Narrowing awareness gap by using e-learning tools for counselling university entrants (Englisch)
- Neue Suche nach: Goyal, Puneet
- Neue Suche nach: Kukreja, Tanya
- Neue Suche nach: Agarwal, Amit
- Neue Suche nach: Khanna, Nitin
- Neue Suche nach: Goyal, Puneet
- Neue Suche nach: Kukreja, Tanya
- Neue Suche nach: Agarwal, Amit
- Neue Suche nach: Khanna, Nitin
In:
2015 International Conference on Advances in Computer Engineering and Applications
;
847-851
;
2015
- Aufsatz (Konferenz) / Elektronische Ressource
-
Titel:Narrowing awareness gap by using e-learning tools for counselling university entrants
-
Beteiligte:Goyal, Puneet ( Autor:in ) / Kukreja, Tanya ( Autor:in ) / Agarwal, Amit ( Autor:in ) / Khanna, Nitin ( Autor:in )
-
Erschienen in:
-
Verlag:
- Neue Suche nach: IEEE
-
Erscheinungsdatum:01.03.2015
-
Format / Umfang:219756 byte
-
ISBN:
-
DOI:
-
Medientyp:Aufsatz (Konferenz)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Datenquelle:
Inhaltsverzeichnis Konferenzband
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
[Front cover]| 2015
- 1
-
Track schedule| 2015
- 1
-
Conference committee| 2015
- 1
-
[Front matter]| 2015
- 1
-
Monotone polygons using linked listPati, Kamaljit / Bharwani, Anandi / Dhanuka, Priyam / Mohanty, Manas Kumar / Sadhu, Sanjib et al. | 2015
- 1
-
Message from program chair| 2015
- 1
-
Segmentation of plant disease spots using automatic SRG algorithm: a look up table approachSarkar, Rajat Kanti / Pramanik, Ankita et al. | 2015
- 8
-
A survey and taxonomy of various packet classification algorithmsNagpal, Bharti / Singh, Nanhay / Chauhan, Naresh / Murari, Radhika et al. | 2015
- 13
-
Prediction of CMRS rock mass rating using fuzzy logicDevanand, / Kumar, Naveen et al. | 2015
- 18
-
PAPR reduction using precoding and companding techniques for OFDM systemsAgarwal, Deergha / Sharan, Nishant / Raja, M Ponmani / Agarwal, Ankur et al. | 2015
- 24
-
Feature based classification of nuclear receptors and their subfamilies using fuzzy K-nearest neighborTiwari, Arvind Kumar / Srivastava, Rajeev et al. | 2015
- 29
-
A GA based job scheduling strategy for computational gridSingh, Krishan Veer / Raza, Zahid et al. | 2015
- 35
-
Ranking web pages based on user interaction timeJain, Nandnee / Dwivedi, Upendra et al. | 2015
- 42
-
An alternative approach for computing monotone polygonDhanuka, Priyam / Bharwani, Anandi / Kaur, Kamaljit / Mohanty, Manas Kumar / Sadhu, Sanjib et al. | 2015
- 46
-
Classifier based text simplification for improved machine translationTyagi, Shruti / Chopra, Deepti / Mathur, Iti / Joshi, Nisheeth et al. | 2015
- 51
-
Artificial intelligence for designing user profiling system for cloud computing security: ExperimentSahil, / Sood, Sandeep / Mehmi, Sandeep / Dogra, Shikha et al. | 2015
- 59
-
Combined horizontal and vertical projection feature extraction technique for Gurmukhi handwritten character recognitionMahto, Manoj Kumar / Bhatia, Karamjit / Sharma, R. K. et al. | 2015
- 66
-
A priority based job scheduling algorithm using IBA and EASY algorithm for cloud metaschedularDubey, Kalka / Kumar, Mohit / Chandra, Mayank Arya et al. | 2015
- 71
-
Comparison of neural network back propagation algorithms for early detection of sleep disordersGarg, Vijay Kumar / Bansal, R. K. et al. | 2015
- 76
-
Soft computing technique based on ANFIS for the early detection of sleep disordersGarg, Vijay Kumar / Bansal, R. K. et al. | 2015
- 80
-
Performance, analysis and comparison of digital addersSaini, Jasmine / Agarwal, Somya / Kansal, Aditi et al. | 2015
- 84
