शोध आलेख
Efficient Privacy Preserving Secure ODARM Algorithm in Horizontally Distributed Database
Big Data Processing of Data Services in Geo Distributed Data Centers Using Cost Minimization Implementation
Design and Performance Evaluation of DWDM based Metropolitan Ring Networks
Video Streaming Over WIMAX with Ant Colony Optimization for Health Applications
Organ Abnormality Prediction Using Finger Vein Reader
Fiber Fault Localization in FTTH Using Online Monitoring
Secure Crypto and ECG Steganography Based Data Communication for Wireless Body Sensor Network
Design of SCS Protocol and Analysis of Quality of Service Parameters for Wireless Sensor Networks
Improved Crypto Analysis for Scrambling Digital Video Using Secret Key
Literature Survey on Hybrid Approach for Cloud Bandwidth and Cost Reduction System Using Predictive Acknowledgements
An Advanced Moving Object Detection Algorithm for Automatic Traffic Monitoring In Real-World Limited Bandwidth Networks
VHDL Simulation of Image Compression Using LBG
Survey on Intelligent Semantic Web Search Engines as Generic Search Engine
Designing of MCAM Using 22nm Technology
Cloud Service Based Measuring Consumer's Preferences
A Novel Security Issues Analysis and Evaluation of Security Method in WSNs
Authenticated Deniable Internet Key Exchange
Preserving Privacy by Enhancing Security in Cloud
Moral Hacking: A Way to Boost Data Security by Using Vulnerability Scanning Tools
OSDM Based Underwater Acoustic Communication
An Iaas Cloud System with Federation Threshold
Thermodynamic Modeling and Optimization of a Dual Pressure Reheat Combined Power Cycle
Design and Implementation of 2by3 Prescaler using Different Logic in CMOS 45nm Technology
Accident Detection System by Using Navigation Devices
Reduced Path, Sink Failures in Autonomous Network Reconfiguration System (ANRS) Techniques
A Stochastic Model to Investigate Data Center Performance and QoS in Iaas Cloud Computing Systems
A Study on Content Based Image Retrieval Systems
Implementation of a New Electro Magnetic Interference Filters Design to Diminish CM Noise
IVUS detection using Image Processing: A Review
Vehicular Ad hoc Network (VANETs): A Review
High Utility Itemset Mining with Selective Item Replication
Comparative Study of Load Testing Tools
Modification of Linux Kernel with Jumping Virtual Clock Round Robin Scheduling
A Novel Approach for Energy Efficient Reliable Routing Using TABU in Wireless Ad Hoc Networks
A Survey on Economic Denial of Sustainability Attack Mitigation Techniques
Managing XML Retrieval through Personalization Using Search Engine
Parallel Clustering of Gene Expression Dataset in Multicore Environment
Intelligent Surveillance and Security System
Neighborhood based Framework Active Learning
Mat Lab Based Synthesis of Speech & Speaker Reorganization Using Data Driven Approach
Design of Review Based Product Aspect Ranking With Transaction Id Verification
Session Based Access Control Mechanism Using ECC in WMN- A Review
FPGA Based Intelligent Potholes Detection System
Fast Data Collection Using Two-Layer Multicast Communication Protocol in Wireless Sensor Networks
Geographic Random Forwarding for Ad-Hoc and Sensor Networks Multihop Performance
CBPPP: Cloud Based Patient Centric Privacy Preserving System
Retinal Disparity Estimation and 2D Fusion in Stereo-Pairs
Recommendation System Based On Clustering and Collaborative Filtering
Traffic Identification Method Engine: An Open Platform for Traffic Classification
QOS - Guaranteed Neighbour Selection & Distributed Packet Scheduling Algorithm by Using MANET Wireless Networks
SLA Based Resource Allocation as a Service Provider (SaaS) in Cloud Computing Environments
Pixel Steganalysis - A Novel Approach in Image Steganography Using F5 Algorithm
Secure Top-K Query to Variably Encrypted Signature in Tiered Sensor Networks
Maintaining Reliability and Time in the Message Transfer within Wireless Sensor Network
Association Rules Mining in Vertically Distributed Databases
Automated Drinking Water Supply System and Theft Identification Using Embedded Technology
Light Weight Intrusion Detection System with Wrapper Approach and Optimized Feature Selection
Performance Analysis of Time Moments, Markov's Parameters and Eigen Spectrum Using Matching Moments
Secured Authentication for De-Duplication by Using Hybrid Cloud Approach
Dynamic Annotation by Web Database Search Results
Uncertain Bandwidth Calculation in Networks with Non-Linear Services
Computer Intraction Based on Hand Gestures
Review on Various Face Recognition Techniques
Efficient Cloud Storage Management Using DHT Mechanism
Design of 1X2 Triangular Shaped Microstrip Patch Antenna Array for WLAN Applications with DGS Structures
Vehicle Locking Using Radio Frequency Identification with Theft Intimation and Smart Tracking System
Multilevel Anti-Discrimination Privacy Preserved Data Transmission
Litrature Survey on Collaborative Cloud Computing For Sharing Resource in Trustworthy Manner
A Review: Eulerian Video Motion Magnification
Review of Botnet Attacks and its Detection Mechanism
Multi Threshold Low Power SRAM Using Floating Gates
Detection of Intrusions in KDDCup Dataset using GA by Enumeration Technique
Search Me If You Can Privacy-Preserving Location Query Service
Intersection RSU in VANET
Vedic Multiplier in VLSI for High Speed Applications
A Review On the Development of GEDIT 3 Plug-In: Go-To Definition for C Using Exuberant-Ctags
Top K Result Retrieval in Searching the File over the Encrypted Data in Cloud
Image Encryption Using Chaotic Map and Prime modulo Multiplicative Linear Congruential Generator
Cryptographic Technique through Hexagonal Path Using Genetic Algorithm
Advanced Adaptive Routing Algorithm for Highway and City Scenarios in VANET
Multi-hop overlay Transport for High Throughput transfers in the Internet
Prevention of SQL Injection Attack on Web Applications
Efficient Cloud Computing Load Balancing Using Cloud Partitioning and Game Theory in Public Cloud
Broadband Double Psi (Ψ) Shaped Patch Antennas for Wireless Communications
The Software Approach to Measure the Quality of Vein Images for Fake Detection in Online Attendance System
Design of Microstrip Patch Antenna for GPS Applications using EBG Structures
Multi Modulus Blind Equalizations for Quadrature Amplitude Modulation
An Empirical Performance Analysis of Relative Keyword Search Techniques
Handling Load Balancing using Genetic Algorithm in Cloud Based Multimedia System
Data Access Service through Web Service by Auto-Updation Mechanism
Survey on Interactive Visualization and Navigation of Web Search Results
Preserving Privacy using Secret Sharing in Distributed Environment on Perturbed Data
Survey of DOS Defense Mechanisms
Behavioural Model of Adult Obesity by Childhood Predictors using Crowd Sourcing
Comparing the Performance of Frequent Itemsets Mining Algorithms
Design of A DIP System for Circumstantial Examination and Determination for Visually Disabled Persons
Combination of Packet Switching and Circuit Switching In the upcoming Computer Networks
A Comparative Study about Region Based and Model Based Using Segmentation Techniques
Trust Management Model Observation towards Security Enhancements and QoS in MANET’s
Energy Efficient Mobile Sink Path Selection Using a Cluster Based Approach in WSNs
Defense against DDoS Attacks Using IP Address Spoofing
A Context-Aware Relation Extraction Method for Relation Completion
Hybrid Based Energy Efficient Wireless Sensor Network Routing Algorithm for Farmland
Online Voting System Using Three Factor Authentication
Detection of Parkinson's Disease by Speech Analysis
Biometric Secured Voting Machine to Avoid Bogus Voting Based on AADHAR CARD
Comprehensive Study and Review Various Routing Protocols in MANET
A Combined Approach Using IoT and Cloud for the Efficient Data Retrieval in Medical Technology
Analysis and Design of Efficient generalized Forensic framework for Detecting Twitter Spammers
Real Time GPRS- Fuel Tracking and Monitoring Entity Using Telematics
Simulation of Algal Bloom Detection System Using Modified ABR Algorithm
Document Image Binarization Using Threshold Segmentation.
Energy Efficient Design for Full Adder Logic Implementation
Survey on Web-Scale Image Search and Re-Ranking With Semantic Signatures.
Scalable Learning for Collective Behaviour Using Sparse Social Dimensions
Detecting and Preventing DDoS Attacks in Cloud.
Design of Smart Home Energy Management System.
Digital Watermarking of Audio in Time Domain Multiple Bit Plane based on Chaotic Scrambling.
An Efficient Attack Detection Method in Proactive Source Routing Protocol for Mobile Adhoc Networks
Enhancement of Underwater Images Using Wavelength Compensation Method
Virtual Makeover and Virtual Trial Dressing
Healthcare Data Security in Cloud Computing
Study of Algorithms for Separation of Singing Voice from Music
Robust Technique for Detection and Classification of Glands from Human Tissue Samples
Robust Video-based Face Recognition.
Secure Internet-Banking with Visual Authentication Protocols
Providing Consistency in Cloud Using Read after Write Technique to Endusers
A Review onDesign of a high gain Microstrip Antenna using Parasitic Patch for GPS Application
Efficient Deduplication with Security Using Jenkins and Recovery Techniques
Public Auditing of Dynamic Big Data Storage with Efficient High Memory Utilization and ECC Algorithm
Smart Antennas for Communications in Line of Sight
Accent Recognition using MFCC and LPC with Acoustic Features
U-Slot Microstrip Patch Antenna for Wireless Application
Optimized Energy Conserving Using Selective Forwarding Algorithm (SFA) for Wireless Sensor Network (WSN)
Automatic Generate CNC Code for Symmetrical Object
A Survey on the Privacy Settings of User Data and Images on Content Sharing Sites
Survey on Text Classification Based on Similarity
Contribution of Feed Waveguide on the Admittance Characteristics Of Coplanar Slot Coupled E-H Tee Junction
Detection of Implanted Devices In Underground By Using UWB Penetrating Radar with Support of PN Code
Personalized Search of User Search Behaviour with Ontology
Design of Space-Time Coded Single-Carrier and Multi-Carrier MIMO-CDMA systems
MOSES: Supporting and Enforcing Security Profiles on Smart Phones
Prepaid Energy Meter with GSM Technology
Interactive Voice Response System by Using Asterisk
Current Distribution of Dipole Antenna for Different Lengths Using Different Types of Basis Functions Applying To Method of Moment
Performance Evaluation of Advanced OLSR against Black Hole Attack and Wormhole Attack in MANET
Elimination of Baseline Fluctuation in EMG Signal Using Digital Filter
A Review of Bike Security System Using Fingerprint GSM&GPS
A Novel Cell Phone Designed For Blind Along With Voice Based Guidance and Location Indication
Review on Intelligent Traffic Management System Based on VANET
D-Matrix: Fault Diagnosis Framework
Literature Survey on Data Mining and Statistical Report for Drugs Reviews
Security and Privacy Issues in Private Cloud Storage
Review of Automatic Attendance Using Facial Recognization
Survey on Controllable Secure Watermark Technique to Detect Data Leakage
An Efficient Data Aggregation Scheme and Cluster Optimization in Wireless Sensor Networks.
Identification of Cup-Disk Ratio for Glaucoma Prone Eyes
One Bit-Line Multi-Threshold SRAM Cell With High Read Stability
Accessible Display Design to Control Home Area Networks
A Review on Implementation of QAM on FPGA
Automatic Integration of Drug Indications from Multiple Health Resources
Unified Data Access Security on Revocable Multi Authority CP-ABE in Cloud
Survey on Feature Subset Selection Algorithm in Brain Interaction Patterns
Performance Comparison of POLY Protocol with Existing CDS Protocols
A Framework for Detection of Jammers in Wireless Sensor Network
An Image Removal Using Local Tetra Patterns for Content Based Image Retrieval
Survey on CommTrust: Multi-Dimensional Trust Using Mining E-Commerce Feedback Comments
LOBOT: Low-Cost Robotic Vehicle
Human Effects to Enhance Clustering Techniques That Assists User in Grouping the Friends
Design of 'V' Shape Microstrip Patch Antenna
Survey on Policy Based Framework for Smartphone Application?s Privacy Using Multiple Profiles
Fingerprint Based Gender Classification Using Block-Based DCT
Communication through Photon Using Quantum Cryptography: A Survey
Study of Ridge Based and Image Based Approach for Fingerprint Gender Classification
Survey of Integrity Verification in Cloud- Storage Using Various Techniques
Survey on Aggregate Cryptosystem for Scalable Vital Data Distribution in Cloud Storage
A Review on Software Fault Injection Methods and Tools
Detecting Cars In Traffic Using Cascade Haar With KLP
A Comprehensive Approach on Different Biometric Modalities and Its Applications for Security
Opinion Mining From Text Reviews Using Machine Learning Algorithm
Dynamic Pricing for Usage of Cloud Resource
Mining User Profile Exploitation Cluster from Computer Program Logs
Associate Adaptable Transactional Information Store in the Cloud Using Distributed Storage and Meta Data Manager
Design and Development of Efficient Content Independent Genealogy
Despeckling of SAR Images Using Wavelet Based Spatially Adaptive Method
Survey on Different Phases of Digital Forensics Investigation Models
Legal Implication of Human and Physical- Activity Monitoring System Using Android Smartphone
Facial Feature Extraction Based On FPD and GLCM Algorithms
Sybil Attack Resistant Cryptographic Traffic Information Dissemination in VuC
Adaptation Backoff Exponent Mechanism in Zigbee Sensor Network for Improving Through put
DOGGY- a Graphical Security Technique to prevent Online Guessing Attacks
Isolated Telugu Speech Recognition using MFCC and Gamma tone features by Radial Basis Networks in Noisy Environment
Review on Anonymous Routing Protocol for High Anonymity Protection in MANETs
Hill Cipher Modifications: A Detailed Review
Evaluation of Keyword Search System with Ranking
Analysis of the Effect of Harmonics Due To Switching Devices W.R.T. Experimental & Simulation Point of View
Avoiding Network Performance Degradation Problem in Zigbee
Survey of Various Opinion Mining Approaches
Detection of Hacking nodes using Dynamic Sensor with Ant Colony Optimization
Secured Data Transmission Using Elliptic Curve Cryptography
Construction and Selection of Six Sigma Quick Switching Sampling System: Sample Size Tightening
Performance Analysis of PAPR Reduction Using DFT-Spreading OFDMA Technique
और देखें