Application of Artificial Neural Networks in optimizing MPPT control for standalone solar PV system (English)
- New search for: Singh, Moirangthem Dennis
- New search for: Shine, V J
- New search for: Janamala, Varaprasad
- New search for: Singh, Moirangthem Dennis
- New search for: Shine, V J
- New search for: Janamala, Varaprasad
In:
2014 International Conference on Contemporary Computing and Informatics (IC3I)
;
162-166
;
2014
-
ISBN:
- Conference paper / Electronic Resource
-
Title:Application of Artificial Neural Networks in optimizing MPPT control for standalone solar PV system
-
Contributors:
-
Published in:
-
Publisher:
- New search for: IEEE
-
Publication date:2014-11-01
-
Size:1922117 byte
-
ISBN:
-
DOI:
-
Type of media:Conference paper
-
Type of material:Electronic Resource
-
Language:English
-
Source:
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Heart function monitoring, prediction and prevention of Heart Attacks: Using Artificial Neural NetworksRavish, D. K. / Shanthi, K.J. / Shenoy, Nayana R / Nisargh, S. et al. | 2014
- 7
-
A cost effective tomato maturity grading system using image processing for farmersRupanagudi, Sudhir Rao / Ranjani, B.S. / Nagaraj, Prathik / Bhat, Varsha G et al. | 2014
- 13
-
Multilevel and multiple approaches for Feature Reweighting to reduce semantic gap using relevance feedbackKumar K., Kranthi / Gopal, T.Venu et al. | 2014
- 24
-
Parameter modeling and simulation of typical non-ideal analog to digital converterTaheri, Sayed Mostafa / Mohammadi, Bahareh et al. | 2014
- 31
-
Bottom-up Pittsburgh approach for discovery of classification rulesSharma, Priyanka / Ratnoo, Saroj et al. | 2014
- 38
-
Predicting the risk of newborns based on fuzzy clustering method with prediction risk assessmentThomas, Jyothi / Kulanthaivel, G. et al. | 2014
- 43
-
Privacy-preserving mining of decision trees using data negation approachDhandhania, R.K. / Baruah, P.K. / Mukkamala, R. et al. | 2014
- 49
-
Big data processing with harnessing hadoop - MapReduce for optimizing analytical workloadsRama Satish, K. V. / Kavya, N. P. et al. | 2014
- 55
-
Design and implementation of Proposed Drawer Model Based Data Warehouse Architecture incorporating DNA Translation cryptographic algorithm for security enhancementChowdhury, Rajdeep / Datta, Soupayan / Dey, Soumya Kanta / Shaw, Sweta et al. | 2014
- 61
-
Service Test Automation FrameworkEeratta, Raghavendra / Shenoy, Sanath S. / Vijeth, C R / John, Nimmy et al. | 2014
- 67
-
The adaptive approach to software reuseKorra, Sampath / Babu, A. Vianaya / Raju, S. Viswanadha et al. | 2014
- 71
-
A Novel approach for classifying software reusable components for upload and downloadJalender, B. / Govardhan, A. / Premchand, P. et al. | 2014
- 76
-
An event based test automation framework for Android mobilesAnbunathan, R / Basu, Anirban et al. | 2014
- 80
-
A trade-off establishment between software complexity and its usability using evolutionary multi-objective optimization (EMO)Yadav, Vandana / Lavania, Siddharth / Chaudhary, Arun / Dhanda, Namrata et al. | 2014
- 83
-
A generic approach for runtime object creation and visualizationShenoy, Sanath S. / Vijeth, C R et al. | 2014
- 88
-
The survivability of computing systemsMurmu, Mahendra Kumar et al. | 2014
- 92
-
Architectural semantics of AADL using Event-BD'Souza, Meenakshi / Ramesh, S. / Satpathy, Manoranjan et al. | 2014
- 98
-
Performance measurements: Proxy server for various operating systemsShiwani, Savita / Kumar, Sandeep / Chandra, Vishal / Bansal, Sunny et al. | 2014
- 103
-
Enhancing security in text messages using matrix based mapping and ElGamal method in elliptic curve cryptographyBalamurugan, R. / Kamalakannan, V. / Rahul, Ganth D. / Tamilselvan, S. et al. | 2014
- 107
-
Improving services using mobile agents-based IoT in a smart cityVerma, Pulkit / Gupta, Mayank / Bhattacharya, Tuhin / Das, Pradip K. et al. | 2014
- 112
-
A novel approach for secure routing protocol: To improve life of networkBhutada, Sunil / Kumar K., Kranthi / Manisha, K. et al. | 2014
- 118
-
Secure and energy efficient routing algorithm for wireless sensor networksMenaria, Vinod Kumar / Soni, Deepak / Nagaraju, A. / Jain, S.C. et al. | 2014
- 124
-
Identifying the behavior: Nodes, Route and Collusion Attack's in MANETKumar K., Kranthi / Laxmi CH., Vasantha / Rao, K. Srinivasa et al. | 2014
- 130
-
Computing in engineering education: The current scenarioRaju, A. B. / Annigeri, Satish et al. | 2014
- 135
-
Book recommendation system based on collaborative filtering and association rule mining for college studentsTewari, Anand Shanker / Priyanka, Kumari et al. | 2014
- 139
-
Opinion based book recommendation using Naive Bayes classifierTewari, Anand Shanker / Ansari, Tasif Sultan / Barman, Asim Gopal et al. | 2014
- 145
-
The construction of an indoor floor plan using a smartphone for future usage of blind indoor navigationJayakody, J.A.D.C. Anuradha / Murray, Iain et al. | 2014
- 157
-
Biometric measurement and classification of IUGR using neural networksBagi, Kumaresha sreeshyala / Shreedhara, K.S. et al. | 2014
- 162
-
Application of Artificial Neural Networks in optimizing MPPT control for standalone solar PV systemSingh, Moirangthem Dennis / Shine, V J / Janamala, Varaprasad et al. | 2014
- 167
-
Comparative analysis of Histogram Equalization techniquesPatel, Surabhi / Goswami, Mausumi et al. | 2014
- 169
-
Noise distribution on various blocks of image and their analysisJaveriya, Gourav Kumar / Gupta, Deepak / Gupta, Shikha / Dahiya, Anil Kumar et al. | 2014
- 175
-
Face recognition: A holistic approach reviewZafaruddin, Ghazi Mohammed / Fadewar, H. S. et al. | 2014
- 179
-
Reordering of delayed strokes for online hindi word recognitionVidya, V / Indhu, T R / Bhadran, V K et al. | 2014
- 187
-
Supervised named entity recognition in Assamese languageTalukdar, Gitimoni / Borah, Pranjal Protim / Baruah, Arup et al. | 2014
- 192
-
Medical decision support system for the missing data using data mining - A surveyTaranath, NL / Patil, Shantakumar B / Patil, Premajyothi / Subbaraya, C.K. et al. | 2014
- 197
-
Player valuation in Indian premier league auction using data mining techniqueKansal, Prince / Kumar, Pankaj / Arya, Himanshu / Methaila, Aditya et al. | 2014
- 204
-
Retrieval of images using data mining techniquesNeethu, Joseph.c / Wilson, Aswathy et al. | 2014
- 209
-
Interestingness of measures: A statistical prospectiveSelvarangam, K / Ramesh Kumar, K et al. | 2014
- 214
-
Resolving data inconsistency in data integrationCarol, I. / Kumar, S. Britto Ramesh et al. | 2014
- 219
-
Experiments on information retrieval mechanisms for distributed biodiversity databases environmentManavalan, / Chattopadhyay, Subrata / Mangala, / Rao, Prahlada / Babu, Sarat Chandra / Kulkarni, Akhil et al. | 2014
- 224
-
An algorithmic approach for analysis of animal movement with granular computing in relation with data miningRawat, Neelam / Sodhi, J.S. / Tyagi, Rajesh K. et al. | 2014
- 230
-
Clustering-based recommender system using principles of voting theoryDas, Joydeep / Mukherjee, Partha / Majumder, Subhashis / Gupta, Prosenjit et al. | 2014
- 236
-
Test driven designKawadkar, Harsha et al. | 2014
- 238
-
An ontology based framework for automatic detection and updation of requirement specificationsBhatia, MPS / Beniwal, Rohit / Kumar, Akshi et al. | 2014
- 243
-
Understanding bug fixes in Ant: An observational studySaha, Shilpi / Majumder, Subhashis / Jain, Samip / Datta, Subhajit et al. | 2014
- 249
-
A hierarchical test case prioritization technique for object oriented softwareVedpal, / Chauhan, Naresh / Kumar, Harish et al. | 2014
- 255
-
A critical analysis of a hierarchy based Usability ModelGupta, Deepak / Ahlawat, Anil / Sagar, Kalpna et al. | 2014
- 267
-
Challenges for software engineering in educational technologiesNori, Kesav V. / Reddy, Y. Raghu / Chimalakonda, Sridhar et al. | 2014
- 273
-
Testability of object-oriented systems: An AHP-based approach for prioritization of metricsKhanna, Priyanksha et al. | 2014
- 282
-
AnglaBharati to AnglaMalayalam: An Experience with English to Indian Language Machine TranslationJayan, V / Bhadran, V K et al. | 2014
- 288
-
Application of artificial immune system approach to develop an algorithm for optimizing multi objective problemsRaheja, Lovely / Lavania, Siddharth / Singh, Sanjeev Kumar / Dhanda, Namrata et al. | 2014
