Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             132 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A Comparative Analysis of Particle Swarm Optimization and Support Vector Machines for Devnagri Character Recognition: An Android Application Kakde, Prashant M.

79 C p. 337-343
artikel
2 A Double Filtered GIST Descriptor for Face Recognition Vinay A.,

79 C p. 533-542
artikel
3 AES Based Text Encryption Using 12 Rounds with Dynamic Key Selection Mathur, Nishtha

79 C p. 1036-1043
artikel
4 A Fast Handoff Technique in Wireless Mesh Network (FHT for WMN) Rathee, Geetanjali

79 C p. 722-728
artikel
5 A High Performance Bulk Driven Quasi Floating Gate MOSEFT Based Current Mirror Rana, Charu

79 C p. 747-754
artikel
6 A Modified High Frequency Adaptive Security Approach using Steganography for Region Selection based on Threshold Value Mungmode, Sachin

79 C p. 912-921
artikel
7 An Algorithm for Retinal Feature Extraction Using Hybrid Approach Panchal, Parth

79 C p. 61-68
artikel
8 Analysis of Knowledge Based Authentication System Using Persuasive Cued Click Points Nayak, Atish

79 C p. 553-560
artikel
9 Analysis of Malicious Behavior of Android Apps Singh, Pooja

79 C p. 215-220
artikel
10 Android Based Assistive Toolkit For Alzheimer Pirani, Er. Zainab

79 C p. 143-151
artikel
11 An Efficient Profile Matching Protocol Using Privacy Preserving in Mobile Social Network Shewale, Kundan

79 C p. 922-931
artikel
12 An Enhanced N-Pattern Hybrid Technique for Medical Images in Telemedicine Vincent, Christy Sumitha

79 C p. 305-313
artikel
13 An Improved PrePost Algorithm for Frequent Pattern Mining with Hadoop on Cloud Thakare, Sanket

79 C p. 207-214
artikel
14 An Innovative Method for Retrieving Relevant Images by Getting the Top-ranked Images First Using Interactive Genetic Algorithm Madhavi, K. Valli

79 C p. 254-261
artikel
15 An Innovative Remote Sensing Image Retrieval Techniques Based on Haar Wavelet-LTRP and ANFIS Bhandari, Kiran Ashok

79 C p. 391-401
artikel
16 An Integrated Approach for Jammer Detection using Software Defined Radio Bhojani, Ronak

79 C p. 809-816
artikel
17 A Novel Approach for Specifying Functional and Non-functional Requirements Using RDS (Requirement Description Schema) Shah, Tejas

79 C p. 852-860
artikel
18 A Novel Framework for Hypervisor Design Ambika, M.

79 C p. 190-198
artikel
19 A Novel Idea on Multimedia Encryption Using Hybrid Crypto Approach Iyer, Sridhar C.

79 C p. 293-298
artikel
20 A Novel Selective Encryption Method for Securing Text Over Mobile Ad Hoc Network Kushwaha, Ajay

79 C p. 16-23
artikel
21 Architecture for Software as a Service (SaaS) Model of CBIR on Hybrid Cloud of Microsoft Azure Meena, Mamta

79 C p. 569-578
artikel
22 Area Efficient Complex Floating Point Multiplier for Reconfigurable FFT/IFFT Processor Based on Vedic Algorithm Thakare, L.P.

79 C p. 434-440
artikel
23 A Reliability based Variant of AODV in MANETs: Proposal, Analysis and Comparison Tyagi, Shobha

79 C p. 903-911
artikel
24 A Scaling Robust Copy-Paste Tampering Detection for Digital Image Forensics Warbhe, Anil Dada

79 C p. 458-465
artikel
25 A Study on the Representation of the Various Models for Dynamic Social Networks Mitra, Anirban

79 C p. 624-631
artikel
26 A Survey on Opportunistic Routing Protocols for Wireless Sensor Networks Jadhav, Payal

79 C p. 603-609
artikel
27 A Survey on Various Multipath Routing Protocols in Wireless Sensor Networks Anasane, Aboli Arun

79 C p. 610-615
artikel
28 Automatic Traffic Surveillance Using Video Tracking Nemade, Bhushan

79 C p. 402-409
artikel
29 8-Bit 250-MS/s ADC Based on SAR Architecture with Novel Comparator at 70nm Technology Node Daulatabad, Shreeniwas

79 C p. 589-596
artikel
30 Client Side Privacy Protection Using Personalized Web Search Malthankar Mrs., Sharvari V.

79 C p. 1029-1035
artikel
31 Computer Vision Based Fruit Grading System for Quality Evaluation of Tomato in Agriculture industry Arakeri, Megha.P.

79 C p. 426-433
artikel
32 Confidentiality-conserving Multi-keyword Ranked Search Above Encrypted Cloud Data Dhumal, Amol A.

79 C p. 845-851
artikel
33 Content-based File Sharing in Peer-to-peer Networks Using Threshold Bhagat, Amol

79 C p. 53-60
artikel
34 Contents
79 C p. iii-vii
artikel
35 Cued-Click Point Graphical Password Using Circular Tolerance to Increase Password Space and Persuasive Features Patra, Karmajit

79 C p. 561-568
artikel
36 DDoS Attack Analyzer: Using JPCAP and WinCap Shinde, Pankaj

79 C p. 781-784
artikel
37 Dealing with Small Files Problem in Hadoop Distributed File System Bende, Sachin

79 C p. 1001-1012
artikel
38 Design and Implementation of Stable PID Controller for Interacting Level Control System Kadu, C.B.

79 C p. 737-746
artikel
39 Design and Simulation of a Blacklisting Technique for Detection of Hello flood Attack on LEACH Protocol Mahajan, Madhura

79 C p. 675-682
artikel
40 Design and Verification of Low Power DA-Adaptive Digital FIR Filter Mankar, Pranav J.

79 C p. 367-373
artikel
41 Design of Intangible Interface for Mouseless Computer Handling using Hand Gestures Pradhan, Alisha

79 C p. 287-292
artikel
42 Detection and Prevention of Wormhole Attack in Wireless Sensor Network using AOMDV Protocol Amish, Parmar

79 C p. 700-707
artikel
43 Development of Next Generation Encryption Algorithm for Data Transmission in 3G/4G Network Ganage, Yogita

79 C p. 1044-1050
artikel
44 Discrimination Prevention with Classification and Privacy Preservation in Data mining KumarTripathi, Krishna

79 C p. 244-253
artikel
45 Distributed Virtualization Manager for KVM Based Cluster Gandhi Mr., Uchit

79 C p. 182-189
artikel
46 DoS Attack Prevention Technique in Wireless Sensor Networks Patil, Shital

79 C p. 715-721
artikel
47 Electromagnetic Energy Harvester for Low Frequency Vibrations Using MEMS Kumar, Ankita

79 C p. 785-792
artikel
48 Energy-Decisive and Upgrade Cooperative Spectrum Sensing in Cognitive Radio Networks Chaudhary, Alpa

79 C p. 683-691
artikel
49 Environment Quality of Service in Cloud Kalekuri, Manjusha

79 C p. 118-126
artikel
50 Face Recognition using Filtered Eoh-sift Vinay A.,

79 C p. 543-552
artikel
51 Feature Vector Extraction based Texture Feature using Hybrid Wavelet Type I & II for Finger Knuckle Prints for Multi-Instance Feature Fusion Yadav, Vandana

79 C p. 351-358
artikel
52 FPGA Based Multiple Fault Tolerant and Recoverable Technique Using Triple Modular Redundancy (FRTMR) Anjankar, Shubham C.

79 C p. 827-834
artikel
53 Gabor Wavelets Based Word Retrieval from Kannada Documents Hangarge, Mallikarjun

79 C p. 441-448
artikel
54 High Performance of Small Cell Cloud Radio Access Network Using Radio over Backhaul Sivappagari, Chandra Mohan Reedy

79 C p. 957-962
artikel
55 Homomorphic Encryption for Security of Cloud Data Potey Mr., Manish M.

79 C p. 175-181
artikel
56 Hybrid Swarm Intelligence Method for Post Clustering Content Based Image Retrieval Meshram, Shubhangi P.

79 C p. 509-515
artikel
57 Hybrid Wavelet Based CBIR System Using Software as a Service (SaaS) Model on Public Cloud Meena, Mamta

79 C p. 278-286
artikel
58 Identity and Access Management as Security-as-a-Service from Clouds Sharma, Deepak H.

79 C p. 170-174
artikel
59 Implementation and Mitigation of Various Tools for Pass the Hash Attack Jadeja, Navjyotsinh

79 C p. 755-764
artikel
60 Implementation of Image Enhancement Algorithms and Recursive Ray Tracing using CUDA Saha, Mr. Diptarup

79 C p. 516-524
artikel
61 Improvement to Blind Image Denoising by Using Local Pixel Grouping with SVD Dhannawat, Rachana

79 C p. 314-320
artikel
62 Improving QoS of Mobile Ad-hoc Network Using Cache Update Scheme in Dynamic Source Routing Protocol Mandhare, V.V.

79 C p. 692-699
artikel
63 Improving Security in Multi Authority Attribute Based Encryption with Fast Decryption Gorasia, Nikita

79 C p. 632-639
artikel
64 Integration of Spark framework in Supply Chain Management Jaggi Mr., Harjeet Singh

79 C p. 1013-1020
artikel
65 Intelligent Predictive String Search Algorithm Gurung, Dipendra

79 C p. 161-169
artikel
66 Intensity Based Automatic Boundary Identification of Pectoral Muscle in Mammograms Vikhe, P.S.

79 C p. 262-269
artikel
67 IoT Based Biometrics Implementation on Raspberry Pi Shah, Dhvani

79 C p. 328-336
artikel
68 Knowledge Management for Downstream Supply Chain Management of Indian Public Sector Oil Companies Desai, Aaditya

79 C p. 1021-1028
artikel
69 License Plate Detection Using Harris Corner and Character Segmentation by Integrated Approach from an Image Patel, Hetal

79 C p. 419-425
artikel
70 Markov Random Field Segmentation Based Sonographic Identification of Prenatal Ventricular Septal Defect Nirmala, S.

79 C p. 344-350
artikel
71 Materialized Cube Selection Using Particle Swarm Optimization Algorithm Gosain, Anjana

79 C p. 2-7
artikel
72 “Measuring the Security and Reliability of Authentication of Social Networking Sites” Sagar, Kumud

79 C p. 668-674
artikel
73 Media Access Delay and Throughput Analysis of Voice Codec with Silence Suppression on Wireless Ad Hoc Network Shah, Ruchi Deepak

79 C p. 940-947
artikel
74 Membership Management and Positioning Method of Multiple Objects using UWB Communication Jeong, Sehyun

79 C p. 640-648
artikel
75 Message From Editors Mishra, B.K.

79 C p. 1
artikel
76 Mining of Association Rules on Large Database Using Distributed and Parallel Computing Vasoya, Anil

79 C p. 221-230
artikel
77 Multipurpose Smart Bag Shweta M,

79 C p. 77-84
artikel
78 Neighbor Adjacency based Hole Detection Protocol for Wireless Sensor Networks Antil, Pearl

79 C p. 866-874
artikel
79 Next Generation Encryption Using Security Enhancement Algorithms for End to End Data Transmission in 3G/4G Networks Kaul, Vikas

79 C p. 1051-1059
artikel
80 Node Heterogeneity for Energy Efficient Synchronization in Wireless Sensor Network Mantri, Dnyaneshwar s

79 C p. 885-892
artikel
81 Novel Content Based Image Classification Method Using LBG Vector Quantization Method with Bayes and Lazy Family Data Mining Classifiers Kasat, Neha R.

79 C p. 483-489
artikel
82 Novel Energy Efficient Election Based Routing Algorithm for Wireless Sensor Network Wankhade, N.R.

79 C p. 772-780
artikel
83 Novel Technique for Performance Improvement of the Wavelet based Denoising Algorithms using Rotated Wavelet Filters Thakur, Kirti V.

79 C p. 499-508
artikel
84 Novel Video Content Summarization Using Thepade's Sorted n-ary Block Truncation coding Badre, Shalakha R.

79 C p. 474-482
artikel
85 Optimized Regression Test Using Test Case Prioritization Ansari, Ahlam

79 C p. 152-160
artikel
86 Optimizing Sorting Algorithms Using Ubiquitous Multi-core Massively Parallel GPGPU Processors Rathi, Sheetal

79 C p. 231-237
artikel
87 Oral-Care Goods Sales Forecasting Using Artificial Neural Network Model Vhatkar, Sangeeta

79 C p. 238-243
artikel
88 Pattern Based Orbit Identification for Scatterometer Level-0 Signal Images Dholakia, Mudit J.

79 C p. 374-382
artikel
89 Penalty Parameter Selection for Hierarchical Data Stream Clustering Bhagat, Amol

79 C p. 24-31
artikel
90 Performance Analysis and Simulation of Rain Attenuation Models at 12–40 GHz Band for an Earth Space Path over Indian Cities Panchal, Parth

79 C p. 801-808
artikel
91 Performance Analysis of AODV and DSDV Routing Protocol in MANET and Modifications in AODV against Black Hole Attack Chavan, A.A.

79 C p. 835-844
artikel
92 Performance Analysis of Various Fuzzy Clustering Algorithms: A Review Gosain, Anjana

79 C p. 100-111
artikel
93 Performance Analysis on Frequency Response of Finite Impulse Response Filter Mohapatra, Badri Narayan

79 C p. 729-736
artikel
94 Performance Estimation of Voltage Controlled Ring Oscillator Designed for Soc Application Save, Sandhya

79 C p. 948-956
artikel
95 Performance Evaluation and Measurement for Energy Efficient Wireless Networks Shah, Hemang

79 C p. 971-977
artikel
96 Performance Evaluation of Distributed Association Rule Mining Algorithms Sawant Ms., Vinaya

79 C p. 127-134
artikel
97 Performance Evaluation of MANET Network Parameters Using AODV Protocol for HEAACK Enhancement Patel, Parth

79 C p. 932-939
artikel
98 Performance Measurement of GSTEB Protocol Using NS-2 Wagh, Gaurav

79 C p. 978-985
artikel
99 Performing Customer Behavior Analysis using Big Data Analytics Khade, Anindita A.

79 C p. 986-992
artikel
100 Pixel Based Image Forensic Technique for Copy-move Forgery Detection Using Auto Color Correlogram Malviya, Ashwini V.

79 C p. 383-390
artikel
101 Poisson Noise Reducing Bilateral Filter Thakur, Kirti V.

79 C p. 861-865
artikel
102 Privacy Preserving Distributed Association Rule Hiding Using Concept Hierarchy Modak, Masooda

79 C p. 993-1000
artikel
103 Qualified Vector Match and Merge Algorithm (QVMMA) for DDoS Prevention and Mitigation Laskar, Sonia

79 C p. 41-52
artikel
104 Score Level Fusion Based Bimodal Biometric Identification Using Thepade's Sorted n-ary Block Truncation Coding with Variod Proportions of Iris and Palmprint Traits Madane, Manisha

79 C p. 466-473
artikel
105 Script Identification Using Gabor Feature and SVM Classifier Chaudhari, Shailesh

79 C p. 85-92
artikel
106 Securing VANET by Preventing Attacker Node Using Watchdog and Bayesian Network Theory Rupareliya, Jay

79 C p. 649-656
artikel
107 Segmentation of Moving Object with Uncovered Background, Temporary Poses and GMOB Vaikole, Shubhangi

79 C p. 299-304
artikel
108 Shared vision system Khana, Saiqa

79 C p. 525-532
artikel
109 Signature Verification SaaS Implementation on Microsoft Azure Cloud Philip, Joel

79 C p. 410-418
artikel
110 Simulation Analysis of Three Level Diode Clamped Multilevel Inverter Fed PMSM Drive Using Carrier Based Space Vector Pulse Width Modulation (CB-SVPWM) Shriwastava, R.G.

79 C p. 616-623
artikel
111 Simulation of Bi-directional DC-DC Converter Using FPGA Karthigeyan, P.

79 C p. 708-714
artikel
112 Smart Cart with Automatic Billing, Product Information, Product Recommendation Using RFID & Zigbee with Anti-Theft Yewatkar, Ankush

79 C p. 793-800
artikel
113 Soft Computing Based Power Control for Interference Mitigation in LTE Femtocell Networks Sivaraj, Nirmala

79 C p. 93-99
artikel
114 Some Common Coupled Fixed Point Results on Modified Intuitionistic Fuzzy Metric Spaces Gupta, Vishal

79 C p. 32-40
artikel
115 Some Fixed Point Result Involving Generalized Altering Distance Function Gupta, Vishal

79 C p. 112-117
artikel
116 Statistical Steganalysis of High Capacity Image Steganography with Cryptography Sabnis, S.K.

79 C p. 321-327
artikel
117 Study of Vocal Tract Shape Estimation Techniques for Children Veena S.,

79 C p. 270-277
artikel
118 Subthreshold Circuit Designing and Implementation of Finite Field Multiplier for Cryptography Application Singh, Praveen

79 C p. 597-602
artikel
119 Synchronization between Non-autonomous Hyperchaotc Systems with Uncertainties Using Active Control Method Yadav, Vijay K.

79 C p. 963-970
artikel
120 Texture Feature Extraction Using Hybrid Wavelet Type I & II for Finger Knuckle Prints for Multi-algorithmic Feature Fusion Yadav, Vandana

79 C p. 359-366
artikel
121 The Impacts of Test Automation on Software's Cost, Quality and Time to Market Kumar, Divya

79 C p. 8-15
artikel
122 The Shoulder Surfing Resistant Graphical Password Authentication Technique Gokhale Mrs., Aakansha S.

79 C p. 875-884
artikel
123 The Shoulder Surfing Resistant Graphical Password Authentication Technique Gokhale, Mrs. Aakansha S.

79 C p. 490-498
artikel
124 Third Party Public Auditing Scheme for Cloud Storage More, Swapnali

79 C p. 69-76
artikel
125 Truncated DCT and Decomposed DWT SVD Features for Image Retrieval Sai, N.S.T.

79 C p. 579-588
artikel
126 Trust-based Voting Method for Efficient Malware Detection More, Shraddha S.

79 C p. 657-667
artikel
127 Tumor Detection In Brain Using Genetic Algorithm Chandra, G. Rajesh

79 C p. 449-457
artikel
128 Use of Fuzzy Tool for Example Based Machine Translation Rana, Manish

79 C p. 199-206
artikel
129 Virtual Machine Monitoring in Cloud Computing Saswade, Nikhil

79 C p. 135-142
artikel
130 VLSI Implementation of a Rate Decoder for Structural LDPC Channel Codes Kakde, Sandeep

79 C p. 765-771
artikel
131 Wireless Network Topological Routing in Wireless Sensor Networks Krishna, K. Hari

79 C p. 817-826
artikel
132 Wireless Sensor Network Topology Control Sing Clustering Krishna, K. Hari

79 C p. 893-902
artikel
                             132 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland