nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A Beowulf Cluster for Teaching and Learning
|
Datti, Ahmad A. |
|
2015 |
70 |
C |
p. 62-68 7 p. |
artikel |
2 |
Accelerometer Based Static Gesture Recognition and Mobile Monitoring System Using Neural Networks
|
Chakravarthi, M.Kalyan |
|
2015 |
70 |
C |
p. 683-687 5 p. |
artikel |
3 |
A Complete Survey on Software Architectural Styles and Patterns
|
Sharma, Anubha |
|
2015 |
70 |
C |
p. 16-28 13 p. |
artikel |
4 |
A Correction Model for Real-word Errors
|
sharma, Sumit |
|
2015 |
70 |
C |
p. 99-106 8 p. |
artikel |
5 |
Adaptive Checkpoint Interval Algorithm Considering Task Deadline and Lifetime Reliability for Real-Time System
|
Bandan, Mohamad Imran bin |
|
2015 |
70 |
C |
p. 821-828 8 p. |
artikel |
6 |
A Distributed Approach to Construct Minimum Spanning Tree in Cognitive Radio Networks
|
Murmu, Mahendra Kumar |
|
2015 |
70 |
C |
p. 166-173 8 p. |
artikel |
7 |
A Fully on Chip Slewrate Enhanced Low Drop-out Voltage Regulator
|
Dwibedy, Debasish |
|
2015 |
70 |
C |
p. 369-376 8 p. |
artikel |
8 |
Algorithm for Shortest Path Problem in a Network with Interval-valued Intuitionistic Trapezoidal Fuzzy Number
|
Kumar, Gaurav |
|
2015 |
70 |
C |
p. 123-129 7 p. |
artikel |
9 |
Algorithms for the Implementation of a Dynamic Electrical Energy Pricing Policy
|
Biswas, Manek |
|
2015 |
70 |
C |
p. 668-675 8 p. |
artikel |
10 |
A Modified BM3D Algorithm for SAR Image Despeckling
|
Y, MuraliMohanBabu. |
|
2015 |
70 |
C |
p. 69-75 7 p. |
artikel |
11 |
A Multimodal Approach To Detect User's Emotion
|
K.M., Anil Kumar |
|
2015 |
70 |
C |
p. 296-303 8 p. |
artikel |
12 |
An Adaptive Method of PCA for Minimization of Classification Error Using Naïve Bayes Classifier
|
Kumar, Devesh |
|
2015 |
70 |
C |
p. 9-15 7 p. |
artikel |
13 |
Analysis of Deadbeat Control for an Integer-N Charge-pump PLL
|
Koithyar, Aravinda |
|
2015 |
70 |
C |
p. 392-398 7 p. |
artikel |
14 |
Analysis of Secure Routing Protocol for Wireless Adhoc Networks Using Efficient DNA Based Cryptographic Mechanism
|
Suresh Babu, E. |
|
2015 |
70 |
C |
p. 341-347 7 p. |
artikel |
15 |
An Effective Approach to Track Levels of Influenza-A (H1N1) Pandemic in India Using Twitter
|
Jain, Vinay Kumar |
|
2015 |
70 |
C |
p. 801-807 7 p. |
artikel |
16 |
An Efficient Data Collection Model Using Phantom Partitioning to Reconnect Traffic Partitioned Node in Wireless Sensor Network Structure
|
Paul, Biju |
|
2015 |
70 |
C |
p. 640-648 9 p. |
artikel |
17 |
Anomaly Detection in Medical Wireless Sensor Networks using Machine Learning Algorithms
|
Pachauri, Girik |
|
2015 |
70 |
C |
p. 325-333 9 p. |
artikel |
18 |
A Novel Approach for Hiding Data in Videos Using Network Steganography Methods
|
Sekhar, Amritha |
|
2015 |
70 |
C |
p. 764-768 5 p. |
artikel |
19 |
A Novel Way of Assessing Software Bug Severity Using Dictionary of Critical Terms
|
Sharma, Gitika |
|
2015 |
70 |
C |
p. 632-639 8 p. |
artikel |
20 |
A Realist Framework for Ontologies and the Semantic Web
|
Mishra, Sanju |
|
2015 |
70 |
C |
p. 483-490 8 p. |
artikel |
21 |
A Review on Online Testability for Reversible Logic
|
Gaur, Hari Mohan |
|
2015 |
70 |
C |
p. 384-391 8 p. |
artikel |
22 |
A Semantic Web query Optimization Using Resource Description Framework
|
Chooralil, Varghese S. |
|
2015 |
70 |
C |
p. 723-732 10 p. |
artikel |
23 |
