nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A Context-aware Task Scheduling in Ad-hoc Desktop Grids
|
Venkataraman, Neelanarayanan |
|
2015 |
50 |
C |
p. 653-662 10 p. |
artikel |
2 |
Adaptive Utility-based Anonymization Model: Performance Evaluation on Big Data Sets
|
Panackal, Jisha Jose |
|
2015 |
50 |
C |
p. 347-352 6 p. |
artikel |
3 |
Advertisement Posting Based on Consumer Behaviour
|
Ragunathan, Thirumalaisamy |
|
2015 |
50 |
C |
p. 329-334 6 p. |
artikel |
4 |
Allocation-aware Task Scheduling for Heterogeneous Multi-cloud Systems
|
Panda, Sanjaya K. |
|
2015 |
50 |
C |
p. 176-184 9 p. |
artikel |
5 |
Analysis and Design of Selenium WebDriver Automation Testing Framework
|
Gojare, Satish |
|
2015 |
50 |
C |
p. 341-346 6 p. |
artikel |
6 |
Analytical Hierarchy Process to Recommend an Ice Cream to a Diabetic Patient Based on Sugar Content in it
|
Gaikwad, Suhas Machhindra |
|
2015 |
50 |
C |
p. 64-72 9 p. |
artikel |
7 |
An Efficient Association Rule Based Clustering of XML Documents
|
Muralidhar, A. |
|
2015 |
50 |
C |
p. 401-407 7 p. |
artikel |
8 |
An Efficient Job Scheduling in Isometric HPCLOUD Using ZBLA Optimization
|
Miriam, D. Doreen Hephzibah |
|
2015 |
50 |
C |
p. 307-315 9 p. |
artikel |
9 |
An Enhanced DACHE Model for the MapReduce Environment
|
Sangavi, S. |
|
2015 |
50 |
C |
p. 579-584 6 p. |
artikel |
10 |
An Enterprise Oriented View on the Cloud Integration Approaches – Hybrid Cloud and Big Data
|
Palanimalai, Shanmugasundaram |
|
2015 |
50 |
C |
p. 163-168 6 p. |
artikel |
11 |
An Extended Trust Management Scheme for Location Based Real-time Service Composition in Secure Cloud Computing
|
Bharathi, C. |
|
2015 |
50 |
C |
p. 103-108 6 p. |
artikel |
12 |
An In-depth Analysis and Study of Load Balancing Techniques in the Cloud Computing Environment
|
Gopinath, P.P. Geethu |
|
2015 |
50 |
C |
p. 427-432 6 p. |
artikel |
13 |
An Innovative App with for Location Finding with Augmented Reality Using CLOUD
|
sundaram, V. Meenakshi |
|
2015 |
50 |
C |
p. 585-589 5 p. |
artikel |
14 |
An Optimistic Approach for Data Retrieval in Vehicular Adhoc Networks
|
Navaneethan, C. |
|
2015 |
50 |
C |
p. 380-387 8 p. |
artikel |
15 |
A Novel Approach for Replica Synchronization in Hadoop Distributed File Systems
|
Vini, Miss. J. |
|
2015 |
50 |
C |
p. 590-595 6 p. |
artikel |
16 |
A Novel Approach to Address Interoperability Concern in Cloud Computing
|
Arunkumar, G. |
|
2015 |
50 |
C |
p. 554-559 6 p. |
artikel |
17 |
A Novel Feature Selection Technique for Improved Survivability Diagnosis of Breast Cancer
|
Sasikala, S. |
|
2015 |
50 |
C |
p. 16-23 8 p. |
artikel |
18 |
A Secure and Light Weight Authentication Service in Hadoop using One Time Pad
|
Sarvabhatla, Mrudula |
|
2015 |
50 |
C |
p. 81-86 6 p. |
artikel |
19 |
A Survey of Big Data Analytics in Healthcare and Government
|
Archenaa, J. |
|
2015 |
50 |
C |
p. 408-413 6 p. |
artikel |
20 |
