nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Accessing Relevant and Accurate Information using Entropy
|
Kumar, Sarowar |
|
2015 |
54 |
C |
p. 449-455 7 p. |
artikel |
2 |
A Cluster-tree based Data Dissemination Routing Protocol
|
Bagga, Neeraj |
|
2015 |
54 |
C |
p. 7-13 7 p. |
artikel |
3 |
A Computer Vision based Framework for Visual Gun Detection Using Harris Interest Point Detector
|
Tiwari, Rohit Kumar |
|
2015 |
54 |
C |
p. 703-712 10 p. |
artikel |
4 |
A Decision Based Unsymmetrical Trimmed Modified Winsorized Mean Filter for the Removal of High Density Salt and Pepper Noise in Images and Videos
|
Vasanth, K. |
|
2015 |
54 |
C |
p. 595-604 10 p. |
artikel |
5 |
A Green Mechanism Design Approach to Automate Resource Procurement in Cloud
|
Ketankumar, Doshi Chintan |
|
2015 |
54 |
C |
p. 108-117 10 p. |
artikel |
6 |
A Method for QRS Delineation Based on STFT Using Adaptive Threshold
|
Shaik, Basheeruddin Shah |
|
2015 |
54 |
C |
p. 646-653 8 p. |
artikel |
7 |
Analysis of Attention Identification and Recognition of Faces through Segmentation and Relative Visual Saliency (SRVS)
|
Kumar, Ravi Kant |
|
2015 |
54 |
C |
p. 756-763 8 p. |
artikel |
8 |
Analysis of Infrastructure Monitoring Requirements for OpenStack Nova
|
Datt, Aparna |
|
2015 |
54 |
C |
p. 127-136 10 p. |
artikel |
9 |
Analysis of users’ Sentiments from Kannada Web Documents
|
Kumar, K. M. Anil |
|
2015 |
54 |
C |
p. 247-256 10 p. |
artikel |
10 |
An Application of Factor Analysis in the Evaluation of Country Economic Rank
|
Bai, Anita |
|
2015 |
54 |
C |
p. 311-317 7 p. |
artikel |
11 |
An Efficient 256-Tap Parallel FIR Digital Filter Implementation Using Distributed Arithmetic Architecture
|
Nandal, Amita |
|
2015 |
54 |
C |
p. 605-611 7 p. |
artikel |
12 |
An Impact of Linear Regression Models for Improving the Software Quality with Estimated Cost
|
Marandi, Arun Kumar |
|
2015 |
54 |
C |
p. 335-342 8 p. |
artikel |
13 |
A Novel Approach for Breast Cancer Detection and Segmentation in a Mammogram
|
Singh, Anuj Kumar |
|
2015 |
54 |
C |
p. 676-682 7 p. |
artikel |
14 |
A Particle Swarm Approach to Collaborative Filtering based Recommender Systems through Fuzzy Features
|
Wasid, Mohammed |
|
2015 |
54 |
C |
p. 440-448 9 p. |
artikel |
15 |
A Privacy Preserved Data Mining Approach Based on k-Partite Graph Theory
|
Bhat, T. Pranav |
|
2015 |
54 |
C |
p. 422-430 9 p. |
artikel |
16 |
A Probabilistic Software Risk Assessment and Estimation Model for Software Projects
|
Kumar, Chandan |
|
2015 |
54 |
C |
p. 353-361 9 p. |
artikel |
17 |
Artificial Neuro Fuzzy Logic PID Controller based on BF-PSO Algorithm
|
Patel, Rahul |
|
2015 |
54 |
C |
p. 463-471 9 p. |
artikel |
18 |
A Simple Method for Detection of Metamorphic Malware using Dynamic Analysis and Text Mining
|
Choudhary, S.P. |
|
2015 |
54 |
C |
p. 265-270 6 p. |
artikel |
19 |
Blind Content Independent Noise Estimation for Multimedia Applications
|
Sodhani, Pranav |
|
2015 |
54 |
C |
p. 549-557 9 p. |
artikel |
20 |