A Trust-based Uncoordinated Checkpointing Algorithm in Mobile Ad Hoc Networks (MANETs)
|
Saini, Poonam |
|
2015 |
70 |
C |
p. 311-317 7 p. |
artikel |
24 |
Autonomous Integration of Distributed Energy Sources and Home Appliances Coordination Scheme in Future Smart Grid Networks
|
Patel, Kunal |
|
2015 |
70 |
C |
p. 538-549 12 p. |
artikel |
25 |
A Zero-Watermarking Scheme using Discrete Wavelet Transform
|
Rani, Asha |
|
2015 |
70 |
C |
p. 603-609 7 p. |
artikel |
26 |
Based Second Order ∑Δ Modulator for Digital Hearing Aid Applications
|
Sebastian, Rijo |
|
2015 |
70 |
C |
p. 274-281 8 p. |
artikel |
27 |
Basis Path Testing Using SGA & HGA with ExLB Fitness Function
|
Garg, Deepak |
|
2015 |
70 |
C |
p. 593-602 10 p. |
artikel |
28 |
Capacitor Allocation in Radial Distribution System with Time Varying ZIP Load Model and Energy Savings
|
Murty, V.V.S.N. |
|
2015 |
70 |
C |
p. 377-383 7 p. |
artikel |
29 |
Comparative Study of Different Measurement Sites Using NIR Based Non-invasive Glucose Measurement System
|
Yadav, Jyoti |
|
2015 |
70 |
C |
p. 469-475 7 p. |
artikel |
30 |
Comprehensive Literature Review on Machine Learning Structures for Web Spam Classification
|
Goh, Kwang Leng |
|
2015 |
70 |
C |
p. 434-441 8 p. |
artikel |
31 |
Computer Aided Diagnostic System for Detection of Leukemia Using Microscopic Images
|
Rawat, Jyoti |
|
2015 |
70 |
C |
p. 748-756 9 p. |
artikel |
32 |
Concentration Enhancement of Liquid Phase Exfoliated Graphene with Addition of Organic Salts
|
Singh, Randhir |
|
2015 |
70 |
C |
p. 565-571 7 p. |
artikel |
33 |
Contents
|
|
|
2015 |
70 |
C |
p. iii-vii nvt p. |
artikel |
34 |
Corrigendum to Comparative Study of different Measurement Sites Using NIR Based Non-invasive Glucose Measurement System
|
Yadav, Jyoti |
|
2015 |
70 |
C |
p. 831- 1 p. |
artikel |
35 |
Corrigendum to ‘Efficient Data Mining Method to Predict the Risk of Heart Diseases through Frequent Itemsets’
|
Ilayaraja M, |
|
2015 |
70 |
C |
p. 830- 1 p. |
artikel |
36 |
Corrigendum to “GA Based Optimization of Second Order ΣΔ Modulator for Digital Hearing Aid Applications”
|
Sebastian, Rijo |
|
2015 |
70 |
C |
p. 829- 1 p. |
artikel |
37 |
Design and Development of Grid Enabled, G2PU Accelerated Java Application (Protein Sequence Study) for Grid Performance Analysis
|
Sinha, Subrata |
|
2015 |
70 |
C |
p. 769-777 9 p. |
artikel |
38 |
Designing Touch-Based Hybrid Authentication Method for Smartphones
|
Nader, J. |
|
2015 |
70 |
C |
p. 198-204 7 p. |
artikel |
39 |
Design of a Binary to BCD Converter Using 2-Dimensional 2-Dot 1-Electron Quantum Dot Cellular Automata
|
Datta, Kakali |
|
2015 |
70 |
C |
p. 153-159 7 p. |
artikel |
40 |
Design of Collision-free Nearest Neighbor Assertion and Load Balancing in Sensor Network System
|
Vijayan, Vinodh P. |
|
2015 |
70 |
C |
p. 508-514 7 p. |
artikel |
41 |
Design of Haptic Interface Controller under Noise Uncertainty and Delay Condition
|
Kumar, Naveen |
|
2015 |
70 |
C |
p. 793-800 8 p. |
artikel |
42 |
Design of Low Power MAX Operator for Multi-valued Logic System
|
Chowdhury, Adib Kabir |
|
2015 |
70 |
C |
p. 428-433 6 p. |
artikel |
43 |
Development of a Java Library for Protein Stability and Disorder Computations
|
Sinha, Subrata |
|
2015 |
70 |
C |
p. 265-273 9 p. |
artikel |
44 |
Development of Lipid Membrane Based Taste Sensors for Electronic Tongue