Automated Menu Planning Algorithm for Children: Food Recommendation by Dietary Management System using ID3 for Indian Food Database
|
Kale, Ashvini |
|
2015 |
50 |
C |
p. 197-202 6 p. |
artikel |
21 |
Automated Message Filtering System in Online Social Network
|
Subramaniyaswamy, V. |
|
2015 |
50 |
C |
p. 466-475 10 p. |
artikel |
22 |
Big Data and Hadoop-a Study in Security Perspective
|
Saraladevi, B. |
|
2015 |
50 |
C |
p. 596-601 6 p. |
artikel |
23 |
Big Data Parallelism: Issues in different X-Information Paradigms
|
Mondal, Koushik |
|
2015 |
50 |
C |
p. 395-400 6 p. |
artikel |
24 |
Big Data Security Issues Based on Quantum Cryptography and Privacy with Authentication for Mobile Data Center
|
Thayananthan, Vijey |
|
2015 |
50 |
C |
p. 149-156 8 p. |
artikel |
25 |
Brain Image Classification Using Learning Machine Approach and Brain Structure Analysis
|
Veeramuthu, A. |
|
2015 |
50 |
C |
p. 388-394 7 p. |
artikel |
26 |
Building an Authentication and Quality of Query Services in the Cloud
|
Sunitha, J. |
|
2015 |
50 |
C |
p. 122-127 6 p. |
artikel |
27 |
Cloud Architecture for the Logistics Business
|
Niharika, Garg |
|
2015 |
50 |
C |
p. 414-420 7 p. |
artikel |
28 |
Cloud Based Big Data Analytics Framework for Face Recognition in Social Networks Using Machine Learning
|
Vinay, A. |
|
2015 |
50 |
C |
p. 623-630 8 p. |
artikel |
29 |
Cloud Based Fuzzy Healthcare System
|
Sundharakumar, K.B. |
|
2015 |
50 |
C |
p. 143-148 6 p. |
artikel |
30 |
Cloud Based Intelligent Transport System
|
Ashokkumar, K. |
|
2015 |
50 |
C |
p. 58-63 6 p. |
artikel |
31 |
Cloud Computing and Inter-Clouds – Types, Topologies and Research Issues
|
Rani, B. Kezia |
|
2015 |
50 |
C |
p. 24-29 6 p. |
artikel |
32 |
Cloud Testing Tools and its Challenges: A Comparative Study
|
Nachiyappan, S. |
|
2015 |
50 |
C |
p. 482-489 8 p. |
artikel |
33 |
Cluster Based Outlier Detection Algorithm for Healthcare Data
|
Christy, A. |
|
2015 |
50 |
C |
p. 209-215 7 p. |
artikel |
34 |
Comparative Study on Non-delay Tolerant Routing Protocols in Vehicular Networks
|
Balasubramani, |
|
2015 |
50 |
C |
p. 252-257 6 p. |
artikel |
35 |
Conceptual Graph Representation Framework for ICD-10
|
Hema, N. |
|
2015 |
50 |
C |
p. 635-642 8 p. |
artikel |
36 |
Content Based Image Retrieval Using Colour Strings Comparison
|
Jenni, Kommineni |
|
2015 |
50 |
C |
p. 374-379 6 p. |
artikel |
37 |
Contents
|
|
|
2015 |
50 |
C |
p. iii-vi nvt p. |
artikel |
38 |
Conversation of Sign Language to Speech with Human Gestures
|
Rajaganapathy, S. |
|
2015 |
50 |
C |
p. 10-15 6 p. |
artikel |
39 |
DDoS Attack Detection Using Fast Entropy Approach on Flow- Based Network Traffic
|
David, Jisa |
|
2015 |
50 |
C |
p. 30-36 7 p. |
artikel |
40 |
Design and Analysis of a Vacation Model for Two-phase Queueing System with Gated Service
|
Ramya, K. |
|
2015 |
50 |
C |
p. 301-306 6 p. |
artikel |
41 |
Designing a Cloud Based Framework for HealthCare System and Applying Clustering Techniques for Region Wise Diagnosis
