विशेषांक आलेख
Enhanced Data Transmission for Wireless Sensor Networks
An Enhanced Rationalize Security and Efficient Data Gathering In Wireless Sensor Networks
Load Balanced Connection Aware Clustering Algorithm for Wireless Sensor Networks
A NEIGHBOR COVERAGE BASED ROUTING BY GOOD NODE DETECTION IN MANET’S
Extracting the Information by Ranking Techniques to Increase the Privacy of Search Engine
USING ERED-FEC MECHANISM TO IMPROVING VIDEO QUALITY TRANSMISSION ON WiMAX
Secure Reputation Mechanism For Unstructured Peer To Peer System
Enhancing Secured Information in Online Social Network by Text Classifier
Avoiding Traffic Congestion Using Position Based Routing Protocol in VANET
Visual Impairment and Blindness Identification Using Mathematical Analysis in the Retinal Vessels
MULTI FOCUS IMAGE FUSION USING MULTI SPECTRAL AND PAN IMAGES
Cancer Cell Detection Using Mathematical Morphology
Recognition of Spatially Significant Zone Using Morphological Dilation With Advanced Watershed Segmentation Algorithm
A Large Scale Analysis Of Information Re-Finding System
Improving Service credibility in Password Authenticated Peer Services
TSROD: Time Synchronization By Reducing Ocean’s Delay In Underwater Wireless Networks
Computer Vision Approach for Retrieving Unconstrained Blurred Images
Intelligent Wireless Street Lighting System
An improved Automatic Virus particle Detection method based on adaptive K-NN classifier
An Enhanced Token Ring Technique for Overhead cut Detection Scheme in Distributed Mesh Networks
Tumor cut segmentation for Blemish Cells Detection in Human Brain Based on Cellular Automata
Secure Sharing Of Related Organization Records in Cloud Computing
Design and Detection of Covert Timing Channels and Spyware Using Warden Technique
A New Approach For Collaborative Data Publishing Using Slicing And M-Privacy
Reachability of Open Source Software
Obtaining Optimal Software Effort Estimation Data Using Feature Subset Selection
Collaborative Discovery and Verification of Neighbour position in MANET
Unconstrained Face Recognition Using SVM Across Blurred And Illuminated Images With Pose Variation
Seam Carving for Content Aware Video Compression
Regularized Sparse Kernel SFA with Decorrelation Filtering For Separating Correlated Sources
New Dimensional Approach towards Fraps-Face Recognition after Plastic Surgery
Privacy Preserving Public Auditing in Secured Cloud Storage Using Block Authentication Code
Securing Location and trust extended authentication in mobile ad hoc network
A Security Approach for Detection And Elimination Of Resource Depletion Attack In Wireless Sensor Network
Human Gait Based Gender Classification Using Energy Motion Approaches
Secure Cluster Formation and Certificate Revocation Of Adversary Nodes In Mobile Adhoc Network
Dynamic Resource Allocation And Distributed Video Transcoding Using Hadoop Cloud Computing
Securable Routing And Elimination Of Adversary Attack From Manet
Location Based Mobile Secure Social Networks
Intrution Resilience Using Self-Healing Mechanism In Mobile Unattended Wsns
Safeguarding Scada Network by Captious State Based Filter
Protection Of User’s Data Using Image Encryption Domain: Image Encryption
A Solid State Transformer Integrating Distributed Generation and Storage
Improving The Performance For Failure-Aware Resource Provisioning In Cloud
Accomplishing Minimum Data Sets Transfer Cost in the Cloud through Ant Colony Optimization
Reverberation Suppression of Noisy Speech Signal
Detection of Tricking Attack and Localization Of Deceivers In Multiple Wireless Networks
Large Scale of Content Distribution Using Homomorphic Hash Function
An Efficient Storage and a Method Of Network Monitoring Data Compression
Profit Maximization in Cloud Computing
Encryption Techniques for Storing Personal Health Details (PHR) In Privacy Cloud
Mobile Ad-Hoc Networks Capacity Optimized Cooperative Communications
High-Capacity Reversible Data Hiding In Binary Images by Using Pattern Substitution
Low Power Consuming FFT Pipelined Processor
Design Of High Performance Rc4 Stream Cipher For Secured Communication
Fault Secure Encoder and Decoder For Memory Applications
Detection of an Inflammatory Disease Based on Classification of Tissues in Brain MRI
The Analysis of Power Transformer from Differential Protection Using Back Propagation Neural Algorithm
Design of Multi-region SAR Segmentation by Parametric
Design of Compressed Sensing systems for wireless sensor under the performance and reliability constraints
Design of Wireless Framework for Energy Efficient Street Light Automation
Error Reduction in WiMAX Deinterleaver Address Generator by Using Majority Logic Circuit
Enhancing Security in MANET Using CCRVC Scheme
Enhanced Security in Manet Using Eaack To Detect Malicious Attack
Enhancing Security in Wireless Ad-Hoc Network Using ZKP
An Energy Efficient Multicast Routing Based On Genetic Algorithm for MANET
Privacy Preserving Outsourcing for Frequent Itemset Mining
An Efficient Way of Detecting Denial-Of-Service Attack Using Multivariate Correlation Analysis
Cloud Computing Model for Large Scale System through Merkle Hash Tree
Time Constrained Datadestruction Using Blowfish Algorithm In Cloud
A Fast Clustering Based Feature Subset Selection Using Affinity Propagation Algorithm
Post Market Drug Analysis using Irregular Pattern Mining Scheme
MULTI ORGANIZATION RECORD SHARING IN CLOUD COMPUTING USING ATTRIBUTEBASED ENCRYPTION
Anomaly Detection on Data Streams with High Dimensional Data Environment
Batch Verification Scheme for Economic Cloud Storage Services
Distributed Cache Model with Stability and Storage Management for MANET
Optimal Centroid Estimation Scheme for Multi Dimensional Clustering
Decision Prevention Mechanism for Frequent Pattern Mining Process
Privacy Ensured Domain Name Query Scheme with Attack Detection Mechanism
Efficient Data Delivery Mechanism for Distributed Storages
Graph Clustering and Feature Selection for High Dimensional Data
Optimizing User Navigation with Pattern based Web Site Restructuring Scheme
Multi Image Super Resolution and Blind Deconvolution
Protecting DNS Query Communication against DDoS Attacks
Image Fraud Identification Using Illuminant Analysis
Privacy Preservation for User Profiles In Social Networks
Routing Attack Discovery in WSN
Decentralized Data Allocation with Load Balancing Mechanism
Mobile Sink based Data Gathering and Forwarding in WSN
Efficient Message Caching Scheme for MANET
Anonymous Privacy-Preserving Routing In Location Based Dynamic Ad-Hoc Networks
Online Dynamic Assessment
Functional Testing Technique Using ODC to Identify And Predict Faults
Automated Testing For the Refactored Codes
Privacy Preserved Association Rule Mining For Attack Detection and Prevention
Visual Text Summarization in Supervised and Unsupervised Constraints Using CITCC
K-Tier Computation of Parallel Workload in Cloud
Automatic Tuning Of OLSR Routing Protocol Using IWD in VANET
Feature Extraction Technique Based On Circular Strip for Palmprint Recognition
Annotating Multiple Web Databases Using Svm
Efficient Load Balanced Routing Algorithm Based On Genetic And Particle Swarm Optimization
Attention Towards Selfish Nodes Over A Manet Using Arti-Q Technique
A Best Vigorous Resource Allocation Autonomously In Cloud
A Security Approach For Detection And Elimination Of Resource Depletion Attack In Wireless Sensor Network
Comparison Of Cepstral And Mel Frequency Cepstral Coefficients For Various Clean And Noisy Speech Signals
Prevention Model For Phishing Attacks In Web Applications Using Linkguard Algorithm
Secure Cluster Formation And Certificate Revocation Of Adversary Nodes In Mobile Adhoc Network
Improving Privacy And Data Utility For High- Dimensional Data By Using Anonymization Technique
Feature Based Classifiation Of Lung Tissues For Lung Disease Diagnosis
An Efficient Approach For Multimedia Transmission Using Multipath Routing In Manet
User Revocation And Fine Grained Access Control Of Phr In Cloud Using Hasbe
Investigation of Recognition Methods in Biometrics
Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack
Optimization Of Energy Efficient Communication To Improve The Lifetime Of Sensor
Enhancement of secured Mobile voting based on IMEI number as Key
Image Fusion And Denoising Technique: Survey
A Cluster Based Group Management Using Zone Leader Allocation In Manet
Dynamic Router Design For Reliable Communication In Noc
An Improved Edge Adaptive Grid Technique To Authenticate Grey Scale Images
AUGMENTING THE SECURITY IN TOR
Tour Planning For Mobile Data-Gathering Mechanisms In Wireless Sensor Networks
Data Aggregation In Wireless Sensor Networks Using Mobile Data Collector
A Image Forensics Analysis by Using DST, Fuzzy and Bayesian Approaches
Effective Heart Disease Prediction using Frequent Feature Selection Method
To improve Security enhancement and Lifetime Management Scheme for Wireless Sensor Networks
Semi supervised clustering for Text Clustering
Secured And Reliable Data Transmission Using Lychrel Numbers Rgb Colors And One Time Password
Detecting Forged Acknowledgement in Mobile Ad-Hoc Network Using Intrusion Detection System
Audio Alert for Safe Driving by Smartphones
Reducing Routing Overhead In Manet Using Ncpr Protocol
Speech Processing Of Tamil Language With Back Propagation Neural Network And Semi- Supervised Traning
Robust Shape Representatio Using Minium Near Convex Decomposition
A Rational Approach For Data Reporting In Wireless Sensor Networks Using Sink Trial Protocol
Neighbor Position Verification in Mobile Ad Hoc Network
Security Scenarios over Cloud Computing through Espousing Multi-Cloud Structure
Range Query Grouping In Spatial Networks Using Dual Distance Measurements
Protecting Web Service Composition From Privacy Attacks Using Dynamic Privacy Model
Thecritical Event Monitoring In Wireless Sensor Networks Using Sleep Scheduling
Performing Enhancement and Providing Minutiae Matching Score in LQFI
A Bi-Objective Approach for Cloud Computing Systems
Data Hiding Using Difference Expension Method
An Enhanced Memory Management For An Advanced Line Buffer Based Image Processing Pipeline
Moving Object Detection By Background Subtraction
Optimized Re-Ranking In Mobile Search Engine Using User Profiling
Bottleneck Zone Analysis in Wireless Sensor Network Using XOR Operation and Duty Cycle
Filtering Injected False Data in Wireless Sensor Networks by Using L, F, S Nodes and Key Distribution
Combined Fingerprint Minutiae Template Generation
A Novel Approach for Restructuring Web Search Results by Feedback Sessions Using Fuzzy clustering
Securing Data Packets from Vampire Attacks in Wireless Ad-Hoc Sensor Network
Improving Service Credibility in Password Authentication Peer Services
Transferring Knowledge Using Feature Extraction from Sparse Data for Drug Toxicity Prediction Using Utility and Drug Combinations
Reduction of End To End Delay Using Priority Queues in Wireless Sensor Network
Performance Enhancement Using Naodv Algorithm In Manet
Preventing Private Information Leakage on Social mining
Efficient Resource Allocation And Avoid Traffic Redundancy Using Chunking And Indexing
Integration of Subspace Clustering and Action Detection on Financial Data
Decentralized Approach for Balancing Load in Dynamic Cloud Environment
A N-Radon Slantlet Transforms Based OFDM System Design with PCC Algorithm to improve the Performance
Congestion Based Pricing Resources Managemant In Broadband Wireless Networks
Electromagnetic Coupling Microstrip Patch Antenna for Improving Wide Bandwidth and Broad Beamwidth
VLSI Implementation of Reconfigurable Low Power Fir Filter Architecture
Access Control Policies Of Socio Networking Websites For Multiple Profile Holders
A Framework to Enhance Cryptographic Parameter for Data In Cloud
Achieve Ranking Accuracy Using Cloudrank Framework for Cloud Services
MPPT Algorithm Based PV System Connected To Single Phase Inverter
Enhanced Detection of Packet Droppers And Modifiers In Wireless Sensor Networks
4 Level Authentication Security In Cloud Computing
Brain Tumor Statistical Structure Analysis And Prediction Based On Self Organised Map
Privacy-Assured OIRS Service with Performance Speedup in Cloud
AMAP: Accelerated Message Authentication Protocol for Vehicular ADHOC Networks
Rank Preserving Discriminant Analysis for Human Behaviour Recognition Using Dash7 Protocol
Security Enhanced Service Level Agreement for Cloud Storage Services
Development Of Efficiency Model Of Three Phase Induction Machine And Improving Efficiency At Low Load Condition Using Controllers
Performance Optimization Of Poultry Farm By Using Instrumentation With Help Of Embedded Automation
Audio Steganography Using Least Significant Bit
Biconnectivity Of Zigbee UMTS Hybrid Network
A Trust Based Payment Scheme for Multihop Wireless Networks
Optimal Route Query Based On Forward Search and Backward Search
Packet classification based on priority with shortest path algorithm
Enhancement of a Novel Secure Data Storage & Privacy in Cloud Network
Efficient Power Management in Wireless Communication
Beyond Text QA Multimedia diverse relevance ranking based Answer Generation by Extracting Web
Unconstrained Face Recognition From Blurred and Illumination with Pose Variant Face Image Using SVM
Enhancing Digital Forensic Analysis through Document Clustering
Novel Dynamic Fault Localization for Server side Vulnerabilities
A Load Balanced Greening Approach for Proficient Resource Allocation with Cloud Partitioning
Enhanced Packet Scheduling Scheme for Wireless Sensor Networks
AMI Mesh Networks Based Home Energy Management System
Accessing Distributed System Using Hashed Fingerprint Recognition
Delay Based Scheduling For Cognitive Radio Networks
Secure Data Transmission in MANETS Using ELIPTIC Curve Cryptography
Analysis of Secure In-Network Aggregation for Anomaly Detection in Wireless Sensor Networks
A Scalable Approach for Effective Content Delivery Using Enhanced Distributed Load Balancing Mechanism
Letter Pair Similarity Classification and URL Ranking Based on Feedback Approach
Preventing Mobility Device Intrusion And Theft Using Biometric Fingerprint Recognition
Traveling Salesman Problem Solved Using Bio Inspired Algorithms (ABC)
Detection of Text with Connected Component Clustering
A Novel Noise Filtering Technique for Denoising MRI Images
Hybrid Location Based Forward Routing in Manet’s
EEEM: An Energy-Efficient Emulsion Mechanism for Wireless Sensor Networks
Detection of Cancer Using Biclustering
Sensor Network Deployment and Critical Parameter Selection for Intrusion Detection System
A Dempster-Shafer Framework For Decision Fusion In Image Forensics
Critical Nuggets Identification for Classification Task
A Method of Segmentation For Glaucoma Screening Using Superpixel Classification
Indexing For Sequential Stochastic Mechanism- Based Movement Replicas In Recognition Of Human Activity
Efficient Algorithms for Incessant Position Based Spatial Queries in Mobile Environments
Detection of Pre-Skin Cancer Using Automatic Cell Segmentation Technique
A Countermeasure Circuit for Secure AES Engine against Differential Power Analysis
Accident Detection Using Android Smart Phone
An Efficient Clustering Method To Find Similarity Between The Documents
Implements The Spatial Inverted Indexes To Perform Quick Search
Secrecy Maintaining Public Inspecting For Secure Cloud Storage
Multichannel Satellite Image Resolution Enhancement Using Dual-Tree Complex Wavelet Transform and NLM Filtering
Performance Analysis Using Controlled-Loose- Virtual-Clumping-Based Expelling for Power Heterogeneous (CBEPH) Manets
Searching Application-Level Meaning for Data Compaction
A Survey on Intrusion Detection in Mobile Ad Hoc Networks Using Enhanced Adaptive Acknowledgment
Efficient and Secure Dynamic Auditing Protocol for Integrity Verification In Cloud Storage
Design and Development of a Real-Time Ground Station Software System and Small Satellite for Weather Monitoring Applications
Efficient Segmentation and Classification of Remote Sensing Image Using Local Self Similarity
Detection and Segmentation of Brain Tumors using AdaBoost SVM
Sensory Data Collection Using Rendezvous Nodes
Realization of High Speed VLSI Architecture for Decision Tree Based Denoising Method In Images
An Efficient Location Based Routing for Mobile Adhoc Networks
A Model of Textual Emotion Mining From Text Document
Modified Difference-Histogram based Reversible Data Hiding Scheme
Optimization of Bit Rate in Medical Image Compression
A Collaborative Approach Based On Ant Colony Algorithm for Data Aggregation in Wireless Sensor Networks
Minimizing Packet Loss Using Buffer Management Scheme for Video Streaming
Detecting Anomalies by Online Techniques Using Spam Detection
Scott Knott Test Based Effective Software Effort Estimation through a Multiple Comparison Algorithms
Packet Classification Using Standard Access Control List
Reduction of Decoding Time in Majority Logic Decoder for Memory Applications
Smart Survillience Rover ? Industarial Monotoring
Reversible Information Hiding in Videos
A Study on Wireless Sensor Networks Localization
Energy Efficient E-BMA Protocol for Wireless Sensor Networks
Removal of High Density Impulse Noise Using Boundary Discriminative Noise Detection Algorithm
Filtering Noisy Contents in Online Social Network by using Rule Based Filtering System
Provide Integrity for Spatial Data Outsourcing
Fingerprint Privacy Preservation by Minutiae and Orientation
Strength of Evolving Agent Population in MAS
Disperse Processing of Presumption Top-K Inquire in Wireless Sensor Networks
Multiple Class Identification and Categorization with Nuggets on Health Care Data
Resource Allocation under Uncertainty in Cloud Storage for Computational Environment
Replica Allocation Technique with Mobility Based Beacons In Mobile Ad Hoc Networks
A Framework for Secure Mechanism to Detecting Localizing Multiple Spoofing Attacks in Wireless Sensor Network
Retrieval of Encrypted cloud data using multikeyword
Tampering and Copy-Move Forgery Detection Using Sift Feature
An Energy Improvement in Cache System by Using Write Through Policy
On-Demand Routing in Mobile Ad Hoc Network
Detecting DDOS Attacks by Circular Protection Network
Protecting Streaming Data Using Provenance Spread Spectrum Watermarking
Multiview Pedestrian Detection Based on Online Support Vector Machine Using Convex Hull
Intelligent network stabilization of dynamical systems using topological condition
Cluster Based Certificate Revocation and CBRP in Manet
Secure Auditing For Outsourced Data in Cloud Using Homomorphic Token and Erasure Code
User Search Histories Based On Query Relevance Using Incremental Algorithm
Xml Based Digitalized Secure Information Channel Maintenance in Distributed Broking Systems
Retinal Microaneurysm Exclusion on Optic Disc and Detection Using Cross Section Profile Analysis
Concept Based Ontology Matching By Concept Enrichment
A Framework Outline for Word Catalog Based Model in Cloud
Establishing Adversary Resistant Communication in Wireless Network
Analysis of a DWDM transmission system for multichannel long haul link
Optimization of Content Downloading Using Dynamic Cache Memory
Feature Extraction and Analysis of Breast Lesions in UltrasoundB mode and Elastography
Handling Flood Attacks in Disruption Tolerant Networks Based On Claim Verification
Enhanced Node Utilization and Responsiveness for Parallel Workload Based On Priority Consolidation in the Cloud
Hand Gesture Recognition using MACD
A Technique to Prevent Dynamic Unsafe Component Loadings
Dynamic Congestion Control with Multihop Scheduling Algorithm For Mobile Ad-Hoc Network
Privacy and Efficiency On Health Care Data Using Private Proxy Reencryption Scheme
Robust Data Authenticity and Group Signature Mechanism for Enhanced Cloud Security Process
Content Based Analysis Improves Audiovisual Archieve Retrieval
Multi Keyword Web Crawling Using Ontology In Web Forums
Mining Of Inconsistent Data in Large Dataset In Distributed Environment
Mobile Virus Prevention Techniques: A Survey Perspective
High Throughput, Low Area, Low Power Distributed Arithmetic Formulation for Adaptive Filter
Robust Cloud Resource Provision
An Analysis of Unwanted Messages Filtering Methods from OSN User Walls
Inspection of Vulnerabilities through Attack Graphs and Analyzing Security Metrics Used For Measuring Security in A Network.
Simulation on Cyber War in Cloud Computing
Particle Filtering Framework and Occlusion Handling Using Region Based Tracking Technique for 2-D and 3-D Image Sequences
Accumulative Privacy Preserving Data Mining Using Gaussian Noise Data Perturbation at Multi Level Trust
Unstructured Data into Intelligent Information Analysis and Evaluation
Design of Double Tail Comparator for High Speed ADC
Improving Word Similarity Using PPMIC with Estimates of Word Polysemy
Intrusion Detection Using Double Guard In Multi- Tier Architecture
Improving energy and cost-effective workflow scheduling in cloud computing
Acknowledgment-Based Secure Authentication Method for Manet
A Self Adaptive Approach for Defending Flood Attacks in Disruption Tolerant Networks
An Anonymous Authentication and Secure Communication Protocol in Ad-hoc Networks
Security Using Anonymization and Slicing
Implementation of Pick and Place Operation, Battery Backup and Zone Control in Automated Guided Vehicle
Clustering of Data with Mixed Attributes based on Unified Similarity Metric
Balancing the Load to Reduce Network Traffic in Private Cloud
Inferring Private Information from Social Network Using Collective Classification
Measure of Implicit Relationship between Words by Network Count
Design and Implementation of Efficient Binary to Residue Converter Using Moduli Method
An Effective Cluster-Based Routing With Link Quality For Power Varied Manets
Robust Rate control for Video Streaming in Heterogeneous Environment
Low Power Multi Bit Flip Flops Design for VLSI Circuits
Image Mining: frameworks and techniques
A Relevant Clustering Algorithm for High- Dimensional Data
Improved Client Data Security with Aggregated Query Using CDAMA
Secured Routing For Manet Using Friend Based Adhoc Routing (FAR)
Design of Hybrid Multicasting Network for Authentication
Sum Query Evaluation over Uncertain Data
Privacy Preserved Data Scheduling For Cloud Data Services
An Effective Approach for Detecting and Preventing Sqlinjection Attacks
Privacy Preserving Public Auditing for Data in Cloud Storage
Combined Cluster Based Ranking for Web Document Using Semantic Similarity
Restructure Search Results for Efficient Web Search
A Secure Erasure Code-Based Multi Cloud Architecture with Privacy and Preservation
SECUDROID - A Secured Authentication in Android Phones Using 3D Password
Ranking the Relationship on Wikipedia through Strength Determination
Dynamic Resource Allocation Using Nephele Framework in Cloud
ADA: Data Aggregation Scheme for Dynamic Application Using PBDR in Wireless Sensor Networks
Optimum Service Interval and Service Period: MBR in Wireless Networks
Adaptive Discriminating Detection for DDoS Attacks from Flash Crowds Using Flow Correlation Coe f f ic i ent with Collective Feedback
Packet Concealing From Discriminating Selective Jamming Attacks Using Prevention Methods
