Collection's Items (Sorted by Submit Date in Descending order): 101 to 120 of 408
Issue Date | Title | Author(s) |
2015-04 | Email Classification Using Enhanced AdaBoost Algorithm | Rani, Shobhika; Kaur, Balwinder |
2015-05 | An Efficient Technique for Gait Recognition Using Width Vector, Angles And MDA | Santosh, Katakam; Sharma, Chirag |
2015-05 | Adaptive Hadoop scheduling using AMF-H3 Framework with Technocrat Algorithm | Valliyappan V; Singh, Parminder |
2015-04 | An Enhanced Approach for Trust Based Routing in MANET | Murty, Pedamallu Lakshmi Narasimha; Singh, Gagandeep |
2015-05 | An Opinion Dynamics Based Advance Stable Election Protocol in Three Level Heterogeneous Wireless Sensor Network | Kaur, Virpal; Dhiman, Vikram |
2015-05 | Adaptive resource provisioning for multi-tier applications using V-cache in cloud computing | Singh, Gurjot Balraj; Singh, Parminder |
2015-05 | Fingerprint Matching Algorithm Using Advanced Pre-Processing Techniques | Kaur, Sarbjit; Garg, Urvashi |
2015-05 | To Enhance ECODE Protocol for improving Congestion Control and Network Life using Single Hop communication in VANET | Pathania, Nahita; Sethi, Rohit |
2015-05 | Analysis of enhanced Hybrid Approach using Greedy Perimeter Stateless Routing in VANET | Neha; Isha |
2014-11 | Wireless Electricity Transmission and Causes | Kaur, Lovepreet; Kaur, Parminder |
2015-05 | To propose a new algorithm for improving software architecture with clustering algorithm | Sharma, Shilpa; Godara, Jyoti |
2015-05 | Enhancement in the resource utilization and sharing in distributed systems | Shukla, Awadhesh Kumar; Singh, Balraj |
2015-05 | An Intelligent User Based Text Recognition Using Analytical Approach | Kumar, Vinit; Bansal, Harsh |
2017-11 | Novel Application of Recycled materials in Designing | Gupta, Ankita; Thosar, Apurva |
2015-05 | Sybil Attack Detection through Distance Calculation | Aggarwal, Vaishali; Singh, Ravinder |
2015-05 | A Key dependent dynamic S-Box using two Chaotic Logistic Equations based PRNG | Nandaram, Chandrakar Ram Kishan; Malhotra, Atul |
2015-05 | Mitigation of DDOS Attack In AODV Routing Protocol Using Token Based Identity | Kaur, Satveer; Sharma, Hitesh |
2015-05 | Comparative Analysis of K-Mean And Hybrid K-Mean Clustering Algorithm for Prediction of Diabetes MELL_EH_TISS | Arora, Sonal; Munjal, Kundan |
2015-05 | Compatibility Measurement of Components in Component Based Software Engineering Using Boltzmann Learning Technique | Kaur, Jasneet; Devi, Pooja |
2015-05 | To evaluate and enhance DOM Tree algorithm for noisy Data detection in web content mining | Mahajan, Sachit; Kaur, Maneet |
Collection's Items (Sorted by Submit Date in Descending order): 101 to 120 of 408