Choosing Optimal Value for Fuzzy Membership in FCM Algorithm for LP-Residual Input Features
|
Misra, S. |
|
2015 |
54 |
C |
p. 542-548 7 p. |
artikel |
21 |
Closed Item-Set Mining for Prediction of Indian Summer Monsoon Rainfall A Data Mining Model with Land and Ocean Variables as Predictors
|
Vathsala, H. |
|
2015 |
54 |
C |
p. 271-280 10 p. |
artikel |
22 |
Contents
|
|
|
2015 |
54 |
C |
p. iii-vi nvt p. |
artikel |
23 |
Continuous Indian Sign Language Gesture Recognition and Sentence Formation
|
Tripathi, Kumud |
|
2015 |
54 |
C |
p. 523-531 9 p. |
artikel |
24 |
Contriving Hybrid DESCAST Algorithm for Cloud Security
|
Sengupta, Nandita |
|
2015 |
54 |
C |
p. 47-56 10 p. |
artikel |
25 |
Cooperative Spectrum Sensing in Cognitive Radios Using Perceptron Learning for IEEE 802.22 WRAN
|
Balaji, V. |
|
2015 |
54 |
C |
p. 14-23 10 p. |
artikel |
26 |
Cross-Lingual Preposition Disambiguation for Machine Translation
|
Kumar, M. Anand |
|
2015 |
54 |
C |
p. 291-300 10 p. |
artikel |
27 |
Data Analysis using Multidimensional Modeling, Statistical Analysis and Data Mining on Agriculture Parameters
|
Hira, Swati |
|
2015 |
54 |
C |
p. 431-439 9 p. |
artikel |
28 |
3D Face Model Estimation based on Similarity Transform using Differential Evolution Optimization
|
Chandar, K. Punnam |
|
2015 |
54 |
C |
p. 621-630 10 p. |
artikel |
29 |
Dr. Eye: An Android Application to Calculate the Vision Acuity
|
Agarwal, Aakash |
|
2015 |
54 |
C |
p. 697-702 6 p. |
artikel |
30 |
Efficient and Accurate Discovery of Colossal Pattern Sequences from Biological Datasets: A Doubleton Pattern Mining Strategy (DPMine)
|
Prasanna, K. |
|
2015 |
54 |
C |
p. 412-421 10 p. |
artikel |
31 |
Efficient De-noising Performance of a Combined Algorithm of Translation Invariant (TI) Wavelets and Independent Component Analysis over TI Wavelets for Speech-Auditory Brainstem Responses
|
Narayanam, Ranganadh |
|
2015 |
54 |
C |
p. 829-837 9 p. |
artikel |
32 |
Energy Analysis for Trajectory based Sink Mobility in WSN
|
Snigdh, I. |
|
2015 |
54 |
C |
p. 118-126 9 p. |
artikel |
33 |
Enhanced Expressivity using Deontic Logic and Reuse Measure of Ontologies
|
Deborah, L. Jegatha |
|
2015 |
54 |
C |
p. 318-326 9 p. |
artikel |
34 |
Enhancing the Security of MANETs using Hash Algorithms
|
Ravilla, Dilli |
|
2015 |
54 |
C |
p. 196-206 11 p. |
artikel |
35 |
Experimental Studies of LSB Watermarking with Different Noise
|
Singh, Ranjeet Kumar |
|
2015 |
54 |
C |
p. 612-620 9 p. |
artikel |
36 |
Face Recognition using R-KDA with Non-Linear SVM for Multi-View Database
|
Devi, Hidangmayum Saxena |
|
2015 |
54 |
C |
p. 532-541 10 p. |
artikel |
37 |
Factor Histogram based Forgery Localization in Double Compressed JPEG Images
|
Mire, Archana V. |
|
2015 |
54 |
C |
p. 690-696 7 p. |
artikel |
38 |
Fast Rotation Invariant Detection of Region Duplication Attacks Even on Uniform Background Containing Digital Images
|
Singh, Vivek Kumar |
|
2015 |
54 |
C |
p. 772-780 9 p. |
artikel |
39 |
