nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Achieving energy efficiency using novel scalar multiplication based ECC for android devices in Internet of Things environments
|
Kumar, K. Sathish |
|
|
22 |
supplement-5 |
p. 12021-12028 |
artikel |
2 |
A cluster based mobile data gathering using SDMA and PSO techniques in WSN
|
Vijayalakshmi, K. |
|
|
22 |
supplement-5 |
p. 12727-12736 |
artikel |
3 |
A comparative analysis of similarity distance measure functions for biocryptic authentication in cloud databases
|
Ramya, R. |
|
|
22 |
supplement-5 |
p. 12147-12155 |
artikel |
4 |
A cost-sensitive method for wireless sensor network min beacon node set construction
|
Bin, Tang |
|
|
22 |
supplement-5 |
p. 11551-11559 |
artikel |
5 |
A coverage hole detection and repair algorithm in wireless sensor networks
|
Feng, Xin |
|
|
22 |
supplement-5 |
p. 12473-12480 |
artikel |
6 |
Adaptable and proficient Hellinger Coefficient Based Collaborative Filtering for recommendation system
|
Maheswari, M. |
|
|
22 |
supplement-5 |
p. 12325-12338 |
artikel |
7 |
A filtering of message in online social network using hybrid classifier
|
Srividya, M. |
|
|
22 |
supplement-5 |
p. 11079-11086 |
artikel |
8 |
A framework for recommending health-related topics based on topic modeling in conversational data (Twitter)
|
Kaveri, V. Vijeya |
|
|
22 |
supplement-5 |
p. 10963-10968 |
artikel |
9 |
A fusion framework based on fuzzy integrals for passive-blind image tamper detection
|
Kaur, Mandeep |
|
|
22 |
supplement-5 |
p. 11363-11378 |
artikel |
10 |
A Fuzzy clustering based MRI brain image segmentation using back propagation neural networks
|
Senthilkumar, C. |
|
|
22 |
supplement-5 |
p. 12305-12312 |
artikel |
11 |
A hybrid ABC-SA based optimized scheduling and resource allocation for cloud environment
|
Muthulakshmi, B. |
|
|
22 |
supplement-5 |
p. 10769-10777 |
artikel |
12 |
A hybrid approach for mismatch data reduction in datasets and guide data mining
|
Dhanalakshmi, R. |
|
|
22 |
supplement-5 |
p. 10605-10614 |
artikel |
13 |
AI-based survivable design for hybrid virtual networks for single regional failures in cloud data centers
|
Sun, Jian |
|
|
22 |
supplement-5 |
p. 12009-12019 |
artikel |
14 |
A light weight FFT based enciphering system for extending the lifetime of mobile ad hoc networks
|
Kavitha, T. |
|
|
22 |
supplement-5 |
p. 12339-12349 |
artikel |
15 |
A lightweight physical-layer based security strategy for Internet of things
|
Jiang, Yu |
|
|
22 |
supplement-5 |
p. 12971-12983 |
artikel |
16 |
A modified multi objective heuristic for effective feature selection in text classification
|
Thiyagarajan, D. |
|
|
22 |
supplement-5 |
p. 10625-10635 |
artikel |
17 |
A multi objective Tabu particle swarm optimization for effective cluster head selection in WSN
|
Vijayalakshmi, K. |
|
|
22 |
supplement-5 |
p. 12275-12282 |
artikel |
18 |
An adaptive signal strength based localization approach for wireless sensor networks
|
Kiruthiga, G. |
|
|
22 |
supplement-5 |
p. 10439-10448 |
artikel |
19 |
Analog to information convertor using cascaded transform and Gaussian random matrix
|
Nirmalraj, S. |
|
|
22 |
supplement-5 |
p. 11813-11820 |
artikel |
20 |
Analytically derived fuzzy membership functions
|
Zhang, Weiping |
|
|
22 |
supplement-5 |
p. 11849-11876 |
artikel |
21 |
An approach of improved dynamic deep belief nets modeling for algae bloom prediction
|
Wang, Li |
|
|
22 |
supplement-5 |
p. 11713-11721 |
artikel |
22 |
An automated and hybrid method for cyst segmentation in dental X-ray images
|
Karthika Devi, R. |
|
|
22 |
supplement-5 |
p. 12179-12191 |
artikel |
23 |
An early intelligent diagnosis model for drilling overflow based on GA–BP algorithm
|
Liang, Haibo |
|
|
22 |
supplement-5 |
p. 10649-10668 |
artikel |
24 |
An effective software project effort estimation system using optimal firefly algorithm
|
Resmi, V. |
|
|
22 |
supplement-5 |
p. 11329-11338 |
artikel |
25 |
An efficient and improved multi-objective optimized replication management with dynamic and cost aware strategies in cloud computing data center
|
Edwin, E. Bijolin |
|
|
22 |
supplement-5 |
p. 11119-11128 |
artikel |
26 |
An efficient and low power impulsive noise suppressor architecture for OFDM system
|
Devarajan, N. Manikanda |
|
|
22 |
supplement-5 |
p. 12777-12783 |
artikel |
27 |
An efficient approach to circumvent black hole nodes in manets
|
Tamilselvi, P. |
|
|
22 |
supplement-5 |
p. 11401-11409 |
artikel |
28 |
An efficient clustering scheme for cloud computing problems using metaheuristic algorithms
|
Baalamurugan, K. M. |
|
|
22 |
supplement-5 |
p. 12917-12927 |
artikel |
29 |
An efficient FMRI classification technique in cloud using multiple parallel feature selection algorithm
|
Pachhaiammal@Priya, M. |
|
|
22 |
supplement-5 |
p. 11899-11907 |
artikel |
30 |
An efficient PCA based pose and occlusion invariant face recognition system for video surveillance
|
Yoganand, A. Vivek |
|
|
22 |
supplement-5 |
p. 11443-11456 |
artikel |
31 |
An efficient performance evaluation model for the resource clusters in cloud environment using continuous time Markov chain and Poisson process
|
Kowsigan, M. |
|
|
22 |
supplement-5 |
p. 12411-12419 |
artikel |
32 |
An efficient system for customer churn prediction through particle swarm optimization based feature selection model with simulated annealing
|
Vijaya, J. |
|
|
22 |
supplement-5 |
p. 10757-10768 |
artikel |
33 |
An energy aware competition based clustering for cluster head selection in wireless sensor network with mobility
|
Narendran, M. |
|
|
22 |
supplement-5 |
p. 11019-11028 |
artikel |
34 |
An enhanced channel estimation technique for CDD OFDM system over time varying channels
|
Raja, A. |
|
|
22 |
supplement-5 |
p. 12069-12075 |
artikel |
35 |
An enhanced energy optimization routing protocol using double cluster heads for wireless sensor network
|
Wang, Lei |
|
|
22 |
supplement-5 |
p. 11057-11068 |
artikel |
36 |
An enhanced J48 classification algorithm for the anomaly intrusion detection systems
|
Aljawarneh, Shadi |
|
|
22 |
supplement-5 |
p. 10549-10565 |
artikel |
37 |
An enhancing reversible data hiding for secured data using shuffle block key encryption and histogram bit shifting in cloud environment
|
Senthilnathan, T. |
|
|
22 |
supplement-5 |
p. 12839-12847 |
artikel |
38 |
An evaluation framework for auto-conversion of 2D to 3D video streaming using depth profile and pipelining technique in handheld cellular devices
|
Ramesh, P. S. |
|
|
22 |
supplement-5 |
p. 11741-11753 |
artikel |
39 |
An heuristic cloud based segmentation technique using edge and texture based two dimensional entropy
|
Jaganathan, M. |
|
|
22 |
supplement-5 |
p. 12767-12776 |
artikel |
40 |
An improved algorithm based on CLAHE for ultrasonic well logging image enhancement
|
Fu, Qingqing |
|
|
22 |
supplement-5 |
p. 12609-12618 |
artikel |
41 |
An improved efficient: Artificial Bee Colony algorithm for security and QoS aware scheduling in cloud computing environment
|
Thanka, M. Roshni |
|
|
22 |
supplement-5 |
p. 10905-10913 |
artikel |
42 |
An improved framework for authorship identification in online messages
|
Srinivasan, L. |
|
|
22 |
supplement-5 |
p. 12101-12110 |
artikel |
43 |
An improved fuzzy enabled optimal multipath routing for wireless sensor network
|
Sindhuja, P. |
|
|
22 |
supplement-5 |
p. 11689-11697 |
artikel |
44 |
An improved load balanced metaheuristic scheduling in cloud
|
Aruna, M. |
|
|
22 |
supplement-5 |
p. 10873-10881 |
artikel |
45 |
An improved neighbor cooperation using adjacent node cooperation in peer to peer networks
|
Raju, S. |
|
|
22 |
supplement-5 |
p. 12263-12274 |
artikel |
46 |
An intelligent intrusion detection system for secure wireless communication using IPSO and negative selection classifier
|
Bhuvaneswari, G. |
|
|
22 |
supplement-5 |
p. 12429-12441 |
artikel |
47 |
An intelligent method of cancer prediction based on mobile cloud computing
|
Zhang, Guoyin |
|
|
22 |
supplement-5 |
p. 11527-11535 |
artikel |
48 |
An novel approach to extract the content retrieval with the image perception using collaborative community oriented sifting (CCOS)
|
Manjula, R. |
|
|
22 |
supplement-5 |
p. 10567-10575 |
artikel |
49 |
An optimal approach for watermarking using MRC4 encryption scheme
|
Pappa, C. Kanmani |
|
|
22 |
supplement-5 |
p. 11183-11191 |
artikel |
50 |
An optimal criterion feature selection method for prediction and effective analysis of heart disease
|
Prakash, S. |
|
|
22 |
supplement-5 |
p. 11957-11963 |
artikel |
51 |
A novel algorithm for threshold image denoising based on wavelet construction
|
Jianhua, Zhang |
|
|
22 |
supplement-5 |
p. 12443-12450 |
artikel |
52 |
A novel clustering algorithm of extracting road network from low-frequency floating car data
|
Zheng, Ke |
|
|
22 |
supplement-5 |
p. 12659-12668 |
artikel |
53 |
A novel 3- level energy heterogeneity clustering protocol with hybrid routing for a concentric circular wireless sensor network
|
Chithra, A. |
|
|
22 |
supplement-5 |
p. 11101-11108 |
artikel |
54 |
A novel medical image enhancement algorithm based on improvement correction strategy in wavelet transform domain
|
Xia, Kai-jian |
|
|
22 |
supplement-5 |
p. 10969-10977 |
artikel |
55 |
A novel method for adaptive fault tolerance during load balancing in cloud computing
|
Tamilvizhi, T. |
|
|
22 |
supplement-5 |
p. 10425-10438 |
artikel |
56 |
A novel method to detect bleeding frame and region in wireless capsule endoscopy video
|
Sivakumar, P. |
|
|
22 |
supplement-5 |
p. 12219-12225 |
artikel |
57 |
A novel of multi-hop transmission in integrated network of WLAN IEEE 802.11n and IEEE 802.11g using Riverbed Modeler 17.5
|
Samuthira Pandi, V. |
|
|
22 |
supplement-5 |
p. 10679-10686 |
artikel |
58 |
A novel semi supervised learning algorithm for thyroid and ulcer classification in tongue image
|
Devi, G. Uma |
|
|
22 |
supplement-5 |
p. 11537-11549 |
artikel |
59 |
A novel trust model of dynamic optimization based on entropy method in wireless sensor networks
|
Nie, Shuzhi |
|
|
22 |
supplement-5 |
p. 11153-11162 |
artikel |
60 |
A polynomial time algorithm for a variant of shortest vector problem with applications in compute-and-forward design
|
Tong, Chao |
|
|
22 |
supplement-5 |
p. 10415-10424 |
artikel |
61 |
Appliance of effective clustering technique for gene expression datasets using GPU
|
Saveetha, V. |
|
|
22 |
supplement-5 |
p. 12381-12388 |
artikel |
62 |
Application of an intelligent early-warning method based on DBSCAN clustering for drilling overflow accident
|
Haibo, Liang |
|
|
22 |
supplement-5 |
p. 12599-12608 |
artikel |
63 |
A prolonged network life time and reliable data transmission aware optimal sink relocation mechanism
|
Pushpalatha, A. |
|
|
22 |
supplement-5 |
p. 12049-12058 |
artikel |
64 |
A robust wavelet based decomposition of facial images to improve recognition accuracy in standard appearance based statistical face recognition methods
|
Senthilkumar, R. |
|
|
22 |
supplement-5 |
p. 12785-12794 |
artikel |
65 |
A rough set data prediction method based on neural network evaluation and least squares fusion
|
Fei, Xi |
|
|
22 |
supplement-5 |
p. 11641-11646 |
artikel |
66 |
A rule based delay constrained energy efficient routing technique for wireless sensor networks
|
Selvi, M. |
|
|
22 |
supplement-5 |
p. 10839-10848 |
artikel |
67 |
A spatio-frequency orientational energy based medical image fusion using non-sub sampled contourlet transform
|
Devanna, H. |
|
|
22 |
supplement-5 |
p. 11193-11205 |
artikel |
68 |
A study and analysis on block matching algorithms for motion estimation in video coding
|
Manikandan, L. C. |
|
|
22 |
supplement-5 |
p. 11773-11780 |
artikel |
69 |
Augmented lightweight security scheme with access control model for wireless medical sensor networks
|
Vaniprabha, A. |
|
|
22 |
supplement-5 |
p. 12495-12505 |
artikel |
70 |
Authentication based on blind signature and ring signature algorithms during vertical handover in heterogeneous wireless networks
|
Kalpana, S. |
|
|
22 |
supplement-5 |
p. 12037-12047 |
artikel |
71 |
Automatic sedimentary microfacies identification from logging curves based on deep process neural network
|
Liu, Hui |
|
|
22 |
supplement-5 |
p. 12451-12457 |
artikel |
72 |
A variable neighborhood search based genetic algorithm for flexible job shop scheduling problem
|
Zhang, Guohui |
|
|
22 |
supplement-5 |
p. 11561-11572 |
artikel |
73 |
Avoiding fuel theft in multifleet vehicles using vehicular adhoc network
|
Senthilraja, P. |
|
|
22 |
supplement-5 |
p. 11175-11181 |
artikel |
74 |
Bacterial foraging information swarm optimizer for detecting affective and informative content in medical blogs
|
Neeba, E. A. |
|
|
22 |
supplement-5 |
p. 10743-10756 |
artikel |
75 |
Body area network with mobile anchor based localization
|
Kavitha, M. G. |
|
|
22 |
supplement-5 |
p. 10779-10788 |
artikel |
76 |
Cat swarm algorithm in wireless sensor networks for optimized cluster head selection: a real time approach
|
Chandirasekaran, D. |
|
|
22 |
supplement-5 |
p. 11351-11361 |
artikel |
77 |
CCMA—cloud critical metric assessment framework for scientific computing
|
Ravindhren, V. G. |
|
|
22 |
supplement-5 |
p. 11307-11317 |
artikel |
78 |
Channel selection using glow swarm optimization and its application in line of sight secure communication
|
Franklin Alex Joseph, A. |
|
|
22 |
supplement-5 |
p. 10801-10808 |
artikel |
79 |
Classical energy detection method for spectrum detecting in cognitive radio networks by using robust augmented threshold technique
|
Sarala, B. |
|
|
22 |
supplement-5 |
p. 11109-11118 |
artikel |
80 |
Classification of malignant melanoma and benign skin lesion by using back propagation neural network and ABCD rule
|
Monisha, M. |
|
|
22 |
supplement-5 |
p. 12897-12907 |
artikel |
81 |
Clustering of near duplicate images using bundled features
|
Kalaiarasi, G. |
|
|
22 |
supplement-5 |
p. 11997-12007 |
artikel |
82 |
Clutch control of a hybrid electrical vehicle based on neuron-adaptive PID algorithm
|
Huang, Bin |
|
|
22 |
supplement-5 |
p. 12091-12099 |
artikel |
83 |
Collaborative approach on mitigating spectrum sensing data hijack attack and dynamic spectrum allocation based on CASG modeling in wireless cognitive radio networks
|
Vimal, S. |
|
|
22 |
supplement-5 |
p. 10491-10501 |
artikel |
84 |
Comparative analysis of zoning approaches for recognition of Indo Aryan language using SVM classifier
|
Dinesh, P. M. |
|
|
22 |
supplement-5 |
p. 10955-10962 |
artikel |
85 |
Competent resource provisioning and distribution techniques for cloud computing environment
|
Suresh, A. |
|
|
22 |
supplement-5 |
p. 11039-11046 |
artikel |
86 |
Congestion control and packet recovery for cross layer approach in MANET
|
Gowtham, M. S. |
|
|
22 |
supplement-5 |
p. 12029-12036 |
artikel |
87 |
Context-aware cloud-based systems: design aspects
|
Vahdat-Nejad, Hamed |
|
|
22 |
supplement-5 |
p. 11601-11617 |
artikel |
88 |
Continuous security assessment of cloud based applications using distributed hashing algorithm in SDLC
|
Vijayakumar, K. |
|
|
22 |
supplement-5 |
p. 10789-10800 |
artikel |
89 |
Continuous user authentication based score level fusion with hybrid optimization
|
Prakash, A. |
|
|
22 |
supplement-5 |
p. 12959-12969 |
artikel |
90 |
Contourlet transform based adaptive nonlinear diffusion filtering for speckle noise removal in ultrasound images
|
Jubairahmed, L. |
|
|
22 |
supplement-5 |
p. 11237-11246 |
artikel |
91 |
Contrast for QOS based clustered energy efficient protocol with PSO and multi-hop gateways in wireless sensor network
|
Selvakumar, K. |
|
|
22 |
supplement-5 |
p. 11883-11890 |
artikel |
92 |
Correction to: A variable neighborhood search based genetic algorithm for flexible job shop scheduling problem
|
Zhang, Guohui |
|
|
22 |
supplement-5 |
p. 11573 |
artikel |
93 |
Cross-layer based routing protocol and solution to packet reordering for TCP in MANET
|
Sunitha, Dodda |
|
|
22 |
supplement-5 |
p. 10809-10816 |
artikel |
94 |
Data mining application on aviation accident data for predicting topmost causes for accidents
|
Koteeswaran, S. |
|
|
22 |
supplement-5 |
p. 11379-11399 |
artikel |
95 |
Defending against jellyfish attacks using cluster based routing protocol for secured data transmission in MANET
|
Satheeshkumar, S. |
|
|
22 |
supplement-5 |
p. 10849-10860 |
artikel |
96 |
Defining the threshold bounds for effective modelling of aggregated IDS
|
Priya, N. |
|
|
22 |
supplement-5 |
p. 11765-11771 |
artikel |
97 |
Denial of service attack solution in OLSR based manet by varying number of fictitious nodes
|
Bhuvaneswari, R. |
|
|
22 |
supplement-5 |
p. 12689-12699 |
artikel |
98 |
Design of efficient wireless communication system with improved SER using different relay environment
|
Saravanan, K. |
|
|
22 |
supplement-5 |
p. 10519-10527 |
artikel |
99 |
Design of high performance filter bank multi-carrier transmitter
|
Radhika, P. |
|
|
22 |
supplement-5 |
p. 12521-12527 |
artikel |
100 |
Design of TAREEN (trust aware routing with energy efficient network) and enactment of TARF: a trust-aware routing framework for wireless sensor networks
|
Udhayavani, M. |
|
|
22 |
supplement-5 |
p. 11919-11927 |
artikel |
101 |
Detection of duplicated data with minimum overhead and secure data transmission for sensor big data
|
Beulah, S. |
|
|
22 |
supplement-5 |
p. 10467-10479 |
artikel |
102 |
Development trend of sharing economy in big data era based on duplication dynamic evolution game theory
|
Wei, Liping |
|
|
22 |
supplement-5 |
p. 13011-13019 |
artikel |
103 |
Discovery of optimal multicast routes in MANETs using cross-layer approach and fuzzy logic support system
|
Sivakumar, S. |
|
|
22 |
supplement-5 |
p. 11467-11476 |
artikel |
104 |
Dynamic multi-keyword based search algorithm using modified based fully homomorphic encryption and Prim’s algorithm
|
Rajan, D. Palanivel |
|
|
22 |
supplement-5 |
p. 11411-11424 |
artikel |
105 |
Dynamics analysis and simulation of six DOF parafoil system
|
Zhang, Zhixiang |
|
|
22 |
supplement-5 |
p. 12669-12680 |
artikel |
106 |
Edge detection of satellite image using fuzzy logic
|
Dhivya, R. |
|
|
22 |
supplement-5 |
p. 11891-11898 |
artikel |
107 |
EEG seizure classification based on exploiting phase space reconstruction and extreme learning
|
Kumar, S. T. Sadish |
|
|
22 |
supplement-5 |
p. 11477-11487 |
artikel |
108 |
Effective failure nodes detection using matrix calculus algorithm in wireless sensor networks
|
Palanikumar, R. |
|
|
22 |
supplement-5 |
p. 12127-12136 |
artikel |
109 |
Efficient analysis of water quality measurement reporting system using IOT based system in WSN
|
Parameswari, M. |
|
|
22 |
supplement-5 |
p. 12193-12201 |
artikel |
110 |
Efficient data retrieval using adaptive clustered indexing for continuous queries over streaming data
|
Sumalatha, M. R. |
|
|
22 |
supplement-5 |
p. 10503-10517 |
artikel |
111 |
Efficient energy optimization in mobile ad hoc network (MANET) using better-quality AODV protocol
|
Anand, M. |
|
|
22 |
supplement-5 |
p. 12681-12687 |
artikel |
112 |
Efficient performance upsurge in live migration with downturn in the migration time and downtime
|
Kumar, A. Vishnu |
|
|
22 |
supplement-5 |
p. 12737-12747 |
artikel |
113 |
Energy aware and fast authentication scheme using identity based encryption in wireless sensor networks
|
Sogani, Ayush |
|
|
22 |
supplement-5 |
p. 10637-10648 |
artikel |
114 |
Energy efficient, obstacle avoidance path planning trajectory for localization in wireless sensor network
|
Magadevi, N. |
|
|
22 |
supplement-5 |
p. 10529-10535 |
artikel |
115 |
Energy efficient parallel hybrid adder architecture for 3X generation in radix-8 booth encoding
|
Nirmaladevi, R. |
|
|
22 |
supplement-5 |
p. 10709-10716 |
artikel |
116 |
Enhanced approach for wireless sensor network based on localization, time synchronization and quality of service routing
|
Palaniappan, Sathyaprakash |
|
|
22 |
supplement-5 |
p. 11781-11790 |
artikel |
117 |
Enhancing 4G Co-existence with Wi-Fi/IoT using cognitive radio
|
Sumathi, A. C. |
|
|
22 |
supplement-5 |
p. 11295-11305 |
artikel |
118 |
Enhancing iris recognition framework using feature selection and BPNN
|
Nithya, A. Alice |
|
|
22 |
supplement-5 |
p. 12363-12372 |
artikel |
119 |
Escalating quality of services with channel assignment and traffic scheduling in wireless mesh networks
|
Selvakumar, K. |
|
|
22 |
supplement-5 |
p. 11949-11955 |
artikel |
120 |
Esteemed software patterns for banking system
|
Rajesh, Sudha |
|
|
22 |
supplement-5 |
p. 11087-11099 |
artikel |
121 |
FCC: Fast congestion control scheme for wireless sensor networks using hybrid optimal routing algorithm
|
Raman, C. J. |
|
|
22 |
supplement-5 |
p. 12701-12711 |
artikel |
122 |
Feature selection using firefly algorithm in software defect prediction
|
Anbu, M. |
|
|
22 |
supplement-5 |
p. 10925-10934 |
artikel |
123 |
Feature selection using fish swarm optimization in big data
|
Manikandan, R. P. S. |
|
|
22 |
supplement-5 |
p. 10825-10837 |
artikel |
124 |
Firefly load balancing based energy optimized routing for multimedia data delivery in wireless mesh network
|
Raja, G. P. |
|
|
22 |
supplement-5 |
p. 12077-12090 |
artikel |
125 |
FPGA architecture for text extraction from images
|
Vignesh, O. |
|
|
22 |
supplement-5 |
p. 12137-12146 |
artikel |
126 |
FPGA based seizure detection and control for brain computer interface
|
Tamilarasi, S. |
|
|
22 |
supplement-5 |
p. 11841-11848 |
artikel |
127 |
FPGA implementation of modified error normalized LMS adaptive filter for ECG noise removal
|
Venkatesan, C. |
|
|
22 |
supplement-5 |
p. 12233-12241 |
artikel |
128 |
FSO–PSO based multihop clustering in WSN for efficient Medical Building Management System
|
Shanthi, G. |
|
|
22 |
supplement-5 |
p. 12157-12168 |
artikel |
129 |
Fuzzy based edge enhanced text detection algorithm using MSER
|
Thilagavathy, A. |
|
|
22 |
supplement-5 |
p. 11681-11687 |
artikel |
130 |
Fuzzy c-means clustering algorithm for performance improvement of ENN
|
Zhou, Yu |
|
|
22 |
supplement-5 |
p. 11163-11174 |
artikel |
131 |
Fuzzy expert system-based framework for flood management in Saudi Arabia
|
Amin, Saad |
|
|
22 |
supplement-5 |
p. 11723-11740 |
artikel |
132 |
Game analysis of XBRL taxonomy extension
|
Zhang, Yingmin |
|
|
22 |
supplement-5 |
p. 12529-12538 |
artikel |
133 |
Gauss-core extension dependent prediction algorithm for collaborative filtering recommendation
|
Xu, L. B. |
|
|
22 |
supplement-5 |
p. 11501-11511 |
artikel |
134 |
Genetic algorithm based sensor node classifications in wireless body area networks (WBAN)
|
Kalaiselvi, K. |
|
|
22 |
supplement-5 |
p. 12849-12855 |
artikel |
135 |
Gesture recognition based on an improved local sparse representation classification algorithm
|
He, Yang |
|
|
22 |
supplement-5 |
p. 10935-10946 |
artikel |
136 |
HBS-CRA: scaling impact of change request towards fault proneness: defining a heuristic and biases scale (HBS) of change request artifacts (CRA)
|
Madapuri, Rudra Kumar |
|
|
22 |
supplement-5 |
p. 11591-11599 |
artikel |
137 |
HHSRP: a cluster based hybrid hierarchical secure routing protocol for wireless sensor networks
|
Deepa, C. |
|
|
22 |
supplement-5 |
p. 10449-10465 |
artikel |
138 |
Human activity recognition in egocentric video using PNN, SVM, kNN and SVM+kNN classifiers
|
Sanal Kumar, K. P. |
|
|
22 |
supplement-5 |
p. 10577-10586 |
artikel |
139 |
Hybrid Lempel–Ziv–Welch and clipped histogram equalization based medical image compression
|
Manimekalai, M. A. P. |
|
|
22 |
supplement-5 |
p. 12805-12816 |
artikel |
140 |
Identification of suitable membership and kernel function for FCM based FSVM classifier model
|
Sridevi, P. |
|
|
22 |
supplement-5 |
p. 11965-11974 |
artikel |
141 |
Image fusion for MODIS and Landsat images using top hat based moving technique with FIS
|
Swathika, R. |
|
|
22 |
supplement-5 |
p. 12939-12947 |
artikel |
142 |
Improved group key management region based cluster protocol in cloud
|
Salma, B. Umi |
|
|
22 |
supplement-5 |
p. 11699-11711 |
artikel |
143 |
Improving energy utilization using multi hop data aggregation with node switching in wireless sensor network
|
Sudha, L. |
|
|
22 |
supplement-5 |
p. 12749-12757 |
artikel |
144 |
Improving image steganalyser performance through curvelet transform denoising
|
Hemalatha, J. |
|
|
22 |
supplement-5 |
p. 11821-11839 |
artikel |
145 |
Improving performance of cooperative communication in heterogeneous manet environment
|
Sangeetha, S. K. B. |
|
|
22 |
supplement-5 |
p. 12389-12395 |
artikel |
146 |
Indicator-based multi-objective adaptive bacterial foraging algorithm for RFID network planning
|
Yuan, Chaochun |
|
|
22 |
supplement-5 |
p. 12649-12657 |
artikel |
147 |
Intelligent ontology based semantic information retrieval using feature selection and classification
|
Selvalakshmi, B. |
|
|
22 |
supplement-5 |
p. 12871-12881 |
artikel |
148 |
Intelligent relay selection and spectrum sharing techniques for cognitive radio networks
|
Ruby, D. |
|
|
22 |
supplement-5 |
p. 10537-10548 |
artikel |
149 |
Intrusion detection of distributed denial of service attack in cloud
|
Velliangiri, S. |
|
|
22 |
supplement-5 |
p. 10615-10623 |
artikel |
150 |
IoT based industrial safety measures monitoring and reporting system using accident reduction model (ARM) control algorithm
|
Rajmohan, Palanivelu |
|
|
22 |
supplement-5 |
p. 11259-11269 |
artikel |
151 |
Key technology and application of millimeter wave communications for 5G: a survey
|
Xu, Xiaoling |
|
|
22 |
supplement-5 |
p. 12997-13009 |
artikel |
152 |
Layout scheme of high-speed railway transfer hubs: bi-level modeling and hybrid genetic algorithm approach
|
Tong, Lu |
|
|
22 |
supplement-5 |
p. 12551-12566 |
artikel |
153 |
Low power NoC architecture based dynamic reconfigurable system
|
Nirmaladevi, K. |
|
|
22 |
supplement-5 |
p. 11489-11500 |
artikel |
154 |
Manifold scalable video conveyance for m-wellbeing crisis relevance
|
Balaji, L. |
|
|
22 |
supplement-5 |
p. 10729-10741 |
artikel |
155 |
Map Reduce for big data processing based on traffic aware partition and aggregation
|
Venkatesh, G. |
|
|
22 |
supplement-5 |
p. 12909-12915 |
artikel |
156 |
Markovian model based indoor location tracking for Internet of Things (IoT) applications
|
Jeba Malar, A. Christy |
|
|
22 |
supplement-5 |
p. 11805-11812 |
artikel |
157 |
Maximizing quality of multimedia streaming services in heterogeneous wireless networks using optimal multi-server technique
|
Duraimurugan, S. |
|
|
22 |
supplement-5 |
p. 12883-12895 |
artikel |
158 |
Millimeter wave CMOS minimum noise amplifier for automotive radars in the frequency band (60–66 GHZ)
|
Suganthi, K. |
|
|
22 |
supplement-5 |
p. 11755-11764 |
artikel |
159 |
Minimum connected dominating set based RSU allocation for smartCloud vehicles in VANET
|
Chinnasamy, A. |
|
|
22 |
supplement-5 |
p. 12795-12804 |
artikel |
160 |
Mitigation of mutual exclusion problem in 5G new radio standards by token and non token based algorithms
|
Saravanan, M. |
|
|
22 |
supplement-5 |
p. 11319-11327 |
artikel |
161 |
Mobility-based sinknode-aided routing in disaster network under the background of big data
|
Ma, Chuang |
|
|
22 |
supplement-5 |
p. 11583-11590 |
artikel |
162 |
Modeling and optimal design of fiber-optic probe for medium detection based on computer simulation
|
Li, Yingwei |
|
|
22 |
supplement-5 |
p. 11207-11226 |
artikel |
163 |
Model transformation using logical prediction from sequence diagram: an experimental approach
|
Mythily, M. |
|
|
22 |
supplement-5 |
p. 12351-12362 |
artikel |
164 |
Modified energy minimization scheme using queue threshold based on priority queueing model
|
Jayarajan, P. |
|
|
22 |
supplement-5 |
p. 12111-12118 |
artikel |
165 |
Modified weighted code with bit invert approach to minimize crosstalk in network on chip links
|
Bharathi, Subramaniam |
|
|
22 |
supplement-5 |
p. 11247-11257 |
artikel |
166 |
Monitoring IaaS using various cloud monitors
|
Stephen, Absa |
|
|
22 |
supplement-5 |
p. 12459-12471 |
artikel |
167 |
Motion vector detection based on local autocorrelation coefficient
|
Fan, Honghui |
|
|
22 |
supplement-5 |
p. 11633-11639 |
artikel |
168 |
Multi-level semantic annotation and unified data integration using semantic web ontology in big data processing
|
Rani, P. Shobha |
|
|
22 |
supplement-5 |
p. 10401-10413 |
artikel |
169 |
Multi objective trust optimization for efficient communication in wireless M learning applications
|
Ashwin, M. |
|
|
22 |
supplement-5 |
p. 10687-10695 |
artikel |
170 |
Multi path interference aware reliable route path establishment in mobile adhoc network environment
|
Vignesh, V. |
|
|
22 |
supplement-5 |
p. 11029-11037 |
artikel |
171 |
Multiple parameter algorithm approach for adult image identification
|
Balamurali, R. |
|
|
22 |
supplement-5 |
p. 11909-11917 |
artikel |
172 |
Near lossless medical image compression using block BWT–MTF and hybrid fractal compression techniques
|
Devadoss, C. Peter |
|
|
22 |
supplement-5 |
p. 12929-12937 |
artikel |
173 |
Node discovery with development of routing tree in wireless networks
|
Vijayaraj, A. |
|
|
22 |
supplement-5 |
p. 10861-10871 |
artikel |
174 |
Noisy image reconstruction based on low-rank in UAV wireless transmission
|
Yao, Shihong |
|
|
22 |
supplement-5 |
p. 10717-10728 |
artikel |
175 |
Nxt-Max: for supporting VDC-based maximum redundant bandwidth allocation in cloud datacenter
|
Shuo, Wang |
|
|
22 |
supplement-5 |
p. 12567-12580 |
artikel |
176 |
Oil pipeline leak signal image recognition based on improved data field theory
|
Liu, Wei |
|
|
22 |
supplement-5 |
p. 12949-12957 |
artikel |
177 |
Optimal route selection in MANET based on particle swarm optimization utilizing expected transmission count
|
Saravanan, N. |
|
|
22 |
supplement-5 |
p. 11647-11658 |
artikel |
178 |
Optimal test suite selection in regression testing with testcase prioritization using modified Ann and Whale optimization algorithm
|
Harikarthik, S. K. |
|
|
22 |
supplement-5 |
p. 11425-11434 |
artikel |
179 |
Optimization of logarithmic converter for LNS based SOC
|
Kumar, A. T. A. Kishore |
|
|
22 |
supplement-5 |
p. 12759-12766 |
artikel |
180 |
Optimization of motion estimation hardware using charged system optimization with low power multipliers for H.264 encoders
|
Vigneash, L. |
|
|
22 |
supplement-5 |
p. 10669-10677 |
artikel |
181 |
Optimization using Artificial Bee Colony based clustering approach for big data
|
Ilango, S. Sudhakar |
|
|
22 |
supplement-5 |
p. 12169-12177 |
artikel |
182 |
Optimized dynamic source routing protocol for MANETs
|
Prasath, N. |
|
|
22 |
supplement-5 |
p. 12397-12409 |
artikel |
183 |
Optimized fuzzy technique for enhancing sentiment analysis
|
Madhusudhanan, S. |
|
|
22 |
supplement-5 |
p. 11929-11939 |
artikel |
184 |
Optimized multiple existence for pedestrian evacuation using geographic map-based path discovery
|
Karthik, V. |
|
|
22 |
supplement-5 |
p. 11227-11236 |
artikel |
185 |
Optimized routing in wireless sensor networks by establishing dynamic topologies based on genetic algorithm
|
Ragavan, P. Srinivasa |
|
|
22 |
supplement-5 |
p. 12119-12125 |
artikel |
186 |
Performance analysis of cluster based homogeneous sensor network using energy efficient N-policy (EENP) model
|
Nageswari, D. |
|
|
22 |
supplement-5 |
p. 12243-12250 |
artikel |
187 |
Performance evaluation of mathematical predictive modeling for air quality forecasting
|
Selvi, S. |
|
|
22 |
supplement-5 |
p. 12481-12493 |
artikel |
188 |
Power alert newscast planning for guaranteeing reliability in mobile wireless sensing element networks
|
Balamurugan, K. |
|
|
22 |
supplement-5 |
p. 12203-12217 |
artikel |
189 |
Power orient efficient multi attribute data rate maintenance scheme for QoS development of wireless networks
|
Uma, S. |
|
|
22 |
supplement-5 |
p. 12373-12379 |
artikel |
190 |
Precipitation analysis and forecasting using singular spectrum analysis with artificial neural networks
|
Sun, Mingdong |
|
|
22 |
supplement-5 |
p. 12633-12640 |
artikel |
191 |
Predicting user preferences on changing trends and innovations using SVM based sentiment analysis
|
Chidambarathanu, K. |
|
|
22 |
supplement-5 |
p. 11877-11881 |
artikel |
192 |
Prediction of user’s type and navigation pattern using clustering and classification algorithms
|
Anandhi, D. |
|
|
22 |
supplement-5 |
p. 10481-10490 |
artikel |
193 |
Predictions models of Taiwan dollar to US dollar and RMB exchange rate based on modified PSO and GRNN
|
Wang, Keming |
|
|
22 |
supplement-5 |
p. 10993-11004 |
artikel |
194 |
Predictive delimiter for multiple sensitive attribute publishing
|
Nithya, M. |
|
|
22 |
supplement-5 |
p. 12297-12304 |
artikel |
195 |
Privacy preserving multi factor authentication using trust management
|
Anakath, A. S. |
|
|
22 |
supplement-5 |
p. 10817-10823 |
artikel |
196 |
Qos improvement based security enhancement for link activity monitoring service in mobile ad hoc network
|
Kavitha, G. |
|
|
22 |
supplement-5 |
p. 12863-12869 |
artikel |
197 |
Quantization based wavelet transformation technique for digital image compression with removal of multiple artifacts and noises
|
Kumar, S. Suresh |
|
|
22 |
supplement-5 |
p. 11271-11284 |
artikel |
198 |
Ranging and tuning based particle swarm optimization with bat algorithm for task scheduling in cloud computing
|
Valarmathi, R. |
|
|
22 |
supplement-5 |
p. 11975-11988 |
artikel |
199 |
RDDSACCGA: a reliable data distribution solution assisted by cloud computing based on genetic algorithm
|
Zhang, Wei |
|
|
22 |
supplement-5 |
p. 11069-11077 |
artikel |
200 |
Reconfigurable unique key generation using variable duty cycle PUF
|
Narasimhan, Sivasankari |
|
|
22 |
supplement-5 |
p. 11339-11349 |
artikel |
201 |
Redundant placement of phasor measurement unit using multi objective evolutionary algorithms based on modified spectral clustering
|
Rahamathullah, Nafeena |
|
|
22 |
supplement-5 |
p. 12713-12725 |
artikel |
202 |
Registry service selection based secured Internet of Things with imperative control for industrial applications
|
Kanagaraju, P. |
|
|
22 |
supplement-5 |
p. 12507-12519 |
artikel |
203 |
Regressive group phase weighting in PTS combined with SLM approach for PAPR reduction in OFDM systems
|
Kumar, K. Kanthi |
|
|
22 |
supplement-5 |
p. 10897-10903 |
artikel |
204 |
Research on multi-feature fusion algorithm for subject words extraction and summary generation of text
|
Xu, Gui-Xian |
|
|
22 |
supplement-5 |
p. 10883-10895 |
artikel |
205 |
Research on the access control protocol Priccess design of network privacy protection
|
Ma, Xu |
|
|
22 |
supplement-5 |
p. 12539-12550 |
artikel |
206 |
Research on the intelligent judgment of traffic congestion in intelligent traffic based on pattern recognition technology
|
Ruiqi, Luo |
|
|
22 |
supplement-5 |
p. 12581-12588 |
artikel |
207 |
Resource allocation algorithm design of high quality of service based on chaotic neural network in wireless communication technology
|
Cui, Yongfeng |
|
|
22 |
supplement-5 |
p. 11005-11017 |
artikel |
208 |
Reversible and robust image watermarking based on histogram shifting
|
Rajkumar, R. |
|
|
22 |
supplement-5 |
p. 12313-12323 |
artikel |
209 |
Robust multitier spatial domain secured color image steganography in server environment
|
Perumal, Kaliram |
|
|
22 |
supplement-5 |
p. 11285-11293 |
artikel |
210 |
Secure and reliable communication scheme for MANET using ECMS cluster head-based certificate revocation
|
Venkata Swaroop, G. |
|
|
22 |
supplement-5 |
p. 11513-11525 |
artikel |
211 |
Secure cloud data storage approach in e-learning systems
|
Sahaya Stalin Jose, G. |
|
|
22 |
supplement-5 |
p. 12857-12862 |
artikel |
212 |
Secured and reliable data transmission on multi-hop wireless sensor network
|
Kavitha, R. J. |
|
|
22 |
supplement-5 |
p. 10915-10924 |
artikel |
213 |
Secure error-correcting (SEC) schemes for network coding through McEliece cryptosystem
|
Zhang, Guangzhi |
|
|
22 |
supplement-5 |
p. 11047-11055 |
artikel |
214 |
Secure group key management protocol for mobile ad hoc networks
|
Selvakumar, K. |
|
|
22 |
supplement-5 |
p. 11989-11995 |
artikel |
215 |
Security analysis of prealigned fingerprint template using fuzzy vault scheme
|
Chitra, D. |
|
|
22 |
supplement-5 |
p. 12817-12825 |
artikel |
216 |
Selection and optimization of cooperative advertising strategies in supply chain based on stackelberg game method
|
Qing, Yang |
|
|
22 |
supplement-5 |
p. 12059-12068 |
artikel |
217 |
Sentiment classification and computing for online reviews by a hybrid SVM and LSA based approach
|
Zhang, Wei |
|
|
22 |
supplement-5 |
p. 12619-12632 |
artikel |
218 |
Short-term load forecasting based on multivariate time series prediction and weighted neural network with random weights and kernels
|
Lang, Kun |
|
|
22 |
supplement-5 |
p. 12589-12597 |
artikel |
219 |
Short-term wind speed forecasting based on improved ant colony algorithm for LSSVM
|
Li, Yanan |
|
|
22 |
supplement-5 |
p. 11575-11581 |
artikel |
220 |
Simulation and analysis of SC-FDMA based cellular systems for LTE uplink transmission
|
Naidu, G. B. S. R. |
|
|
22 |
supplement-5 |
p. 10947-10954 |
artikel |
221 |
Socia media opinions aware adverse drug effect prediction and prevention system for the secured health care medical environment
|
Nalini, S. |
|
|
22 |
supplement-5 |
p. 12827-12837 |
artikel |
222 |
Soft computing approach based malicious peers detection using geometric and trust features in P2P networks
|
Premakumari, T. |
|
|
22 |
supplement-5 |
p. 12227-12232 |
artikel |
223 |
Sorted or pooled? Optimal tournament design for heterogeneous contestants
|
Wei, Guangxing |
|
|
22 |
supplement-5 |
p. 12641-12648 |
artikel |
224 |
Speech recognition system using enhanced mel frequency cepstral coefficient with windowing and framing method
|
Lokesh, S. |
|
|
22 |
supplement-5 |
p. 11669-11679 |
artikel |
225 |
Swarm intelligent based online feature selection (OFS) and weighted entropy frequent pattern mining (WEFPM) algorithm for big data analysis
|
Devi, S. Gayathri |
|
|
22 |
supplement-5 |
p. 11791-11803 |
artikel |
226 |
Texture based medical image classification by using multi-scale gabor rotation-invariant local binary pattern (MGRLBP)
|
Murugappan, V. |
|
|
22 |
supplement-5 |
p. 10979-10992 |
artikel |
227 |
The application of target tracking method in power load analysis based on computer vision in complex scenes
|
Liu, Dunnan |
|
|
22 |
supplement-5 |
p. 11457-11465 |
artikel |
228 |
The method and application of big data mining for mobile trajectory of taxi based on MapReduce
|
Kong, Fansheng |
|
|
22 |
supplement-5 |
p. 11435-11442 |
artikel |
229 |
The numerical simulation of entire sucker rod string buckling with couplings in vertical wells
|
Sun, Xiurong |
|
|
22 |
supplement-5 |
p. 12283-12295 |
artikel |
230 |
The power load’s signal analysis and short-term prediction based on wavelet decomposition
|
Wang, Huan |
|
|
22 |
supplement-5 |
p. 11129-11141 |
artikel |
231 |
The research of the plant leaves identification method based on 3-layers BP neutral network
|
Huang, Feijiang |
|
|
22 |
supplement-5 |
p. 11143-11152 |
artikel |
232 |
Third generation memetic optimization technique for energy efficient routing stability and load balancing in MANET
|
Sekar, P. Chandra |
|
|
22 |
supplement-5 |
p. 11941-11948 |
artikel |
233 |
Towards mobile cloud authentication and gait based security using time warping technique
|
Merlin, S. Sengole |
|
|
22 |
supplement-5 |
p. 10595-10604 |
artikel |
234 |
Track-sector-tree clustering scheme for dense wireless sensor networks
|
Naveen, J. |
|
|
22 |
supplement-5 |
p. 12421-12428 |
artikel |
235 |
Twin background model for foreground detection in video sequence
|
Jeeva, S. |
|
|
22 |
supplement-5 |
p. 11659-11668 |
artikel |
236 |
Using cloud effectively in concept based text mining using grey wolf self organizing feature map
|
Thilagavathy, R. |
|
|
22 |
supplement-5 |
p. 10697-10707 |
artikel |
237 |
Vantage Point Latent Semantic Indexing for multimedia web document search
|
Srikanth, D. |
|
|
22 |
supplement-5 |
p. 10587-10594 |
artikel |
238 |
Virtual machine placement with (m, n)-fault tolerance in cloud data center
|
Zhou, Ao |
|
|
22 |
supplement-5 |
p. 11619-11631 |
artikel |
239 |
Weighted spherical Bessel–Fourier image moments
|
He, Bing |
|
|
22 |
supplement-5 |
p. 12985-12996 |
artikel |
240 |
Wireless network confidence level improvement via fusion adaptive resonance theory
|
Chandraprabha, K. |
|
|
22 |
supplement-5 |
p. 12251-12261 |
artikel |