- 293
-
Achieving seamlessness in multi-projector based tiled display using camera feedbackGaur, Pranav Kant / Sarode, Dinesh M. / Shete, Pritam P. / Venkata, P.P.K / Bose, S.K. et al. | 2014
- 299
-
Document classification using Symbolic classifiersRevanasiddappa, M B / Harish, B S / Manjunath, S et al. | 2014
- 304
-
Multiple feature fusion for classification of facial images| 2014
- 308
-
Automatic quality evaluation of fruits using Probabilistic Neural Network approachAshok, Vani / Vinod, D.S. et al. | 2014
- 312
-
A distributed approach for selection of optimal actor nodes in wireless sensor and actor networksRanga, Virender / Dave, Mayank / Verma, Anil Kumar et al. | 2014
- 320
-
Network coding: ABC based COPE in wireless sensor and Mesh networkSingh, Amit / Nagaraju, A et al. | 2014
- 326
-
EFfective Tariff Selection On Cloud Services: A consumer perspectiveSubramanian, Thiruselvan / Savarimuthu, Nickolas et al. | 2014
- 331
-
Federated Intelligent Cloud Service-Oriented Federation in Global Cloud Market with Match-Making Service Broker and Global Workload ManagementSathyanarayanan, S / Sagayaraj, Reynald Susainathan Reni et al. | 2014
- 343
-
Data security in Cloud Computing using Cramer - Shoup cryptosystemRaju, S. / Sirajudeen, Y. Mohamed et al. | 2014
- 347
-
Adv-MMAC: An advertisement based multichannel MAC protocol for wireless sensor networksSwain, Rakesh Ranjan / Mishra, Sonali / Samal, Tushar Kanta / Kabat, Manas Ranjan et al. | 2014
- 353
-
Novel data storage and retrieval in cloud database by using frequent access node encryptionSyed, Sadia / Teja, P. Srinivas et al. | 2014
- 357
-
Ontology based semantic representation for Public Health data integrationRao, Rohini R. / Makkithaya, Krishnamoorthi / Gupta, Neha et al. | 2014
- 363
-
A compact sensor system for concussion mitigation in helmets - A concept prototypeVeena, Divya. K / Devaraj, Deepashree / Rajasree, P.M / Oberoi, Anmol et al. | 2014
- 367
-
Assessment of data quality in Web sites: towards a modelLeite, Patricia / Goncalves, Joaquim / Teixeira, Paulo / Rocha, Alvaro et al. | 2014
- 374
-
Cognitive biometrics based on EEG signalChatra, Ashwini S et al. | 2014
- 377
-
Image retrieval based on image mean mapping methodChary, R. Venkata Ramana / Lakshmi, D. Rajya / Sunitha, K.V.N et al. | 2014
- 383
-
Edge based selective encryption scheme for biometric data using chaotic theoryMehta, Garima / Dutta, Malay Kishore / Travieso-Gonzalez, Carlos M. / Kim, Pyung Soo et al. | 2014
- 387
-
A novel approach for latent to rolled fingerprint matchingChaudhari, Ganesh N. / Wagh, R.B. et al. | 2014
- 392
-
Neural network framework for multilingual Web documentsPrakash, Kolla Bhanu / Ananthan, T V / Rajavarman, V N et al. | 2014
- 398
-
A study of recent advances in cache memoriesBanday, M. Tariq / Khan, Munis et al. | 2014
- 404
-
System simulation approach for helicopter autopilotJamadagni, Chinmayi S / Chethan, C U / Jeppu, YV / Kamble, Sagar B / Desai, Vijay H et al. | 2014
- 409
-
FPGA implementation of enhanced key expansion algorithm for Advanced Encryption StandardGandh, D.Rahul / Kamalakannan, V. / Balamurugan, R. / Tamilselvan, S. et al. | 2014
- 414
-
Mission critical software test philosophy a SILS based approach in Indian Mars Orbiter MissionSumith Shankar, S / Desai, Kiran / Dutta, Shuvo / Chetwani, Rajiv R / Ravindra, M. / Bharadwaj, K.M. et al. | 2014
- 426
-
Performance analysis of fuel cell assisted distributed generation systemChahar, Kishore / Maurya, Ajay Kumar / Chaturvedi, Abhishek et al. | 2014
- 430
-
An efficient recall in diversified training samples using Bidirectional Associative MemoryAkhila, / Shivamurthy, P M et al. | 2014
- 434
-
Twofold classification of motor imagery using common spatial patternMohanchandra, Kusuma / Saha, Snehanshu / Deshmukh, Rashmi et al. | 2014
- 440
-
Data aggregation using doped turbo codesKulkarni, Archana R / Pallavi, Andhe et al. | 2014
- 446
-
Key management schemes for secure group communication in wireless networks - A surveyRenugadevi, N. / Swaminathan, G. / Kumar, Aditya S et al. | 2014