Feature Selection and Classification of Microarray Data using MapReduce based ANOVA and K-Nearest Neighbor
|
Kumar, Mukesh |
|
2015 |
54 |
C |
p. 301-310 10 p. |
artikel |
40 |
Finding Similar Patents through Semantic Query Expansion
|
Sharma, Pawan |
|
2015 |
54 |
C |
p. 390-395 6 p. |
artikel |
41 |
FIVDL: Fingerprint Image Verification using Dictionary Learning
|
Arunalatha, J.S. |
|
2015 |
54 |
C |
p. 482-490 9 p. |
artikel |
42 |
FRDF: Face Recognition Using Fusion of DTCWT and FFT Features
|
Rangaswamy, Y. |
|
2015 |
54 |
C |
p. 809-817 9 p. |
artikel |
43 |
Fusion of Fuzzy Enhanced Overexposed and Underexposed Images
|
Dhingra, Naina |
|
2015 |
54 |
C |
p. 738-745 8 p. |
artikel |
44 |
Fusion of Multi-Sensor Satellite Images Using Non-Subsampled Contourlet Transform
|
Mangalraj, P. |
|
2015 |
54 |
C |
p. 713-720 8 p. |
artikel |
45 |
Gaussian Random Projection Based Non-invertible Cancelable Biometric Templates
|
Kaur, Harkeerat |
|
2015 |
54 |
C |
p. 661-670 10 p. |
artikel |
46 |
Generating Optimal Query Plans for Distributed Query Processing using Teacher-Learner Based Optimization
|
Mishra, Vikash |
|
2015 |
54 |
C |
p. 281-290 10 p. |
artikel |
47 |
Gray and Black Hole Attack Identification Using Control Packets in MANETs
|
Dhaka, Arvind |
|
2015 |
54 |
C |
p. 83-91 9 p. |
artikel |
48 |
Hardware Accelerated Multi-coordinate Viewing Framework for Volumetric Visualization of Large 3D Medical Dataset
|
Kumar, Piyush |
|
2015 |
54 |
C |
p. 566-573 8 p. |
artikel |
49 |
Health Monitoring of Civil Structures with Integrated UAV and Image Processing System
|
Sankarasrinivasan, S. |
|
2015 |
54 |
C |
p. 508-515 8 p. |
artikel |
50 |
Hierarchical Lossless Image Compression for Telemedicine Applications
|
Sumalatha, R. |
|
2015 |
54 |
C |
p. 838-848 11 p. |
artikel |
51 |
Human Computer Interaction using Hand Gesture
|
Sharma, Ram Pratap |
|
2015 |
54 |
C |
p. 721-727 7 p. |
artikel |
52 |
Hybridization of Algorithm for Restoration of Impulse Noise Image
|
Loya, Nilesh |
|
2015 |
54 |
C |
p. 728-737 10 p. |
artikel |
53 |
Image Denoising Using Spatial Gradient Based Bilateral Filter and Minimum Mean Square Error Filtering
|
Tiwari, Mayank |
|
2015 |
54 |
C |
p. 638-645 8 p. |
artikel |
54 |
Image Encryption using Elliptic Curve Cryptography
|
Singh, Laiphrakpam Dolendro |
|
2015 |
54 |
C |
p. 472-481 10 p. |
artikel |
55 |
Image Retrieval: Information and Rough Set Theories
|
Garimella, Rama Murthy |
|
2015 |
54 |
C |
p. 631-637 7 p. |
artikel |
56 |
Image Segmentation Using K -means Clustering Algorithm and Subtractive Clustering Algorithm
|
Dhanachandra, Nameirakpam |
|
2015 |
54 |
C |
p. 764-771 8 p. |
artikel |
57 |
Implementation of Text Encryption using Elliptic Curve Cryptography
|
Singh, Laiphrakpam Dolendro |
|
2015 |
54 |
C |
p. 73-82 10 p. |
artikel |
58 |
Mitigation of Storage Covert Channels in IPSec for QoS Aware Applications
|
Kundu, Arnab |
|
2015 |
54 |
C |
p. 102-107 6 p. |
artikel |
59 |
Mobility Aware Loose Clustering for Mobile Ad hoc Network
|
Neethu, V.V. |
|
2015 |
54 |
C |
p. 57-64 8 p. |
artikel |
60 |
Modified Eigen Vectors Arrangement for Better Representation of Images in Low Dimension
|
Pandey, Shreelekha |
|
2015 |
54 |
C |
p. 683-689 7 p. |
artikel |
61 |
Modified Self Organizing Feature Map Neural Network (MSOFM NN) Based Gray Image Segmentation
|
Upadhyay, Pankaj |
|
2015 |
54 |
C |
p. 671-675 5 p. |
artikel |
62 |
Monitoring of Riak CS Storage Infrastructure
|
Jain, Pragya |
|
2015 |
54 |
C |
p. 137-146 10 p. |
artikel |
63 |
Multi-Label Learning with Class-Based Features Using Extended Centroid-Based Classification Technique (CCBF)
|
Devi, P.R. Suganya |
|
2015 |
54 |
C |
p. 405-411 7 p. |
artikel |
64 |
Multilayer Neuro PID Controller based on Back Propagation Algorithm
|
Patel, Rahul |
|
2015 |
54 |
C |
p. 207-214 8 p. |
artikel |
65 |
Multi-Level Manifolds for Remote Sensing Imagery Classification
|
Mangalraj, P. |
|
2015 |
54 |
C |
p. 654-660 7 p. |
artikel |
66 |
Multiple Transmit Antenna Selection in MIMO-OSTBC System in Nakagami-m Fading Channel
|
Hendre, Vaibhav |
|
2015 |
54 |
C |
p. 558-565 8 p. |
artikel |
67 |
Neural Network Based Human Age-group Estimation in Curvelet Domain
|
Saxena, Aditya K. |
|
2015 |
54 |
C |
p. 781-789 9 p. |
artikel |
68 |
Neuro-Fuzzy Based Hybrid Model for Web Usage Mining
|
Shivaprasad, G. |
|
2015 |
54 |
C |
p. 327-334 8 p. |
artikel |
69 |
New Data Hiding Technique in Encrypted Image: DKL Algorithm (Differing Key Length)
|
Udhayavene, S. |
|
2015 |
54 |
C |
p. 790-798 9 p. |
artikel |
70 |
Noise Reduction using Wavelet Transform and Singular Vector Decomposition
|
Patil, Rajesh |
|
2015 |
54 |
C |
p. 849-853 5 p. |
artikel |
71 |
Numeral Script Identification from Handwritten Document Images
|
Obaidullah, Sk Md |
|
2015 |
54 |
C |
p. 585-594 10 p. |
artikel |
72 |
Occlusion Invariant Palmprint Recognition with ULBP Histograms
|
Tamrakar, Deepti |
|
2015 |
54 |
C |
p. 491-500 10 p. |
artikel |
73 |
Online Touchless Palmprint Registration System in a Dynamic Environment
|
Balwant, Manoj Kumar |
|
2015 |
54 |
C |
p. 799-808 10 p. |
artikel |
74 |
Optimizing Security and Address Configuration in IPv6 SLAAC
|
Shah, Junaid Latief |
|
2015 |
54 |
C |
p. 177-185 9 p. |
artikel |
75 |
Participatory Sensing System in Presence of Multiple Buyers
|
Bhattacharjee, Jaya |
|
2015 |
54 |
C |
p. 237-246 10 p. |
artikel |
76 |
Particle Swarm Optimization Applied to Ascent Phase Launch Vehicle Trajectory Optimization Problem
|
Dileep, M.V. |
|
2015 |
54 |
C |
p. 516-522 7 p. |
artikel |
77 |
Perceptual Subspace Speech Enhancement with Variance Normalization
|
Surendran, Sudeep |
|
2015 |
54 |
C |
p. 818-828 11 p. |
artikel |
78 |
Performance Evaluation of Cloud Services with Profit Optimization
|
Jaiganesh, M. |
|
2015 |
54 |
C |
p. 24-30 7 p. |
artikel |
79 |
PhishShield: A Desktop Application to Detect Phishing Webpages through Heuristic Approach
|
Rao, Routhu Srinivasa |
|
2015 |
54 |
C |
p. 147-156 10 p. |
artikel |
80 |
PIB: Profiling Influential Blogger in Online Social Networks, A Knowledge Driven Data Mining Approach
|
Vasanthakumar, G.U. |
|
2015 |
54 |
C |
p. 362-370 9 p. |
artikel |
81 |
Predicting Financial Distress: A Comparison of Survival Analysis and Decision Tree Techniques
|
Gepp, Adrian |
|
2015 |
54 |
C |
p. 396-404 9 p. |
artikel |
82 |
Preface
|
Venugopal, K.R. |
|
2015 |
54 |
C |
p. 457-462 6 p. |
artikel |
83 |
Preface
|
Venugopal, K.R. |
|
2015 |
54 |
C |
p. 1-6 6 p. |
artikel |
84 |
Preface
|
Venugopal, K.R. |
|
2015 |
54 |
C |
p. 225-230 6 p. |
artikel |
85 |
Prevention of Insider Attacks by Integrating Behavior Analysis with Risk based Access Control Model to Protect Cloud
|
Babu, B. Mahesh |
|
2015 |
54 |
C |
p. 157-166 10 p. |
artikel |
86 |
Quantum Key Distribution Protocol with Four-State Systems – Software Implementation
|
Mogos, Gabriela |
|
2015 |
54 |
C |
p. 65-72 8 p. |
artikel |
87 |
Real Time Strategy Games: A Reinforcement Learning Approach
|
Sethy, Harshit |
|
2015 |
54 |
C |
p. 257-264 8 p. |
artikel |
88 |
Real Time Visibility Enhancement for Single Image Haze Removal
|
Kumari, Apurva |
|
2015 |
54 |
C |
p. 501-507 7 p. |
artikel |
89 |
RETRACTED: Classification of Time Series Data by One Class Classifier Using DTW-D
|
Kumar, Vasimalla |
|
2015 |
54 |
C |
p. 343-352 10 p. |
artikel |
90 |
RFDMRP: River Formation Dynamics based Multi-hop Routing Protocol for Data Collection in Wireless Sensor Networks
|
Guravaiah, Koppala |
|
2015 |
54 |
C |
p. 31-36 6 p. |
artikel |
91 |
RPRDC: Reliable Proliferation Routing with low Duty-cycle in Wireless Sensor Networks
|
Venkatesha, |
|
2015 |
54 |
C |
p. 37-46 10 p. |
artikel |
92 |
Search-Based Object-Oriented Software Re-Structuring with Structural Coupling Strength
|
Amarjeet, |
|
2015 |
54 |
C |
p. 380-389 10 p. |
artikel |
93 |
Selfish Node Detection and Low Cost Data Transmission in MANET using Game Theory
|
Das, Debjit |
|
2015 |
54 |
C |
p. 92-101 10 p. |
artikel |
94 |
Semantic Retrieval of Relevant Sources for Large Scale Virtual Documents
|
Priyadarshini, R. |
|
2015 |
54 |
C |
p. 371-379 9 p. |
artikel |
95 |
Significance of GMM-UBM based Modelling for Indian Language Identification
|
Kumar, V. Ravi |
|
2015 |
54 |
C |
p. 231-236 6 p. |
artikel |
96 |
Speech Enhancement using Spectral Subtraction-type Algorithms: A Comparison and Simulation Study
|
Upadhyay, Navneet |
|
2015 |
54 |
C |
p. 574-584 11 p. |
artikel |
97 |
Traffic Analysis of Vehicular Ad-Hoc Networks of V2I Communication
|
Paul, Mousumi |
|
2015 |
54 |
C |
p. 215-223 9 p. |
artikel |
98 |
Trust Calculation with Ant Colony Optimization in Online Social Networks
|
Sanadhya, Shashvat |
|
2015 |
54 |
C |
p. 186-195 10 p. |
artikel |
99 |
Video-Based Face Recognition and Face-Tracking using Sparse Representation Based Categorization
|
Nagendra, Shruthi |
|
2015 |
54 |
C |
p. 746-755 10 p. |
artikel |
100 |
Virtual Machine Migration Triggering using Application Workload Prediction
|
Raghunath, Bane Raman |
|
2015 |
54 |
C |
p. 167-176 10 p. |
artikel |