Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             100 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 Accessing Relevant and Accurate Information using Entropy Kumar, Sarowar
2015
54 C p. 449-455
7 p.
artikel
2 A Cluster-tree based Data Dissemination Routing Protocol Bagga, Neeraj
2015
54 C p. 7-13
7 p.
artikel
3 A Computer Vision based Framework for Visual Gun Detection Using Harris Interest Point Detector Tiwari, Rohit Kumar
2015
54 C p. 703-712
10 p.
artikel
4 A Decision Based Unsymmetrical Trimmed Modified Winsorized Mean Filter for the Removal of High Density Salt and Pepper Noise in Images and Videos Vasanth, K.
2015
54 C p. 595-604
10 p.
artikel
5 A Green Mechanism Design Approach to Automate Resource Procurement in Cloud Ketankumar, Doshi Chintan
2015
54 C p. 108-117
10 p.
artikel
6 A Method for QRS Delineation Based on STFT Using Adaptive Threshold Shaik, Basheeruddin Shah
2015
54 C p. 646-653
8 p.
artikel
7 Analysis of Attention Identification and Recognition of Faces through Segmentation and Relative Visual Saliency (SRVS) Kumar, Ravi Kant
2015
54 C p. 756-763
8 p.
artikel
8 Analysis of Infrastructure Monitoring Requirements for OpenStack Nova Datt, Aparna
2015
54 C p. 127-136
10 p.
artikel
9 Analysis of users’ Sentiments from Kannada Web Documents Kumar, K. M. Anil
2015
54 C p. 247-256
10 p.
artikel
10 An Application of Factor Analysis in the Evaluation of Country Economic Rank Bai, Anita
2015
54 C p. 311-317
7 p.
artikel
11 An Efficient 256-Tap Parallel FIR Digital Filter Implementation Using Distributed Arithmetic Architecture Nandal, Amita
2015
54 C p. 605-611
7 p.
artikel
12 An Impact of Linear Regression Models for Improving the Software Quality with Estimated Cost Marandi, Arun Kumar
2015
54 C p. 335-342
8 p.
artikel
13 A Novel Approach for Breast Cancer Detection and Segmentation in a Mammogram Singh, Anuj Kumar
2015
54 C p. 676-682
7 p.
artikel
14 A Particle Swarm Approach to Collaborative Filtering based Recommender Systems through Fuzzy Features Wasid, Mohammed
2015
54 C p. 440-448
9 p.
artikel
15 A Privacy Preserved Data Mining Approach Based on k-Partite Graph Theory Bhat, T. Pranav
2015
54 C p. 422-430
9 p.
artikel
16 A Probabilistic Software Risk Assessment and Estimation Model for Software Projects Kumar, Chandan
2015
54 C p. 353-361
9 p.
artikel
17 Artificial Neuro Fuzzy Logic PID Controller based on BF-PSO Algorithm Patel, Rahul
2015
54 C p. 463-471
9 p.
artikel
18 A Simple Method for Detection of Metamorphic Malware using Dynamic Analysis and Text Mining Choudhary, S.P.
2015
54 C p. 265-270
6 p.
artikel
19 Blind Content Independent Noise Estimation for Multimedia Applications Sodhani, Pranav
2015
54 C p. 549-557
9 p.
artikel
20 Choosing Optimal Value for Fuzzy Membership in FCM Algorithm for LP-Residual Input Features Misra, S.
2015
54 C p. 542-548
7 p.
artikel
21 Closed Item-Set Mining for Prediction of Indian Summer Monsoon Rainfall A Data Mining Model with Land and Ocean Variables as Predictors Vathsala, H.
2015
54 C p. 271-280
10 p.
artikel
22 Contents 2015
54 C p. iii-vi
nvt p.
artikel
23 Continuous Indian Sign Language Gesture Recognition and Sentence Formation Tripathi, Kumud
2015
54 C p. 523-531
9 p.
artikel
24 Contriving Hybrid DESCAST Algorithm for Cloud Security Sengupta, Nandita
2015
54 C p. 47-56
10 p.
artikel
25 Cooperative Spectrum Sensing in Cognitive Radios Using Perceptron Learning for IEEE 802.22 WRAN Balaji, V.
2015
54 C p. 14-23
10 p.
artikel
26 Cross-Lingual Preposition Disambiguation for Machine Translation Kumar, M. Anand
2015
54 C p. 291-300
10 p.
artikel
27 Data Analysis using Multidimensional Modeling, Statistical Analysis and Data Mining on Agriculture Parameters Hira, Swati
2015
54 C p. 431-439
9 p.
artikel
28 3D Face Model Estimation based on Similarity Transform using Differential Evolution Optimization Chandar, K. Punnam
2015
54 C p. 621-630
10 p.
artikel
29 Dr. Eye: An Android Application to Calculate the Vision Acuity Agarwal, Aakash
2015
54 C p. 697-702
6 p.
artikel
30 Efficient and Accurate Discovery of Colossal Pattern Sequences from Biological Datasets: A Doubleton Pattern Mining Strategy (DPMine) Prasanna, K.
2015
54 C p. 412-421
10 p.
artikel
31 Efficient De-noising Performance of a Combined Algorithm of Translation Invariant (TI) Wavelets and Independent Component Analysis over TI Wavelets for Speech-Auditory Brainstem Responses Narayanam, Ranganadh
2015
54 C p. 829-837
9 p.
artikel
32 Energy Analysis for Trajectory based Sink Mobility in WSN Snigdh, I.
2015
54 C p. 118-126
9 p.
artikel
33 Enhanced Expressivity using Deontic Logic and Reuse Measure of Ontologies Deborah, L. Jegatha
2015
54 C p. 318-326
9 p.
artikel
34 Enhancing the Security of MANETs using Hash Algorithms Ravilla, Dilli
2015
54 C p. 196-206
11 p.
artikel
35 Experimental Studies of LSB Watermarking with Different Noise Singh, Ranjeet Kumar
2015
54 C p. 612-620
9 p.
artikel
36 Face Recognition using R-KDA with Non-Linear SVM for Multi-View Database Devi, Hidangmayum Saxena
2015
54 C p. 532-541
10 p.
artikel
37 Factor Histogram based Forgery Localization in Double Compressed JPEG Images Mire, Archana V.
2015
54 C p. 690-696
7 p.
artikel
38 Fast Rotation Invariant Detection of Region Duplication Attacks Even on Uniform Background Containing Digital Images Singh, Vivek Kumar
2015
54 C p. 772-780
9 p.
artikel
39 Feature Selection and Classification of Microarray Data using MapReduce based ANOVA and K-Nearest Neighbor Kumar, Mukesh
2015
54 C p. 301-310
10 p.
artikel
40 Finding Similar Patents through Semantic Query Expansion Sharma, Pawan
2015
54 C p. 390-395
6 p.
artikel
41 FIVDL: Fingerprint Image Verification using Dictionary Learning Arunalatha, J.S.
2015
54 C p. 482-490
9 p.
artikel
42 FRDF: Face Recognition Using Fusion of DTCWT and FFT Features Rangaswamy, Y.
2015
54 C p. 809-817
9 p.
artikel
43 Fusion of Fuzzy Enhanced Overexposed and Underexposed Images Dhingra, Naina
2015
54 C p. 738-745
8 p.
artikel
44 Fusion of Multi-Sensor Satellite Images Using Non-Subsampled Contourlet Transform Mangalraj, P.
2015
54 C p. 713-720
8 p.
artikel
45 Gaussian Random Projection Based Non-invertible Cancelable Biometric Templates Kaur, Harkeerat
2015
54 C p. 661-670
10 p.
artikel
46 Generating Optimal Query Plans for Distributed Query Processing using Teacher-Learner Based Optimization Mishra, Vikash
2015
54 C p. 281-290
10 p.
artikel
47 Gray and Black Hole Attack Identification Using Control Packets in MANETs Dhaka, Arvind
2015
54 C p. 83-91
9 p.
artikel
48 Hardware Accelerated Multi-coordinate Viewing Framework for Volumetric Visualization of Large 3D Medical Dataset Kumar, Piyush
2015
54 C p. 566-573
8 p.
artikel
49 Health Monitoring of Civil Structures with Integrated UAV and Image Processing System Sankarasrinivasan, S.
2015
54 C p. 508-515
8 p.
artikel
50 Hierarchical Lossless Image Compression for Telemedicine Applications Sumalatha, R.
2015
54 C p. 838-848
11 p.
artikel
51 Human Computer Interaction using Hand Gesture Sharma, Ram Pratap
2015
54 C p. 721-727
7 p.
artikel
52 Hybridization of Algorithm for Restoration of Impulse Noise Image Loya, Nilesh
2015
54 C p. 728-737
10 p.
artikel
53 Image Denoising Using Spatial Gradient Based Bilateral Filter and Minimum Mean Square Error Filtering Tiwari, Mayank
2015
54 C p. 638-645
8 p.
artikel
54 Image Encryption using Elliptic Curve Cryptography Singh, Laiphrakpam Dolendro
2015
54 C p. 472-481
10 p.
artikel
55 Image Retrieval: Information and Rough Set Theories Garimella, Rama Murthy
2015
54 C p. 631-637
7 p.
artikel
56 Image Segmentation Using K -means Clustering Algorithm and Subtractive Clustering Algorithm Dhanachandra, Nameirakpam
2015
54 C p. 764-771
8 p.
artikel
57 Implementation of Text Encryption using Elliptic Curve Cryptography Singh, Laiphrakpam Dolendro
2015
54 C p. 73-82
10 p.
artikel
58 Mitigation of Storage Covert Channels in IPSec for QoS Aware Applications Kundu, Arnab
2015
54 C p. 102-107
6 p.
artikel
59 Mobility Aware Loose Clustering for Mobile Ad hoc Network Neethu, V.V.
2015
54 C p. 57-64
8 p.
artikel
60 Modified Eigen Vectors Arrangement for Better Representation of Images in Low Dimension Pandey, Shreelekha
2015
54 C p. 683-689
7 p.
artikel
61 Modified Self Organizing Feature Map Neural Network (MSOFM NN) Based Gray Image Segmentation Upadhyay, Pankaj
2015
54 C p. 671-675
5 p.
artikel
62 Monitoring of Riak CS Storage Infrastructure Jain, Pragya
2015
54 C p. 137-146
10 p.
artikel
63 Multi-Label Learning with Class-Based Features Using Extended Centroid-Based Classification Technique (CCBF) Devi, P.R. Suganya
2015
54 C p. 405-411
7 p.
artikel
64 Multilayer Neuro PID Controller based on Back Propagation Algorithm Patel, Rahul
2015
54 C p. 207-214
8 p.
artikel
65 Multi-Level Manifolds for Remote Sensing Imagery Classification Mangalraj, P.
2015
54 C p. 654-660
7 p.
artikel
66 Multiple Transmit Antenna Selection in MIMO-OSTBC System in Nakagami-m Fading Channel Hendre, Vaibhav
2015
54 C p. 558-565
8 p.
artikel
67 Neural Network Based Human Age-group Estimation in Curvelet Domain Saxena, Aditya K.
2015
54 C p. 781-789
9 p.
artikel
68 Neuro-Fuzzy Based Hybrid Model for Web Usage Mining Shivaprasad, G.
2015
54 C p. 327-334
8 p.
artikel
69 New Data Hiding Technique in Encrypted Image: DKL Algorithm (Differing Key Length) Udhayavene, S.
2015
54 C p. 790-798
9 p.
artikel
70 Noise Reduction using Wavelet Transform and Singular Vector Decomposition Patil, Rajesh
2015
54 C p. 849-853
5 p.
artikel
71 Numeral Script Identification from Handwritten Document Images Obaidullah, Sk Md
2015
54 C p. 585-594
10 p.
artikel
72 Occlusion Invariant Palmprint Recognition with ULBP Histograms Tamrakar, Deepti
2015
54 C p. 491-500
10 p.
artikel
73 Online Touchless Palmprint Registration System in a Dynamic Environment Balwant, Manoj Kumar
2015
54 C p. 799-808
10 p.
artikel
74 Optimizing Security and Address Configuration in IPv6 SLAAC Shah, Junaid Latief
2015
54 C p. 177-185
9 p.
artikel
75 Participatory Sensing System in Presence of Multiple Buyers Bhattacharjee, Jaya
2015
54 C p. 237-246
10 p.
artikel
76 Particle Swarm Optimization Applied to Ascent Phase Launch Vehicle Trajectory Optimization Problem Dileep, M.V.
2015
54 C p. 516-522
7 p.
artikel
77 Perceptual Subspace Speech Enhancement with Variance Normalization Surendran, Sudeep
2015
54 C p. 818-828
11 p.
artikel
78 Performance Evaluation of Cloud Services with Profit Optimization Jaiganesh, M.
2015
54 C p. 24-30
7 p.
artikel
79 PhishShield: A Desktop Application to Detect Phishing Webpages through Heuristic Approach Rao, Routhu Srinivasa
2015
54 C p. 147-156
10 p.
artikel
80 PIB: Profiling Influential Blogger in Online Social Networks, A Knowledge Driven Data Mining Approach Vasanthakumar, G.U.
2015
54 C p. 362-370
9 p.
artikel
81 Predicting Financial Distress: A Comparison of Survival Analysis and Decision Tree Techniques Gepp, Adrian
2015
54 C p. 396-404
9 p.
artikel
82 Preface Venugopal, K.R.
2015
54 C p. 457-462
6 p.
artikel
83 Preface Venugopal, K.R.
2015
54 C p. 1-6
6 p.
artikel
84 Preface Venugopal, K.R.
2015
54 C p. 225-230
6 p.
artikel
85 Prevention of Insider Attacks by Integrating Behavior Analysis with Risk based Access Control Model to Protect Cloud Babu, B. Mahesh
2015
54 C p. 157-166
10 p.
artikel
86 Quantum Key Distribution Protocol with Four-State Systems – Software Implementation Mogos, Gabriela
2015
54 C p. 65-72
8 p.
artikel
87 Real Time Strategy Games: A Reinforcement Learning Approach Sethy, Harshit
2015
54 C p. 257-264
8 p.
artikel
88 Real Time Visibility Enhancement for Single Image Haze Removal Kumari, Apurva
2015
54 C p. 501-507
7 p.
artikel
89 RETRACTED: Classification of Time Series Data by One Class Classifier Using DTW-D Kumar, Vasimalla
2015
54 C p. 343-352
10 p.
artikel
90 RFDMRP: River Formation Dynamics based Multi-hop Routing Protocol for Data Collection in Wireless Sensor Networks Guravaiah, Koppala
2015
54 C p. 31-36
6 p.
artikel
91 RPRDC: Reliable Proliferation Routing with low Duty-cycle in Wireless Sensor Networks Venkatesha,
2015
54 C p. 37-46
10 p.
artikel
92 Search-Based Object-Oriented Software Re-Structuring with Structural Coupling Strength Amarjeet,
2015
54 C p. 380-389
10 p.
artikel
93 Selfish Node Detection and Low Cost Data Transmission in MANET using Game Theory Das, Debjit
2015
54 C p. 92-101
10 p.
artikel
94 Semantic Retrieval of Relevant Sources for Large Scale Virtual Documents Priyadarshini, R.
2015
54 C p. 371-379
9 p.
artikel
95 Significance of GMM-UBM based Modelling for Indian Language Identification Kumar, V. Ravi
2015
54 C p. 231-236
6 p.
artikel
96 Speech Enhancement using Spectral Subtraction-type Algorithms: A Comparison and Simulation Study Upadhyay, Navneet
2015
54 C p. 574-584
11 p.
artikel
97 Traffic Analysis of Vehicular Ad-Hoc Networks of V2I Communication Paul, Mousumi
2015
54 C p. 215-223
9 p.
artikel
98 Trust Calculation with Ant Colony Optimization in Online Social Networks Sanadhya, Shashvat
2015
54 C p. 186-195
10 p.
artikel
99 Video-Based Face Recognition and Face-Tracking using Sparse Representation Based Categorization Nagendra, Shruthi
2015
54 C p. 746-755
10 p.
artikel
100 Virtual Machine Migration Triggering using Application Workload Prediction Raghunath, Bane Raman
2015
54 C p. 167-176
10 p.
artikel
                             100 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland