Linked e-resources

Details

Chapter 1. Cloud Computing Technology as an Auto Filtration System for Cost Reduction while Roaming
Chapter 2. A Secured Digital Signature Using Conjugacy and DLP on Non-Commutative Group over Finite Field
Chapter 3. Design of Visual Cryptography Scheme Using C(m,w) Combinations
Chapter 4. Some Properties of Rough Sets on Fuzzy Approximation Spaces and Applications
Chapter 5. Join Operations to Enhance Performance in Hadoop MapReduce Environment
Chapter 6. Multipath Load Balancing and Secure Adaptive Routing Protocol for Service Oriented WSNs
Chapter 7. Visual Based Information Retrieval Using Voronoi Tree
Chapter 8. EEG Based Oscitancy Classification System for Accidental Prevention
Chapter 9. Low Power 14T Hybrid Full Adder Cell
Chapter 10. A Combined System for Regionalization in Spatial Data Mining Based on Fuzzy C- Means Algorithm with Gravitational Search Algorithm
Chapter 11. Adaptive Spatio-Temporal Filtering with Motion Estimation for Mixed Noise Removal and Contrast Enhancement in Video Sequence
Chapter 12. Improved Dynamic Time Warping Based Approach for Activity Recognition
Chapter 13. Design & Functional Verification of Axi2Ocp Bridge for Highly Optimized Bus Utilization and Closure Using Functional Coverage
Chapter 14. STRIDE Based Analysis of the Chrome Browser Extensions API
Chapter 15. Social and Temporal-Aware Personalized Recommendation for Best Spreaders on Information Sharing
Chapter 16. Person Recognition Using Surf Features and Vola-Jones Algorithm
Chapter 17. A Novel Representation for Classification of User Sentiments
Chapter 18. Information Retrieval for Gujarati Language Using Cosine Similarity Based Vector Space Model
Chapter 19. Design and Optimization of Fractal Antenna for UWB Application
Chapter 20. Multi-objective IT Professionals’ Utilization Problems Using Fuzzy Goal Programming
Chapter 21. An Innovative Method for Load Balanced Clustering Problem for Wireless Sensor Network in Mobile Cloud Computing
Chapter 22. BLDC Motor Drive with Power Factor Correction Using PWM Rectifier
Chapter 23. A 3D Approach for Palm Leaf Character Recognition Using Histogram Computation and Distance Profile Features
Chapter 24. Gradient Magnitude Based Watershed Segmentation for Brain Tumor Segmentation and Classification
Chapter 25. A Novel Edge Based Chaotic Steganography Method Using Neural Network
Chapter 26. PLoc-Euk: An Ensemble Classifier for Prediction of Eukaryotic Protein Sub-Cellular Localization
Chapter 27. Feature Optimization to Recognize Telugu Handwritten Characters by Implementing DE and PSO Techniques
Chapter 28. Dengue Fever Classification Using Gene Expression Data: A PSO Based Artificial Neural Network Approach
Chapter 29. L-Slotted Microstrip Fed Monopole Antenna for Triple Band WLAN and WiMAX Applications
Chapter 30. Modified Non Linear Diffusion Approach for Multiplicative Noise
Chapter 31. Performance Analysis of Fully Depleted SOI Tapered Body Reduced Source (FD-SOI TBRS) MOSFET for Low Power Digital Applications
Chapter 32. A Latest Comprehensive Study on Structured Threat Information Expression (STIX) and Trusted Automated Exchange of Indicator Information (TAXII)
Chapter 33. Robust Flare Phase Auto Landing of Aircrafts, Based on Modified ASBO
Chapter 34. Drive-by-Download Malware Detection in Hosts by Analyzing System Resource Utilization Using One Class Support Vector Machines
Chapter 35. 2D Shape Representation and Analysis Using Edge Histogram and Shape Feature
Chapter 36. A Study & Analysis of Different Brain Tumor Segmentation Techniques
Chapter 37. Threshold Based Clustering Algorithm Analyzes Diabetic Mellitus
Chapter 38. Automatic Classification of Lung Nodules into Benign or Malignant Using SVM Classifier
Chapter 39. RSentiment: A Tool to Extract Meaningful Insights from Textual Reviews
Chapter 40. Preventive Maintenance Approach for Storage and Retrieval of Sensitive Data
Chapter 41. Domain Independent Approach for Aspect Oriented Sentiment Analysis for Product Reviews
Chapter 42. Privacy Preserving Data Mining: A Parametric Analysis
Chapter 43. Approach for Emotion Extraction from Text
Chapter 44. Bio-inspired Algorithms for Mobile Location Management – A New Paradigm
Chapter 45. Automatic Detection of Diabetic Retinopathy Using Two Phase Top-hat Transformations – A Novel Approach
Chapter 46. Evaluation of Heart Rate Using Reflectance of An Image
Chapter 47. Analysis of Logs by Using Logstash
Chapter 48. Performance of Multiple String Matching Algorithms in Text Mining
Chapter 49. Estimation of Degree of Connectivity to Predict Quality of Software Design
Chapter 50. Information Retrieval through the Web and Semantic Knowledge-Driven Automatic Question Answering System
Chapter 51. Level Set Based Liver Segmentation and Classification by SVM
Chapter 52. A Purely Localized Random Key Sequencing Using Accelerated Hashing in Wireless Ad-hoc Networks
Chapter 53. GOASREP: Goal Oriented Approach for Software Requirements Elicitation and Prioritization Using Analytic Hierarchy Process
Chapter 54. Confidentiality and Storage of Data in Cloud Environment
Chapter 55. An Exploratory Study of RDF: A Data Model for Cloud Computing
Chapter 56. Optimization of Overcurrent Relays in Microgrid Using Interior Point Method and Active Set Method
Chapter 57. Series Smart Wire – Managing Load and Congestion in Transmission Line
Chapter 58. Recognizing Human Faces with Tilt
Chapter 59. Word-Level Script Identification from Scene Images
Chapter 60. Writer Specific Parameters for Online Signature Verification
Chapter 61. Gene Ontology Based Function Prediction of Human Protein Using Protein Sequence and Neighborhood Property of PPI Network
Chapter 62. TKAR: Efficient Mining of Top – k Association Rules on Real – Life Datasets
Chapter 63. Predicting Defect of Software System
Chapter 64. Fusion of Medical Image Using STSVD
Chapter 65. Modified Cuckoo Search Algorithm for Fittest Relay Identification in Microgrid
Chapter 66. A Method for the Selection of Agile Methods Using AHP
Chapter 67. Load Balancing with Job Switching in Cloud Computing Network
Chapter 68. An Efficient Detection and Mitigation of Selfish and Black Hole Attack in Cognitive Mobile Ad-hoc Network
Chapter 69. Cryptanalysis of Secure Routing among Authenticated Nodes in MANETs
Chapter 70. Novel Techniques for Detection of Anomalies in Brain MR Images
Chapter 71. Convex Hyperspectral Unmixing Algorithm Using Parameterized Non-Convex Penalty Function.

Browse Subjects

Show more subjects...

Statistics

from
to
Export