Linked e-resources

Details

Chapter 1. A Compact Triple and Quadruple Band Antenna for Bluetooth/WiMAX/WLAN/X-Band Applications
Chapter 2. DDA: An Approach to Handle DDoS (Ping Flood) Attack
Chapter 3. Approach to Accurate Circle Detection: Multithreaded Implementation of Modified Circular Hough Transform
Chapter 4. Apache Hadoop Yarn MapReduce Job Classification Based on CPU Utilization and Performance Evaluation on Multi Cluster Heterogeneous Environment
Chapter 5. Faster Load Flow Analysis
Chapter 6. Fuzzy Link Based Analysis for Mining Informational Systems
Chapter 7. Teaching-Learning-Based Optimization (TLBO) Approach to Truss Structure Subjected to Static and Dynamic Constraints
Chapter 8. Enforcing Indexing Techniques in Berkeley DB Using Implementation of Hilbert Tree Algorithm
Chapter 9. An Improvement in Performance of Optical Communication System using Linearly Chirped Apodized Fiber Bragg Grating
Chapter 10. Enhancement of Minimum Spanning Tree
Chapter 11. Feasibility Study of Proposed Architecture for Automatic Assessment of Use Case Diagram
Chapter 12. Extraction of Web Content Based on Content Type
Chapter 13. User Based Collaborative Filtering Using Bloom Filter with MapReduce
Chapter 14. ICT Based Facilities Management Tools for Buildings
Chapter 15. Study the Effect of Packet Drop Attack in AODV Routing and MANET and Detection of Such Node in MANET
Chapter 16. UDP Flooding Attack Detection Using Information Metric Measure
Chapter 17. Generalized MCDM Based Decision Support System for Personnel Prioritization
Chapter 18. A Proactive Dynamic Rate Control Scheme for AIMD based Reactive TCP Variants
Chapter 19. Investigating Varying Time Black Hole attack on QoS over MANET
Chapter 20. Hybrid Approach to Reduce Time Complexity of String Matching Algorithm using Hashing with Chaining
Chapter 21. INDTime: Temporal Tagger- First Step Towards Temporal Information Retrieval
Chapter 22. A Secure Text Communication Scheme Based on Combination of Compression, Cryptography and Steganography
Chapter 23. A Comparative Analysis of Feature Selection Methods and Associated Machine Learning Algorithms on Wisconsin Breast Cancer Dataset (WBCD)
Chapter 24. ACE (Advanced Compression Encryption) Scheme for Image Authentication
Chapter 25. An Efficient and Interactive Approach for Association Rules Generation by Integrating Ontology and Filtering Technique
Chapter 26. Detection of Wormhole Attack in Wireless Sensor Networks
Chapter 27. Comparative Analysis of MCML Compressor with and without Concept of Sleep Transistor
Chapter 28. Design & Analysis of Ultra-Compact Four Band Wavelength Demultiplexer Based on 2D Photonic Crystal
Chapter 29. Designing and Optimization of Nano-Ring Resonator Based Photonic Pressure Sensor
Chapter 30. Classifying Nodes in Social Media Space
Chapter 31. A Novel Hexagonal Shaped Based Band Stop Frequency Selective Surface with Multi-Band Applications
Chapter 32. AXSM : An Automated Tool for XML Schema Matching
Chapter 33. Development of Web Map Service For Open Street Maps (OSM) Data
Chapter 34. Improved Indoor Positioning using RSS and Directional Antenna Integrating With RFID and Wireless Technology
Chapter 35. Secured Cloud Data Storage
Prototype Trust Model for Public Cloud Storage
Chapter 36. A Semi Circular Monopole Antenna for Ultra Wide Band Applications
Chapter 37. Security Analysis of Different LFSR Based Ciphers to Propose a Novel Approach Compatible with Parallel Computing Platform, Providing Resistance Against Various LFSR Based Attacks
Chapter 38. Microstrip Patch Antenna for IEEE 802.11a WLAN (5.25GHz) Application
Chapter 39. Support Vector Machine Based Model for Host Overload Detection in Clouds
Chapter 40. A Hybrid Face Recognition Scheme Using Contour and Gabor Wavelet
Chapter 41. Data Dissemination Techniques and Publish/Subscribe Architecture in Vehicular Ad-hoc Networks
Chapter 42. Data Acquisition with FPGA using Xilinx and LabVIEW
Chapter 43. SRR and R-CSRR Loaded Reconfigurable Antenna with Multiband Notch Characteristics
Chapter 44. Wireless Resonant Power Transmission
Chapter 45. Fuzzy Clustering based Efficient Classification Model for large TCPdump data set using Hadoop framework
Chapter 46. System-related Characteristic Based Leader Election Protocol for Cognitive Radio Networks
Chapter 47. Passive Image Manipulation Detection using Wavelet Transform and Support Vector Machine Classifier
Chapter 48. Intrusion Detection System with Snort in Cloud Computing
Chapter 49. Rural E-Health Care Model
Chapter 50. An Implementation Model for Privacy Aware Access Control in Web Services Environment
Chapter 51. Comprehensive Review on Eye Close and Eye Open Activities Using EEG in Brain Computer Interface
Chapter 52. Design of High Data Rate and Multipath Efficient Underwater Acoustic Communication System Using OFDM-DQPSK
Chapter 53. A Hybrid Approach for Big Data Analysis of Cricket Fan Sentiments in Twitter
Chapter 54. Performance Analysis of Medical Image Compression Techniques
Chapter 55. Integrated Framework Using Frequent Pattern for Clustering Numeric and Nominal Data Sets
Chapter 56. Image Encryption by Using Block Based Symmetric Transformation Algorithm (International Data Encryption Algorithm)
Chapter 57. Content Based Watermarking Using MCA
Chapter 58. Image Enhancement Based on Log-Gabor Filter for Noisy Fingerprint Image
Chapter 59. Computational Performance Analysis of Ant Colony Optimization Algorithms for Travelling Sales Person Problem
Chapter 60. Evaluating Performance of Reactive and Hybrid Routing Protocol in Mobile Ad-Hoc Network
Chapter 61. Sentiment Based Data Mining Approach for Classification and Analysis
Chapter 62. Offline Handwritten Sanskrit Simple and Compound Character Recognition Using Neural Network
Chapter 63. Need of ICT for Sustainable Development of Power Sector
Chapter 64. Development of Optical Impairment Minimization Technique for Radio Over Fiber Link
Chapter 65. Mobile Waste Management for Smart Cities: Monitoring Sanitation through Living Labs
Chapter 66. Optimized Implementation of Location Aware and Network Based Services for Power Efficient Android Applications
Chapter 67. Power Consumption and Congestion Control of Rendezvous Node for Wireless Biosensor Network
Chapter 68. Comparison of Different Similarity Functions on Hindi QA System
Chapter 69. Preventing Faults: Fault Monitoring and Proactive Fault tolerance in Cloud Computing
Chapter 70. Evolving the Reliability for Cloud System Using Priority Metric
Chapter 71. Multilevel Priority Based Task Scheduling Algorithm for Workflows in Cloud Computing Environment
Chapter 72. Efficient DNA Based Cryptographic Mechanism to Defend and Detect Blackhole Attack in MANETs
Chapter 74. Opinion Mining Classification Based on Extension of Opinion Mining Phrases
Chapter 75. Facial Expression Recognition Using variants of LBP and Classifier Fusion
Chapter 76. FLSU Based Energy Efficient Protocol Design for WSN with Mobile Sink
Chapter 77. Goal based Constraint Driven Dynamic RESTful Web Service Composition Using AI Techniques.

Browse Subjects

Show more subjects...

Statistics

from
to
Export