nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
ACO Based Feature Subset Selection for Multiple k-Nearest Neighbor Classifiers
|
Shailendra Kumar Shrivastava |
|
2011 |
3 |
5 |
p. 1831-1838 |
artikel |
2 |
A Comparative Study of Classification Algorithms for Spam Email Data Analysis
|
Aman Sharma, |
|
2011 |
3 |
5 |
p. 1890-1895 |
artikel |
3 |
A Comparative Study of Public Key Cryptosystem based on ECC and RSA
|
Arun kumar, |
|
2011 |
3 |
5 |
p. 1904-1909 |
artikel |
4 |
A GENETIC ALGORITHM FOR REGRESSION TEST CASE PRIORITIZATION USING CODE COVERAGE
|
Arvinder Kaur, |
|
2011 |
3 |
5 |
p. 1839-1847 |
artikel |
5 |
Ambient Noise Tomography of the Central India
|
Abhay P. Singh, |
|
2011 |
3 |
5 |
p. 2068-2075 |
artikel |
6 |
ANALYSIS OF ELECTRONIC VOTING SYSTEM IN VARIOUS COUNTRIES
|
Sanjay Kumar, |
|
2011 |
3 |
5 |
p. 1825-1830 |
artikel |
7 |
Android in opposition to iPhone
|
Kavita Sharma |
|
2011 |
3 |
5 |
p. 1965-1969 |
artikel |
8 |
AN EFFICIENT SUPER RESOLUTION TECHNIQUE FOR LOSS LESS COMPRESSED BAYER COLOUR FILTER ARRAY IMAGES
|
K.Chiranjeevi, |
|
2011 |
3 |
5 |
p. 1804-1814 |
artikel |
9 |
AN EXTENDED METHOD FOR ORDER REDUCTION OF LARGE SCALE MULTI VARIABLE SYSTEMS
|
Dr. G.Saraswathi |
|
2011 |
3 |
5 |
p. 2109-2118 |
artikel |
10 |
An Implementation of I2C using VHDL for DATA surveillance
|
Arvind Sahu, |
|
2011 |
3 |
5 |
p. 1857-1865 |
artikel |
11 |
An Improved Hop-Count Metric for Infrastructural Wireless Mesh Network
|
Paramjeet Kaur Bedi, |
|
2011 |
3 |
5 |
p. 1757-1763 |
artikel |
12 |
A novel application for transmission of Orthogonal Embedded Images by using Morphological Transform Domain & cryptographic methods
|
M.Venkata Kishore, |
|
2011 |
3 |
5 |
p. 1866-1877 |
artikel |
13 |
APPRAISAL OF QUESTION CATEGORIZATION FOR AN ADAPTIVE ASSESSMENT IN ELEARNING
|
R. KAVITHA |
|
2011 |
3 |
5 |
p. 1933-1937 |
artikel |
14 |
A Randomized Secure Data Hiding Algorithm Using File Hybridization for Information Security
|
K. Venkata Ramana, |
|
2011 |
3 |
5 |
p. 1878-1889 |
artikel |
15 |
A Survey on Intrusion in Ad Hoc Networks and its Detection Measures
|
Ms. Preetee K. Karmore, |
|
2009 |
3 |
5 |
p. 1896-1903 |
artikel |
16 |
A Survey on Telecommunication Technology Standards
|
Sandeep Singh Sengar, |
|
2011 |
3 |
5 |
p. 2061-2067 |
artikel |
17 |
Automated Load Shedding Period Control System (An effective way to reduce human effort)
|
Dwijen Rudrapal, |
|
2011 |
3 |
5 |
p. 1764-1772 |
artikel |
18 |
A Wavelet Transform Algorithm for 2n Shades Image
|
Aditya Kumar, |
|
2011 |
3 |
5 |
p. 2136-2144 |
artikel |
19 |
COLLABORATIVE ANOMALY-BASED INTRUSION DETECTION IN MOBILE AD HOC NETWORKS
|
SUNIL K. PARYANI, |
|
2011 |
3 |
5 |
p. 2024-2027 |
artikel |
20 |
Comparative and Analysis of Biometric Systems
|
Manivannan, |
|
2011 |
3 |
5 |
p. 2156-2162 |
artikel |
21 |
COMPARATIVE STUDY OF BROWSER BASED OPEN SOURCE TESTING TOOLS WATIR AND WET
|
Nisha Gogna, |
|
2011 |
3 |
5 |
p. 1910-1923 |
artikel |
22 |
DESIGN MODEL OF FUZZY LOGIC MEDICAL DIAGNOSIS CONTROL SYSTEM
|
Faran Baig, |
|
2011 |
3 |
5 |
p. 2093-2108 |
artikel |
23 |
Development of Coalmine Safety System Using Wireless Sensor Network
|
S.Vandana, |
|
2011 |
3 |
5 |
p. 2076-2085 |
artikel |
24 |
Differential Evolution for Optimization of PID Gains in Automatic Generation Control
|
Dr. L.D. Arya, |
|
2011 |
3 |
5 |
p. 1848-1856 |
artikel |
25 |
Enhancement of Network Security Techniques using Quantum Cryptography
|
Navleen Kaur, |
|
2011 |
3 |
5 |
p. 1960-1964 |
artikel |
26 |
FEATURE SELECTION METHODS AND ALGORITHMS
|
L.Ladha, |
|
2011 |
3 |
5 |
p. 1787-1797 |
artikel |
27 |
Global Chaos Synchronization of Four-Scroll and Four-Wing Attractors by Active Nonlinear Control
|
Dr. V. Sundarapandian |
|
2011 |
3 |
5 |
p. 2145-2155 |
artikel |
28 |
Global Chaos Synchronization of the Pehlivan Systems by Sliding Mode Control
|
Dr. V. Sundarapandian |
|
2011 |
3 |
5 |
p. 2163-2169 |
artikel |
29 |
HYBRID FEATRUE SELECTION FOR NETWORK INTRUSION
|
S.Sethuramalingam, |
|
2011 |
3 |
5 |
p. 1773-1780 |
artikel |
30 |
Hybrid Particle Swarm Optimization for Regression Testing
|
Dr. Arvinder Kaur |
|
2011 |
3 |
5 |
p. 1815-1824 |
artikel |
31 |
Implementation of a Secured system with Roaming Server and Roaming Ports
|
R. Bharathi, |
|
2011 |
3 |
5 |
p. 1781-1786 |
artikel |
32 |
Implementing Ant Colony Optimization for Test Case Selection and Prioritization
|
Bharti Suri, |
|
2011 |
3 |
5 |
p. 1924-1932 |
artikel |
33 |
Introducing a New Language for Stream Applications
|
Mohamad Dabbagh |
|
2011 |
3 |
5 |
p. 2119-2126 |
artikel |
34 |
Investigations and Performance Evaluation of Dynamic Routing Protocol with New Proposed Protocol for WAN
|
Vasudha, |
|
2011 |
3 |
5 |
p. 1970-1979 |
artikel |
35 |
MESSAGE INDUCED SOFT CHEKPOINTING FOR RECOVERY IN MOBILE ENVIRONMENTS
|
Ruchi Tuli, |
|
2011 |
3 |
5 |
p. 1798-1803 |
artikel |
36 |
Modified Order Crossover (OX) Operator
|
Ms. Monica Sehrawat, |
|
2011 |
3 |
5 |
p. 2019-2023 |
artikel |
37 |
Optimizing Dependencies - A solution to Failure Proneness of software
|
Dr.G.AppaRao, |
|
2011 |
3 |
5 |
p. 2010-2018 |
artikel |
38 |
Output Regulation of the Tigan System
|
Dr. V. Sundarapandian |
|
2011 |
3 |
5 |
p. 2127-2135 |
artikel |
39 |
Performance Evaluation and Optimization of DSR Routing Algorithm over 802.11 based Wireless Mesh Network
|
Birinder Singh, |
|
2011 |
3 |
5 |
p. 1980-1985 |
artikel |
40 |
Prediction of Profitability of Industries using Weighted SVR
|
Divya Tomar, |
|
2011 |
3 |
5 |
p. 1938-1945 |
artikel |
41 |
Prediction of the Query of Search Engine Using Back Propagation Algorithm
|
Deepti Gupta , |
|
2011 |
3 |
5 |
p. 1946-1959 |
artikel |
42 |
Quantum Black Holes and pseudotelepathy in biological organisms
|
Monendra Grover, |
|
2011 |
3 |
5 |
p. 1995-1998 |
artikel |
43 |
Revisions & Altercations in the Administration of Assets for Mobile Grid Computing
|
Aditya Vidyarthi, |
|
2011 |
3 |
5 |
p. 2041-2045 |
artikel |
44 |
Robot Assisted Wireless Sensor Network for Monitoring and Detection of Explosives in Indoor Environment
|
Joshua D Freeman, |
|
2011 |
3 |
5 |
p. 2046-2053 |
artikel |
45 |
Self-Healing in Dynamic Web Service Composition
|
S.Poonguzhali, |
|
2011 |
3 |
5 |
p. 2054-2060 |
artikel |
46 |
The Integration and Development of the Leisure and Hospitality Information System Module with the Embedded Technology
|
Chih-Yao Lo |
|
2011 |
3 |
5 |
p. 1986-1994 |
artikel |
47 |
Towards Learner Model Sharing Among Heterogeneous E-Learning Environments
|
R. Sunitha, |
|
2011 |
3 |
5 |
p. 2034-2040 |
artikel |
48 |
Trust Negotiations Using Cryptographic Approach
|
Sandeep.V, |
|
2011 |
3 |
5 |
p. 2086-2092 |
artikel |
49 |
Using Association Rule Mining for Extracting Product Sales Patterns in Retail Store Transactions
|
Pramod Prasad, |
|
2011 |
3 |
5 |
p. 2177-2182 |
artikel |
50 |
Web Page Prediction using Hybrid Model
|
Shreya Dubey, |
|
2011 |
3 |
5 |
p. 2170-2176 |
artikel |
51 |
ZigBee Based Industrial Automation Profile for Power Monitoring Systems
|
Archana R. Raut, |
|
2011 |
3 |
5 |
p. 2028-2033 |
artikel |