|
Parekh, Maulik |
|
2015 |
50 |
C |
p. 537-542 6 p. |
artikel |
42 |
Detection and Prevention System towards the Truth of Convergence on Decision Using Aumann Agreement Theorem
|
Poongodi, M. |
|
2015 |
50 |
C |
p. 244-251 8 p. |
artikel |
43 |
Dynamic Preclusion of Encroachment in Hadoop Distributed File System
|
Saranya, S. |
|
2015 |
50 |
C |
p. 531-536 6 p. |
artikel |
44 |
Editorial - Preface
|
Vijayakumar, V. |
|
2015 |
50 |
C |
p. 1-2 2 p. |
artikel |
45 |
E3: Effective Emoticon Extractor for Behavior Analysis from Social Media
|
Mahajan, Chetan |
|
2015 |
50 |
C |
p. 610-616 7 p. |
artikel |
46 |
Efficient Scheduling Algorithm for Cloud
|
Madhukar, Ellendula |
|
2015 |
50 |
C |
p. 353-356 4 p. |
artikel |
47 |
Era of Cloud Computing: A New Insight to Hybrid Cloud
|
Srinivasan, Aishwarya |
|
2015 |
50 |
C |
p. 42-51 10 p. |
artikel |
48 |
Experiencing Company's Popularity and Finding Correlation between Companies in Various Countries Using Facebook's Insight Data
|
Hothi, Harish |
|
2015 |
50 |
C |
p. 433-439 7 p. |
artikel |
49 |
Exporting Files into Cloud Using Gestures in Hand Held Devices-an Intelligent Attempt
|
Karthick, M. |
|
2015 |
50 |
C |
p. 258-263 6 p. |
artikel |
50 |
Feature Selection of Gene Expression Data for Cancer Classification: A Review
|
Singh, Rabindra Kumar |
|
2015 |
50 |
C |
p. 52-57 6 p. |
artikel |
51 |
Framework for Platform Agnostic Enterprise Application Development Supporting Multiple Clouds
|
Vijaya, Aparna |
|
2015 |
50 |
C |
p. 73-80 8 p. |
artikel |
52 |
Fuzzy Based Intrusion Detection Systems in MANET
|
Balan, E. Vishnu |
|
2015 |
50 |
C |
p. 109-114 6 p. |
artikel |
53 |
Health Monitoring System by Prognotive Computing Using Big Data Analytics
|
Srivathsan, M. |
|
2015 |
50 |
C |
p. 602-609 8 p. |
artikel |
54 |
Hybrid Cloud for Educational Sector
|
Srinivasan, Aishwarya |
|
2015 |
50 |
C |
p. 37-41 5 p. |
artikel |
55 |
Hybrid Fuzzy-ontology Design Using FCA Based Clustering for Information Retrieval in Semantic Web
|
Balasubramaniam, K. |
|
2015 |
50 |
C |
p. 135-142 8 p. |
artikel |
56 |
Impact of Big Data Analytics on Banking Sector: Learning for Indian Banks
|
Srivastava, Utkarsh |
|
2015 |
50 |
C |
p. 643-652 10 p. |
artikel |
57 |
Improving the Enhanced Recommended System Using Bayesian Approximation Method and Normalized Discounted Cumulative Gain
|
Jayashree, R. |
|
2015 |
50 |
C |
p. 216-222 7 p. |
artikel |
58 |
Intelligent Travel Recommendation System by Mining Attributes from Community Contributed Photos
|
Subramaniyaswamy, V. |
|
2015 |
50 |
C |
p. 447-455 9 p. |
artikel |
59 |
Intelligent Vehicle Monitoring Using Global Positioning System and Cloud Computing
|
Jose, Dimil |
|
2015 |
50 |
C |
p. 440-446 7 p. |
artikel |
60 |
IPTV Software Process and Workflow
|
Kalbandi, Ishwarappa |
|
2015 |
50 |
C |
p. 128-134 7 p. |
artikel |
61 |
ITTS: Intelligent Transport and Tourism System
|
Ragunathan, Thirumalaisamy |
|
2015 |
50 |
C |
