Linked e-resources

Details

Chapter 1. Study and Analysis of Subthreshold Leakage Current in Sub-65 nm NMOSFET
Chapter 2. Implementations of Secure Reconfigurable Cryptoprocessor: A Survey
Chapter 3. Mitigating & Patching System Vulnerabilities Using Ansible: A Comparative Study of Various Configuration Management Tools for IAAS Cloud
Chapter 4. Adaptive Fractal Image Compression Based on Adaptive Thresholding in DCT Domain
Chapter 5. Improved Resource Exploitation by Combining Hadoop Map Reduce Framework with VirtualBox
Chapter 6. Density Based Outlier Detection Technique
Chapter 7. Systematic Evaluation of Seed Germination Models: A Comparative Analysis
Chapter 8. Business Modeling Using Agile
Chapter 9. An efficient Hybrid Encryption Technique Based on DES and RSA for Textual Data
Chapter 10. Application of Machine Learning on Process Metrics for Defect Prediction in Mobile Application
Chapter 11. Automatic Insurance and Pollution Challan Generator System in India
Chapter 12. Effectively Implementation of KNN-Search on Multidimensional Data Using Quadtree
Chapter 13. Edge Detectors Based Telegraph Total Variational Model for Image Filtering
Chapter 14. Cloud Based K-means Clustering Running as a MapReduce Job for Big Data Healthcare Analytics Using Apache Mahout
Chapter 15. Symbolic Decision Tree for Interval Data
An Approach towards Predictive Streaming and Rendering of 3D Models
Chapter 16. Predictive 3D Content Streaming Based on Decision Tree Classifier Approach
Chapter 17. Quantitative Characterization of Radiographic Weld Defect Based on the Ground Truth Radiographs made on a Stainless Steel Plates
Chapter 18. Research and Topology of Shunt Active Filters for Quality of Power
Chapter 19. Development Of 3d High Definition Endoscope System
Chapter 20. Excel Solver for Deterministic Inventory Model: INSOLVER
Chapter 21. DSL Approach for Development of Gaming Applications
Chapter 22. Digital Forensic Architecture for Cloud Computing Systems: Methods of Evidence Identification, Segregation, Collection and Partial Analysis
Chapter 23. Brushing
An Algorithm for Data Deduplication
Chapter 24. A New Approach for Integrating Social Data into Groups of Interest
Chapter 25. Estimation of Shape Parameter of the Radial Distribution of Cosmic Ray Shower Particles
Chapter 26. Network Security in Big Data: Tools and Techniques
Chapter 27. Design of Ripple Carry Adder Using 2-Dimensional 2-Dot 1-Electron Quantum-Dot Cellular Automata
Chapter 28. Advanced Congestion Control Techniques for MANET
Chapter 29. A Method of Baseline Correction for Offline Handwritten Telugu Text Lines
Chapter 30. A Technique for Prevention of Derailing and Collision of Trains in India
Chapter 32. Executing Hive Queries on 3-NODE Cluster and AWS Cluster- Comparative Analysis
Chapter 33. Performance of Speaker Independent Language Identification System under Various Noise Environments
Chapter 34. Multi-level Fusion of Palmprint and Dorsal hand Vein
Chapter 35. A Comparative Study on Multi-view Discriminant Analysis and Source Domain Dictionary Based Face Recognition
Chapter 36. Mining Maximal Efficient Closed Item Sets without any Redundancy
Chapter 37. An Interactive freehand ROI Tool for Thyroid Uptake studies Using Gamma Camera
Chapter 38. Literature Survey on Intrusion Detection Systems in MANETs
Chapter 39. Apply of Sum of Difference Method to Predict Placement of Students' Using Educational Data Mining
Chapter 40. Robust Color Image Multi-thresholding Using Between-class variance and Cuckoo Search Algorithm
Chapter 41. Social Media: A Review
Chapter 42. Bayesian-Fuzzy GIS Overlay to Construe Congestion Dynamics
Chapter 43. A Hybrid Clustering Technique to Improve Big Data Accessibility Based on Machine Learning Approaches
Chapter 44. Efficient Iceberg Query Evaluation Using Compressed Bitmap Index Technique in Distributed Databases
Chapter 45. Unique Identifier System Using Aneka Platform
Chapter 46. A Novel Graphical Password Authentication Mechanism for Cloud Services
Chapter 47. A Conceptual Framework for Big Data Implementation to Handle Large Volume of Complex Data
Chapter 48. Path Reliability in Automated Test Case Generation Process
Chapter 49. A Study on Wii Remote Application as Tangible User Interface in Elementary Classroom Teaching
Chapter 50. Enhanced Understanding of Education Content Using 3D Depth Vision
Chapter 51. AHP-based Ranking of Cloud-Service Providers
Chapter 52. Hardware Prototyping for Enhanced Resilient On-board Navigation Unit
Chapter 53. Web Data Analysis Using Negative Association Rule Mining
Chapter 54. Cloud Based Thermal Management System Design and Its Analysis
Chapter 55. ICC Cricket World Cup Prediction Model
Chapter 56. Towards distributed Solution to the State Explosion Problem
Chapter 57. Real Time Bus Monitoring System
Chapter 58. High Performance DFT Architectures Using Winograd Fast Fourier Transform Algorithm
Chapter 59. Dynamic Voltage Restorer Based on Neural Network and Particle Swarm Optimization for Voltage Mitigation
Chapter 60. Analysis of Norms in Adaptive Algorithm on Application of System Identification
Chapter 61. SKT: A New Approach for Secure Key Transmission Using MGPISXFS
Chapter 62. A Comparative Study of Different Approaches for the Speaker Recognition
Chapter 63. A Time Efficient Leaf Rust Disease Detection Technique of Wheat Leaf Images Using Pearson Correlation Coefficient and Rough Fuzzy C-Means
Chapter 64. Task Scheduling Algorithms with Multiple Factor in Cloud Computing Environment
Chapter 65. The State of the Art in Software Reliability Prediction: Software Metrics and Fuzzy Logic Perspective
Chapter 66. An Indexed Approach for Multiple Data Storage in Cloud
Chapter 67. Design New Bi-orthogonal Wavelet Filter for Extraction of Blood Vessels and Calculate the Statistical Features
Chapter 68. Demand Side Management Using Bacterial Foraging Optimization Algorithm
Chapter 69. An Optimized Cluster Based Routing Technique in VANET for Next Generation Network
Chapter 70. AgroKanti: Location-aware Decision Support System for Forecasting of Pests and Diseases in Grapes
Chapter 71. A Unified Modeling Language Model for Occurrence and Resolving of Cyber Crime
Chapter 72. Cross Lingual Information Retrieval (CLIR): Review of Tools, Challenges and Translation Approaches
Chapter 73. Minimizing the Cost of Losses Due to Cyber Attack through B. B. (Branch and Bound) Technique
Chapter 74. Denoising Knee Joint Vibration Signals Using Variational Mode Decomposition
Chapter 75. Data Size Reduction and Maximization of the Network Lifetime over Wireless Sensor Network.

Browse Subjects

Show more subjects...

Statistics

from
to
Export