Securely Managing the Personal Health Records Using Attribute Based Encryption in Cloud Computing
Semantic Analysis based Dirichlet Clustering Scheme for Text Documents
An Enhancement in Data Collection
Effective Neighbor Identification with False Report Verification Using Manets
Balancing privacy and Utility in Defect Prediction by Privatization Algorithm
User Centric Privacy Access control For MHealthcare Emergency in Opportunistic Computing
Modified Networks Selection Scheme for 4G System Based On QOS
An Efficient Resource Allocation for Improving Resource Utilization in Self Organizing Clouds
Query Services in Cost Efficient Cloud Using Query Analysis
Applications of Security System
Scheduling Enabled Compressive Data Collection Scheme For Wireless Sensor Networks
Mobile Health Monitoring Based On New Power Management Approach
Reversible Gate Based Testable Sequential Circuits
Real Time Sentiment Classification Using Unsupervised Reviews
Improving Scalability of R-Dictionary Using Keyword Based Approach
Detection and Localization of Multiple Spoofing Attackers in Wireless Network
A Self-Learning Optimization Approach to Single Image Super-Resolution using Kernel ridge regression model
A Novel Method of Vehicle Accident Protection and Early Precaution System
Cluster Tree Based Hybrid Document Similarity Measure
An Overview of Knowledge Discovery Database and Data mining Techniques
Virtual Shopping Application for Android Devices Using Virtual Reality
Modified K-Means Algorithm for Initial Centroid Detection
Data Access Control in Cloud Using Attribute Based Revocation Algorithm
TPA Based Batch Auditing Mechanism for Commercial Clouds
Reputation and Quality of Service for Wireless Sensor Networks Using Ant Colony Optimization
Efficient Method for Secure Transmission from Malicious Nodes through Certificate Authentication
Design of 2/3 prescalerLow Power Flexible Multiband Divider
Enhance Privacy Preserving In Location Based Service
Cloud-based Secure Log Management using Homomorphic Encryption to reduce Communication Overhead
Security for Smart Distribution Grid By Using Wireless Communication
Invariant Based Integration of Web Service Interface Testing
Low Cost (PUF) Physical Unclonable Function Using Secured Clock Network
Attribute Based Encryption with Privacy Protection in Clouds
Establishing SSH Connection and Interfacing GSM/GPRS Functionality with Raspberry PI
An Efficient Algorithm to Mitigate Packet Drop Attack in AODV Protocol
Face Verification across Ages Using Self Organizing Map
Dynamic Profile Based Technique to Detect Flooding Attack in MANET
Design of Dipole Antenna Using Mom
Vehicle Detection Using Gabor Filter
Multi Focus Image Fusion Using Joint Sparse Representation
Authentication and Intrusion Detection System for Mobile Ad-Hoc Networks
ETAM Enhanced Trust Authentication Mechanism for Vehicular Ad Hoc Networks
Content Based Image Retrieval System-an Evaluation
Gateway Discovery Approaches Implementation and Performance Analysis in the Integrated Mobile Ad Hoc Network (MANET)-Internet Scenario
A Clustering Mechanism for Energy Efficient Routing Path
Systolic Tree Algorithms for Discovering High Utility Itemsets from Transactional Databases
Key Generation for Outsourced Storages in Clouds
A Framework for Secret Sharing In Multisession Trust Negotiation
Smart Energy Meter with Instant Billing and Payment
Algorithmic-Technique for Compensating Memory Errors in JPEG2000 Standard
Car Authentication and Accident Intimation System Using GPS and GSM
An Effective Approach for Video Copy Detection and Identification of Misbehaving Users
Intrusion Detection System to Detect Malicious Misbehaviour Nodes in Manet
A New Algorithm for Finding Automatic Clustering In Unlabeled Datasets
Feature subset selection using filtering with Mutual information and Maximal information coefficient
Efficient Optimization of Sparql Basic Graph Pattern
Scalable And Secure Sharing Of Personal Health Records In Cloud Computing Using Multi Authority Attribute-Based Encryption
Dynamic Key Management System for improving security in Three-Tier environment
Global Innovations in Cloud Computing Services and Deployment
High Speed Boosted CMOS Differential Logic for Ripple Carry Adders
Preserving Data Integrity in Cloud Storage
Reduce Traffic in Optical Switching Networks by Using Control Packet Buffering Method
Enabling Cost-Effective Privacy Preserving Of Intermediate Sensitive Data Sets in Cloud Using Proxy Re-Encryption Technique
Green Computing For System Efficiency and Optimization
Using Interleaving Techniques with FEC Mechanisms to Deal with Burst Errors
Remote Monitoring of Vital Signs in Chronic Heart Failure Patients
Copy Frame Detection in Video by Using Data Mining Techniques
Lossless Compression and Efficient Reconstruction of Colour Medical Images
A Study on Optimization Algorithms for Clustering Gene Expression Data
Per-Colorant-Channel High Capacity Color Barcodes: An Interference Cancellation Framework
Time Constrained Data Destruction in Cloud
Online and Remote Motor Energy Monitoring and Fault Diagnostics Using Wireless Sensor Networks
GeoZigBee: A Wireless GPS Wristwatch Tracking Solution
Implementing Black hole Password Entry Technique For Mitigating Shoulder-surfing Threat
Efficient Techniques for Message Authentication and Communication for Wireless Sensor Network
Digitalised Secure Information Channel Maintenance in Distributed Broking System
Multi Resolution Pruning Based Co-location Identification in Spatial Data
Proposed Architecture for Implementing Privacy in Cloud Computing using grids and virtual private network
Integrating Colors, Shapes and Motions Using Active Contour Based Visual Tracking
A Cost Effective Multicast Key Management Scheme for Secure Group Communication
Dynamic Architecture for Scalable and Proficient Group Key Management
Enhanced Intrusion Detection for Zombie Exploration Attacks in Mobile Adhoc Networks
Dynamic Economic Dispatch for Power Generation Using Hybrid optimization Algorithm
To Enhance the Lifetime of WSN Network using PSO
Multi Sink based Data Collection Scheme for Wireless Sensor Networks
Service and Data Security for Multi Cloud Environment
Power Quality Improvement using Hysteresis Voltage Control of DVR
Single Query Optimization of SPARQL Using Ant Colony Optimization
Practical Approach for Achieving Minimum Data Sets Storage Cost In Cloud
A Survey on Wireless Sensor Network Security
Analysis of ECG Signals for Arrhythmia Using MATLAB
Determination of LMP for Congestion Management in Electricity Market
Adeptness Comparison between Instance Based and K Star Classifiers for Credit Risk Scrutiny
Providing High Security in User for Vehicular Ad- Hoc Network
A Semantic Model for Concept Based Clustering
Preventing DNS Queries Against DDOS Attack
A Unified Scheduling For Multi-Hop Wireless With Order Optimal Per Flow Delay
Profit based unit commitment using IPPDT and genetic algorithm
Various Segmentation Techniques in Image Processing: A Survey
MST Clustering and Relevancy Analysis for Key Element Identification Process
ICGICT Allocation of DG for IEEE 33 Bus Systems
RFID Based Smart Grid with Power Factor Maintenance in Load Side
Presence Server For Mobile Ubiquity Services In Presence Cloud
Personal Authentication using Fingerprint Biometric System
Bandwidth Scheduling for Content Delivery in VANET
Cluster Based Intrusion Detection System for Wireless Sensor Networks
Grid connected renewable energy system using unified power quality conditioner for improving power quality
User Behaviour Prediction Based Adaptive Mobile Video Streaming and Efficient Social Video Sharing in the Clouds
Disperse Processin Of Presumption Top-K Inquire In Wireless Sensor Networks
SeCom: A Novel Approach for Malware Confiscation in OS level Virtual Machines
A support for end user-Centric SLA administration of Cloud-Hosted Databases
Brain Gate Technology
An Optimal Cloud Service Selection Based on the QoS Values: A Survey
Privacy-Preserving Data Sharing for Dynamic Groups in the Cloud: A Survey
Multidimensional Image Registered Scanner using MDPSO (Multi-objective Discrete Particle Swarm Optimization)
An Improved Semi-Supervised Clustering Algorithm Based on Active Learning
Artificial Intelligence (Biologically inspired intelligent robots using artificial muscles)
Hyperspectral Image Resolution Enhancement Using Object Tagging OLHE Technique
An Improved Privacy Preserved Rule Mining for Credit Dataset with Discrimination Prevention
Non-Invasive EEG Based Wireless Brain Computer Interface for Safety Applications Using Embedded Systems
Fingerprint Matching Incorporating Ridge Features Using Contourlet Transforms
Analysis and Principles of Green UI Design for Web Portals
Optimized Data Transmission from Cloud to Society by Mapreduce
A Fuzzy Ontology Based Automatic Video Content Retrieval
A Novel Approach to Ranking On Data Manifold With Sink Points
An Efficient I/O Cost Model for Novel Indexing algorithms in a Joint Top K Spatial Keyword Query Processing
The Brain Fingerprinting Technology
Camerareadycopy-ICGICT-403-Cloud Computing (Networks)
Adaptive Fuzzy Based Solution of Inverted Pendulum & Aircraft Landing Problems
Maintaining Privacy and Secrecy in Untrusted Network with Stile
Recognizing and Mask Removal in 3D Faces Even In Presence of Occlusions
Authenticating Service Request in Kernel Mode against Malicious Code
A Preserving Location Privacy of Mobile Network
ECG Steganography Based Privacy Protecting Of Medical Data for Telemedicine Application
MD5: Anonymous Location-Aided Routing in Suspicious Secure MANETs
Secure Sharing Of Data for Dynamic Multi Owner in Cloud Storage
APU - Mobility Prediction Scheme for Routing Protocols in MANET
An Elastic and Scalable Data Streaming System for Distributed Cloud
Reducing Burst Transmission Error by Honey comb method in Sensor networks
Authentication of Online Digitized Content Using Trapdoor Hash Function Method
Multi Organization Records Sharing in Cloud Computing Using Attribute Based Encryption
Entity Recognition in a Web Based Join Structure
Simple Algorithm for the Magnetic Field Computation in Bobbin Coil Arrangement
Enhancing the Efficiency of Secure and Distributed Reprogramming Protocol for Wireless Sensor Network
Efficient Management Algorithm for Non- Interrupting Data Communication in Wireless Networks
An Architecture to Enhance Privacy and Security in Collaborative Systems
Protected Patients Data Centre in Cloud Computing
Vibrant Resource Allocation Algorithms using Virtual Machine in Cloud-Survey
Avoiding Overload Using Virtual Machine in Cloud Data Centre
Secure Data Sharing in Cloud Environment Using Multi Authority Attribute Based Encryption
Border Alert System for Boats Using Zigbee
Highly Efficient and Intelligent Indoor and Outdoor Lighting System Using a ZigBee Network of Devices and Sensors
Implementation of 3-Tier Architecture Using C-MART
SPOT- E-mail Spam Zombie Detection System
An Efficient Approach for Emergency Message Dissemination in VANET
A Performance Analysis for Manet Using Secured Algorithm
Automated Diagnosis of Cardiac Health
Efficient Dynamic Multilevel Priority Task Scheduling For Wireless Sensor Networks
Enhancing the High Performance Resource Allocation and Data Sharing in Cloud Computing
Efficient Cluster Based CCRVC Scheme in Manet
A Survey on Energy Efficient Hierarchical (Leach) Clustering Algorithms in Wireless Sensor Network
Efficient Detection and Elimination of Vampire Attacks in Wireless Ad-Hoc Sensor Networks
Analyse the New Path Weight Using Hop By Hop Routing Mesh Networks
A Trust Based Mechanism for Preventing Noncooperative Eavesdropping in WSN
Reducing Data Redundancy Scheme in Heterogeneous Cloud Storage
Detection of Cheater Nodes Based On Evidences and Reports in MultiHop Wireless Networks
Risk-Awareness for Manet Routing Attacks Based On D-S Theory
Trust Aware Secure Routing for Cluster-based Wireless Sensor Networks - A Comparative Study
Detection and Mitigation of DDOS Attacks By Circular IPS Protection Network
Automation of URL Discovery and Flattering Mechanism in Live Forum Threads
A Hybrid BTF Approach for Temporal Query Processing In the Patented Medical Database
Three Step Password Scheme for Secured Data Transfer
A Roadmap to an Enhanced Graph Based Data mining Approach for Multi-Relational Data mining
Secure Data Sharing for Dynamic and Large Groups in the Cloud
Performance and Analysis of Video Streaming of Signals in Wireless Network Transmission
Enhancing Map-Reduce Framework for Bigdata with Hierarchical Clustering
Discovering Patterns of Human Interaction in Meetings Using Tree-Based Mining
An Efficient Retrieval of Encrypted Data In Cloud Computing
Integrating Wireless Sensor Networks into Internet Of Things For Security
GNSS Based Bus Monitoring And Sending SMS To The Passengers
Meta Heuristic Harmony Search Algorithm for Network Reconfiguration and Distributed Generation Allocation
Video Enhancement Based on Piecewise Tone Mapping
A Comparative Study of Software Effort Estimation Using Fuzzy Logic Membership Function
System of Quality Automation for Documents (SQAD)
An Efficient Transmission over Cooperative Groups Using Hybrid Scheme
Design & Implementation of Nios II Processor for Low Powered Embedded Systems
Securing and Region Based Algorithms For Wireless Sensor Networks
ICGICT-213-Internet Based User Service-Mobile Computing Internet Based User Service
Dynamic Virtual Machine Scheduling for Resource Sharing In the Cloud Environment
Garment Company Automation Using the Concept Of Big Data And Open Source Software
An Efficient Approach to Enhance Security for Android Applications
Restoring Degraded Documents by Using Neural Network - KSOM Based Hybrid Techniques
Nonwhite Noise Reduction In Hyperspectral Images
Smart-Puter Based Sectrol for Vehicles
Cost Effective Resource Mapping Based Requisition Partitioning Through Iterated Local Search
Contourlet Based Image Denoising Using New- Threshold Function
Experimental Investigation Decentralized IaaS Cloud Architecture Open Stack with CDT
Biometric Fingerprint Verification System Based on BFS using Ridge Features
Optimal Top-K Queries Computing: Sampling and Energetic Development Approach
An Iterative Approach to Record Deduplication
Developing Intonation Pattern for Tamil Text To Speech Synthesis System
Encryption of Cryptographic key technique by crossover of Iris and Face Biometric key
An Efficient Approach for Requirement Traceability Integrated With Software Repository
Near Duplicate Document Detection Using Document-Level Features and Supervised Learning
Energy Histogram for Image Retrieval using Relevance Feedback
Detecting Threads in Secure Communication using RCEE
Secure Crypto Multimodal Biometric System for the Privacy Protection of User Identification
Power Optimization in FPGA through Controller Device
Sybil Attack Detection with Reduced Bandwidth overhead in Urban Vehicular Networks
Elliptic Curve Cryptography in Cloud Architectures With Lower Latency
Enhanced Routing in Mobile Adhoc Network against Denial of Service Attack
Grid Computing: A solution to processing time and power issues
Voice Recognition Robot for Visually Impaired People
Efficient Single Sign on Scheme for Distributed Networks
A Power Balancing Approach for Efficient Route Discovery by Selecting Link Stability Neighbours in Manet
Improve the QoS of Networks Using Advanced Hybrid Routing in WSN
Detection of Digital Image Forgeries by Illuminant Color Estimation and Classification
Parallel AES Encryption Engines for Many-Core Processor Arrays
Cryptography Based Data Aggregation Scheme for Data Integrity Analysis in Wireless Sensor Networks
Majority Logic Decoding Of Euclidean Geometry Low Density Parity Check (EG-LDPC) Codes
A Scheme for Detection of License Number Plate by the Application of Genetic Algorithms
MEMS Accelerometer based Digital Pen Recognition using Neural Networks
Mitigating Malicious Activities by Providing New Acknowledgment Approach
An Adaptive Contrast Enhancement of Colored Foggy Images
Reduction of Delay and Power by Using MLDD Technique in Error Correction
A Novel Architecture of SRAM Cell Using Single Bit-Line
Implementation of E2AODV Protocol for Load Balancing In Cluster Ad-Hoc Network
Activity Recognition from Video in Day or Night Using Fuzzy Clustering Techniques
Sybil Attack Detection in Urban Vehicular Networks
Performance Analysis Of Time Hopping Ultra Wideband Communication System
TAKE DIVERSION Driving Directions with Taxi Drivers Intelligence
Back-Bone Assisted Hop Greedy Routing in Vanets
Payment Scheme for Identifying Cheating Reports in Multihop Wireless Networks
A Hierarchical Approach for the Resource Management of Very Large Cloud Platforms
A Survey on Cloud Storage
Efficient Resources Allocation and Reduce Energy Using Virtual Machines for Cloud Environment
Improvisation of Fault Classification and Detection
Survey of Various Techniques to Provide Multilevel Trust in Privacy Preserving Data Mining
Multi-Sensor Railway Track Geometry Surveying System
A Modified Bec Logic Design of High Speed Csla For Low Power And Area Efficient Applications
Decentralised Access Control with Aggregate Key Encyryption For Data Stored In Cloud
Ocular Artifacts Reduction in EEG Using DWT And ANC For Portable Applications
Usability Matrix On Dynamic Datasets For Cloud Storage Solution Framework
Multipath Routing for Redundancy Management in Mobile Ad-hoc Networks
Multiuser MIMO in LTE Advanced
HealthCare Monitoring Solution with Decryption Outsourcing by Parallel Computing in Cloud
Palmprint Recognition Using Adaptive Histogram Equalization and Discrete Curvelet Transform
Threshold Technique for Mobile Ad-Hoc Networks Using Secured Revocation Check
Personalized Mobile search engine with GPCA Algorithm
Optimization based on PSO-ANFIS in Water bath Temperature System
A Weighted OFDM Signal Scheme for Peak To Average Power Ratio Reduction Of OFDM Signals
An Effective Energy and Latency Of Full Text Search Based On TWIG Pattern Queries Over Wireless XML
Unitary Differential Space Time Frequency Codes For MB-OFDM Uwb Wireless Communications
Multirate Multicarrier CDMA via Orthogonal Codes for Wireless Mobile Communication
Improving Security of Single Sign-On Mechanism for Distributed Service Enviornment
Design and Development Web Server and Embedded Based Agriculture Automation with Remote Monitoring System
Secure & Energy-Efficient Intrusion Detection in WSN
An Improved CBIR Method Using Color and Texture Properties with Relevance Feedback
Web Database Search Result Annotation
An innovative approach in Information Extraction using Ontology for Geospatial Domain
Mitigating Superfluous Flooding of Control Packets MANET
RCAETP: Reliable and Congestion Aware Event Transmission Protocol in a Wireless Sensor Network
Effective Image Resizing By Combining Scaling, Seam Carving and Canny Edge Detector
Clustering Enormous and Uncertain Data Steam
Taint Flow Analysis for the Detection of Buffer Overflow Attacks
शोध आलेख
Security for Green Communication in Heterogeneous Wireless Networks
A Comparative Analysis of Various Representations of Human Action Recognition in a Video
Performance analysis of Absolute Deviation Filter for Removal of Impulse Noise
Comparative Analysis of Different Feature Extraction and Classifier Techniques for Speaker Identification Systems: A Review
A Comparative Study of Frequent Pattern Recognization Techniques from Stream Data
Region of Interest Based Image Compression
Development of Fuzzy based categorical Text Clustering Algorithm for Information Retrieval
Image Sharing in Clouds based on N-Server Forward Re-encryption System
Modeling of UPFC Using Model Predictive Control and Bacterial Foraging Algorithm
Discovering Multi-Level Association Rules using Fuzzy Hierarchies
Design of an Efficient Low power Shift Register using Double Edge Triggered Flip-flop
A Secure Framework for Protection of Social Networks from Information Stealing Attacks
Real Time Face Tracking By Using Naïve Bayes Classifier
A Secure Distributed Peer To Peer Systems
A Review on Processing Big Data
PERFORMANCE ANALYSIS OF MULTICARRIER CDMA SYSTEMS
Secure Paper Distribution on Cloud Using Reencryption
Data mining: Techniques for Enhancing Customer Relationship Management in Banking and Retail Industries
Fractal Image Steganography Using Non Linear Model
A Survey on the Solutions for the Problems of Denial of sleep Attacks
Multi-slots Reconfigurable Microstrip Antenna with Capacitive Loading Technique
An Alternative Technique to Perform Surgeriesin Hospital by Surgical Diathermy
Scalable Management Strategies using Mobile Agents in Optical Transport Network
Study of Compute Application Resources Sharing for Android with Cloud Computing
Reversible Data Hiding using Visual Cryptography: A Review
Health Monitoring Systems for Antiquated Peoples-A Survey
A Study on Web Services Performance Measurements and Its Techniques
Automatic Defect Detection Algorithm for Woven Fabric using Artificial Neural Network Techniques
Mining Big Sources using Efficient Data Mining Algorithms
Performance Evaluation of Conventional Controller for Positive Output Re Lift LUO Converter
Sentiment Analysis Using Support Vector Machine
Implementation of Link Layer of USB 3.1
Review on Data Mining Techniques for Intrusion Detection System
Estimation of Software Quality using Object Oriented Design Metrics
Multi-Objective Reactive Power Compensation Using Evolutionary Programming and Particle Swarm Optimization
Spam Filtering in Online Social Networks Using Machine Learning Technique
A Behavioral Comparison of LAR with AODV And DSR Routing Protocols
Automated Survey Analysis System
Dimensional Analysis of GaAs Based Double Barrier Resonant Tunnelling Diode
Flat Back Index Generation for E-Books: A Tri-gram Approach
Computing List of Ordered Pairs from Disjoint Closed Interval to compute a most Probable Delay Path:NPHard in polynomial time
LBMP: A Logarithm-Barrier-Based Multipath Protocol for Internet Traffic Management
Development of DAVE 3D Android Gaming Application
OPTIMIZED VIDEO STREAMING USING MIXED BAYESIAN OPTIMIZATION TECHNIQUE IN P2P VIDEO ON DEMAND
Improved Correlation Preserved Indexing For Text Mining
Biological Early Detection of Nasal Dermoid Cyst Using CT/ MRI Scan - A Review
An Obfuscation-Based Approach For Protecting Location Privacy
Android Application for Doctor‟s Appointment
A Novel Approach for Breast Cancer Detection using Data Mining Techniques
A Fast Method of Hands-Free Design Technique For Adaptive Mobile Communications Systems
Review on Conversion of Various Block Sizes in Compressed Domain using DCT
Collaborative Filtering Based On Search Engine Logs
A Quantitative Analysis of NHPP Based Software Reliability Growth Models
Study on Cloud Computing Model and its Benefits, Challenges
A Survey for Automatic Detection of Non- Proliferative Diabetic Retinopathy
Advanced Persistent Threats & Recent High Profile Cyber Threat Encounters
New EaaS Cloud Service Model Implementation for Smart Education
A Light-weight Data Replication for Cloud Data Centers Environment
Robot Application of a Brain Computer Interface To Staubli Tx40 Robots - Early Stages
और देखें