nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A Comparative Analysis of Particle Swarm Optimization and Support Vector Machines for Devnagri Character Recognition: An Android Application
|
Kakde, Prashant M. |
|
|
79 |
C |
p. 337-343 |
artikel |
2 |
A Double Filtered GIST Descriptor for Face Recognition
|
Vinay A., |
|
|
79 |
C |
p. 533-542 |
artikel |
3 |
AES Based Text Encryption Using 12 Rounds with Dynamic Key Selection
|
Mathur, Nishtha |
|
|
79 |
C |
p. 1036-1043 |
artikel |
4 |
A Fast Handoff Technique in Wireless Mesh Network (FHT for WMN)
|
Rathee, Geetanjali |
|
|
79 |
C |
p. 722-728 |
artikel |
5 |
A High Performance Bulk Driven Quasi Floating Gate MOSEFT Based Current Mirror
|
Rana, Charu |
|
|
79 |
C |
p. 747-754 |
artikel |
6 |
A Modified High Frequency Adaptive Security Approach using Steganography for Region Selection based on Threshold Value
|
Mungmode, Sachin |
|
|
79 |
C |
p. 912-921 |
artikel |
7 |
An Algorithm for Retinal Feature Extraction Using Hybrid Approach
|
Panchal, Parth |
|
|
79 |
C |
p. 61-68 |
artikel |
8 |
Analysis of Knowledge Based Authentication System Using Persuasive Cued Click Points
|
Nayak, Atish |
|
|
79 |
C |
p. 553-560 |
artikel |
9 |
Analysis of Malicious Behavior of Android Apps
|
Singh, Pooja |
|
|
79 |
C |
p. 215-220 |
artikel |
10 |
Android Based Assistive Toolkit For Alzheimer
|
Pirani, Er. Zainab |
|
|
79 |
C |
p. 143-151 |
artikel |
11 |
An Efficient Profile Matching Protocol Using Privacy Preserving in Mobile Social Network
|
Shewale, Kundan |
|
|
79 |
C |
p. 922-931 |
artikel |
12 |
An Enhanced N-Pattern Hybrid Technique for Medical Images in Telemedicine
|
Vincent, Christy Sumitha |
|
|
79 |
C |
p. 305-313 |
artikel |
13 |
An Improved PrePost Algorithm for Frequent Pattern Mining with Hadoop on Cloud
|
Thakare, Sanket |
|
|
79 |
C |
p. 207-214 |
artikel |
14 |
An Innovative Method for Retrieving Relevant Images by Getting the Top-ranked Images First Using Interactive Genetic Algorithm
|
Madhavi, K. Valli |
|
|
79 |
C |
p. 254-261 |
artikel |
15 |
An Innovative Remote Sensing Image Retrieval Techniques Based on Haar Wavelet-LTRP and ANFIS
|
Bhandari, Kiran Ashok |
|
|
79 |
C |
p. 391-401 |
artikel |
16 |
An Integrated Approach for Jammer Detection using Software Defined Radio
|
Bhojani, Ronak |
|
|
79 |
C |
p. 809-816 |
artikel |
17 |
A Novel Approach for Specifying Functional and Non-functional Requirements Using RDS (Requirement Description Schema)
|
Shah, Tejas |
|
|
79 |
C |
p. 852-860 |
artikel |
18 |
A Novel Framework for Hypervisor Design
|
Ambika, M. |
|
|
79 |
C |
p. 190-198 |
artikel |
19 |
A Novel Idea on Multimedia Encryption Using Hybrid Crypto Approach
|
Iyer, Sridhar C. |
|
|
79 |
C |
p. 293-298 |
artikel |
20 |
A Novel Selective Encryption Method for Securing Text Over Mobile Ad Hoc Network
|
Kushwaha, Ajay |
|
|
79 |
C |
p. 16-23 |
artikel |
21 |
Architecture for Software as a Service (SaaS) Model of CBIR on Hybrid Cloud of Microsoft Azure
|
Meena, Mamta |
|
|
79 |
C |
p. 569-578 |
artikel |
22 |
Area Efficient Complex Floating Point Multiplier for Reconfigurable FFT/IFFT Processor Based on Vedic Algorithm
|
Thakare, L.P. |
|
|
79 |
C |
p. 434-440 |
artikel |
23 |
A Reliability based Variant of AODV in MANETs: Proposal, Analysis and Comparison
|
Tyagi, Shobha |
|
|
79 |
C |
p. 903-911 |
artikel |
24 |
A Scaling Robust Copy-Paste Tampering Detection for Digital Image Forensics
|
Warbhe, Anil Dada |
|
|
79 |
C |
p. 458-465 |
artikel |
25 |
A Study on the Representation of the Various Models for Dynamic Social Networks
|
Mitra, Anirban |
|
|
79 |
C |
p. 624-631 |
artikel |
26 |
A Survey on Opportunistic Routing Protocols for Wireless Sensor Networks
|
Jadhav, Payal |
|
|
79 |
C |
p. 603-609 |
artikel |
27 |
A Survey on Various Multipath Routing Protocols in Wireless Sensor Networks
|
Anasane, Aboli Arun |
|
|
79 |
C |
p. 610-615 |
artikel |
28 |
Automatic Traffic Surveillance Using Video Tracking
|
Nemade, Bhushan |
|
|
79 |
C |
p. 402-409 |
artikel |
29 |
8-Bit 250-MS/s ADC Based on SAR Architecture with Novel Comparator at 70nm Technology Node
|
Daulatabad, Shreeniwas |
|
|
79 |
C |
p. 589-596 |
artikel |
30 |
Client Side Privacy Protection Using Personalized Web Search
|
Malthankar Mrs., Sharvari V. |
|
|
79 |
C |
p. 1029-1035 |
artikel |
31 |
Computer Vision Based Fruit Grading System for Quality Evaluation of Tomato in Agriculture industry
|
Arakeri, Megha.P. |
|
|
79 |
C |
p. 426-433 |
artikel |
32 |
Confidentiality-conserving Multi-keyword Ranked Search Above Encrypted Cloud Data
|
Dhumal, Amol A. |
|
|
79 |
C |
p. 845-851 |
artikel |
33 |
Content-based File Sharing in Peer-to-peer Networks Using Threshold
|
Bhagat, Amol |
|
|
79 |
C |
p. 53-60 |
artikel |
34 |
Contents
|
|
|
|
79 |
C |
p. iii-vii |
artikel |
35 |
Cued-Click Point Graphical Password Using Circular Tolerance to Increase Password Space and Persuasive Features
|
Patra, Karmajit |
|
|
79 |
C |
p. 561-568 |
artikel |
36 |
DDoS Attack Analyzer: Using JPCAP and WinCap
|
Shinde, Pankaj |
|
|
79 |
C |
p. 781-784 |
artikel |
37 |
Dealing with Small Files Problem in Hadoop Distributed File System
|
Bende, Sachin |
|
|
79 |
C |
p. 1001-1012 |
artikel |
38 |
Design and Implementation of Stable PID Controller for Interacting Level Control System
|
Kadu, C.B. |
|
|
79 |
C |
p. 737-746 |
artikel |
39 |
Design and Simulation of a Blacklisting Technique for Detection of Hello flood Attack on LEACH Protocol
|
Mahajan, Madhura |
|
|
79 |
C |
p. 675-682 |
artikel |
40 |
Design and Verification of Low Power DA-Adaptive Digital FIR Filter
|
Mankar, Pranav J. |
|
|
79 |
C |
p. 367-373 |
artikel |
41 |
Design of Intangible Interface for Mouseless Computer Handling using Hand Gestures
|
Pradhan, Alisha |
|
|
79 |
C |
p. 287-292 |
artikel |
42 |
Detection and Prevention of Wormhole Attack in Wireless Sensor Network using AOMDV Protocol
|
Amish, Parmar |
|
|
79 |
C |
p. 700-707 |
artikel |
43 |
Development of Next Generation Encryption Algorithm for Data Transmission in 3G/4G Network
|
Ganage, Yogita |
|
|
79 |
C |
p. 1044-1050 |
artikel |
44 |
Discrimination Prevention with Classification and Privacy Preservation in Data mining
|
KumarTripathi, Krishna |
|
|
79 |
C |
p. 244-253 |
artikel |
45 |
Distributed Virtualization Manager for KVM Based Cluster
|
Gandhi Mr., Uchit |
|
|
79 |
C |
p. 182-189 |
artikel |
46 |
DoS Attack Prevention Technique in Wireless Sensor Networks
|
Patil, Shital |
|
|
79 |
C |
p. 715-721 |
artikel |
47 |
Electromagnetic Energy Harvester for Low Frequency Vibrations Using MEMS
|
Kumar, Ankita |
|
|
79 |
C |
p. 785-792 |
artikel |
48 |
Energy-Decisive and Upgrade Cooperative Spectrum Sensing in Cognitive Radio Networks
|
Chaudhary, Alpa |
|
|
79 |
C |
p. 683-691 |
artikel |
49 |
Environment Quality of Service in Cloud
|
Kalekuri, Manjusha |
|
|
79 |
C |
p. 118-126 |
artikel |
50 |
Face Recognition using Filtered Eoh-sift
|
Vinay A., |
|
|
79 |
C |
p. 543-552 |
artikel |
51 |
Feature Vector Extraction based Texture Feature using Hybrid Wavelet Type I & II for Finger Knuckle Prints for Multi-Instance Feature Fusion
|
Yadav, Vandana |
|
|
79 |
C |
p. 351-358 |
artikel |
52 |
FPGA Based Multiple Fault Tolerant and Recoverable Technique Using Triple Modular Redundancy (FRTMR)
|
Anjankar, Shubham C. |
|
|
79 |
C |
p. 827-834 |
artikel |
53 |
Gabor Wavelets Based Word Retrieval from Kannada Documents
|
Hangarge, Mallikarjun |
|
|
79 |
C |
p. 441-448 |
artikel |
54 |
High Performance of Small Cell Cloud Radio Access Network Using Radio over Backhaul
|
Sivappagari, Chandra Mohan Reedy |
|
|
79 |
C |
p. 957-962 |
artikel |
55 |
Homomorphic Encryption for Security of Cloud Data
|
Potey Mr., Manish M. |
|
|
79 |
C |
p. 175-181 |
artikel |
56 |
Hybrid Swarm Intelligence Method for Post Clustering Content Based Image Retrieval
|
Meshram, Shubhangi P. |
|
|
79 |
C |
p. 509-515 |
artikel |
57 |
Hybrid Wavelet Based CBIR System Using Software as a Service (SaaS) Model on Public Cloud
|
Meena, Mamta |
|
|
79 |
C |
p. 278-286 |
artikel |
58 |
Identity and Access Management as Security-as-a-Service from Clouds
|
Sharma, Deepak H. |
|
|
79 |
C |
p. 170-174 |
artikel |
59 |
Implementation and Mitigation of Various Tools for Pass the Hash Attack
|
Jadeja, Navjyotsinh |
|
|
79 |
C |
p. 755-764 |
artikel |
60 |
Implementation of Image Enhancement Algorithms and Recursive Ray Tracing using CUDA
|
Saha, Mr. Diptarup |
|
|
79 |
C |
p. 516-524 |
artikel |
61 |
Improvement to Blind Image Denoising by Using Local Pixel Grouping with SVD
|
Dhannawat, Rachana |
|
|
79 |
C |
p. 314-320 |
artikel |
62 |
Improving QoS of Mobile Ad-hoc Network Using Cache Update Scheme in Dynamic Source Routing Protocol
|
Mandhare, V.V. |
|
|
79 |
C |
p. 692-699 |
artikel |
63 |
Improving Security in Multi Authority Attribute Based Encryption with Fast Decryption
|
Gorasia, Nikita |
|
|
79 |
C |
p. 632-639 |
artikel |
64 |
Integration of Spark framework in Supply Chain Management
|
Jaggi Mr., Harjeet Singh |
|
|
79 |
C |
p. 1013-1020 |
artikel |
65 |
Intelligent Predictive String Search Algorithm
|
Gurung, Dipendra |
|
|
79 |
C |
p. 161-169 |
artikel |
66 |
Intensity Based Automatic Boundary Identification of Pectoral Muscle in Mammograms
|
Vikhe, P.S. |
|
|
79 |
C |
p. 262-269 |
artikel |
67 |
IoT Based Biometrics Implementation on Raspberry Pi
|
Shah, Dhvani |
|
|
79 |
C |
p. 328-336 |
artikel |
68 |
Knowledge Management for Downstream Supply Chain Management of Indian Public Sector Oil Companies
|
Desai, Aaditya |
|
|
79 |
C |
p. 1021-1028 |
artikel |
69 |
License Plate Detection Using Harris Corner and Character Segmentation by Integrated Approach from an Image
|
Patel, Hetal |
|
|
79 |
C |
p. 419-425 |
artikel |
70 |
Markov Random Field Segmentation Based Sonographic Identification of Prenatal Ventricular Septal Defect
|
Nirmala, S. |
|
|
79 |
C |
p. 344-350 |
artikel |
71 |
Materialized Cube Selection Using Particle Swarm Optimization Algorithm
|
Gosain, Anjana |
|
|
79 |
C |
p. 2-7 |
artikel |
72 |
“Measuring the Security and Reliability of Authentication of Social Networking Sites”
|
Sagar, Kumud |
|
|
79 |
C |
p. 668-674 |
artikel |
73 |
Media Access Delay and Throughput Analysis of Voice Codec with Silence Suppression on Wireless Ad Hoc Network
|
Shah, Ruchi Deepak |
|
|
79 |
C |
p. 940-947 |
artikel |
74 |
Membership Management and Positioning Method of Multiple Objects using UWB Communication
|
Jeong, Sehyun |
|
|
79 |
C |
p. 640-648 |
artikel |
75 |
Message From Editors
|
Mishra, B.K. |
|
|
79 |
C |
p. 1 |
artikel |
76 |
Mining of Association Rules on Large Database Using Distributed and Parallel Computing
|
Vasoya, Anil |
|
|
79 |
C |
p. 221-230 |
artikel |
77 |
Multipurpose Smart Bag
|
Shweta M, |
|
|
79 |
C |
p. 77-84 |
artikel |
78 |
Neighbor Adjacency based Hole Detection Protocol for Wireless Sensor Networks
|
Antil, Pearl |
|
|
79 |
C |
p. 866-874 |
artikel |
79 |
Next Generation Encryption Using Security Enhancement Algorithms for End to End Data Transmission in 3G/4G Networks
|
Kaul, Vikas |
|
|
79 |
C |
p. 1051-1059 |
artikel |
80 |
Node Heterogeneity for Energy Efficient Synchronization in Wireless Sensor Network
|
Mantri, Dnyaneshwar s |
|
|
79 |
C |
p. 885-892 |
artikel |
81 |
Novel Content Based Image Classification Method Using LBG Vector Quantization Method with Bayes and Lazy Family Data Mining Classifiers
|
Kasat, Neha R. |
|
|
79 |
C |
p. 483-489 |
artikel |
82 |
Novel Energy Efficient Election Based Routing Algorithm for Wireless Sensor Network
|
Wankhade, N.R. |
|
|
79 |
C |
p. 772-780 |
artikel |
83 |
Novel Technique for Performance Improvement of the Wavelet based Denoising Algorithms using Rotated Wavelet Filters
|
Thakur, Kirti V. |
|
|
79 |
C |
p. 499-508 |
artikel |
84 |
Novel Video Content Summarization Using Thepade's Sorted n-ary Block Truncation coding
|
Badre, Shalakha R. |
|
|
79 |
C |
p. 474-482 |
artikel |
85 |
Optimized Regression Test Using Test Case Prioritization
|
Ansari, Ahlam |
|
|
79 |
C |
p. 152-160 |
artikel |
86 |
Optimizing Sorting Algorithms Using Ubiquitous Multi-core Massively Parallel GPGPU Processors
|
Rathi, Sheetal |
|
|
79 |
C |
p. 231-237 |
artikel |
87 |
Oral-Care Goods Sales Forecasting Using Artificial Neural Network Model
|
Vhatkar, Sangeeta |
|
|
79 |
C |
p. 238-243 |
artikel |
88 |
Pattern Based Orbit Identification for Scatterometer Level-0 Signal Images
|
Dholakia, Mudit J. |
|
|
79 |
C |
p. 374-382 |
artikel |
89 |
Penalty Parameter Selection for Hierarchical Data Stream Clustering
|
Bhagat, Amol |
|
|
79 |
C |
p. 24-31 |
artikel |
90 |
Performance Analysis and Simulation of Rain Attenuation Models at 12–40 GHz Band for an Earth Space Path over Indian Cities
|
Panchal, Parth |
|
|
79 |
C |
p. 801-808 |
artikel |
91 |
Performance Analysis of AODV and DSDV Routing Protocol in MANET and Modifications in AODV against Black Hole Attack
|
Chavan, A.A. |
|
|
79 |
C |
p. 835-844 |
artikel |
92 |
Performance Analysis of Various Fuzzy Clustering Algorithms: A Review
|
Gosain, Anjana |
|
|
79 |
C |
p. 100-111 |
artikel |
93 |
Performance Analysis on Frequency Response of Finite Impulse Response Filter
|
Mohapatra, Badri Narayan |
|
|
79 |
C |
p. 729-736 |
artikel |
94 |
Performance Estimation of Voltage Controlled Ring Oscillator Designed for Soc Application
|
Save, Sandhya |
|
|
79 |
C |
p. 948-956 |
artikel |
95 |
Performance Evaluation and Measurement for Energy Efficient Wireless Networks
|
Shah, Hemang |
|
|
79 |
C |
p. 971-977 |
artikel |
96 |
Performance Evaluation of Distributed Association Rule Mining Algorithms
|
Sawant Ms., Vinaya |
|
|
79 |
C |
p. 127-134 |
artikel |
97 |
Performance Evaluation of MANET Network Parameters Using AODV Protocol for HEAACK Enhancement
|
Patel, Parth |
|
|
79 |
C |
p. 932-939 |
artikel |
98 |
Performance Measurement of GSTEB Protocol Using NS-2
|
Wagh, Gaurav |
|
|
79 |
C |
p. 978-985 |
artikel |
99 |
Performing Customer Behavior Analysis using Big Data Analytics
|
Khade, Anindita A. |
|
|
79 |
C |
p. 986-992 |
artikel |
100 |
Pixel Based Image Forensic Technique for Copy-move Forgery Detection Using Auto Color Correlogram
|
Malviya, Ashwini V. |
|
|
79 |
C |
p. 383-390 |
artikel |
101 |
Poisson Noise Reducing Bilateral Filter
|
Thakur, Kirti V. |
|
|
79 |
C |
p. 861-865 |
artikel |
102 |
Privacy Preserving Distributed Association Rule Hiding Using Concept Hierarchy
|
Modak, Masooda |
|
|
79 |
C |
p. 993-1000 |
artikel |
103 |
Qualified Vector Match and Merge Algorithm (QVMMA) for DDoS Prevention and Mitigation
|
Laskar, Sonia |
|
|
79 |
C |
p. 41-52 |
artikel |
104 |
Score Level Fusion Based Bimodal Biometric Identification Using Thepade's Sorted n-ary Block Truncation Coding with Variod Proportions of Iris and Palmprint Traits
|
Madane, Manisha |
|
|
79 |
C |
p. 466-473 |
artikel |
105 |
Script Identification Using Gabor Feature and SVM Classifier
|
Chaudhari, Shailesh |
|
|
79 |
C |
p. 85-92 |
artikel |
106 |
Securing VANET by Preventing Attacker Node Using Watchdog and Bayesian Network Theory
|
Rupareliya, Jay |
|
|
79 |
C |
p. 649-656 |
artikel |
107 |
Segmentation of Moving Object with Uncovered Background, Temporary Poses and GMOB
|
Vaikole, Shubhangi |
|
|
79 |
C |
p. 299-304 |
artikel |
108 |
Shared vision system
|
Khana, Saiqa |
|
|
79 |
C |
p. 525-532 |
artikel |
109 |
Signature Verification SaaS Implementation on Microsoft Azure Cloud
|
Philip, Joel |
|
|
79 |
C |
p. 410-418 |
artikel |
110 |
Simulation Analysis of Three Level Diode Clamped Multilevel Inverter Fed PMSM Drive Using Carrier Based Space Vector Pulse Width Modulation (CB-SVPWM)
|
Shriwastava, R.G. |
|
|
79 |
C |
p. 616-623 |
artikel |
111 |
Simulation of Bi-directional DC-DC Converter Using FPGA
|
Karthigeyan, P. |
|
|
79 |
C |
p. 708-714 |
artikel |
112 |
Smart Cart with Automatic Billing, Product Information, Product Recommendation Using RFID & Zigbee with Anti-Theft
|
Yewatkar, Ankush |
|
|
79 |
C |
p. 793-800 |
artikel |
113 |
Soft Computing Based Power Control for Interference Mitigation in LTE Femtocell Networks
|
Sivaraj, Nirmala |
|
|
79 |
C |
p. 93-99 |
artikel |
114 |
Some Common Coupled Fixed Point Results on Modified Intuitionistic Fuzzy Metric Spaces
|
Gupta, Vishal |
|
|
79 |
C |
p. 32-40 |
artikel |
115 |
Some Fixed Point Result Involving Generalized Altering Distance Function
|
Gupta, Vishal |
|
|
79 |
C |
p. 112-117 |
artikel |
116 |
Statistical Steganalysis of High Capacity Image Steganography with Cryptography
|
Sabnis, S.K. |
|
|
79 |
C |
p. 321-327 |
artikel |
117 |
Study of Vocal Tract Shape Estimation Techniques for Children
|
Veena S., |
|
|
79 |
C |
p. 270-277 |
artikel |
118 |
Subthreshold Circuit Designing and Implementation of Finite Field Multiplier for Cryptography Application
|
Singh, Praveen |
|
|
79 |
C |
p. 597-602 |
artikel |
119 |
Synchronization between Non-autonomous Hyperchaotc Systems with Uncertainties Using Active Control Method
|
Yadav, Vijay K. |
|
|
79 |
C |
p. 963-970 |
artikel |
120 |
Texture Feature Extraction Using Hybrid Wavelet Type I & II for Finger Knuckle Prints for Multi-algorithmic Feature Fusion
|
Yadav, Vandana |
|
|
79 |
C |
p. 359-366 |
artikel |
121 |
The Impacts of Test Automation on Software's Cost, Quality and Time to Market
|
Kumar, Divya |
|
|
79 |
C |
p. 8-15 |
artikel |
122 |
The Shoulder Surfing Resistant Graphical Password Authentication Technique
|
Gokhale Mrs., Aakansha S. |
|
|
79 |
C |
p. 875-884 |
artikel |
123 |
The Shoulder Surfing Resistant Graphical Password Authentication Technique
|
Gokhale, Mrs. Aakansha S. |
|
|
79 |
C |
p. 490-498 |
artikel |
124 |
Third Party Public Auditing Scheme for Cloud Storage
|
More, Swapnali |
|
|
79 |
C |
p. 69-76 |
artikel |
125 |
Truncated DCT and Decomposed DWT SVD Features for Image Retrieval
|
Sai, N.S.T. |
|
|
79 |
C |
p. 579-588 |
artikel |
126 |
Trust-based Voting Method for Efficient Malware Detection
|
More, Shraddha S. |
|
|
79 |
C |
p. 657-667 |
artikel |
127 |
Tumor Detection In Brain Using Genetic Algorithm
|
Chandra, G. Rajesh |
|
|
79 |
C |
p. 449-457 |
artikel |
128 |
Use of Fuzzy Tool for Example Based Machine Translation
|
Rana, Manish |
|
|
79 |
C |
p. 199-206 |
artikel |
129 |
Virtual Machine Monitoring in Cloud Computing
|
Saswade, Nikhil |
|
|
79 |
C |
p. 135-142 |
artikel |
130 |
VLSI Implementation of a Rate Decoder for Structural LDPC Channel Codes
|
Kakde, Sandeep |
|
|
79 |
C |
p. 765-771 |
artikel |
131 |
Wireless Network Topological Routing in Wireless Sensor Networks
|
Krishna, K. Hari |
|
|
79 |
C |
p. 817-826 |
artikel |
132 |
Wireless Sensor Network Topology Control Sing Clustering
|
Krishna, K. Hari |
|
|
79 |
C |
p. 893-902 |
artikel |