特集記事
Optimal Transmission and Scheduling in Delay Tolerant Network
Static Power Reduction Using Reconfigurable Multi-Mode VTCMOS Switches
Periodically Predicting Client?s Bandwidth & Cost Acknowledgements Sends to Cloud Server to Optimize Resource Usage
Analyze & Classify Intrusions to Detect Selective Measures to Optimize Intrusions in Virtual Network
Enhancing Security and Reliability using Constraint based Information Sharing in Cloud
An Efficient Rule Based System to Avoid Malicious Content from OSNs
Mobile Presence Services with Scalability Using Concurrency in Programming
Proficient Sharing of Personal Health Reports in Cloud
Secure Communication through Prior Key Distribution System for Nodes
Secure Personal Information by Analyzing Online Social Networks
Novel Secure Multiparty Protocol in Distributed Databases
HMEP: Hasten Message Endorsement Protocol for Vehicular Ad hoc Networks
Adaptive Routing for Throughput Maximization
Improving Audit Service in Cloud for Outsourced Storage Dynamically
Improving the Performance of Condor for Dag- Based Tasks through Cache Memory in Grid Environments
Active Resource Provision in Cloud Computing Through Virtualization
DACD: Delegated Access Control of Data in Cloud computing environment
Online Updating osPCA Technique for Outlier Detection
Removal of Escrow Problem and Revocation Problem in Distributed Data Sharing
An Approach to Improve Computer Forensic Analysis via Document Clustering Algorithms
An Algorithmic Approach to Evaluate Skills of an Employee to Improve Productivity of an Organization
Unique Address Assignment and Dynamic Configuration of Node Traffic of MANETs
An Efficient and Secured Storage Delegated Access Control to Maintain Confidentiality of Data
Automata Based Access Control Privacy Preserving in PPIB
Moving Fuzzy K-Means Conventional Clustering Algorithms for Microscopic Images
ECA Based Home Automation System
Development of Image Fusion Algorithms by Integrating PCA, Wavelet and Curvelet Transforms
Broken Railway Track Detection Using LED-LDR
Dual Dynamic Node Flip-Flop Design with an Embedded Logic Design
A VLSI Implementation of Fast Addition Using an Efficient CSLAs Architecture
FPGA Implementation of Selective Eigen Background Using Background Subtraction Algorithm in Crowded Scenes
FPGA Implementation of Removal of Impulse Noise in Images by using MDBUT Technique
A Novel Approach to Condense the Leakage Power in Deep Submicron Circuits by Sleep Methods
Energy Efficient Intruder Dection and Alert (Eeida) System Using Wireless Multimedia Sensor Networks
Q Less QR Decomposition Based Signal Detection Scheme for MIMO System
Implementation of Multi-Bit flip-flop for Power Reduction in CMOS Technologies
Advanced Cryptographic Technique Using Double Poin t Crossover
Robust Invisible QR Code Image Watermarking Algorithm in SWT Domain
Comparison of CAN, TTP and Flexray Communication Protocols
A Multi-Level Approach of Audio-Steganography and Cryptography
DOA Estimation of Uncorrelated and Coherent Signals in Multipath Environment Using ULA Antennas
Image Denoising Using Complex Framelets
Implementation of Euclidian Geometry Low Density Parity Check (EG-LDPC) Codes for Error Detection by Using MLDD
Threshold Based Fall Detection and Prediction Method Using Tri-Axial Accelerometer
High Speed Vedic Multiplier Using Nikhilam Sutra with Barrel Shifter
Swumanoid:An Autonomous Manoeuvre Sailing Robot For Oceanographic Research
32-Bit CMOS Comparator Using a Zero Detector
研究論文
Efficient Data Broadcast Using One-To-All and All-To-All Broadcast Algorithm In Wireless Networks
Intelligent Database Driven Reverse Dictionary
Universal Turing Machine: A Model for all Computational Problems
Mitigating Data Mining Attack in Cloud
A Study of Text Localization Algorithms for Complex Images
Location Based Multicast Addressing Protocol Using Markov Chain for Manet
Taxonomy of E-Mail Security Protocol
Implementation of Embedded System Using RFID and Alcohol Sensor at the Toll Plaza
State-of-the ART Location Recognization Development Over Smartphones by Integrating Cloud Based LBS’s
Stroke and Contrast Enhancement of Degraded Document Image through Binarization
SDD: A Novel Technique for Enhancing Cloud Security with Self Destructing Data
High Performance Efficient Address Generator for WiMAX Deinterleaver
Performance Analysis of Routing Protocols in Ad Hoc Wireless Networks
A New Approach for Multicast Routing Protocol Using Branching Point
Reconfigurable Antennas – Antennas that can think for themselves
Analysis of Log Data and Statistics Report Generation Using Hadoop
A Proficient Method for Traffic Monitoring System
Swarm Intelligence Paradigm For Object Tracking In Video
A Power - Balancing Approach for Coverage Time Optimization in Clustered Networks
Gesture Identification Based Remote Controlled Robot
Design on CIC interpolator in Model Simulator
Web Based Applications and Their Testing Approach
Visual Saliency Based 3D Human Model Agreement
Artificial Intelligence Approach for Disease Diagnosis and Treatment
Remote access to PC using Android phone
FPGA Implementation of Optimized Decimation Filter for Wireless Communication Receivers
Quad Clustering Routing Protocol to Enhance the Stability in WSN
Partitioning Clustering Algorithms for Data Stream Outlier Detection
Precise Recommendation System for the Long Tail Problem Using Adaptive Clustering Technique
A Loose Virtual Clustering algorithm for efficient routing of MANETs
A Novel Protection Scheme against Byzantine Attack in Mobile Ad hoc Network
Palmprint Recognition using Novel Fusion Algorithm
Design of Error Compensation for High Performance Fixed -Width Multiplier
Smart Duo Approach - Detection and Removal of Sybil attackers in MANETs by Clump based Scheme
An Improved OLSR Protocol for Reducing the Routing Overhead in MANETs
Handwritten Document Editor: A Review
Predictive Hot set Identification in Social Networks: Approach
Performance Evaluation of LTE Hard Handover Algorithm with Multimedia Data Transmission
A Scheme for Encrypting a Database
Analysis and Design of Various Key Pre- Distribution Schemes
A Comparative Study of Routing Protocols vs Energy Consumption in MANETs
Cardio Pulmonary Resuscitation - A Self Rescuing Device
Manipulating Diabetes by Mooting Blood Clott Time Parameter
Processing Uncertain Databases Using USkyline Mechanism
A Zigbee Based Inter-Processor Communication Architecture for the Management of Bedchambers for the Physically Challenged
Enhanced Bandwidth of Rectangular Microstrip Antenna using Uniplanar EBG Cells
A Survey on the principles of mining Clinical Datasets by utilizing Data mining technique
A Visual Secret Sharing Technique for Secure and Fast Transmission of Image
Design of Multiband RoF-PoN for Down Stream and Wavelength Reuse to Upstream
A Novel Way of Cost Estimation in Software Project Development Based on Clustering Techniques
Enhanced Generic Video Summarization using Large Scale Categorization
Ontology Creation and Development Model
ANN Assisted Node Localization in WSN using TDOA
An Approach for Word Sense Disambiguation using modified Naïve Bayes Classifier
EAACK-A Secure Intrusion Detection System for MANET
Multicast Routing Based On Genetic Algorithm for Mobile Adhoc Network
Enhancing Security in MANET using Integral Component Cluster-Based Certificate Revocation with Vindication Capability
Detecting Video Sequence Matching Using Segmentation Method
Building a ranking based reverse dictionary
A Review on Image Processing Techniques for Synthetic Aperture Radar (SAR) Images
Effective Load Balancing for Cloud Computing using Hybrid AB Algorithm
ANONYMIZING TRANSACTION DATA PUBLICATION USING SLICING
Increasing Node Density to Improve the Network Lifetime in Wireless Network
A Review: Wireless Body Area Networks for Health Care
A Review: Clumping in Mobile Adhoc Networks
Optimization of PAPR Using HPA and Amplitude Clipping Reduction Technique
A Study of Behaviour And Performance Analysis Of Wormhole Attack In Mobile Ad-Hoc Networks
Repeaterless Transmission of 4.48 Tb/S over Standard Single Mode Fiber (SSMF) G.652
Cache Consistency and IDS for Handling Attacks in Routing Ad-hoc networks
An Adaptive Framework for Autonomic Person Identification System using Pervasive Computing
Identification of Structural Clones Using Association Rule and Clustering
Clustering Based Optic Disc and Optic Cup Segmentation for Glaucoma Detection
Integration of Wireless Sensor Network with Virtual Instrumentation in a Hazardous Environmental
Efficient Range based Algorithm for Localization in Pilgrim Tracking Scenario
Dynamic Histogram Shifting for Reducing Distortion in Image Embedding
Computer Simulation of Polyamidoamine Dendrimers and Their Complexes with Cisplatin Molecules in Water Environment
A Finite State Machine based Evaluation of Business Policy Enforcement in Long Term Composed Services
A Formal Approach for the Verification of Order of Execution in Long Term Composed Services
Automatic Image Segmentation method based on ALG
I-MAC with Minimum Delay and Cross Layer Optimization for Wireless Sensor Networks
Self-organization and Self-healing: Rationale and Strategies for Designing and Developing a Dependable Software System
On the Design of an Object Oriented Programming Language
もっと見る