-
Design and implementation of PN sequence generator using Vedic multiplicationJamgade, Roshni / Ambatkar, Shrikant / Kakde, Sandeep et al. | 2015
- 88
-
Performance of dual MRC over non-identical TWDP fading channelsDinamani Singh, Aheibam / Subadar, Rupaban et al. | 2015
- 93
-
Capacity of dual MRC with adaptive transmitters over non-identical TWDP fading channelsDinamani Singh, Aheibam / Subadar, Rupaban et al. | 2015
- 98
-
Performance comparison of diversity receivers over TWDP fading channelsDinamani Singh, Aheibam / Meitei, N. Loyalakpa et al. | 2015
- 103
-
Framework of adaptive lossless compression with block wise dataRaj, Deepa / Gupta, Seema et al. | 2015
- 108
-
Texture analysis of various images to find self-similaritiesTripathi, Shipra / Kumar, Jeet et al. | 2015
- 114
-
Comparison of image compression methods on various imagesKumar, Jeet / Kumar, Manish et al. | 2015
- 119
-
A review on steganography and cryptographyMishra, Rina / Bhanodiya, Praveen et al. | 2015
- 123
-
A cognitive model of navigation and path finding using cellular automata agentArya, Ashima / Gupta, Shaili et al. | 2015
- 134
-
K-means clustering for adaptive wavelet based image denoisingAgrawal, Utkarsh / Tiwary, U. S. / Roy, Soumava Kumar / Prashanth, D. S. et al. | 2015
- 138
-
A comprehensive review on automation of Indian sign languageVerma, Vivek Kumar / Srivastava, Sumit / Kumar, Naveen et al. | 2015
- 143
-
Identification of spatio-temporal and kinematics parameters for 2-D optical gait analysis system using passive markersPrakash, Chandra / Mittal, Anshul / Kumar, Rajesh / Mittal, Namita et al. | 2015
- 150
-
Enhanced clustering ant colony routing algorithm based on swarm intelligence in wireless sensor networkVerma, Ankit / Vashist, Prem Chand et al. | 2015
- 155
-
Security for Bluetooth enabled devices using BlipTrack Bluetooth detectorKumar, Monu / Gupta, B. K. et al. | 2015
- 159
-
Design and development of peer to peer web caching technique for mobile Ad-Hoc networks: A reviewVaidya, Bhagyashree V. / Mangrulkar, R. S. et al. | 2015
- 163
-
Security for IoT: An effective DTLS with public certificatesPanwar, Mukul / Kumar, Ajay et al. | 2015
- 167
-
Implementing energy efficient technique for defense against Gray-Hole and Black-Hole attacks in wireless sensor networksDongare, Snehal P. / Mangrulkar, Ram S. et al. | 2015
- 178
-
Performance evaluation of different versions of 2D Torus networkYadav, Sapna / Mishra, Richa / Gupta, Umesh et al. | 2015
- 183
-
Energy efficient clustering based 3-rank heterogeneous network model for wireless sensor networkAgarwal, Deepali / Gupta, Avdhesh et al. | 2015
- 189
-
Review of Internet of Things in development of smart cities with data management & privacyBurange, Anup W. / Misalkar, Harshal D. et al. | 2015
- 196
-
A parallel approach for region-growing segmentationBaby, Anju Soosan / Balachandran, K et al. | 2015
- 201
-
Performance analysis of training algorithms of multilayer perceptrons in diabetes predictionSaji, Sumi Alice / Balachandran, K et al. | 2015
- 207
-
Modeling of services and their collaboration in enterprise cloud bus (ECB) using UML 2.0Khan, Gitosree / Sengupta, Sabnam / Sarkar, Anirban et al. | 2015
- 214
-
Test script execution and effective result analysis in hybrid test automation frameworkChaini, Hari Sankar / Pradhan, Sateesh Kumar et al. | 2015
- 218
-
Study and analysis of particle swarm optimization for improving partition clusteringPatel, Garvishkumar K. / Dabhi, Vipul K. / Prajapati, Harshadkumar B. et al. | 2015
- 226
-
Face recognition using back propagation neural network techniqueSekhon, Abhjeet / Agarwal, Pankaj et al. | 2015
- 231
-
Easiest tricks to solve tickiest expressions of stackGupta, Yash / Sharma, Rajat / Sharma, Shivani et al. | 2015
- 237
-
Recent advancements in requirement elicitation and prioritization techniquesGarg, Nikita / Agarwal, Pankaj / Khan, Shadab et al. | 2015
- 241
-
Cryptographic algorithm on multicore processor: A reviewJain, Vivek / Sharma, Prachi / Sharma, Shreshtha et al. | 2015
- 245
-
A methodology to overcome challenges and risks associated with ambient intelligent systemsKashyap, Hema / Singh, Vikas / Chauhan, Vinita / Siddhi, Pragya et al. | 2015
- 249
-
Survey on various techniques of trackingMishra, Asmita / Chandra, Mayank / Jaiswal, Namrata et al. | 2015
- 252
-
Smart intrusion detection system for MANETKashyap, Neeti et al. | 2015
- 255
-
Retrieval of software component version from a software version database: A graph based approachDutta, Stobak / Sengupta, Sabnam et al. | 2015
- 260
-
Content based image retrieval a comparative based analysis for feature extraction approachBhad, Ashwini Vinayak / Ramteke, Komal et al. | 2015
- 267
-
RF analysis of MEMS shunt capacitive switch with gold and aluminium beamAgarwal, Saurabh / Kumar, Mithlesh / Guha, Koushik / Baishya, Srimanta et al. | 2015
- 272
-
An overview on: Intrusion detection system with secure hybrid mechanism in wireless sensor networkMoon, Prachi S. / Ingole, Piyush K. et al. | 2015
- 278
-
Generalization of fuzzy noiseless source coding with utilitiesArora, H. D. / Dhiman, Anjali et al. | 2015
- 284
-
CPFR: Coverage preserving failure recovery in wireless sensor networksSharma, Krishna P. / Sharma, T. P. et al. | 2015
- 290
-
Implementation model for access control using log based security: Practical approachSingh, Amritpal et al. | 2015
- 294
-
Comparative analysis of location and zone based routing in VANET with IEEE802.11p in city scenarioHusain, Akhtar / Sharma, S. C. et al. | 2015
- 300
-
Problem of secondary structure prediction minimize by using the Baum Walch algorithmAgarwal, Shivani / Shukla, Suyash / Kumar, Atul / Khan, N. U. et al. | 2015
- 305
-
Fuzzy inference system & fuzzy cognitive maps based classificationBhutani, Kanika / Gaurav, / Kumar, Megha et al. | 2015
- 310
-
Bank note authentication using decision tree rules and machine learning techniquesKumar, Chhotu / Dudyala, Anil Kumar et al. | 2015
- 315
-
Mining emotions (anger & fear) from Indian army fans page on FacebookSherawat, Deepika et al. | 2015
- 321
-
Enhancementof gain, bandwidth and directivity of a patch antenna by increasing dielectric layers of the substrate through micromachining technique for RFID applicationSaha, Rajesh / Maity, Santanu / Trigunayat, Nripendra et al. | 2015
- 325
-
Design and development of bottle washer machine for small scale beverage industryGajjar, Ankur G. / Patel, Alpesh I. / Singh, Raviprakash G. et al. | 2015
- 332
-
Digital image authentication and encryption using digital signatureAlam, Shahzad / Jamil, Amir / Saldhi, Ankur / Ahmad, Musheer et al. | 2015
- 337
-
Analysis of efficient random permutations generation for security applicationsNasim, Zeba / Bano, Zohra / Ahmad, Musheer et al. | 2015
- 342
-
Performance comparison between Linux containers and virtual machinesJoy, Ann Mary et al. | 2015
- 347
-
A new local area network attack through IP and MAC address spoofingShaw, Shashi / Choudhury, Prasenjit et al. | 2015
- 351
-
Search system: Effective solution to medical problemsPatle, Arti / Kumari, Bhavya / Gupta, Lavanya et al. | 2015
- 356
-
Performance evaluation of cuckoo search algorithm based FOPID controllers applied to a robotic manipulator with actuatorSharma, Richa / Gaur, Prerna / Mittal, A. P. et al. | 2015
- 364
-
Modified approximate lower triangular encoding of LDPC codesDutta, Arijit / Pramanik, Ankita et al. | 2015
- 370
-
A study on the growth of Agile methods in India till 2014Agrawal, Ashish / Singh, Sadhana / Maurya, L. S. et al. | 2015
- 375
-
An implementation of energy efficient data compression & security mechanism in clustered wireless sensor networkNagdive, Akshay S. / Ingole, Piyush K. et al. | 2015
- 381
-
Important factors for estimating reliability of SOASingh, Neha / Tyagi, Kirti et al. | 2015
- 387
-
An efficient framework for mining biological networkSingh, Shivani et al. | 2015
- 393
-
Performance metrics of web crawler in client-server and MVC architectureBadgujar, Jyotsana / Jailia, Manisha / Kumar, Ashok et al. | 2015
- 399
-
Analysis of e-learning web application's alignment with six facets of understandingKamatchi, R. / Ambekar, Kimaya et al. | 2015
- 404
-
Fuzzy logic based image encryption for confidential data transfer using (2, 2) secret sharing scheme-reviewMudia, Hinal M. / Chavan, P. V. et al. | 2015
- 409
-
Neural network based group authentication using (n, n) secret sharing schemeNarad, Supriya K. / Chavan, Pallavi V. et al. | 2015
- 415
-
Web application for analysis of CSS styling issues and Gurmukhi fonts for Punjabi websiteSingal, Swati Mittal et al. | 2015
- 419
-
A methodological survey of image segmentation using soft computing techniquesSingh, Vijai / Gupta, Shivangi / Saini, Shrutika et al. | 2015
- 423
-
Finding experts in community question answering services: A theme based query likelihood language approachMandal, Deba P. / Kundu, Dipankar / Maiti, Saptaditya et al. | 2015
- 428
-
Traffic and congestion free routing for mobile robotsRana, Manoj / Gupta, Avdhesh / Singh, R. K. et al. | 2015
- 432
-
Dual lexical chaining for context based text classificationChakraverty, S. / Juneja, B. / Pandey, U. / Arora, A. et al. | 2015
- 440
-
Automation of weblink validation using a generic & reusable automation frameworkGoel, Lipika / Majumdar, Rana et al. | 2015
- 444
-
Comparison of RC6, modified RC6 & enhancement of RC6Aggarwal, Kirti et al. | 2015
- 450
-
Hash_RC6 — Variable length Hash algorithm using RC6Aggarwal, Kirti / Verma, Harsh K. et al. | 2015
- 457
-
Handling mutual exclusion in a distributed application through ZookeeperGoel, Lipika Bose / Majumdar, Rana et al. | 2015
- 461
-
Open data kit-use of smartphone technology for surveyingTayal, Radhika / Saluja, Shivani / Bedwal, Tushina / Sardana, Anjali et al. | 2015
- 465
-
A learning based handwritten text categorizationSarker, Goutam / Dhua, Silpi / Besra, Monica et al. | 2015
- 472
-
A programming based handwritten text identificationSarker, Goutam / Besra, Monica / Dhua, Silpi et al. | 2015
- 478
-
Finding approximate head orientation in non-intrusive environment with single cameraAbhyankar, Parag / Momin, B. F. et al. | 2015
- 483
-
A comparative study on different approaches of real time human emotion recognition based on facial expression detectionDe, Anurag / Saha, Ashim et al. | 2015
- 488
-
A comprehensive review on recent advances in Variational Bayesian inferenceSain, Rohit / Mittal, Vikas / Gupta, Vrinda et al. | 2015
- 493
-
A Malsburg learning back propagation combination for handwritten alpha numeral recognitionSarker, Goutam / Besra, Monica / Dhua, Silpi et al. | 2015
- 499
-
Assessment of feature extraction techniques for hyperspectral image classificationDiwaker, / Dutta, Maitreyee et al. | 2015
- 501
-
An enhanced modulo-based image encryption using chaotic and fractal keysChopra, Akshay / Ahmad, Musheer / Malik, Manish et al. | 2015
- 507
-
Implementation of new encryption algorithm with random key selection and minimum space complexityMushtaque, Md Asif / Dhiman, Harsh et al. | 2015
- 517
-
Comparative study of Mamdani-type and Sugeno-type fuzzy inference systems for diagnosis of diabetesSingla, Jimmy et al. | 2015
- 523
-
Review on: Severity estimation unit of automotive accidentRaut, Saroj / Karmore, Swapnili et al. | 2015
- 527
-
Split-range control of a Jacketed CSTR using self-tuning fuzzy PI controllerGupta, Pradeep / Rana, K.P.S. / Kumar, Vineet / Mishra, Puneet et al. | 2015
- 534
-
Stiction combating intelligent controller tuning: A comparative studyMishra, Puneet / Kumar, Vineet / Rana, K. P. S. et al. | 2015
- 542
-
AI based MPPT methods for grid connected PV systems under non linear changing solar irradiationArora, Ankita / Gaur, Prerna et al. | 2015
- 548
-
Multi-objective optimization of thermo-electric heat pump using genetic algorithm and fuzzy Bellman-Zadeh decision makingHans, Ranjana / Kaushik, S. C. / Manikandan, S. et al. | 2015
- 553
-
Multi-objective optimization of solar powered ericsson cycle using genetic algorithm and fuzzy decision makingArora, Rajesh / Kaushik, S. C. / Kumar, Raj et al. | 2015
- 559
-
An application of data mining to improve personnel performance evaluation in higher education sector in IndiaSharma, Mugdha / Goyal, Ankit et al. | 2015
- 565
-
Comparison of ranking algorithms with dataspaceLal, Niranjan / Qamar, Samimul et al. | 2015
- 573
-
Outlier detection from multidimensional space using multilayer perceptron, RBF networks and pattern clustering techniquesSinwar, Deepak / Dhaka, V. S. et al. | 2015
- 580
-
A review on outlier detection techniques on data stream by using different approaches of K-Means algorithmChauhan, Prashant / Shukla, Madhu et al. | 2015
- 586
-
A novel approach for clustering data streams using granularity techniqueKaneriya, Ankur / Shukla, Madhu et al. | 2015
- 591
-
A short study in formulation of TLBO and its synergized applications with clusteringKurada, Ramachandra Rao / Kanadam, Karteeka Pavan / Tripathi, R. C. et al. | 2015
- 598
-
Design and implementation of high performance architecture for packet classificationKhan, Ausaf Umar / Suryawanshi, Yogesh / Chawhan, Manish / Kakde, Sandeep et al. | 2015
- 603
-
A novel replica placement strategy using binary item-to-item collaborative filtering for efficient voronoi-based cloud-oriented content delivery networkRoy, Sandip / Bose, Rajesh / Sarddar, Debabrata et al. | 2015
- 609
-
Comparative analysis of SRAM cells in sub-threshold region in 65nmMadan, Raghav / Gupta, Rishabh / Nirwan, Bhawana Singh / Grover, Anuj et al. | 2015
- 614
-
Layout development of area efficient Lo-skewed even parity generatorSinghal, Manas / Mehra, Rajesh et al. | 2015
- 619
-
Area-efficient layout design of comparator using cascaded techniqueTrikha, Manish / Mehra, Rajesh et al. | 2015
- 624
-
Reducing RMS noise in CMOS dynamic reconfigurable latched comparator in 50 nmKumar, Murari / Singhal, Manish et al. | 2015
- 628
-
A flipped voltage follower based analog multiplier in 90nm CMOS processSatapathy, Amarjyoti / Maity, Subir Kumar / Mandal, Sushanta K. et al. | 2015
- 632
-
Pragmatic approaches to implement self-checking mechanism in UVM based TestBenchMadan, Raghav / Kumar, Nishant / Deb, Sujay et al. | 2015
- 637
-
Determining minimum spanning tree in an undirected weighted graphRai, Shikha / Sharma, Swati et al. | 2015
- 643
-
Experimental study & analysis of genetic operators for alignment of multiple biological sequencesGupta, Preeti / Agarwal, Pankaj et al. | 2015
- 649
-
Energy efficient fault tolerant and clustering algorithm using alternative backup set for wireless sensor networkSharma, Ishant Kumar / Singh, Balpreet et al. | 2015
- 654
-
Algorithms for clustering XML documents: A reviewGulati, Shagun / Munjal, Geetika et al. | 2015
- 659
-
Formal specification of asynchronous checkpointing using Event-BSingh, Natthan / Chandra, Manik / Yadav, Divakar et al. | 2015
- 665
-
Non-recursive inorder traversal on constructed threaded K-D tree for efficient cloud based space partitioningRoy, Sandip / Bose, Rajesh / Sarddar, Debabrata et al. | 2015
- 669
-
Comparative analysis of two different ant colony algorithm for model of TSPJoshi, Sourabh / Kaur, Sarabjit et al. | 2015
- 672
-
Preprocessing web logs: A critical phase in web usage miningGoel, Neha / Jha, C. K. et al. | 2015
- 677
-
An efficient and secure means for identity and trust management in cloudNida, / Teli, Bhupendra Kumar et al. | 2015
- 683
-
On multi-secret sharing using Hill cipher and random gridsJothi, R. / Ojha, Aparajita et al. | 2015
- 688
-
Fast scale invariant multi-view face detection from color images using skin color segmentation & trained cascaded face detectorsGor, Ashish K. / Bhatt, Malay S. et al. | 2015
- 695
-
MiM-MaM: A new task scheduling algorithm for grid environmentKfatheen, S. Vaaheedha / Banu, M. Nazreen et al. | 2015
- 700
-
Exigency alert and tracking systemKishorBabu, Saggurthi / Sagar, V. Vidya / Nikhitha, B. / Priyanka, P. et al. | 2015
- 706
-
Rainfall forecasting using neural network: A surveyDarji, Mohini P. / Dabhi, Vipul K. / Prajapati, Harshadkumar B. et al. | 2015
- 714
-
Classification of ECG signals using machine learning techniques: A surveyJambukia, Shweta H. / Dabhi, Vipul K. / Prajapati, Harshadkumar B. et al. | 2015
- 722
-
A survey on the impact of economies of scale on scientific communitiesVerma, Seema / Satao, Rachana A. et al. | 2015
- 727
-
Linear array synthesis using Schelkunoff polynomial method and particle swarm optimizationBanerjee, Smita / Dwivedi, Ved Vyas et al. | 2015
- 731
-
A survey on location based application development for Android platformPatel, Bhagyasri G. / Dabhi, Vipul K. / Tyagi, Utkarsh / Shah, Pushpalata B. et al. | 2015
- 740
-
Multilingual text summarization with UNLSherry, / Bhatia, Parteek et al. | 2015
- 746
-
Semantic document retrieval system using fuzzy clustering and reformulated queryMurali, Dabbu / Damodaram, Avula et al. | 2015
- 754
-
A survey on defect and noise detection and correction algorithms in image sensorsJain, Abhishek / Gupta, Richa et al. | 2015
- 760
-
Gaussian filter threshold modulation for filtering flat and texture area of an imageJain, Abhishek / Gupta, Richa et al. | 2015
- 764
-
Fingerprint feature extraction using morphological operationsSingh, Paramvir / Kaur, Lakhwinder et al. | 2015
- 768
-
Non text eradication from degraded and non degraded videos and imagesSaluja, Shivani / Bedwal, Tushina / Rana, Deepti / Tayal, Radhika et al. | 2015
- 773
-
Concepts extraction for medical documents using ontologyMala, Vajenti / Lobiyal, D. K. et al. | 2015
- 778
-
Dynamic composition of web services based on Qos parameters using fuzzy logicKashyap, Namrata / Tyagi, Kirti et al. | 2015
- 783
-
CATCH: Comparison and analysis of tools covering honeypotsNagpal, Bharti / Singh, Nanhay / Chauhan, Naresh / Sharma, Pratima et al. | 2015
- 787
-
Dynamic load balancing using buffer management in distributed database environmentMishra, Richa / Singh, Sanjeev Kr. / Singh, P. K. / Singh, R. K. et al. | 2015
- 791
-
Analysis of attacks on routing protocols in MANETsKapur, Raj Kamal / Khatri, Sunil Kumar et al. | 2015
- 799
-
Security pricing: A catalyst for the large scale adoption of cloud computingDogra, Shikha / Mehmi, Sandeep / Sahil, / Sood, Sandeep et al. | 2015
- 803
-
A review on efficient routing techniques in wireless sensor networksKalore, Sushil Vilas / Rewagad, Prashant et al. | 2015
- 808
-
Use of global positioning system (GPS) to track movement of mobile node in proxy mobile Internet protocol version 6(PMIPv6)Tarbani, Nitesh M / Alvi, A.S. et al. | 2015
- 812
-
Approach to perform horizontal and vertical handoff in wireless networkGhormade, Priti B / Shah, Jagruti J. et al. | 2015
- 816
-
sOverview of IP tracebacking using packet marking techniquesSanap, Swapnil M. / Pawar, Pranav et al. | 2015
- 821
-
Modelling of hierarchical location management schemes to locate mobile multi agents using colored Petri NetAggarwal, Swati / Pathak, Heman et al. | 2015
- 826
-
Energy aware path formation with link stability in wireless adhoc networkSharma, Shubham / Pathak, Deepak et al. | 2015
- 832
-
Effect of optimal cluster head placement in MANET through multi objective GASett, Sujoy / Thakurta, Parag Kumar Guha et al. | 2015
- 838
-
Developing mobile message security application using 3D Playfair Cipher algorithmSingh, Swati / Jain, Reetika / Deep, Pranay / Agarwal, Sakshi et al. | 2015
- 842
-
Comparative study of LEACH, LEACH-C and PEGASIS routing protocols for wireless sensor networkSharma, Ishu / Singh, Rajvir / Khurana, Meenu et al. | 2015
- 847
-
Narrowing awareness gap by using e-learning tools for counselling university entrantsGoyal, Puneet / Kukreja, Tanya / Agarwal, Amit / Khanna, Nitin et al. | 2015
- 852
-
Deployment of secure sharing: Authenticity and authorization using cryptography in cloud environmentUpadhyaya, Akanksha / Bansal, Monika et al. | 2015
- 856
-
Assessment of VoIP E-model over 802.11 wireless mesh networkChhabra, Amit / Singh, Dheerendra et al. | 2015
- 861
-
PAPR improvement in cognitive radio using interleaved SC-FDMASharma, Ashish / Singh, Avinash et al. | 2015
- 866
-
Ensuring privacy in opportunistic networks using dynamic clusteringKaur, Prabhleen / Singh, Jasvir et al. | 2015
- 870
-
LTE interfaces and protocolsDhindsa, Bhavneet / Kaur, Amanpreet / Ahuja, Swaran et al. | 2015
- 875
-
An algorithm to detect malicious nodes in wireless sensor network using enhanced LEACH protocolDas, Semanti / Das, Abhijit et al. | 2015
- 882
-
Energy based proficiency analysis of ad-hoc routing protocols in wireless sensor networksSharma, Rohini / Lobiyal, D. K. et al. | 2015
- 887
-
Section based hybrid routing protocol for WSN using artificial bee colonyKhushboo, Kumari / Daniel, A. K. et al. | 2015
- 893
-
A detection technique for identity based attacks in clustered mobile ad-hoc networksSharma, Tripti / Singh, Leenu et al. | 2015
- 899
-
A review of scalable data sharing techniques for secure cloud storageTripathi, Aditi / Deep Khare, Mayank / Singh, Pradeep Kumar et al. | 2015
- 902
-
A survey on congestion control mechanisms in packet switch networksSingh, Abhay Kumar / Meenu, et al. | 2015
- 907
-
Detection and elimination of the topological threats in mobile ad hoc network: A new approachSingha, Swagata / Das, Abhijit et al. | 2015
- 912
-
Efficiently improving the security of OTPKumar, Devashish / Agrawal, Amit / Goyal, Puneet et al. | 2015
- 916
-
Prevention of shoulder surfing attack using randomized square matrix virtual keyboardNand, Pradyumn / Singh, Prashast Kumar / Aneja, Joy / Dhingra, Yash et al. | 2015
- 921
-
Survey paper on various techniques of recognition and trackingJaiswal, Namrata / Gupta, Vishan Kumar / Mishra, Asmita et al. | 2015
- 926
-
Performance evaluation of PEGASIS protocol for WSN using NS2Sharma, Ishu / Singh, Rajvir / Khurana, Meenu et al. | 2015
- 930
-
Mobility management in heterogeneous wireless networks based on IEEE 802.21 frameworkKumar, Vimal / Gupta, Avadhesh Kumar / Kumar, Satish / Kumar, Vipin et al. | 2015
- 936
-
EEG based stress recognition system based on Indian classical musicNawasalkar, Ram K. / Butey, Pradeep K. / Deshpande, Swapnil G. / Thakare, V. M. et al. | 2015
- 940
-
Tree based energy efficient routing scheme for body area networkJuneja, Priya / Jain, Sushma et al. | 2015
- 948
-
Low power designing in VLSI chipsMalhotra, Navneesh Singh et al. | 2015
- 952
-
ICI cancellation in OFDM by phase rotated data transmissionSingh, Avinash / Sharma, Ashish et al. | 2015
- 957
-
A review on analysis of EEG signalsKaur, Jasjeet / Kaur, Amanpreet et al. | 2015
- 961
-
Design of bit serial parallel multiplier using finite field over GF(2P)Sangole, Amol Mukesh / Ghodeswar, Ujwala et al. | 2015
- 966
-
Black hole attack's effect mobile ad-hoc networks (MANET)Sardana, Anjali / Bedwal, Tushina / Saini, Akanksha / Tayal, Radhika et al. | 2015
- 971
-
Task allocation on cloud resources using analytic network processTripathi, Atul / Vidyathi, Deo Prakash et al. | 2015
- 979
-
Data mining in medicine: Current issues and future trendsBhavya, / Mahak, / Mittal, Pooja et al. | 2015
- 984
-
Development of a Morph Analyser for Nepali noun tokenChhetri, Indira / Dey, Gopa / Das, Sajal Kanti / Borah, Samarjeet et al. | 2015
- 988
-
Theoretical modeling of current measurement in nanoscale device considering Green's function formalismHassan, Asif / Mondol, Raktim Kumar / Jafar, Imran Bin / Shahin, Md. Zahidul Islam et al. | 2015
- 993
-
Analytical formulation of graphene nanoribbon varactor diodeHassan, Asif / Hasan, Zahid / Mondol, Raktim Kumar et al. | 2015
- 997
-
Exhaustive study of SDLC phases and their best praxctices to create CDP model for process improvementLekh, Rachna / Pooja, et al. | 2015
- 1004
-
Developing 3D-Playfair Cipher algorithm using structure rotationSingh, Swati / Singh, Ravindra Kumar / Kaur, Amandeep / Kaur, Dilpreet et al. | 2015
- 1014
-
Web service discovery and integration with QOS parameter using SOA based repositoryTiwari, Vinay Kumar / Gautam, Amit Kumar / Diwaker, Saurabh et al. | 2015
- 1015
-
An enhanced and effective preemption based scheduling for grid computing enabling backfilling techniqueMishra, Anurag et al. | 2015
- 1019
-
Comprehensive set of mutation operators for the determination of adequacy of test setChauhan, Vinita / Chauhan, Vineet / Kashyap, Hema / Singh, Vikas et al. | 2015
- 1024
-
Cardiac image segmentation using Simulated Genetic algorithmSingh, Vijai / Misra, A K / Varsha, et al. | 2015
- 1028
-
Detection of unhealthy region of plant leaves using image processing and genetic algorithmSingh, Vijai / Varsha, / Misra, A K et al. | 2015
- 1033
-
Integration of heterogeneous databasesGarg, Binny / Kaur, Karamjit et al. | 2015