Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             240 results found
no title author magazine year volume issue page(s) type
1 Achieving energy efficiency using novel scalar multiplication based ECC for android devices in Internet of Things environments Kumar, K. Sathish

22 supplement-5 p. 12021-12028
article
2 A cluster based mobile data gathering using SDMA and PSO techniques in WSN Vijayalakshmi, K.

22 supplement-5 p. 12727-12736
article
3 A comparative analysis of similarity distance measure functions for biocryptic authentication in cloud databases Ramya, R.

22 supplement-5 p. 12147-12155
article
4 A cost-sensitive method for wireless sensor network min beacon node set construction Bin, Tang

22 supplement-5 p. 11551-11559
article
5 A coverage hole detection and repair algorithm in wireless sensor networks Feng, Xin

22 supplement-5 p. 12473-12480
article
6 Adaptable and proficient Hellinger Coefficient Based Collaborative Filtering for recommendation system Maheswari, M.

22 supplement-5 p. 12325-12338
article
7 A filtering of message in online social network using hybrid classifier Srividya, M.

22 supplement-5 p. 11079-11086
article
8 A framework for recommending health-related topics based on topic modeling in conversational data (Twitter) Kaveri, V. Vijeya

22 supplement-5 p. 10963-10968
article
9 A fusion framework based on fuzzy integrals for passive-blind image tamper detection Kaur, Mandeep

22 supplement-5 p. 11363-11378
article
10 A Fuzzy clustering based MRI brain image segmentation using back propagation neural networks Senthilkumar, C.

22 supplement-5 p. 12305-12312
article
11 A hybrid ABC-SA based optimized scheduling and resource allocation for cloud environment Muthulakshmi, B.

22 supplement-5 p. 10769-10777
article
12 A hybrid approach for mismatch data reduction in datasets and guide data mining Dhanalakshmi, R.

22 supplement-5 p. 10605-10614
article
13 AI-based survivable design for hybrid virtual networks for single regional failures in cloud data centers Sun, Jian

22 supplement-5 p. 12009-12019
article
14 A light weight FFT based enciphering system for extending the lifetime of mobile ad hoc networks Kavitha, T.

22 supplement-5 p. 12339-12349
article
15 A lightweight physical-layer based security strategy for Internet of things Jiang, Yu

22 supplement-5 p. 12971-12983
article
16 A modified multi objective heuristic for effective feature selection in text classification Thiyagarajan, D.

22 supplement-5 p. 10625-10635
article
17 A multi objective Tabu particle swarm optimization for effective cluster head selection in WSN Vijayalakshmi, K.

22 supplement-5 p. 12275-12282
article
18 An adaptive signal strength based localization approach for wireless sensor networks Kiruthiga, G.

22 supplement-5 p. 10439-10448
article
19 Analog to information convertor using cascaded transform and Gaussian random matrix Nirmalraj, S.

22 supplement-5 p. 11813-11820
article
20 Analytically derived fuzzy membership functions Zhang, Weiping

22 supplement-5 p. 11849-11876
article
21 An approach of improved dynamic deep belief nets modeling for algae bloom prediction Wang, Li

22 supplement-5 p. 11713-11721
article
22 An automated and hybrid method for cyst segmentation in dental X-ray images Karthika Devi, R.

22 supplement-5 p. 12179-12191
article
23 An early intelligent diagnosis model for drilling overflow based on GA–BP algorithm Liang, Haibo

22 supplement-5 p. 10649-10668
article
24 An effective software project effort estimation system using optimal firefly algorithm Resmi, V.

22 supplement-5 p. 11329-11338
article
25 An efficient and improved multi-objective optimized replication management with dynamic and cost aware strategies in cloud computing data center Edwin, E. Bijolin

22 supplement-5 p. 11119-11128
article
26 An efficient and low power impulsive noise suppressor architecture for OFDM system Devarajan, N. Manikanda

22 supplement-5 p. 12777-12783
article
27 An efficient approach to circumvent black hole nodes in manets Tamilselvi, P.

22 supplement-5 p. 11401-11409
article
28 An efficient clustering scheme for cloud computing problems using metaheuristic algorithms Baalamurugan, K. M.

22 supplement-5 p. 12917-12927
article
29 An efficient FMRI classification technique in cloud using multiple parallel feature selection algorithm Pachhaiammal@Priya, M.

22 supplement-5 p. 11899-11907
article
30 An efficient PCA based pose and occlusion invariant face recognition system for video surveillance Yoganand, A. Vivek

22 supplement-5 p. 11443-11456
article
31 An efficient performance evaluation model for the resource clusters in cloud environment using continuous time Markov chain and Poisson process Kowsigan, M.

22 supplement-5 p. 12411-12419
article
32 An efficient system for customer churn prediction through particle swarm optimization based feature selection model with simulated annealing Vijaya, J.

22 supplement-5 p. 10757-10768
article
33 An energy aware competition based clustering for cluster head selection in wireless sensor network with mobility Narendran, M.

22 supplement-5 p. 11019-11028
article
34 An enhanced channel estimation technique for CDD OFDM system over time varying channels Raja, A.

22 supplement-5 p. 12069-12075
article
35 An enhanced energy optimization routing protocol using double cluster heads for wireless sensor network Wang, Lei

22 supplement-5 p. 11057-11068
article
36 An enhanced J48 classification algorithm for the anomaly intrusion detection systems Aljawarneh, Shadi

22 supplement-5 p. 10549-10565
article
37 An enhancing reversible data hiding for secured data using shuffle block key encryption and histogram bit shifting in cloud environment Senthilnathan, T.

22 supplement-5 p. 12839-12847
article
38 An evaluation framework for auto-conversion of 2D to 3D video streaming using depth profile and pipelining technique in handheld cellular devices Ramesh, P. S.

22 supplement-5 p. 11741-11753
article
39 An heuristic cloud based segmentation technique using edge and texture based two dimensional entropy Jaganathan, M.

22 supplement-5 p. 12767-12776
article
40 An improved algorithm based on CLAHE for ultrasonic well logging image enhancement Fu, Qingqing

22 supplement-5 p. 12609-12618
article
41 An improved efficient: Artificial Bee Colony algorithm for security and QoS aware scheduling in cloud computing environment Thanka, M. Roshni

22 supplement-5 p. 10905-10913
article
42 An improved framework for authorship identification in online messages Srinivasan, L.

22 supplement-5 p. 12101-12110
article
43 An improved fuzzy enabled optimal multipath routing for wireless sensor network Sindhuja, P.

22 supplement-5 p. 11689-11697
article
44 An improved load balanced metaheuristic scheduling in cloud Aruna, M.

22 supplement-5 p. 10873-10881
article
45 An improved neighbor cooperation using adjacent node cooperation in peer to peer networks Raju, S.

22 supplement-5 p. 12263-12274
article
46 An intelligent intrusion detection system for secure wireless communication using IPSO and negative selection classifier Bhuvaneswari, G.

22 supplement-5 p. 12429-12441
article
47 An intelligent method of cancer prediction based on mobile cloud computing Zhang, Guoyin

22 supplement-5 p. 11527-11535
article
48 An novel approach to extract the content retrieval with the image perception using collaborative community oriented sifting (CCOS) Manjula, R.

22 supplement-5 p. 10567-10575
article
49 An optimal approach for watermarking using MRC4 encryption scheme Pappa, C. Kanmani

22 supplement-5 p. 11183-11191
article
50 An optimal criterion feature selection method for prediction and effective analysis of heart disease Prakash, S.

22 supplement-5 p. 11957-11963
article
51 A novel algorithm for threshold image denoising based on wavelet construction Jianhua, Zhang

22 supplement-5 p. 12443-12450
article
52 A novel clustering algorithm of extracting road network from low-frequency floating car data Zheng, Ke

22 supplement-5 p. 12659-12668
article
53 A novel 3- level energy heterogeneity clustering protocol with hybrid routing for a concentric circular wireless sensor network Chithra, A.

22 supplement-5 p. 11101-11108
article
54 A novel medical image enhancement algorithm based on improvement correction strategy in wavelet transform domain Xia, Kai-jian

22 supplement-5 p. 10969-10977
article
55 A novel method for adaptive fault tolerance during load balancing in cloud computing Tamilvizhi, T.

22 supplement-5 p. 10425-10438
article
56 A novel method to detect bleeding frame and region in wireless capsule endoscopy video Sivakumar, P.

22 supplement-5 p. 12219-12225
article
57 A novel of multi-hop transmission in integrated network of WLAN IEEE 802.11n and IEEE 802.11g using Riverbed Modeler 17.5 Samuthira Pandi, V.

22 supplement-5 p. 10679-10686
article
58 A novel semi supervised learning algorithm for thyroid and ulcer classification in tongue image Devi, G. Uma

22 supplement-5 p. 11537-11549
article
59 A novel trust model of dynamic optimization based on entropy method in wireless sensor networks Nie, Shuzhi

22 supplement-5 p. 11153-11162
article
60 A polynomial time algorithm for a variant of shortest vector problem with applications in compute-and-forward design Tong, Chao

22 supplement-5 p. 10415-10424
article
61 Appliance of effective clustering technique for gene expression datasets using GPU Saveetha, V.

