Collection's Items (Sorted by Submit Date in Descending order): 161 to 180 of 408
Issue Date | Title | Author(s) |
2015-05 | Performance Improvements in NoSQL Databases INDICANO: An In-Memory Distributed Cache for NoSQL | Sood, Akshay; Singh, Ravinder |
2015-05 | Sentiment Analysis for Social Media and Online Review | Singh, Rajni; Kaur, Rajdeep |
2015-05 | Mobile Anchor Assisted Localization Algorithm to Improve Network Life Time in Wireless Sensor Network | Prabhakar, Maid Amol; Sahu, Ravi Kant |
2015-05 | Software design enhancement using refactoring | Rani, Rekha; Singh, Balraj |
2015-05 | Security Enhancement in Existing Android Permission Base Model | Laheri, Pankaj; Garg, Anu |
2017-11 | Enhancing Keystroke Dynamic Based Biometric Authentication for Mobile Devices Using Sensor Data | Prasanna, Pothina Yogi Sai; Saini, Baljit Singh |
2015-05 | E-mail Spam Classification using PCA-SVM and PCA- Hybrid of SVM RBF with Adaboost | Singh, Sneha; Kaur, Sandeep |
2015-04 | Improving Resource Utilization by Integrating Hadoop Map Reduce Framework with Virtual Box | Kaur, Ramanpal; Kaur, Harjeet |
2015-05 | Computer-Aided Detection of Follicular Lymphoma Grading Using Support Vector Machine | Kaur, Kirandeep; Singh, Sanjay Kumar |
2015-05 | Multi-robot cooperation method for localizing odor sources based on a niching Firefly algorithm | Aier, Noktienla; Sood, Monica |
2015-04 | Secure Communication Channel for Grid Users Using AES Encryption | Raman, Himansu Shekhar; Bakshi, Aditya |
2015 | To Propose Algorithm to Detect and Isolate Malicious Vehicle in VANET | Kateshiya, Jaydeep Pravinchandra; Singh, Anup Parkash |
2015-05 | Identifying Effective Attributes For Structuring Social Groups in Social Media Using Principal Component Analysis | Shafi, Samiya; Singh, Harshpreet |
2015-04 | Testing to Detect Anomalies in Firewall Rules and Policy | Yadav, Rakesh; Kaur, Harjeet |
2015-05 | Strategize Framework for Contesting Plan with Known Variable Learning Technique | Singh, Jaskirat; Vashisht, Sheveta |
2015-05 | To Mitigate The Effect of EDoS Attack in Cloud Computing | Amita; Munjal, Kundan |
2015-05 | An Efficient Localization Algorithm Using Directional Antenna in Wireless Sensor Networks | Gautam, Shalini; Sahu, Ravi Kant |
2015-04 | Review and Analysis on Security in Cloud Computing | Chib, Karamvir Singh; Singh, Mandeep; Kashyap, Kunal; Asija, Deepak |
2015-05 | A Reliable Distributed Mutual Exclusion in MANET | Kaur, Mandeep; Sharma, Shabnam |
2015-05 | Metaheuristic Techniques on N-Queen problem: DE vs. ABC | Sharief, Pirzada Nawaz; Siani, Baljit Singh |
Collection's Items (Sorted by Submit Date in Descending order): 161 to 180 of 408