|
Sharma, Gaurav |
|
2015 |
70 |
C |
p. 146-152 7 p. |
artikel |
45 |
Devising a Super Ontology
|
Malik, Sonika |
|
2015 |
70 |
C |
p. 785-792 8 p. |
artikel |
46 |
Different Obfuscation Techniques for Code Protection
|
Behera, Chandan Kumar |
|
2015 |
70 |
C |
p. 757-763 7 p. |
artikel |
47 |
Disjointing Technique for Reliability Evaluation of Computer-Communication Networks
|
Kaushik, Kriti |
|
2015 |
70 |
C |
p. 205-211 7 p. |
artikel |
48 |
Dynamic Interactive Voice Response System Using Ontology and Java Expert System Shell
|
Thirumaran M., |
|
2015 |
70 |
C |
p. 107-113 7 p. |
artikel |
49 |
Efficient Data Mining Method to Predict the Risk of Heart Diseases Through Frequent Itemsets
|
Ilayaraja M., |
|
2015 |
70 |
C |
p. 586-592 7 p. |
artikel |
50 |
Efficient Service Utilization in Cloud Computing Exploitation Victimization as Revised Rough Set Optimization Service Parameters
|
Tiwari, Ashish |
|
2015 |
70 |
C |
p. 610-617 8 p. |
artikel |
51 |
Efficient Three Variables Reversible Logic Synthesis Using Mixed-polarity Toffoli Gate
|
Cheng, Chua Shin |
|
2015 |
70 |
C |
p. 362-368 7 p. |
artikel |
52 |
EMAODV: Technique to Prevent Collaborative Attacks in MANETs
|
Rana, Anuj |
|
2015 |
70 |
C |
p. 137-145 9 p. |
artikel |
53 |
Emotion Detection Using MFCC and Cepstrum Features
|
Lalitha, S. |
|
2015 |
70 |
C |
p. 29-35 7 p. |
artikel |
54 |
Energy Aware SLA with Classification of Jobs for Cloud Environment
|
Joy, Nimisha |
|
2015 |
70 |
C |
p. 740-747 8 p. |
artikel |
55 |
Energy Optimization of ZigBee Based WBAN for Patient Monitoring
|
Pathak, Shashwat |
|
2015 |
70 |
C |
p. 414-420 7 p. |
artikel |
56 |
Energy Savings Using D-STATCOM Placement in Radial Distribution System
|
Gupta, Atma Ram |
|
2015 |
70 |
C |
p. 558-564 7 p. |
artikel |
57 |
Enhance QoS by Learning Data flow rates in Wireless Networks Using Hierarchical Docition
|
Sruthi, Simi S. |
|
2015 |
70 |
C |
p. 708-714 7 p. |
artikel |
58 |
External Fault Classification Experienced by Three-Phase Induction Motor Based on Multi-Class ELM
|
Sharma, Sandeep |
|
2015 |
70 |
C |
p. 814-820 7 p. |
artikel |
59 |
Feasibility Study of Microgrid Installation in an Educational Institution with Grid Uncertainty
|
Sahoo, Ashwin Kumar |
|
2015 |
70 |
C |
p. 550-557 8 p. |
artikel |
60 |
Feature Extractionusing ORB-RANSAC for Face Recognition
|
Vinay A., |
|
2015 |
70 |
C |
p. 174-184 11 p. |
artikel |
61 |
FR: A Recommender for Finding Faculty Based on CF Technique
|
Nagpal, Diksha |
|
2015 |
70 |
C |
p. 499-507 9 p. |
artikel |
62 |
Green ICT for Sustainable Development: A Higher Education Perspective
|
Suryawanshi, Kavita |
|
2015 |
70 |
C |
p. 701-707 7 p. |
artikel |
63 |
High Rating Recent Preferences Based Recommendation System
|
Dhawan, Sanjeev |
|
2015 |
70 |
C |
p. 259-264 6 p. |
artikel |
64 |
Image Encryption Scheme Based on Knight's Tour Problem
|
Singh, Manpreet |
|
2015 |
70 |
C |
p. 245-250 6 p. |
artikel |
65 |
Impact of STATCOM Control Parameters on Available Transfer Capability Enhancement in Energy Markets
|
Kumar, Ravinder |
|
2015 |
70 |
C |
p. 515-525 11 p. |
artikel |
66 |
Key-frame Extraction by Analysis of Histograms of Video Frames Using Statistical Methods
|
C V, Sheena |
|
2015 |
70 |
C |
p. 36-40 5 p. |
artikel |
67 |
K-Medoid Clustering for Heterogeneous DataSets
|
Harikumar, Sandhya |
|
2015 |
70 |
C |
p. 226-237 12 p. |
artikel |
68 |
Location Information Verification cum Security Using TBM in Geocast Routing
|
Sheet, Dalya K. |
|
2015 |
70 |
C |
p. 219-225 7 p. |
artikel |
69 |
Low Power Modulo 2 n +1 Multiplier Using Data Aware Adder Tree
|
Sakthivel, R. |
|
2015 |
70 |
C |
p. 355-361 7 p. |
artikel |
70 |
Microscopic Image Contrast and Brightness Enhancement Using Multi-scale Retinex and Cuckoo Search Algorithm
|
Biswas, Biswajit |
|
2015 |
70 |
C |
p. 348-354 7 p. |
artikel |
71 |
Multi Core Aware Java Library for Computing Protein Stability Indices – A Performance Improvement and Power Consumption Study
|
Sinha, Subrata |
|
2015 |
70 |
C |
p. 715-722 8 p. |
artikel |
72 |
Multimedia Communication using DVB Technology Over Open Range
|
Bera, Soumyasree |
|
2015 |
70 |
C |
p. 282-288 7 p. |
artikel |
73 |
Multi-Modality Medical Image Fusion using Discrete Wavelet Transform
|
Bhavana V., |
|
2015 |
70 |
C |
p. 625-631 7 p. |
artikel |
74 |
On Finding a Defect-free Component in Nanoscale Crossbar Circuits
|
Kule, Malay |
|
2015 |
70 |
C |
p. 421-427 7 p. |
artikel |
75 |
On Image Forgery Detection Using Two Dimensional Discrete Cosine Transform and Statistical Moments
|
Kaushik, Rajeev |
|
2015 |
70 |
C |
p. 130-136 7 p. |
artikel |
76 |
On Intuitionistic Fuzzy Divergence Measure with Application to Edge Detection
|
Kaushik, Rajeev |
|
2015 |
70 |
C |
p. 2-8 7 p. |
artikel |
77 |
Online Harmonic Monitoring, Assessment and Control with AMR on Smartphone
|
Kulkarni, H.H. |
|
2015 |
70 |
C |
p. 92-98 7 p. |
artikel |
78 |
Online Monitoring of a Cyber Physical System Against Control Aware Cyber Attacks
|
Gawand, Hemangi Laxman |
|
2015 |
70 |
C |
p. 238-244 7 p. |
artikel |
79 |
On the Scope of Backbone Formation in Wireless Ad Hoc Networks
|
Kumar, Santosh |
|
2015 |
70 |
C |
p. 212-218 7 p. |
artikel |
80 |
Optimal Choice of Parameters for Fireworks Algorithm
|
Kumar, Vijay |
|
2015 |
70 |
C |
p. 334-340 7 p. |
artikel |
81 |
Performance Evaluation and Improvement in Transient Instability of IEEE 9 Bus System Using Exciter and Governor Control
|
Asija, Divya |
|
2015 |
70 |
C |
p. 733-739 7 p. |
artikel |
82 |
Performance Measure and Efficiency of Chemical Skin Burn Classification Using KNN Method
|
suvarna, Malini |
|
2015 |
70 |
C |
p. 48-54 7 p. |
artikel |
83 |
Preface
|
Mathew, Jimson |
|
2015 |
70 |
C |
p. 1- 1 p. |
artikel |
84 |
Preserving Privacy of Patients Based on Re-identification Risk
|
Taneja, Himanshu |
|
2015 |
70 |
C |
p. 448-454 7 p. |
artikel |
85 |
Recovering Depth Map from Enhanced Image Gradients
|
Bala, Anu |
|
2015 |
70 |
C |
p. 572-578 7 p. |
artikel |
86 |
Recovery of Lost Connectivity in Wireless Sensor and Actor Networks using Static Sensors as Bridge Routers
|
Ranga, Virender |
|
2015 |
70 |
C |
p. 491-498 8 p. |
artikel |
87 |
Regression and Endogeneity Bias in Big Marketing Data
|
Kaur, PankajDeep |
|
2015 |
70 |
C |
p. 41-47 7 p. |
artikel |
88 |
Remote Sensing Image Fusion using PCNN Model Parameter Estimation by Gamma Distribution in Shearlet Domain
|
Biswas, Biswajit |
|
2015 |
70 |
C |
p. 304-310 7 p. |
artikel |
89 |
Reversible Logic Circuit Synthesis and Optimization Using Adaptive Genetic Algorithm
|
Sasamal, Trailokya Nath |
|
2015 |
70 |
C |
p. 407-413 7 p. |
artikel |
90 |
ROI Based Medical Image Compression for Telemedicine Application
|
Kaur, Manpreet |
|
2015 |
70 |
C |
p. 579-585 7 p. |
artikel |
91 |
RSA Based Two-factor Remote User Authentication Scheme with User Anonymity
|
Chandrakar, Preeti |
|
2015 |
70 |
C |
p. 318-324 7 p. |
artikel |
92 |
Scalable Database Management in Cloud Computing
|
Kaur, Pankaj Deep |
|
2015 |
70 |
C |
p. 658-667 10 p. |
artikel |
93 |
Secure and Robust Watermarking Using Wavelet Transform and Student t-distribution
|
Singh, Surbhi |
|
2015 |
70 |
C |
p. 442-447 6 p. |
artikel |
94 |
Secure Communication Using DNA Cryptography with Secure Socket Layer (SSL) Protocol in Wireless Sensor Networks
|
Monika, |
|
2015 |
70 |
C |
p. 808-813 6 p. |
artikel |
95 |
Secure Hybrid Robust Watermarking Technique for Medical Images
|
Sharma, Abhilasha |
|
2015 |
70 |
C |
p. 778-784 7 p. |
artikel |
96 |
Secure Medical Data Transmission by Using ECC with Mutual Authentication in WSNs
|
Shankar, Shashi Kant |
|
2015 |
70 |
C |
p. 455-461 7 p. |
artikel |
97 |
Sentiment Analysis for Indian Stock Market Prediction Using Sensex and Nifty
|
Bhardwaj, Aditya |
|
2015 |
70 |
C |
p. 85-91 7 p. |
artikel |
98 |
Sharing a Secret Image with Encapsulated Shares in Visual Cryptography
|
Shankar K., |
|
2015 |
70 |
C |
p. 462-468 7 p. |
artikel |
99 |
Solar and Wind Power Estimation and Economic Load Dispatch Using Firefly Algorithm
|
Saxena, Nishant |
|
2015 |
70 |
C |
p. 688-700 13 p. |
artikel |
100 |
Some Aspects of Coverage Awareness in Wireless Sensor Networks
|
Singh, Surjit |
|
2015 |
70 |
C |
p. 160-165 6 p. |
artikel |
101 |
Sparse Watermarking Technique for Improving Security of Biometric System
|
Thanki, Rohit |
|
2015 |
70 |
C |
p. 251-258 8 p. |
artikel |
102 |
SVPWM Based Converter for PMSG Based Wind Energy Conversion System
|
Mudholker, Ankush |
|
2015 |
70 |
C |
p. 676-682 7 p. |
artikel |
103 |
Terminal Reliability Assessment for a New Gamma Minus Multistage Interconnection Networks
|
Gupta, S. |
|
2015 |
70 |
C |
p. 476-482 7 p. |
artikel |
104 |
Two Novel Detector-Descriptor Based Approaches for Face Recognition Using SIFT and SURF
|
A, Vinay |
|
2015 |
70 |
C |
p. 185-197 13 p. |
artikel |
105 |
Understanding and Analyzing the Impact of Memory Controller's Scheduling Policies on DRAM's Energy and Performance
|
Modgil, Aastha |
|
2015 |
70 |
C |
p. 399-406 8 p. |
artikel |
106 |
Video Foreground Detection in Non-static Background Using Multi-dimensional Color Space
|
Thangarajah, Akilan |
|
2015 |
70 |
C |
p. 55-61 7 p. |
artikel |
107 |
Virtual Instrumentation Based Fetal ECG Extraction
|
Raj, Chinmayee G. |
|
2015 |
70 |
C |
p. 289-295 7 p. |
artikel |
108 |
Wavelet Based Modern Finger Knuckle Authentication
|
Kulkarni, Sujata |
|
2015 |
70 |
C |
p. 649-657 9 p. |
artikel |
109 |
Wavelet Packet Texture Descriptors Based Four-class BIRADS Breast Tissue Density Classification
|
Kumar, Indrajeet |
|
2015 |
70 |
C |
p. 76-84 9 p. |
artikel |
110 |
Wi-Fi Enabled Personal Computer Network Monitoring System Using Smart Phone with Enhanced Security Measures
|
Arora, Anuja |
|
2015 |
70 |
C |
p. 114-122 9 p. |
artikel |
111 |
Window Based State Monitoring in Cloud Datacenter using VM Concept
|
Hazarika, Bhaswati |
|
2015 |
70 |
C |
p. 618-624 7 p. |
artikel |
112 |
Wind Speed Variation Impact on Transmission Loss Reduction in Electricity Market
|
Kumar, Manish |
|
2015 |
70 |
C |
p. 526-537 12 p. |
artikel |