p. 191-196 6 p. |
artikel |
62 |
Keyword Prediction with ARM on Bibliographic RDF Data
|
Kushwaha, Nidhi |
|
2015 |
50 |
C |
p. 490-495 6 p. |
artikel |
63 |
Machine Learning Approach to the Prediction of Surface Roughness Using Statistical Features of Vibration Signal Acquired in Turning
|
Elangovan, M. |
|
2015 |
50 |
C |
p. 282-288 7 p. |
artikel |
64 |
Minimize Search Time through Gender Classification from Multimodal Biometrics
|
Prabhu, G. |
|
2015 |
50 |
C |
p. 289-294 6 p. |
artikel |
65 |
Modifying Security Policies Towards BYOD
|
Vignesh, U. |
|
2015 |
50 |
C |
p. 511-516 6 p. |
artikel |
66 |
Monitoring Driver Head Postures to Control Risks of Accidents
|
Meshram, Pranoti |
|
2015 |
50 |
C |
p. 617-622 6 p. |
artikel |
67 |
Novel Read Algorithms for Improving the Performance of Big Data Storage Systems
|
Ragunathan, Thirumalaisamy |
|
2015 |
50 |
C |
p. 264-269 6 p. |
artikel |
68 |
Online Interactive Data Mining Tool
|
Borhade, Mahesh |
|
2015 |
50 |
C |
p. 335-340 6 p. |
artikel |
69 |
Ontology Based Public Healthcare System in Internet of Things (IoT)
|
Abinaya, |
|
2015 |
50 |
C |
p. 99-102 4 p. |
artikel |
70 |
On Uniform Traffic Pattern of Symmetric Midimew Connected Mesh Network
|
Hag, Ala Ahmed Yahya |
|
2015 |
50 |
C |
p. 476-481 6 p. |
artikel |
71 |
Performance and Quality Assessment of Similarity Measures in Collaborative Filtering Using Mahout
|
Bagchi, Saikat |
|
2015 |
50 |
C |
p. 229-234 6 p. |
artikel |
72 |
Performance Improvement of MapReduce Framework in Heterogeneous Context using Reinforcement Learning
|
Naik, Nenavath Srinivas |
|
2015 |
50 |
C |
p. 169-175 7 p. |
artikel |
73 |
Person Counting System Using EFV Segmentation and Fuzzy Logic
|
Sivabalakrishnan, M. |
|
2015 |
50 |
C |
p. 572-578 7 p. |
artikel |
74 |
Predictive Methodology for Diabetic Data Analysis in Big Data
|
kumar, N.M. Saravana |
|
2015 |
50 |
C |
p. 203-208 6 p. |
artikel |
75 |
Preserving Data Confidentiality Using Multi-cloud Architecture
|
Sulochana, M. |
|
2015 |
50 |
C |
p. 357-362 6 p. |
artikel |
76 |
Progonosis and Modelling of Breast Cancer and its Growth Novel Naive Bayes
|
Durgalakshmi, B. |
|
2015 |
50 |
C |
p. 551-553 3 p. |
artikel |
77 |
Reachability Based Web Page Ranking Using Wavelets
|
Hariharan, S. |
|
2015 |
50 |
C |
p. 157-162 6 p. |
artikel |
78 |
Reducing Semantic Gap in Video Retrieval with Fusion: A Survey
|
Sudha, D. |
|
2015 |
50 |
C |
p. 496-502 7 p. |
artikel |
79 |
Rendering-as-a-Service: Taxonomy and Comparison
|
Annette, J. Ruby |
|
2015 |
50 |
C |
p. 276-281 6 p. |
artikel |
80 |
Review on Cloud Computing Application in P2P Video Streaming
|
Wahid, Nur Wahidah Bt Ab |
|
2015 |
50 |
C |
p. 185-190 6 p. |
artikel |
81 |
Scalable Privacy Preservation in Big Data a Survey
|
Vennila, S. |
|
2015 |
50 |
C |
p. 369-373 5 p. |
artikel |
82 |
Securing Multi-cloud Using Secret Sharing Algorithm
|
Muhil, M. |
|
2015 |
50 |
C |
p. 421-426 6 p. |
artikel |
83 |
Segmentation of Tumors from Ultrasound Images with PAORGB
|
Eapena, Ms. Maya |
|
2015 |
50 |
C |
p. 663-668 6 p. |
artikel |
84 |
Survey on Background Modeling and Foreground Detection for Real Time Video Surveillance
|
Jeeva, S. |
|
2015 |
50 |
C |
p. 566-571 6 p. |
artikel |
85 |
Survey on Molecular Cryptographic Network DNA (MCND) Using Big Data
|
Kannadasan, R. |
|
2015 |
50 |
C |
p. 3-9 7 p. |
artikel |
86 |
Survey on Programming Models and Environments for Cluster, Cloud, and Grid Computing that Defends Big Data
|
Jackson, J. Christy |
|
2015 |
50 |
C |
p. 517-523 7 p. |
artikel |
87 |
Survey on Software Project Risks and Big Data Analytics
|
Rekha, J.H. |
|
2015 |
50 |
C |
p. 295-300 6 p. |
artikel |
88 |
Survey on the Key Management for Securing the Cloud
|
Pradeep, K.V. |
|
2015 |
50 |
C |
p. 115-121 7 p. |
artikel |
89 |
Switch Bandwidth Congestion Prediction in Cloud Environment
|
Kuppusamy, Sivakumar |
|
2015 |
50 |
C |
p. 235-243 9 p. |
artikel |
90 |
The k-modes Algorithm with Entropy Based Similarity Coefficient
|
Sangam, Ravi Sankar |
|
2015 |
50 |
C |
p. 93-98 6 p. |
artikel |
91 |
Tool Wear Condition Prediction Using Vibration Signals in High Speed Machining (HSM) of Titanium (Ti-6Al-4V) Alloy
|
Krishnakumar, P. |
|
2015 |
50 |
C |
p. 270-275 6 p. |
artikel |
92 |
Towards a Middleware for Resource Sharing in Collaboration of Pervasive Computing
|
Samydurai, A. |
|
2015 |
50 |
C |
p. 87-92 6 p. |
artikel |
93 |
Towards a Multi-level Upper Ontology/ foundation Ontology Framework as Background Knowledge for Ontology Matching Problem
|
Chauhan, Alok |
|
2015 |
50 |
C |
p. 631-634 4 p. |
artikel |
94 |
Towards an Analysis of Data Accountability and Auditing for Secure Cloud Data Storage
|
Prassanna, J. |
|
2015 |
50 |
C |
p. 543-550 8 p. |
artikel |
95 |
Towards the Development of a Framework for Socially Responsible Software by Analyzing Social Media Big Data on Cloud Through Ontological Engineering
|
Chauhan, Alok |
|
2015 |
50 |
C |
p. 524-530 7 p. |
artikel |
96 |
Unique Sense: Smart Computing Prototype
|
Vijaykumar, S. |
|
2015 |
50 |
C |
p. 223-228 6 p. |
artikel |
97 |
Unstructured Data Analysis on Big Data Using Map Reduce
|
Subramaniyaswamy, V. |
|
2015 |
50 |
C |
p. 456-465 10 p. |
artikel |
98 |
Use of Machine Learning Algorithms for Weld Quality Monitoring using Acoustic Signature
|
Sumesh, A. |
|
2015 |
50 |
C |
p. 316-322 7 p. |
artikel |
99 |
Variant of COBWEB Clustering for Privacy Preservation in Cloud DB Querying
|
Mulani, Nazneen |
|
2015 |
50 |
C |
p. 363-368 6 p. |
artikel |
100 |
Versatile and Economical Acquisition Setup for Dorsa Palm Vein Authentication
|
Poornima, S. |
|
2015 |
50 |
C |
p. 323-328 6 p. |
artikel |
101 |
Video Content Reterival Using Historgram Clustering Technique
|
Saravanan, D. |
|
2015 |
50 |
C |
p. 560-565 6 p. |
artikel |
102 |
Virtualizing Electrical Appliances and Gadgets Input with Human Gestures
|
Aravind, B. |
|
2015 |
50 |
C |
p. 503-510 8 p. |
artikel |