विशेषांक आलेख
E-Commerce Growth and Opportunities in Indian Scenario - A Survey on Ecommerce Eco System
WEBGPSS as a Tool in Business Simulation
A Framework for Agricultural Farm-to- Market Supply Chain
Data Management in Technical Institutions in India with Special Reference to Karnataka State, D.K. District
A Review on Recent Developments in Technology Forecasting
Ambiguities in Natural Language Processing
Protein Structure and Function Prediction Using Machine Learning Methods ? A Review
Pattern Recognition in Image Processing ? A Study
Development of Prediction Tool for Drought Tolerant Protein in Rice Using Machine Learning Algorithm
Computer Vision-Based Aid for the Visually Impaired Persons- A Survey And Proposing New Framework
Pedestrian Detection-A Comparative Study Using HOG and COHOG
Comparative Analysis of Various Algorithms Used in Travelling Salesman Problem
Computational Mapping of Interaction Sites of Synthetic Antibody Clone P109d9on VP28 Protein
Recognising Partially Occluded Faces From a Video Sequence
A Modified Rough Fuzzy ?Clustering - Classification? Model For Gene Expression Data
Network Based Approach for Understanding the Chondrocyte Biology for Rheumatoid Arthritis
Effects of Mobile Phone Radiation on Brain Using Statistical Parameters and Its Derivatives
Discriminative DCT Based Face Recognition: An Efficient and Accurate Approach
Tumor Detection and Segmentation Using Watershed and Hierarchical Clustering Algorithms
Reconstruction of Gene Regulatory Network to Identify Prognostic Molecular Markers of the Reactive Stroma of Breast and Prostate Cancer Using Information Theoretic Approach
Road Network Extraction from High Resolution Satellite Images
A Machine Learning Approach for Discovery of Novel Non- Ribosomal Peptide Synthetases (NRPS) in genomes of Plant Growth Promoting Pseudomonas Spp
Applications of Machine Learning - A Survey
PhzPred ? A Tool for Prediction of Phenazine Synthesizing Genes in Plant Growth Promoting Pseudomonas spp
Traffic Light Control System Using Image Processing
Statistical Inference and Reconstruction of Gene Regulatory Network from Observational Expression Profile
A New Approach For an Improved Multiple Brain Lesion Segmentation
A New Hybrid Scalable Parallel Clustering Approach For Large Data Using FCM And FA
View Based Feature Extraction and Classification Approach to Malayalam Palm Leaf Document Image
Computational Method for Reconstruction of Gene Regulatory Network Using Microarray Data
Predictive Analytics Using Soft Computing: A Case Study on Forecasting For Indian Automobile Industry
Impact of Computers on Structural Biology of Proteins
A Framework for Opinion Mining- Root Cause Monitoring the Social System Which Keeps Tracks of Weak Points in Rural Areas
Ranking of Landmark Images
Design and Development of a Domain Specific Focused Crawler Using Support Vector Learning Strategy
An Ontology-Based Information Retrieval Model for Domesticated Plants
Comparative Analysis of Various Techniques Used In Managing Big Data
Optimization Based Data Mining in Business Research
Discovering Relations among Documents Using Novel Text Retrieval Technique
Comparison of Join Algorithms in Map Reduce Framework
A Survey on Time Series Data Mining
Approach for Predicting Student Performance Using Ensemble Model Method
Automatic Language Identification from Written Texts ? An Overview
Product Segmentation for Opinion Mining Using Probabilistic Principle Component Analysisin Customer Behaviors
Text Classification Using Symbolic Data Analysis
A Parallelized Social Network Analysis Using Virtualization for Student?s Academic Improvement
An Innovative Aim for Collecting and Retrieving Documents from Web Domain Using SSARC (Spontaneous Sorting and Retrieving Clock) Algorithm
Significance of Effective Defect Management Strategies to Reduce Pre Production Defects
Software Company Centric Roles, Responsibilities and Higher Positions of Software Tester in Software Development Life Cycle
From Extreme Programming to Extreme Pedagogy: An Agile Framework for Engineering Education
A Genteel Requirement Engineering for Web Applications
A Review on Asymmetric Cryptography ? RSA and ElGamal Algorithm
A Review on Steganography - Least Significant Bit Algorithm and Discrete Wavelet Transform Algorithm
A Comparative Performance Analysis of DES and BLOWFISH Symmetric Algorithm
Efficient Cryptography Technique for Data Security using Binary Tree
ASH-HEED Protocol for Heterogeneous Wireless Sensor Networks
Modified Enhanced Stable Election Based Routing Protocol for Wireless Sensor Networks
Cryptographic process for Cyber Safeguard by using PGP
LibRFID: Automation Software for Library Management System Using RFID Technology
An Analysis of Cloud Interoperability Standards onVarious Service Models
Comparative Study of Workflow Scheduling Algorithms in Cloud Computing
Comparative Study of Scheduling and Service Broker Algorithms in Cloud Computing
Survey on Need of Loop Transformations for Automatic Parallelization
A Critical Review on Risk of Cloud Computing in Commercial
शोध आलेख
Survey on Knowledge Discovery in Speech Emotion Detection
A Survey on Attacks in Web Usage Mining
Home Automation and Energy Harvesting In Wireless Sensors Network
Tuning and Performance Analysis of Geographical Routing Protocol in MANET
A Hierarchical Approach to Access Control – A Review
Algorithm used in Intrusion Detection Systems: a Review
Hybrid Clustering and Classification for Entropy Reduction: A Review
Effective Approach for Data Aggregation in Wireless Sensor Network: A Structure Free Approach
MANAP: An Effective and Self-Configuring Protocol for Dynamic Node Addressing In MANETs
Dual Objective Based Navigation Assistance to the Blind and Visually Impaired
Emerging Measures in Preserving Privacy for Publishing The Data
An Efficient QOS Routing Algorithm for Protection of Data Flow in MPLS Network
Study of Cosmic Intelligence and Human Health
Performance Analysis for All- Optical Networks Using Wavelength Routing Methods in Different Topologies
Simulation and Analysis of Blocking Probability Using RWA Algorithm for All- Optical Networks
Efficient Motion Tracking Algorithm for Stereo Vision System
Network Planning and Engineering for Fiber Optic Transport Systems
Development of Rule Scheduler for Multiple Triggered Rules in Active Object-Relational Database Systems
A WIRELESS SENSOR NETWORK
Performance Analysis of Low Rate WPAN Topologies
Analysing the Flame and Fire Characteristics Using Auto Adaptive Edge Detection
Video Retrieval Using Fusion of Visual Features and Latent Semantic Indexing
Design and Implementation of Efficient Packet Scheduling Algorithm
EFFICIENT ALLOCATION OF DYNAMIC RESOURCES IN A CLOUD
A Survey of the Security Use Cases in Big Data
An Introduction of the RIST Framework on Information Security Awareness Practices in the Current Information Age
Comparative Modeling, Quality Assessment and Validation of HYD1
Towards More Efficient DSP Implementations: An Analysis into the Sources of Error in DSP Design
Load Balancing in Structured Peer to Peer Systems
Design and Development of Autonomous Ground Vehicle for Wild Life Monitoring
High Security Framework Using Pair-Wise Key Distribution in WSN with Mobile Sink
A Comparative study of Classifiers’ Performance for Gender Classification
IMAGE BASED FINGERPRINT VERIFICATION
Approach for Rule Pruning in Association Rule Mining for Removing Redundancy
A Narrative Approach for Data Preserving Techniques
Case Study of Data Mining Models and Warehousing
Use of Symmetric Algorithm for Image Encryption
Data Security in Cloud Using Elliptic Curve Crytography
Energy Efficient Cognitive Radio Hybrid Voting Rule –PSO
A Survey on Process of Isolated Character Recognition
Reconstruction of Patch Face Reducing Malicious Attack in Secure Computation
Analysis of Image Demosaicking Algorithms
Reduction of PAPR in MIMO-OFDM/A System Using Polyphase Complementary Modulation
Techniques of Node Localization in Wireless Sensor Networks: A Review
Energy Efficiency Techniques for Wireless Sensor Networks: A Review
Image Enhancement Using Wavelets
A Survey on the Security Fight against Ransomware and Trojans in Android
Security Issues in ALARM Protocol for Mutual Authentication in MANET: A Review
Analysis and Design of Distributed Wireless Network Using Multipath Routing Protocol
Privilege Based Attribute Encryption System For Secure and Reliable Data Sharing
Improving the Performance of Power Heterogeneous MANET’s Using an Adaptive Power Aware Routing
Monitoring and Controlling Terminal Nodes under Hierarchical Heterogeneous Wireless Networks
Secure Wireless Ad-Hoc Sensor Network from Vampire Attack Using M-DSDV
Detection of Spoofing Attack and Localization of Multiple Adversaries in WSN
An Effective Way of Cluster Formation Based On Load Rebalancing
Cross-Domain Opinion Mining Using a Thesaurus in Social Media Content
Anonymous Secure Routing Scheme in Mobile Adhoc Networks
Cognitive Radio Based Neighbor Identification and Probabilistic Rebroadcast for Reducing Routing Overhead
Digitalised Secure Information Channel Maintanence in Distributed Brokering Systems
Efficient Data Broadcast Using One-To-All and All-To-All Broadcast Algorithm In Wireless Networks
Intelligent Database Driven Reverse Dictionary
A Dynamic Resources Allocation by Data Migration within Cloud Resources by Gossip Protocol in Cloud Environments
Image Analysis and Partitioning For FPGA Implementation of Image Restoration
An Integrated Fast Reroute Approach for Routing Protection in IP Networks
2GHZ PLL Frequency Synthesizer for Zigbee Applications
A Secured Algorithm Based On ECC and DWT with Watermarking
Visual Cryptographic Technique for Enhancing the Security of Image Transaction
Universal Turing Machine: A Model for all Computational Problems
Adaptive Bus Routing Heuristics for Improving Vehicle Utilization and Reducing Commuter Waiting Times
Cloud Computing Based HPC: A Framework for Ethiopian Universities
और देखें