22 supplement-5 p. 12381-12388
article
62 Application of an intelligent early-warning method based on DBSCAN clustering for drilling overflow accident Haibo, Liang

22 supplement-5 p. 12599-12608
article
63 A prolonged network life time and reliable data transmission aware optimal sink relocation mechanism Pushpalatha, A.

22 supplement-5 p. 12049-12058
article
64 A robust wavelet based decomposition of facial images to improve recognition accuracy in standard appearance based statistical face recognition methods Senthilkumar, R.

22 supplement-5 p. 12785-12794
article
65 A rough set data prediction method based on neural network evaluation and least squares fusion Fei, Xi

22 supplement-5 p. 11641-11646
article
66 A rule based delay constrained energy efficient routing technique for wireless sensor networks Selvi, M.

22 supplement-5 p. 10839-10848
article
67 A spatio-frequency orientational energy based medical image fusion using non-sub sampled contourlet transform Devanna, H.

22 supplement-5 p. 11193-11205
article
68 A study and analysis on block matching algorithms for motion estimation in video coding Manikandan, L. C.

22 supplement-5 p. 11773-11780
article
69 Augmented lightweight security scheme with access control model for wireless medical sensor networks Vaniprabha, A.

22 supplement-5 p. 12495-12505
article
70 Authentication based on blind signature and ring signature algorithms during vertical handover in heterogeneous wireless networks Kalpana, S.

22 supplement-5 p. 12037-12047
article
71 Automatic sedimentary microfacies identification from logging curves based on deep process neural network Liu, Hui

22 supplement-5 p. 12451-12457
article
72 A variable neighborhood search based genetic algorithm for flexible job shop scheduling problem Zhang, Guohui

22 supplement-5 p. 11561-11572
article
73 Avoiding fuel theft in multifleet vehicles using vehicular adhoc network Senthilraja, P.

22 supplement-5 p. 11175-11181
article
74 Bacterial foraging information swarm optimizer for detecting affective and informative content in medical blogs Neeba, E. A.

22 supplement-5 p. 10743-10756
article
75 Body area network with mobile anchor based localization Kavitha, M. G.

22 supplement-5 p. 10779-10788
article
76 Cat swarm algorithm in wireless sensor networks for optimized cluster head selection: a real time approach Chandirasekaran, D.

22 supplement-5 p. 11351-11361
article
77 CCMA—cloud critical metric assessment framework for scientific computing Ravindhren, V. G.

22 supplement-5 p. 11307-11317
article
78 Channel selection using glow swarm optimization and its application in line of sight secure communication Franklin Alex Joseph, A.

22 supplement-5 p. 10801-10808
article
79 Classical energy detection method for spectrum detecting in cognitive radio networks by using robust augmented threshold technique Sarala, B.

22 supplement-5 p. 11109-11118
article
80 Classification of malignant melanoma and benign skin lesion by using back propagation neural network and ABCD rule Monisha, M.

22 supplement-5 p. 12897-12907
article
81 Clustering of near duplicate images using bundled features Kalaiarasi, G.

22 supplement-5 p. 11997-12007
article
82 Clutch control of a hybrid electrical vehicle based on neuron-adaptive PID algorithm Huang, Bin

22 supplement-5 p. 12091-12099
article
83 Collaborative approach on mitigating spectrum sensing data hijack attack and dynamic spectrum allocation based on CASG modeling in wireless cognitive radio networks Vimal, S.

22 supplement-5 p. 10491-10501
article
84 Comparative analysis of zoning approaches for recognition of Indo Aryan language using SVM classifier Dinesh, P. M.

22 supplement-5 p. 10955-10962
article
85 Competent resource provisioning and distribution techniques for cloud computing environment Suresh, A.

22 supplement-5 p. 11039-11046
article
86 Congestion control and packet recovery for cross layer approach in MANET Gowtham, M. S.

22 supplement-5 p. 12029-12036
article
87 Context-aware cloud-based systems: design aspects Vahdat-Nejad, Hamed

22 supplement-5 p. 11601-11617
article
88 Continuous security assessment of cloud based applications using distributed hashing algorithm in SDLC Vijayakumar, K.

22 supplement-5 p. 10789-10800
article
89 Continuous user authentication based score level fusion with hybrid optimization Prakash, A.

22 supplement-5 p. 12959-12969
article
90 Contourlet transform based adaptive nonlinear diffusion filtering for speckle noise removal in ultrasound images Jubairahmed, L.

22 supplement-5 p. 11237-11246
article
91 Contrast for QOS based clustered energy efficient protocol with PSO and multi-hop gateways in wireless sensor network Selvakumar, K.

22 supplement-5 p. 11883-11890
article
92 Correction to: A variable neighborhood search based genetic algorithm for flexible job shop scheduling problem Zhang, Guohui

22 supplement-5 p. 11573
article
93 Cross-layer based routing protocol and solution to packet reordering for TCP in MANET Sunitha, Dodda

22 supplement-5 p. 10809-10816
article
94 Data mining application on aviation accident data for predicting topmost causes for accidents Koteeswaran, S.

22 supplement-5 p. 11379-11399
article
95 Defending against jellyfish attacks using cluster based routing protocol for secured data transmission in MANET Satheeshkumar, S.

22 supplement-5 p. 10849-10860
article
96 Defining the threshold bounds for effective modelling of aggregated IDS Priya, N.

22 supplement-5 p. 11765-11771
article
97 Denial of service attack solution in OLSR based manet by varying number of fictitious nodes Bhuvaneswari, R.

22 supplement-5 p. 12689-12699
article
98 Design of efficient wireless communication system with improved SER using different relay environment Saravanan, K.

22 supplement-5 p. 10519-10527
article
99 Design of high performance filter bank multi-carrier transmitter Radhika, P.

22 supplement-5 p. 12521-12527
article
100 Design of TAREEN (trust aware routing with energy efficient network) and enactment of TARF: a trust-aware routing framework for wireless sensor networks Udhayavani, M.

22 supplement-5 p. 11919-11927
article
101 Detection of duplicated data with minimum overhead and secure data transmission for sensor big data Beulah, S.

22 supplement-5 p. 10467-10479
article
102 Development trend of sharing economy in big data era based on duplication dynamic evolution game theory Wei, Liping

22 supplement-5 p. 13011-13019
article
103 Discovery of optimal multicast routes in MANETs using cross-layer approach and fuzzy logic support system Sivakumar, S.

22 supplement-5 p. 11467-11476
article
104 Dynamic multi-keyword based search algorithm using modified based fully homomorphic encryption and Prim’s algorithm Rajan, D. Palanivel

22 supplement-5 p. 11411-11424
article
105 Dynamics analysis and simulation of six DOF parafoil system Zhang, Zhixiang

22 supplement-5 p. 12669-12680
article
106 Edge detection of satellite image using fuzzy logic Dhivya, R.

22 supplement-5 p. 11891-11898
article
107 EEG seizure classification based on exploiting phase space reconstruction and extreme learning Kumar, S. T. Sadish

22 supplement-5 p. 11477-11487
article
108 Effective failure nodes detection using matrix calculus algorithm in wireless sensor networks Palanikumar, R.

22 supplement-5 p. 12127-12136
article
109 Efficient analysis of water quality measurement reporting system using IOT based system in WSN Parameswari, M.

22 supplement-5 p. 12193-12201
article
110 Efficient data retrieval using adaptive clustered indexing for continuous queries over streaming data Sumalatha, M. R.

22 supplement-5 p. 10503-10517
article
111 Efficient energy optimization in mobile ad hoc network (MANET) using better-quality AODV protocol Anand, M.

22 supplement-5 p. 12681-12687
article
112 Efficient performance upsurge in live migration with downturn in the migration time and downtime Kumar, A. Vishnu

22 supplement-5 p. 12737-12747
article
113 Energy aware and fast authentication scheme using identity based encryption in wireless sensor networks Sogani, Ayush

22 supplement-5 p. 10637-10648
article
114 Energy efficient, obstacle avoidance path planning trajectory for localization in wireless sensor network Magadevi, N.

22 supplement-5 p. 10529-10535
article
115 Energy efficient parallel hybrid adder architecture for 3X generation in radix-8 booth encoding Nirmaladevi, R.

22 supplement-5 p. 10709-10716
article
116 Enhanced approach for wireless sensor network based on localization, time synchronization and quality of service routing Palaniappan, Sathyaprakash

22 supplement-5 p. 11781-11790
article
117 Enhancing 4G Co-existence with Wi-Fi/IoT using cognitive radio Sumathi, A. C.

22 supplement-5 p. 11295-11305
article
118 Enhancing iris recognition framework using feature selection and BPNN Nithya, A. Alice

22 supplement-5 p. 12363-12372
article
119 Escalating quality of services with channel assignment and traffic scheduling in wireless mesh networks Selvakumar, K.

22 supplement-5 p. 11949-11955
article
120 Esteemed software patterns for banking system Rajesh, Sudha

22 supplement-5 p. 11087-11099
article
121 FCC: Fast congestion control scheme for wireless sensor networks using hybrid optimal routing algorithm Raman, C. J.

22 supplement-5 p. 12701-12711
article
122 Feature selection using firefly algorithm in software defect prediction Anbu, M.

22 supplement-5 p. 10925-10934
article
123 Feature selection using fish swarm optimization in big data Manikandan, R. P. S.

22 supplement-5 p. 10825-10837
article
124 Firefly load balancing based energy optimized routing for multimedia data delivery in wireless mesh network Raja, G. P.

22 supplement-5 p. 12077-12090
article
125 FPGA architecture for text extraction from images Vignesh, O.

22 supplement-5 p. 12137-12146
article
126 FPGA based seizure detection and control for brain computer interface Tamilarasi, S.

22 supplement-5 p. 11841-11848
article
127 FPGA implementation of modified error normalized LMS adaptive filter for ECG noise removal Venkatesan, C.

22 supplement-5 p. 12233-12241
article
128 FSO–PSO based multihop clustering in WSN for efficient Medical Building Management System Shanthi, G.

22 supplement-5 p. 12157-12168
article
129 Fuzzy based edge enhanced text detection algorithm using MSER Thilagavathy, A.

22 supplement-5 p. 11681-11687
article
130 Fuzzy c-means clustering algorithm for performance improvement of ENN Zhou, Yu

22 supplement-5 p. 11163-11174
article
131 Fuzzy expert system-based framework for flood management in Saudi Arabia Amin, Saad

22 supplement-5 p. 11723-11740
article
132 Game analysis of XBRL taxonomy extension Zhang, Yingmin

22 supplement-5 p. 12529-12538
article
133 Gauss-core extension dependent prediction algorithm for collaborative filtering recommendation Xu, L. B.

22 supplement-5 p. 11501-11511
article
134 Genetic algorithm based sensor node classifications in wireless body area networks (WBAN) Kalaiselvi, K.

22 supplement-5 p. 12849-12855
article
135 Gesture recognition based on an improved local sparse representation classification algorithm He, Yang

22 supplement-5 p. 10935-10946
article
136 HBS-CRA: scaling impact of change request towards fault proneness: defining a heuristic and biases scale (HBS) of change request artifacts (CRA) Madapuri, Rudra Kumar

22 supplement-5 p. 11591-11599
article
137 HHSRP: a cluster based hybrid hierarchical secure routing protocol for wireless sensor networks Deepa, C.

22 supplement-5 p. 10449-10465
article
138 Human activity recognition in egocentric video using PNN, SVM, kNN and SVM+kNN classifiers Sanal Kumar, K. P.

22 supplement-5 p. 10577-10586
article
139 Hybrid Lempel–Ziv–Welch and clipped histogram equalization based medical image compression Manimekalai, M. A. P.

22 supplement-5 p. 12805-12816
article
140 Identification of suitable membership and kernel function for FCM based FSVM classifier model Sridevi, P.

22 supplement-5 p. 11965-11974
article
141 Image fusion for MODIS and Landsat images using top hat based moving technique with FIS Swathika, R.

22 supplement-5 p. 12939-12947
article
142 Improved group key management region based cluster protocol in cloud Salma, B. Umi

22 supplement-5 p. 11699-11711
article
143 Improving energy utilization using multi hop data aggregation with node switching in wireless sensor network Sudha, L.

22 supplement-5 p. 12749-12757
article
144 Improving image steganalyser performance through curvelet transform denoising Hemalatha, J.

22 supplement-5 p. 11821-11839
article
145 Improving performance of cooperative communication in heterogeneous manet environment Sangeetha, S. K. B.

22 supplement-5 p. 12389-12395
article
146 Indicator-based multi-objective adaptive bacterial foraging algorithm for RFID network planning Yuan, Chaochun

22 supplement-5 p. 12649-12657
article
147 Intelligent ontology based semantic information retrieval using feature selection and classification Selvalakshmi, B.

22 supplement-5 p. 12871-12881
article
148 Intelligent relay selection and spectrum sharing techniques for cognitive radio networks Ruby, D.

22 supplement-5 p. 10537-10548
article
149 Intrusion detection of distributed denial of service attack in cloud Velliangiri, S.

