Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             51 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 ACO Based Feature Subset Selection for Multiple k-Nearest Neighbor Classifiers Shailendra Kumar Shrivastava
2011
3 5 p. 1831-1838
artikel
2 A Comparative Study of Classification Algorithms for Spam Email Data Analysis Aman Sharma,
2011
3 5 p. 1890-1895
artikel
3 A Comparative Study of Public Key Cryptosystem based on ECC and RSA Arun kumar,
2011
3 5 p. 1904-1909
artikel
4 A GENETIC ALGORITHM FOR REGRESSION TEST CASE PRIORITIZATION USING CODE COVERAGE Arvinder Kaur,
2011
3 5 p. 1839-1847
artikel
5 Ambient Noise Tomography of the Central India Abhay P. Singh,
2011
3 5 p. 2068-2075
artikel
6 ANALYSIS OF ELECTRONIC VOTING SYSTEM IN VARIOUS COUNTRIES Sanjay Kumar,
2011
3 5 p. 1825-1830
artikel
7 Android in opposition to iPhone Kavita Sharma
2011
3 5 p. 1965-1969
artikel
8 AN EFFICIENT SUPER RESOLUTION TECHNIQUE FOR LOSS LESS COMPRESSED BAYER COLOUR FILTER ARRAY IMAGES K.Chiranjeevi,
2011
3 5 p. 1804-1814
artikel
9 AN EXTENDED METHOD FOR ORDER REDUCTION OF LARGE SCALE MULTI VARIABLE SYSTEMS Dr. G.Saraswathi
2011
3 5 p. 2109-2118
artikel
10 An Implementation of I2C using VHDL for DATA surveillance Arvind Sahu,
2011
3 5 p. 1857-1865
artikel
11 An Improved Hop-Count Metric for Infrastructural Wireless Mesh Network Paramjeet Kaur Bedi,
2011
3 5 p. 1757-1763
artikel
12 A novel application for transmission of Orthogonal Embedded Images by using Morphological Transform Domain & cryptographic methods M.Venkata Kishore,
2011
3 5 p. 1866-1877
artikel
13 APPRAISAL OF QUESTION CATEGORIZATION FOR AN ADAPTIVE ASSESSMENT IN ELEARNING R. KAVITHA
2011
3 5 p. 1933-1937
artikel
14 A Randomized Secure Data Hiding Algorithm Using File Hybridization for Information Security K. Venkata Ramana,
2011
3 5 p. 1878-1889
artikel
15 A Survey on Intrusion in Ad Hoc Networks and its Detection Measures Ms. Preetee K. Karmore,
2009
3 5 p. 1896-1903
artikel
16 A Survey on Telecommunication Technology Standards Sandeep Singh Sengar,
2011
3 5 p. 2061-2067
artikel
17 Automated Load Shedding Period Control System (An effective way to reduce human effort) Dwijen Rudrapal,
2011
3 5 p. 1764-1772
artikel
18 A Wavelet Transform Algorithm for 2n Shades Image Aditya Kumar,
2011
3 5 p. 2136-2144
artikel
19 COLLABORATIVE ANOMALY-BASED INTRUSION DETECTION IN MOBILE AD HOC NETWORKS SUNIL K. PARYANI,
2011
3 5 p. 2024-2027
artikel
20 Comparative and Analysis of Biometric Systems Manivannan,
2011
3 5 p. 2156-2162
artikel
21 COMPARATIVE STUDY OF BROWSER BASED OPEN SOURCE TESTING TOOLS WATIR AND WET Nisha Gogna,
2011
3 5 p. 1910-1923
artikel
22 DESIGN MODEL OF FUZZY LOGIC MEDICAL DIAGNOSIS CONTROL SYSTEM Faran Baig,
2011
3 5 p. 2093-2108
artikel
23 Development of Coalmine Safety System Using Wireless Sensor Network S.Vandana,
2011
3 5 p. 2076-2085
artikel
24 Differential Evolution for Optimization of PID Gains in Automatic Generation Control Dr. L.D. Arya,
2011
3 5 p. 1848-1856
artikel
25 Enhancement of Network Security Techniques using Quantum Cryptography Navleen Kaur,
2011
3 5 p. 1960-1964
artikel
26 FEATURE SELECTION METHODS AND ALGORITHMS L.Ladha,
2011
3 5 p. 1787-1797
artikel
27 Global Chaos Synchronization of Four-Scroll and Four-Wing Attractors by Active Nonlinear Control Dr. V. Sundarapandian
2011
3 5 p. 2145-2155
artikel
28 Global Chaos Synchronization of the Pehlivan Systems by Sliding Mode Control Dr. V. Sundarapandian
2011
3 5 p. 2163-2169
artikel
29 HYBRID FEATRUE SELECTION FOR NETWORK INTRUSION S.Sethuramalingam,
2011
3 5 p. 1773-1780
artikel
30 Hybrid Particle Swarm Optimization for Regression Testing Dr. Arvinder Kaur
2011
3 5 p. 1815-1824
artikel
31 Implementation of a Secured system with Roaming Server and Roaming Ports R. Bharathi,
2011
3 5 p. 1781-1786
artikel
32 Implementing Ant Colony Optimization for Test Case Selection and Prioritization Bharti Suri,
2011
3 5 p. 1924-1932
artikel
33 Introducing a New Language for Stream Applications Mohamad Dabbagh
2011
3 5 p. 2119-2126
artikel
34 Investigations and Performance Evaluation of Dynamic Routing Protocol with New Proposed Protocol for WAN Vasudha,
2011
3 5 p. 1970-1979
artikel
35 MESSAGE INDUCED SOFT CHEKPOINTING FOR RECOVERY IN MOBILE ENVIRONMENTS Ruchi Tuli,
2011
3 5 p. 1798-1803
artikel
36 Modified Order Crossover (OX) Operator Ms. Monica Sehrawat,
2011
3 5 p. 2019-2023
artikel
37 Optimizing Dependencies - A solution to Failure Proneness of software Dr.G.AppaRao,
2011
3 5 p. 2010-2018
artikel
38 Output Regulation of the Tigan System Dr. V. Sundarapandian
2011
3 5 p. 2127-2135
artikel
39 Performance Evaluation and Optimization of DSR Routing Algorithm over 802.11 based Wireless Mesh Network Birinder Singh,
2011
3 5 p. 1980-1985
artikel
40 Prediction of Profitability of Industries using Weighted SVR Divya Tomar,
2011
3 5 p. 1938-1945
artikel
41 Prediction of the Query of Search Engine Using Back Propagation Algorithm Deepti Gupta ,
2011
3 5 p. 1946-1959
artikel
42 Quantum Black Holes and pseudotelepathy in biological organisms Monendra Grover,
2011
3 5 p. 1995-1998
artikel
43 Revisions & Altercations in the Administration of Assets for Mobile Grid Computing Aditya Vidyarthi,
2011
3 5 p. 2041-2045
artikel
44 Robot Assisted Wireless Sensor Network for Monitoring and Detection of Explosives in Indoor Environment Joshua D Freeman,
2011
3 5 p. 2046-2053
artikel
45 Self-Healing in Dynamic Web Service Composition S.Poonguzhali,
2011
3 5 p. 2054-2060
artikel
46 The Integration and Development of the Leisure and Hospitality Information System Module with the Embedded Technology Chih-Yao Lo
2011
3 5 p. 1986-1994
artikel
47 Towards Learner Model Sharing Among Heterogeneous E-Learning Environments R. Sunitha,
2011
3 5 p. 2034-2040
artikel
48 Trust Negotiations Using Cryptographic Approach Sandeep.V,
2011
3 5 p. 2086-2092
artikel
49 Using Association Rule Mining for Extracting Product Sales Patterns in Retail Store Transactions Pramod Prasad,
2011
3 5 p. 2177-2182
artikel
50 Web Page Prediction using Hybrid Model Shreya Dubey,
2011
3 5 p. 2170-2176
artikel
51 ZigBee Based Industrial Automation Profile for Power Monitoring Systems Archana R. Raut,
2011
3 5 p. 2028-2033
artikel
                             51 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland