Linked e-resources

Details

Chapter 1. A New Private Security Policy Approach for DDoS Attack Defense in NGNs
Chapter 2. An Effective Approach for Providing Diverse and Serendipitous Recommendations
Chapter 3. Envelope Fluctuation Reduction for WiMAX MIMO-OFDM Signals Using Adaptive Network Fuzzy Inference Systems
Chapter 4. Modeling and Performance Analysis of Free Space Quantum Key Distribution
Chapter 5. Design of a Low-delay-write Model of a TMCAM
m]Chapter 6. SLA Based E-Learning Service Provisioning in Cloud
Chapter 7. Estimating the Similarities of G7 Countries Using Economic Parameters
Chapter 8. Offline Malayalam Character Recognition: A Comparative Study Using Multiple Classifier Combination Techniques
Chapter 9. A Comparative Study on Load Balancing Algorithms for SIP servers
Chapter 10. Design of Wireless Sensor Network Based Embedded Systems for Aquaculture Environment Monitoring
Chapter 11. Touch-to-learn: A Tangible Learning System for Hard-of Hearing Children
Chapter 12. Creating Low Cost Multi-gesture Device Control by Using Depth Sensing
Chapter 13. Evaluation of Glomerular Filtration Rate by Single Frame Method applying GATES Formula
Chapter 14. Design and Development of Cost Effective Wearable Glove for Automotive Industry
Chapter 15. Tampering Localization in Digital Image Using First Two Digit Probability Features
Chapter 16. Classification of Bank Direct Marketing Data Using Subsets of Training Data
Chapter 17. Offline Writer Identification and Verification
A State-of-the-Art
Chapter 18. Handwritten Oriya Digit Recognition Using Maximum Common Sub-graph Based Similarity Measures
Chapter 19. Design of Non-volatile SRAM Cell Using Memristor
Chapter 20. Evolutionary Algorithm Based LFC of Single Area Thermal Power System with Different Steam Configurations and Nonlinearity
Chapter 21. Game Theory and Its Applications in Machine Learning
Chapter 22. A Study on Speech Processing
Chapter 23. Forest Type Classification: A Hybrid NN-GA Model Based Approach
Chapter 24. Optimizing Technique to Improve the Speed of Data throughput through Pipeline
Chapter 25. An Improved Data Hiding Scheme in Motion Vectors of Video Streams
Chapter 26. Hiding Sensitive Items Using Pearson's Correlation Coefficient Weighing Mechanism
Chapter 27. OpenCV Based Implementation of Zhang-Suen Thinning Algorithm Using Java for Arabic Text Recognition
Chapter 28. Numerical Modeling of Twin Band MIMO Antenna
Chapter 29. Performance Evaluation of Video-based Face Recognition Approaches for Online Video Contextual Advertisement User-oriented System
Chapter 30. A Survey on Power Gating Techniques in Low Power VLSI Design
Chapter 31. Phase Based Mel Frequency Cepstral Coefficients for Speaker Identification
Chapter 33. An Improved Feedback Filtered-X NLMS Algorithm for Noise Cancellation
Chapter 34. Application of Internet of Things (IoT) for Smart Process Manufacturing in Indian Packaging Industry
Chapter 35. Function Optimization Using Robust Simulated Annealing
Chapter 36. Analysis and Optimization of Feature Extraction Techniques for Content Based Image Retrieval
Chapter 37. Parametric Curve Based Human Gait Recognition
Chapter 38. An Energy Efficient Proposed Framework for Time Synchronization Problem of Wireless Sensor Network
Chapter 39. Epigenetic and Hybrid Intelligence in Mining Patterns
Chapter 40. A Technical Review on LVRT of DFIG Systems
Chapter 41. An AIS Based Approach for Extraction of PV Module Parameters
Chapter 42. Word Sense Disambiguation in Bengali: An Auto-updated Learning Set Increases the Accuracy of the Result
Chapter 43. Efficient Methods to Generate Inverted Indexes for IR
Chapter 44. Intelligent Mail Box
Chapter 45. Learning Based No Reference Algorithm for Dropped Frame Identification in Uncompressed Video
Chapter 46. Multi-view Video Summarization
Chapter 47. Comprehensive Review of Video Enhancement Algorithms for Low Lighting Conditions
Chapter 48. A Detailed Review of Color Image Contrast Enhancement Techniques for Real Time Applications
Chapter 49. A Conceptual Model for Acquisition of Morphological Features of Highly Agglutinative Tamil Language Using Unsupervised Approach
Chapter 50. A Fuzzy Approach for the Maintainability Assessment of Aspect Oriented Systems
Chapter 51. Split and Merge Multi-scale Retinex Enhancement of Magnetic Resonance Medical Images
Chapter 52. Review on Secured Medical Image Processing
Chapter 53. Identification of Stages of Malignant Tumor in MRM Images using Level Set algorithm and Textural Analysis
Chapter 54. Reviews Based Mobile Application Development Model (RBMAD)
Chapter 55. Three Phase Security System for Vehicles Using Face Recognition on Distributed Systems
Chapter 56. SLA Based Utility Analysis for Improving QoS in Cloud Computing
Chapter 57. A Descriptive Study on Resource Provisioning Approaches in Cloud Computing Environment
Chapter 58. Analyzing the Performance of a Software and IT Growth with Special Reference to India
Chapter 59. Stock Price Forecasting Using ANN Method
Chapter 60. Recognition of Handwritten English Text Using Energy Minimisation
Chapter 61. A Novel Codification Technique for Tacit Knowledge in Software Industry Using Data Mining techniques
Chapter 62. An Analysis on the Effect of Malicious Nodes on the Performance of LAR Protocol in MANETs
Chapter 63. Qualitative Performance Analysis of Punjabi and Hindi Websites of Academic Domain: A Case Study
Chapter 64. A Robust, Privacy Preserving Secret Data Concealing Embedding Technique into Encrypted Video Stream
Chapter 65. Trusted Execution Environment for Data Protection in Cloud.

Browse Subjects

Show more subjects...

Statistics

from
to
Export