22 supplement-5 p. 10615-10623
article
150 IoT based industrial safety measures monitoring and reporting system using accident reduction model (ARM) control algorithm Rajmohan, Palanivelu

22 supplement-5 p. 11259-11269
article
151 Key technology and application of millimeter wave communications for 5G: a survey Xu, Xiaoling

22 supplement-5 p. 12997-13009
article
152 Layout scheme of high-speed railway transfer hubs: bi-level modeling and hybrid genetic algorithm approach Tong, Lu

22 supplement-5 p. 12551-12566
article
153 Low power NoC architecture based dynamic reconfigurable system Nirmaladevi, K.

22 supplement-5 p. 11489-11500
article
154 Manifold scalable video conveyance for m-wellbeing crisis relevance Balaji, L.

22 supplement-5 p. 10729-10741
article
155 Map Reduce for big data processing based on traffic aware partition and aggregation Venkatesh, G.

22 supplement-5 p. 12909-12915
article
156 Markovian model based indoor location tracking for Internet of Things (IoT) applications Jeba Malar, A. Christy

22 supplement-5 p. 11805-11812
article
157 Maximizing quality of multimedia streaming services in heterogeneous wireless networks using optimal multi-server technique Duraimurugan, S.

22 supplement-5 p. 12883-12895
article
158 Millimeter wave CMOS minimum noise amplifier for automotive radars in the frequency band (60–66 GHZ) Suganthi, K.

22 supplement-5 p. 11755-11764
article
159 Minimum connected dominating set based RSU allocation for smartCloud vehicles in VANET Chinnasamy, A.

22 supplement-5 p. 12795-12804
article
160 Mitigation of mutual exclusion problem in 5G new radio standards by token and non token based algorithms Saravanan, M.

22 supplement-5 p. 11319-11327
article
161 Mobility-based sinknode-aided routing in disaster network under the background of big data Ma, Chuang

22 supplement-5 p. 11583-11590
article
162 Modeling and optimal design of fiber-optic probe for medium detection based on computer simulation Li, Yingwei

22 supplement-5 p. 11207-11226
article
163 Model transformation using logical prediction from sequence diagram: an experimental approach Mythily, M.

22 supplement-5 p. 12351-12362
article
164 Modified energy minimization scheme using queue threshold based on priority queueing model Jayarajan, P.

22 supplement-5 p. 12111-12118
article
165 Modified weighted code with bit invert approach to minimize crosstalk in network on chip links Bharathi, Subramaniam

22 supplement-5 p. 11247-11257
article
166 Monitoring IaaS using various cloud monitors Stephen, Absa

22 supplement-5 p. 12459-12471
article
167 Motion vector detection based on local autocorrelation coefficient Fan, Honghui

22 supplement-5 p. 11633-11639
article
168 Multi-level semantic annotation and unified data integration using semantic web ontology in big data processing Rani, P. Shobha

22 supplement-5 p. 10401-10413
article
169 Multi objective trust optimization for efficient communication in wireless M learning applications Ashwin, M.

22 supplement-5 p. 10687-10695
article
170 Multi path interference aware reliable route path establishment in mobile adhoc network environment Vignesh, V.

22 supplement-5 p. 11029-11037
article
171 Multiple parameter algorithm approach for adult image identification Balamurali, R.

22 supplement-5 p. 11909-11917
article
172 Near lossless medical image compression using block BWT–MTF and hybrid fractal compression techniques Devadoss, C. Peter

22 supplement-5 p. 12929-12937
article
173 Node discovery with development of routing tree in wireless networks Vijayaraj, A.

22 supplement-5 p. 10861-10871
article
174 Noisy image reconstruction based on low-rank in UAV wireless transmission Yao, Shihong

22 supplement-5 p. 10717-10728
article
175 Nxt-Max: for supporting VDC-based maximum redundant bandwidth allocation in cloud datacenter Shuo, Wang

22 supplement-5 p. 12567-12580
article
176 Oil pipeline leak signal image recognition based on improved data field theory Liu, Wei

22 supplement-5 p. 12949-12957
article
177 Optimal route selection in MANET based on particle swarm optimization utilizing expected transmission count Saravanan, N.

22 supplement-5 p. 11647-11658
article
178 Optimal test suite selection in regression testing with testcase prioritization using modified Ann and Whale optimization algorithm Harikarthik, S. K.

22 supplement-5 p. 11425-11434
article
179 Optimization of logarithmic converter for LNS based SOC Kumar, A. T. A. Kishore

22 supplement-5 p. 12759-12766
article
180 Optimization of motion estimation hardware using charged system optimization with low power multipliers for H.264 encoders Vigneash, L.

22 supplement-5 p. 10669-10677
article
181 Optimization using Artificial Bee Colony based clustering approach for big data Ilango, S. Sudhakar

22 supplement-5 p. 12169-12177
article
182 Optimized dynamic source routing protocol for MANETs Prasath, N.

22 supplement-5 p. 12397-12409
article
183 Optimized fuzzy technique for enhancing sentiment analysis Madhusudhanan, S.

22 supplement-5 p. 11929-11939
article
184 Optimized multiple existence for pedestrian evacuation using geographic map-based path discovery Karthik, V.

22 supplement-5 p. 11227-11236
article
185 Optimized routing in wireless sensor networks by establishing dynamic topologies based on genetic algorithm Ragavan, P. Srinivasa

22 supplement-5 p. 12119-12125
article
186 Performance analysis of cluster based homogeneous sensor network using energy efficient N-policy (EENP) model Nageswari, D.

22 supplement-5 p. 12243-12250
article
187 Performance evaluation of mathematical predictive modeling for air quality forecasting Selvi, S.

22 supplement-5 p. 12481-12493
article
188 Power alert newscast planning for guaranteeing reliability in mobile wireless sensing element networks Balamurugan, K.

22 supplement-5 p. 12203-12217
article
189 Power orient efficient multi attribute data rate maintenance scheme for QoS development of wireless networks Uma, S.

22 supplement-5 p. 12373-12379
article
190 Precipitation analysis and forecasting using singular spectrum analysis with artificial neural networks Sun, Mingdong

22 supplement-5 p. 12633-12640
article
191 Predicting user preferences on changing trends and innovations using SVM based sentiment analysis Chidambarathanu, K.

22 supplement-5 p. 11877-11881
article
192 Prediction of user’s type and navigation pattern using clustering and classification algorithms Anandhi, D.

22 supplement-5 p. 10481-10490
article
193 Predictions models of Taiwan dollar to US dollar and RMB exchange rate based on modified PSO and GRNN Wang, Keming

22 supplement-5 p. 10993-11004
article
194 Predictive delimiter for multiple sensitive attribute publishing Nithya, M.

22 supplement-5 p. 12297-12304
article
195 Privacy preserving multi factor authentication using trust management Anakath, A. S.

22 supplement-5 p. 10817-10823
article
196 Qos improvement based security enhancement for link activity monitoring service in mobile ad hoc network Kavitha, G.

22 supplement-5 p. 12863-12869
article
197 Quantization based wavelet transformation technique for digital image compression with removal of multiple artifacts and noises Kumar, S. Suresh

22 supplement-5 p. 11271-11284
article
198 Ranging and tuning based particle swarm optimization with bat algorithm for task scheduling in cloud computing Valarmathi, R.

22 supplement-5 p. 11975-11988
article
199 RDDSACCGA: a reliable data distribution solution assisted by cloud computing based on genetic algorithm Zhang, Wei

22 supplement-5 p. 11069-11077
article
200 Reconfigurable unique key generation using variable duty cycle PUF Narasimhan, Sivasankari

22 supplement-5 p. 11339-11349
article
201 Redundant placement of phasor measurement unit using multi objective evolutionary algorithms based on modified spectral clustering Rahamathullah, Nafeena

22 supplement-5 p. 12713-12725
article
202 Registry service selection based secured Internet of Things with imperative control for industrial applications Kanagaraju, P.

22 supplement-5 p. 12507-12519
article
203 Regressive group phase weighting in PTS combined with SLM approach for PAPR reduction in OFDM systems Kumar, K. Kanthi

22 supplement-5 p. 10897-10903
article
204 Research on multi-feature fusion algorithm for subject words extraction and summary generation of text Xu, Gui-Xian

22 supplement-5 p. 10883-10895
article
205 Research on the access control protocol Priccess design of network privacy protection Ma, Xu

22 supplement-5 p. 12539-12550
article
206 Research on the intelligent judgment of traffic congestion in intelligent traffic based on pattern recognition technology Ruiqi, Luo

22 supplement-5 p. 12581-12588
article
207 Resource allocation algorithm design of high quality of service based on chaotic neural network in wireless communication technology Cui, Yongfeng

22 supplement-5 p. 11005-11017
article
208 Reversible and robust image watermarking based on histogram shifting Rajkumar, R.

22 supplement-5 p. 12313-12323
article
209 Robust multitier spatial domain secured color image steganography in server environment Perumal, Kaliram

22 supplement-5 p. 11285-11293
article
210 Secure and reliable communication scheme for MANET using ECMS cluster head-based certificate revocation Venkata Swaroop, G.

22 supplement-5 p. 11513-11525
article
211 Secure cloud data storage approach in e-learning systems Sahaya Stalin Jose, G.

22 supplement-5 p. 12857-12862
article
212 Secured and reliable data transmission on multi-hop wireless sensor network Kavitha, R. J.

22 supplement-5 p. 10915-10924
article
213 Secure error-correcting (SEC) schemes for network coding through McEliece cryptosystem Zhang, Guangzhi

22 supplement-5 p. 11047-11055
article
214 Secure group key management protocol for mobile ad hoc networks Selvakumar, K.

22 supplement-5 p. 11989-11995
article
215 Security analysis of prealigned fingerprint template using fuzzy vault scheme Chitra, D.

22 supplement-5 p. 12817-12825
article
216 Selection and optimization of cooperative advertising strategies in supply chain based on stackelberg game method Qing, Yang

22 supplement-5 p. 12059-12068
article
217 Sentiment classification and computing for online reviews by a hybrid SVM and LSA based approach Zhang, Wei

22 supplement-5 p. 12619-12632
article
218 Short-term load forecasting based on multivariate time series prediction and weighted neural network with random weights and kernels Lang, Kun

22 supplement-5 p. 12589-12597
article
219 Short-term wind speed forecasting based on improved ant colony algorithm for LSSVM Li, Yanan

22 supplement-5 p. 11575-11581
article
220 Simulation and analysis of SC-FDMA based cellular systems for LTE uplink transmission Naidu, G. B. S. R.

22 supplement-5 p. 10947-10954
article
221 Socia media opinions aware adverse drug effect prediction and prevention system for the secured health care medical environment Nalini, S.

22 supplement-5 p. 12827-12837
article
222 Soft computing approach based malicious peers detection using geometric and trust features in P2P networks Premakumari, T.

22 supplement-5 p. 12227-12232
article
223 Sorted or pooled? Optimal tournament design for heterogeneous contestants Wei, Guangxing

22 supplement-5 p. 12641-12648
article
224 Speech recognition system using enhanced mel frequency cepstral coefficient with windowing and framing method Lokesh, S.

22 supplement-5 p. 11669-11679
article
225 Swarm intelligent based online feature selection (OFS) and weighted entropy frequent pattern mining (WEFPM) algorithm for big data analysis Devi, S. Gayathri

22 supplement-5 p. 11791-11803
article
226 Texture based medical image classification by using multi-scale gabor rotation-invariant local binary pattern (MGRLBP) Murugappan, V.

22 supplement-5 p. 10979-10992
article
227 The application of target tracking method in power load analysis based on computer vision in complex scenes Liu, Dunnan

22 supplement-5 p. 11457-11465
article
228 The method and application of big data mining for mobile trajectory of taxi based on MapReduce Kong, Fansheng

22 supplement-5 p. 11435-11442
article
229 The numerical simulation of entire sucker rod string buckling with couplings in vertical wells Sun, Xiurong

22 supplement-5 p. 12283-12295
article
230 The power load’s signal analysis and short-term prediction based on wavelet decomposition Wang, Huan

22 supplement-5 p. 11129-11141
article
231 The research of the plant leaves identification method based on 3-layers BP neutral network Huang, Feijiang

22 supplement-5 p. 11143-11152
article
232 Third generation memetic optimization technique for energy efficient routing stability and load balancing in MANET Sekar, P. Chandra

22 supplement-5 p. 11941-11948
article
233 Towards mobile cloud authentication and gait based security using time warping technique Merlin, S. Sengole

22 supplement-5 p. 10595-10604
article
234 Track-sector-tree clustering scheme for dense wireless sensor networks Naveen, J.

22 supplement-5 p. 12421-12428
article
235 Twin background model for foreground detection in video sequence Jeeva, S.

22 supplement-5 p. 11659-11668
article
236 Using cloud effectively in concept based text mining using grey wolf self organizing feature map Thilagavathy, R.

22 supplement-5 p. 10697-10707
article
237 Vantage Point Latent Semantic Indexing for multimedia web document search Srikanth, D.

22 supplement-5 p. 10587-10594
article
238 Virtual machine placement with (m, n)-fault tolerance in cloud data center Zhou, Ao

22 supplement-5 p. 11619-11631
article
239 Weighted spherical Bessel–Fourier image moments He, Bing

22 supplement-5 p. 12985-12996
article
240 Wireless network confidence level improvement via fusion adaptive resonance theory Chandraprabha, K.

22 supplement-5 p. 12251-12261
article
                             240 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands