Gradient Tree Boosting Based Approach for the Prediction of Airfoil Self-noise
|
Patri, Ashutosh |
|
2015 |
46 |
C |
p. 109-121 |
artikel |
181 |
RC4 Encryption-A Literature Survey
|
Jindal, Poonam |
|
2015 |
46 |
C |
p. 697-705 |
artikel |
182 |
Real Time Copyright Protection and Implementation of Image and Video Processing on Android and Embedded Platforms
|
Hashmi, Mohammad Farukh |
|
2015 |
46 |
C |
p. 1626-1634 |
artikel |
183 |
Reinforcement Learning in Adaptive Control of Power System Generation
|
Raju, Leo |
|
2015 |
46 |
C |
p. 202-209 |
artikel |
184 |
Reliability Evaluation of Mobile Ad Hoc Network: With and without Mobility Considerations
|
Padmavathy, N. |
|
2015 |
46 |
C |
p. 1126-1139 |
artikel |
185 |
RETRACTED: Automated Irrigation by an ANN Controller
|
Poyen, Faruk Bin |
|
2015 |
46 |
C |
p. 257-267 |
artikel |
186 |
Retrieval of Flower Based on Sketches
|
Kumar, Y.H. Sharath |
|
2015 |
46 |
C |
p. 1577-1584 |
artikel |
187 |
Revisiting Major Discoveries in Linguistic Geometry with Mosaic Reasoning
|
Stilman, Boris |
|
2015 |
46 |
C |
p. 784-793 |
artikel |
188 |
RGB-D Face Recognition System Verification Using Kinect and FRAV3D Databases
|
Krishnan, Poornima |
|
2015 |
46 |
C |
p. 1653-1660 |
artikel |
189 |
RGB Histogram Based Color Image Segmentation Using Firefly Algorithm
|
Rajinikanth, V. |
|
2015 |
46 |
C |
p. 1449-1457 |
artikel |
190 |
Robust and Invisible Image Watermarking in RGB Color Space Using SVD
|
Vaishnavi, D. |
|
2015 |
46 |
C |
p. 1770-1777 |
artikel |
191 |
Robust Cheat-prevention for Random Grids Based Visual Secret Sharing Scheme
|
Mishra, Sonu K. |
|
2015 |
46 |
C |
p. 517-523 |
artikel |
192 |
Role of Semantic Relations in Hindi Word Sense Disambiguation
|
Singh, Satyendr |
|
2015 |
46 |
C |
p. 240-248 |
artikel |
193 |
Routing Using Trust Based System with SHA-2 Authentication
|
Ravilla, Dilli |
|
2015 |
46 |
C |
p. 1108-1115 |
artikel |
194 |
Sampling Period Selection of Control Application Connected to FlexRay Bus
|
Kumar, P.R. Sunil |
|
2015 |
46 |
C |
p. 1357-1364 |
artikel |
195 |
Secure and Fault Tolerant Dynamic Cluster Head Selection Method for Wireless Sensor Networks
|
Virmani, Deepali |
|
2015 |
46 |
C |
p. 989-996 |
artikel |
196 |
Secured Temporal Log Management Techniques for Cloud
|
Muthurajkumar, S. |
|
2015 |
46 |
C |
p. 589-595 |
artikel |
197 |
Selective Cache Line Replication Scheme in Shared Last Level Cache
|
Chaturvedi, Nitin |
|
2015 |
46 |
C |
p. 1095-1107 |
artikel |
198 |
Single Image Haze Removal Using White Balancing and Saliency Map
|
Ansia, S. |
|
2015 |
46 |
C |
p. 12-19 |
artikel |
199 |
Single Image Super Resolution from Compressive Samples Using Two Level Sparsity Based Reconstruction
|
Nath, Aneesh G. |
|
2015 |
46 |
C |
p. 1643-1652 |
artikel |
200 |
Smart Phone Based Data Mining for Human Activity Recognition
|
Chetty, Girija |
|
2015 |
46 |
C |
p. 1181-1187 |
artikel |
201 |
Software Test Automation: An Algorithm for Solving System Management Automation Problems
|
Rauf, E.M. Abdul |
|
2015 |
46 |
C |
p. 949-956 |
artikel |
202 |
Spatial Preprocessing Based Multinomial Logistic Regression for Hyperspectral Image Classification
|
Prabhakar, T.V. Nidhin |
|
2015 |
46 |
C |
p. 1817-1826 |
artikel |
203 |
Spike Detection of Disturbed Power Signal Using VMD
|
Viswanath, Amitha |
|
2015 |
46 |
C |
p. 1087-1094 |
artikel |
204 |
Spyware Detection in Android Using Hybridization of Description Analysis, Permission Mapping and Interface Analysis
|
Kaur, Parmjit |
|
2015 |
46 |
C |
p. 794-803 |
artikel |
205 |
Structural Similarity Detection Using Structure of Control Statements
|
Sudhamani, M. |
|
2015 |
46 |
C |
p. 892-899 |
artikel |
206 |
Summarizing User Opinions: A Method for Labeled-data Scarce Product Domains
|
Kurian, Neethu |
|
2015 |
46 |
C |
p. 93-100 |
artikel |
207 |
Synthesis of Reconfigurable Video Compression Modules in Virtex FPGAs for Multiple Fault Repair Mechanism
|
Baby, Neena |
|
2015 |
46 |
C |
p. 1333-1340 |
artikel |
208 |
Synthesize of High Speed Floating-point Multipliers Based on Vedic Mathematics
|
Anjana, S. |
|
2015 |
46 |
C |
p. 1294-1302 |
artikel |
209 |
Techniques to Enhance the Quality of Service of Multi Hop Relay Networks
|
Arthi, M. |
|
2015 |
46 |
C |
p. 973-980 |
artikel |
210 |
T-GEN: A Tabu Search Based Genetic Algorithm for the Automatic Playlist Generation Problem
|
Antony, Sneha |
|
2015 |
46 |
C |
p. 409-416 |
artikel |
211 |
The Interplay between Requirements Relationships Knowledge and Requirements Change towards Software Project Success: An Assessment Using Partial Least Square (PLS)
|
Aziz, Ruhaya Ab. |
|
2015 |
46 |
C |
p. 732-741 |
artikel |
212 |
2TierCoCS: A Two-tier Cooperative Caching Scheme for Internet-based Vehicular ad Hoc Networks
|
Parvathy, P.R. |
|
2015 |
46 |
C |
p. 1079-1086 |
artikel |
213 |
Towards Faster Spectrum Sensing Techniques in Cognitive Radio Architectures
|
Munjuluri, Srikanth |
|
2015 |
46 |
C |
p. 1156-1163 |
artikel |
214 |
Trust Based Stock Recommendation System – A Social Network Analysis Approach
|
Sankar, C. Prem |
|
2015 |
46 |
C |
p. 299-305 |
artikel |
215 |
Two Dimensional Finite Volume Model to Study the Effect of ER on Cytosolic Calcium Distribution in Astrocytes
|
Jha, Brajesh Kumar |
|
2015 |
46 |
C |
p. 1285-1293 |
artikel |
216 |
Understanding the Usage of Online Forums as Learning Platforms
|
Rekha, V. Smrithi |
|
2015 |
46 |
C |
p. 499-506 |
artikel |
217 |
Unsupervised Speech Segregation Using Pitch Information and Time Frequency Masking
|
Lekshmi, M.S. |
|
2015 |
46 |
C |
p. 122-126 |
artikel |
218 |
Use of Gradient Technique for Extracting Features from Handwritten Gurmukhi Characters and Numerals
|
Aggarwal, Ashutosh |
|
2015 |
46 |
C |
p. 1716-1723 |
artikel |
219 |
Using Brain Computer Interface for Synthesized Speech Communication for the Physically Disabled
|
Soman, Sumit |
|
2015 |
46 |
C |
p. 292-298 |
artikel |
220 |
VANET Based Vehicle Tracking Module for Safe and Efficient Road Transportation System
|
Sumayya, P.A. |
|
2015 |
46 |
C |
p. 1173-1180 |
artikel |
221 |
Vertex Cover Algorithm Based Multi-document Summarization Using Information Content of Sentences
|
John, Ansamma |
|
2015 |
46 |
C |
p. 285-291 |
artikel |
222 |
Vision Based Pedestrian Detection for Advanced Driver assistance
|
Gaikwad, Vijay |
|
2015 |
46 |
C |
p. 321-328 |
artikel |
223 |
Visualization of Nuclear and other Non-commercial Materials Using Megavoltage X-ray Technology
|
Mandava, Ajay K. |
|
2015 |
46 |
C |
p. 1268-1273 |
artikel |
224 |
Voltage Stability by Reactive Power Rescheduling Using PSO Algorithm
|
Rajalakshmy, S. |
|
2015 |
46 |
C |
p. 1377-1384 |
artikel |
225 |
Wavelet Sub Band Entropy Based Feature Extraction Method for BCI
|
Sankar, A. Siva |
|
2015 |
46 |
C |
p. 1476-1482 |
artikel |
226 |
XML URL Classification Based on their Semantic Structure Orientation for Web Mining Applications
|
Murthy, A. Krishna |
|
2015 |
46 |
C |
p. 143-150 |
artikel |