- 451
-
A soft-demapper for coded MIMO-OFDM systemChavali, Nanda Kishore / Yalla, Anvesh Reddy et al. | 2014
- 458
-
A complex Ferrari LPC to LSF implementationDomadiya, Jatin V. / Kandagal, Amaresh P. / Ramesh, N. et al. | 2014
- 463
-
A novel approach based on 2D - DWT and variance method for human detection and tracking in video surveillance applicationsGangal, P. P. / Satpute, V. R. / Kulat, K. D. / Keskar, A. G. et al. | 2014
- 469
-
Analysis and performance evaluation of various image segmentation methodsMageswari, S. Umaa / Mala, C. et al. | 2014
- 475
-
New proposed practice for secure image combing cryptography stegnography and watermarking based on various parametersGupta, Rupesh / Singh, Tanu Preet et al. | 2014
- 480
-
An efficient automatic method of Optic disc segmentation using region growing technique in retinal imagesSingh, Anushikha / Dutta, Malay Kishore / Parthasarathi, M. / Burget, Radim / Riha, Kamil et al. | 2014
- 485
-
Clustering based - A FAST algorithm on high dimensional dataKadam, Sonali P. / Varsha S., Naikwadi / Kaveree S., Belamkar / Aruna S., Andhare / Mayuri M., Mohite et al. | 2014
- 490
-
Proposed novel schema design for map generation to assist vision impaired in an indoor navigation environmentJayakody, J.A.D.C.Anuradha / Murray, Iain et al. | 2014
- 495
-
Analysis of robotic environment using low resolution image sequenceSreedharan, Swetha / Radhakrishnan, G / Gupta, Deepa / Sudarshan, TSB et al. | 2014
- 503
-
Quality assessment of stereo images using reduced reference based on saliency regionBoaz, Too Kipyego / Prabhakar, C. J. et al. | 2014
- 509
-
A secure and high payload digital audio watermarking using features from iris imageKaur, Arashdeep / Dutta, Malay Kishore / Soni, K.M. / Taneja, Nidhi et al. | 2014
- 513
-
ANN based semantic Content Based Image Retrieval with distributed processingKarande, Supriya Jalindar / Maral, Vikas et al. | 2014
- 517
-
Imperceptible digital watermarking in medical retinal images for tele-medicine applicationsDutta, Malay Kishore / Singh, Anushikha / Parthasarathi, M. / Travieso, Carlos M. et al. | 2014
- 522
-
Fingerprint identification using feature extraction: A surveyShrivastava, Ankit / Srivastava, Devesh Kumar et al. | 2014
- 526
-
An adaptive skin color model for a human face detectionDanti, Vasavi N. / Kadiyavar, Pratibha T. et al. | 2014
- 533
-
A two stage Braille Character segmentation approach for embossed double sided Hindi Devanagari Braille documentsShreekanth, T. / Udayashankara, V. et al. | 2014
- 539
-
Coordination of mobile robots with master-slave architecture for a service applicationAnand, A. / Nithya, M. / Sudarshan, TSB et al. | 2014
- 544
-
Efficient implementation of 8-bit vedic multipliers for image processing applicationVijayan, Aravind E / John, Arlene / Sen, Deepak et al. | 2014
- 553
-
Adaptive checkpointing for fault tolerance in an autonomous mobile computing gridJaggi, Parmeet Kaur / Singh, Awadhesh Kumar et al. | 2014
- 558
-
Mouse Brace: A convenient computer mouse using accelerometer, flex sensors and microcontrollerBerlia, Rishabh / Santosh, Pallavi et al. | 2014
- 562
-
Implementation of secure customized monitoring tool for adapative distributed systemsKotari, Manjunath / Chiplunkar, Niranjan N. / Nagesh, H R et al. | 2014
- 568
-
A collaborative filtering recommendation engine in a distributed environmentGhuli, Poonam / Ghosh, Atanu / Shettar, Rajashree et al. | 2014
- 575
-
Biometric person authentication: A reviewRaju, A S / Udayashankara, V et al. | 2014
- 581
-
An investigation of combining gradient descriptor and diverse classifiers to improve object taxonomy in very large image datasetAnusha, T.R / Hemavathi, N / Mahantesh, K / Chetana, R et al. | 2014
- 586
-
Text and script independent writer identificationDhandra, B.V. / Vijayalaxmi, M.B. et al. | 2014
- 603
-
Performance assessment of different image sizes for printed Gujarati and English digits using template matchingChaudhari, Shailesh A. / Gulati, Ravi M. et al. | 2014
- 609
-
Compression of images represented in hexagonal lattice using wavelet and gabor filterJeevan, K.M. / Krishnakumar, S. et al. | 2014
- 614
-
Implementation of improved Robust Energy Efficient Routing protocolMadhu, B.M. / Abhilash, C B et al. | 2014
- 619
-
Quantitative assessment of TV white spaces for cognitive radio networks in IndiaDeshmukh, Madhukar / Patil, Kishor P. / Kharote, Sujay / Jadhav, Akshay / Maskar, Shantanu et al. | 2014
- 625
-
Spatial DSDV (S-DSDV) routing algorithm for mobile ad hoc networkManjunath, M / Manjaiah, D.H et al. | 2014
- 630
-
An impact of grid based approach in offline handwritten Kannada word recognitionPatel, M.S. / Reddy, Sanjay Linga et al. | 2014
- 634
-
Wireless requirements and challenges in Industry 4.0Varghese, Anitha / Tandur, Deepaknath et al. | 2014
- 639
-
NFC technology: Current and future trends in IndiaDhar, Sudipta / Dasgupta, Aniruddha et al. | 2014
- 645
-
Neuro-fuzzy design of a fuzzy PI controller with real-time implementation on a speed control systemGhosh, Arijit / Sen, Satyaki / Dey, Chanchal et al. | 2014
- 651
-
Parallel processors for high speed multiple objects recognitionRasiq, S.M / Krishnakumar, S. et al. | 2014
- 657
-
Recognition of ancient Kannada Epigraphs using fuzzy-based approachSoumya, A / Kumar, G Hemantha et al. | 2014
- 670
-
An unsupervised intelligent system to detect fabrication in photocopy document using variations in Bounding Box featuresPatgar, Suman V / Rani, K / Vasudev, T et al. | 2014
- 676
-
Temporal pattern mining in an object set having irregular layered structure by using SASK algorithmKothuri, Sriraman / Mattupalli, Komal Teja et al. | 2014
- 682
-
Cognitive computing simulator-COMPASSVarghese, Dany / Shankar, Viju et al. | 2014
- 688
-
Structured Intelligent Search Engine for effective information retrieval using query clustering technique and Semantic WebPrakasha, S / Shashidhar, HR / Raju, G T et al. | 2014
- 696
-
Multilingual e-mail classification using Bayesian filtering and language translationBanday, M. Tariq / Sheikh, Shafiya Afzal et al. | 2014
- 702
-
Preventing input type validation vulnerabilities using network based intrusion detection systemsSunkari, Venkatramulu / Rao, C.V.Guru et al. | 2014
- 707
-
S/MIME with multiple e-mail address certificates: A usability studyBanday, M. Tariq / Sheikh, Shafiya Afzal et al. | 2014
- 714
-
E3BFT: Energy efficient and energy balanced fault tolerance clustering in Wireless Sensor NetworksGupta, Suneet K. / Kuila, Pratyay / Jana, Prasanta K. et al. | 2014
- 720
-
A review of theatmospheric effects on radiopath lossin cellular mobile communication systemHanchinal, C S / Muralidhara, K.N. et al. | 2014
- 724
-
Darideepa: A Mobile Application for bus notification systemSneha, M / Urs, Chaitra N / Chatterji, Sourindra / Srivatsa, M S / Pareekshith, K J / Amith Kashyap, H et al. | 2014
- 728
-
Survey on skin based face detection on different illumination, poses and occlusionRajeshwari, J. / Karibasappa, K. / GopalKrishna, M.T et al. | 2014
- 734
-
Image resolution enhancement using undecimated double density dual tree wavelet transformVijayan, Mithun / Josemartin, M J / Geetharanjin, P R et al. | 2014
- 740
-
Automatic segmentation and classification of mitotic cell nuclei in histopathology images based on Active Contour ModelBeevi K., Sabeena / Nair, Madhu S. / Bindu, G. R. et al. | 2014
- 745
-
Depth recovery from stereo imagesInduchoodan, P R / Josemartin, M J / Geetharanjin, P R et al. | 2014
- 751
-
Modified Eight-Directional Canny for Robust Edge DetectionShanmugavadivu, P. / Kumar, Ashish et al. | 2014
- 757
-
Fractal dimension for drowsiness detection in brainwavesPavithra, M / NiranjanaKrupa, B / Sasidharan, Arun / Kutty, Bindu M / Lakkannavar, Manjunath et al. | 2014
- 762
-
An analysis of routing and security protocols in oppurtunstic computingHegde, Seema B / Babu, B. Sathish et al. | 2014
- 768
-
Protection of shared data among multiple users for online social networksGanesh, D. / RamaPrasad, V. V. et al. | 2014
- 774
-
Design of optimized reversible binary adder/subtractor and BCD adderNagamani, A N / Ashwin, S / Agrawal, Vinod Kumar et al. | 2014
- 780
-
Design of a secure architecture for context-aware Web Services using access control mechanismCharles, P.Joseph / Kumar, S.Britto Ramesh et al. | 2014
- 785
-
Effect of varying the size of initial parent pool in genetic algorithmKanika, / Gupta, Rajiv et al. | 2014
- 789
-
Mutual information based weighted fuzzy clusteringJayabal, Yogalakshmi / Ramanathan, Chandrashekar et al. | 2014
- 795
-
Refinement of data streams using Minimum Variance principleDhotre, Virendrakumar / Karande, Kailash et al. | 2014
- 800
-
Business intelligence from online product review-a rough set based rule induction approachDas, T. K. / Acharjya, D. P. / Patra, M. R. et al. | 2014
- 804
-
Efficient sensor node determination using proteusSittalatchoumy, R. / Sivakumar, L. et al. | 2014
- 811
-
Modeling Chinese wall access control using formal concept analysisMouliswaran, S. Chandra / Kumar, Ch. Aswani / Chandrasekar, C. et al. | 2014
- 817
-
Energy Efficient Reliable Routing through Dynamic Spectrum Management in Cognitive Radio Sensor NetworksSheelavant, Kumaresh / Sumathi, R. et al. | 2014
- 823
-
Image encryption scheme with key sequences based on Chaotic functionsShruthi, K. M. / Sheela, S. / Sathyanarayana, S. V. et al. | 2014
- 828
-
Exploiting node heterogeneity for time synchronization in low power sensor networksYadav, Akash / Waghmare, Anandghan / Sairam, Ashok Singh et al. | 2014
- 833
-
Orchestration of cloud computing virtual resourcesKatyal, Mayanka / Mishra, Atul et al. | 2014
- 839
-
Reversible data hiding in encrypted images by active block exchange and room reservationMathew, Tojo / Wilscy, M. et al. | 2014
- 845
-
Extraction of curvelet based RLBP features for representation of facial expressionNagaraja, S. / Prabhakar, C.J. et al. | 2014
- 851
-
Human recognition for surveillance systems using bounding boxDeepak, P. / Krishnakumar, S. / Suresh, Smitha et al. | 2014
- 857
-
Template matching method for Kannada Handwritten recognition based on correlation analysisAravinda, C.V / Prakash, H.N. et al. | 2014
- 862
-
Comparative analysis of demosaicking techniques for Mars Colour Camera dataRoy, Sampa / Moorthi, S.M. / Dhar, Debajyoti / Sarkar, S. S. et al. | 2014
- 868
-
ASIC implementation of image enhancement technique for Fingerprint recognition processGayathri, S. / Sridhar, V. et al. | 2014
- 874
-
Smart home and smart city solutions enabled by 5G, IoT, AAI and CoT servicesSkouby, K E / Lynggaard, P et al. | 2014
- 879
-
Intrusion detection model using fusion of PCA and optimized SVMThaseen, I. Sumaiya / Kumar, Ch.Aswani et al. | 2014
- 885
-
A novel cross layer wireless mesh network protocol for distributed generation in electrical networksVambase, S. V. / Mangalwede, S. R. et al. | 2014
- 894
-
An improved and optimized approach for pre-emptive migration of video processSandhya, S / Cauvery, N. K. et al. | 2014
- 899
-
Efficient cooperative spectrum sensing in Cognitive Radio using coalitional game modelBalaji, V. / Hota, Chittaranjan et al. | 2014
- 908
-
A decision level fusion of morphology based Pattern Spectrum and IDSC for shape representation and classificationShekar, B. H. / Pilar, Bharathi et al. | 2014
- 915
-
Blood vessels segmentation with GUI in digital fundus images for automated detection of diabetic retinopathyDevaraj, Deepashree / Prasanna Kumar, S.C. et al. | 2014
- 921
-
Intelligent sensing systems for adjusting temperatures in air conditionersAkhila, / Divakara, N et al. | 2014
- 923
-
MAP-MRF approach for image denoisingAravind, B N / Suresh, K V et al. | 2014
- 928
-
Depression level prediction using EEG signal processingMallikarjun, H M / Suresh, H N et al. | 2014
- 934
-
Using novelty score of unseen items to handle popularity bias in recommender systemsBedi, Punam / Gautam, Anjali / Richa, / Sharma, Chhavi et al. | 2014
- 940
-
Automatic bimodal audiovisual speech recognition: A reviewKandagal, Amaresh P / Udayashankara, V et al. | 2014
- 946
-
Assamese Word Sense Disambiguation using Supervised LearningBorah, Pranjal Protim / Talukdar, Gitimoni / Baruah, Arup et al. | 2014
- 951
-
Data mining algorithms for Web-services classificationSyed Mustafa, A / Kumaraswamy, Y.S. et al. | 2014
- 957
-
Improving the speed of the Method of Moments technique in large body scattering problems using the sparse matrix methodRaju, A. Upendra / Balakrishnan, Jyothi et al. | 2014
- 962
-
Feature selection using game theory for phoneme based speech recognitionRekha, J. Ujwala / Chatrapati, K. Shahu / Babu, A. Vinaya et al. | 2014
- 967
-
SAHI vs. Selenium: A comparative analysisNaidu, Thanuja Janarthana / Basri, Nor Asyikin / Nagenthram, Saravanan et al. | 2014
- 971
-
Live forensics analysis: Violations of business security policyTanwar, Govind Singh / Poonia, Ajeet Singh et al. | 2014
- 977
-
Survey on interoperability, security, trust, privacy standardization of cloud computingSaravanakumar, C. / Arun, C. et al. | 2014
- 983
-
Flexible microstrip patch antenna using rubber substrate for WBAN applicationsKurian, Jobin / Rajan M.N., Upama / Sukumaran, Shinoj K. et al. | 2014
- 987
-
Adaptive Fuzzy Neural Network Model for intrusion detectionKumar, K. S. Anil / Mohan, V. Nanda et al. | 2014
- 992
-
Modified trial division algorithm using KNJ-factorization method to factorize RSA public key encryptionLal, Nidhi / Singh, Anurag Prakash / Kumar, Shishupal et al. | 2014
- 996
-
A survey on spectrum handoff techniques in cognitive radio networksMaheshwari, Pushp / Singh, Awadhesh Kumar et al. | 2014
- 1002
-
Emerging trends of location privacy techniques in location aided applicationsJagdale, B.N. / Bakal, J. W. et al. | 2014
- 1007
-
Queuing strategies for self overload control in SIP serversGuduru, Kiran Kumar / Usha, J. et al. | 2014
- 1012
-
Early diagnosis of primary tumor in brain MRI images using wavelet as the input of Ada-Boost classifierAjikumar, S. / Jayachandran, A. et al. | 2014
- 1022
-
A composite image cipher using DNA sequence and genetic algorithmSaranya, M R / Mohan, Arun K / Anusudha, K et al. | 2014
- 1032
-
Microarray data classification using Fuzzy K-Nearest NeighborKumar, Mukesh / Rath, Santanu Ku. et al. | 2014
- 1039
-
OLDA based online handwriting recogntionPrasad, M. Mahadeva et al. | 2014
- 1042
-
An algorithm for enhanced image security with reversible data hidingMohan, Arun K / Saranya, M R / Anusudha, K. et al. | 2014
- 1046
-
Real-time EEG based object recognition system using Brain Computer InterfaceAnupama, H.S. / Cauvery, N.K. / Lingaraju, G.M. et al. | 2014
- 1052
-
Game Theoretical and Generic approaches for selfish node avoidance in ad hoc networksSultana, Shabana / Raj, C. Vidya et al. | 2014
- 1059
-
On optimal power allocation for minimizing interferene in relay assisted cognitive radio networksMaity, Seba / Maji, Chinmoy et al. | 2014
- 1065
-
Dissecting SMS malwares in androidBabu, Anoop Joseph / Raveendranath, Rahul / Rajamani, Venkiteswaran / Datta, Soumya Kanti et al. | 2014
- 1070
-
Framework for Pairwise key establishment in wireless sensor networksNirmala, M.B / Manjunath, A.S et al. | 2014
- 1076
-
Designing challenges to utilize white-space for configurable femtocell base on slotted TDMWyawahare, Nikhil P. / Haridas, S.L. et al. | 2014
- 1087
-
A trust based secure gateway selection and authentication scheme in MANETGupta, Amit Kumar / Kumar, Rakesh / Gupta, Naveen Kumar et al. | 2014
- 1094
-
Green computing a way towards environmentally sustainable futureRanbhise, Prajyot et al. | 2014
- 1101
-
Power cognizant algorithms using slack reclamation methodBeena, B M / Prashanth, C.S.R et al. | 2014
- 1107
-
Analysis of information diffusion in dynamic information networksSarna, Geetika / Walia, Rhythm / Bhatia, MPS et al. | 2014
- 1112
-
Web based and voice enabled IVRS for large scale Malayalam speech data collectiondevi P, Shobana / DivyaDas, / Stephen, Jose / Bhadran, V K et al. | 2014
- 1118
-
Fusion of Pearson similarity and Slope One methods for QoS prediction for web servicesVadivelou, G. / Ilavarasan, E. et al. | 2014
- 1125
-
Possibilistic Fuzzy C-means clustering on medical diagnostic systemsSimhachalam, B. / Ganesan, G. et al. | 2014
- 1135
-
Recipe of speech compression using coiflet waveletNarkhedkar, Snehanka G. / Patel, Pramod Kumar et al. | 2014
- 1140
-
An improved honey bees life scheduling algorithm for a public cloudGarg, Anjuli / Krishna, C. Rama et al. | 2014
- 1148
-
Automatic detection of red lesions in digital color retinal imagesSharath Kumar, P N / Rajesh Kumar, R / Sathar, Anuja / Sahasranamam, V et al. | 2014
- 1154
-
An application of Fourier statistical features in scene text detectionVinod, H.C. / Niranjan, S.K. / Manjunath Aradhya, V.N. et al. | 2014
- 1160
-
Segmentation of noisy PET images using Bayesian mattingRenukalatha, S. / Suresh, K.V. et al. | 2014
- 1175
-
Localization of vehicle number plate based on watershed transform and visualization techniqueVeena, M.N / Vasudev, T. et al. | 2014
- 1182
-
Modified differential evolution based 0/1 clustering for classification of data points: Using modified new point symmetry based distance and dynamically controlled parametersSingh, Vikram / Saha, Sriparna et al. | 2014
- 1188
-
Easy optimization of image transformation using sFFT algorithm with HALIDE languageThirumoorthi, C. / Karthikeyan, T. et al. | 2014
- 1191
-
An approach for face detection using artificial intelligenceBhat, Vandana S. / Pujari, Jagadeesh D. et al. | 2014
- 1198
-
Granular neural networks models with class-belonging granulationKumar, D. Arun / Meher, Saroj K. et al. | 2014
- 1203
-
Video retrieval: An accurate approach based on Kirsch descriptorShekar, B H / Holla, K Raghurama / Kumari, M Sharmila et al. | 2014
- 1208
-
Achieving stability of ECG biometric features through binaural brain entrainmentPalaniappan, Ramaswamy / Andrews, Samraj et al. | 2014
- 1211
-
Personal informatics weave your numbersAnbalagan, Sanjay Krishna / Grinstein, George / Purushe, Shweta et al. | 2014
- 1215
-
Identification of vegetation from satellite derived hyper spectral indicesNandibewoor, Archana / Adiver, Prashanth / Hegadi, Ravindra et al. | 2014
- 1220
-
An efficient rule acquisition method using type - 2 fuzzy rough ontologyDevadoss, Nilavu / Ramakrishnan, Sivakumar et al. | 2014
- 1226
-
Mixed random 128 bit key using finger print features and binding key for AES algorithmPriya, S. Sridevi Sathya / Karthigaikumar, P. / Mangai, N.M. Siva et al. | 2014
- 1231
-
OFDM channel estimation using total variation minimization in compressed sensingManu, K. M. / Nelson, K. J. et al. | 2014
- 1235
-
An Android approach for Wireless power harvesting from Radio wavesDubey, Varsha / Sangeeth Sagar, V R / Sumalya, Shubham / Abhilash, C B et al. | 2014
- 1240
-
Performance analysis of WDM link using Dispersion Compensating Fiber at different wavelengthsSoni, Gaurav / Kaur, Rupinderjit et al. | 2014
- 1245
-
Performance analysis of inter-satellite optical wireless communication (IsOWC) system at 980 nm and 1550 nm wavelengthsKaur, Navjot / Soni, Gaurav et al. | 2014
- 1251
-
Performance analysis of Free Space Optics link at different data ratesSoni, Gaurav / Banga, Vijay Kumar et al. | 2014
- 1256
-
Artificial Intelligence guidance for Unmanned Aerial Vehicles in three dimensional spaceChithapuram, Chethan / Jeppu, Yogananda V. / Kumar, Ch. Aswani et al. | 2014
- 1262
-
Information retrieval through the fusion of multi-sensors data over multi-resolutionsRao, C.V. / Rao, J. Malleswara / Kumar, A. Senthil / Lakshmi, B. / Dadhwal, V.K. et al. | 2014
- 1268
-
Using K-means cluster based techniques in external plagiarism detectionVani, K / Gupta, Deepa et al. | 2014
- 1274
-
Recognition of similar patterns in popular Hindi Jazz songs by music data miningBagul, Mitali / Soni, Divya / Saravanakumar, K et al. | 2014
- 1279
-
Debugging using MD5 process firewallOm Kumar, C.U. / Kishore, S. / Geetha, A. et al. | 2014
- 1285
-
Malware detection by token countingPoonia, Ajeet Singh / Singh, Shivraj et al. | 2014
- 1289
-
A precedence based load balancing strategy for batch of DAGs for computational gridShahid, Mohammad / Raza, Zahid et al. | 2014
- 1296
-
An energy efficient remote user authentication scheme preserving user anonymityBapana, Surekha / Narayana, K. Lakshmi / Vorugunti, Chandra Sekhar et al. | 2014
- 1302
-
A green greedy process scheduler for cloud data centersKarthik, C / Gupta, Aayush / Chandrasekaran, K et al. | 2014
- 1310
-
Printed monopole UWB antenna with EBG structure for Wireless Body Area NetworkReghunath, Vijai / Sukumaran, Shinoj K. et al. | 2014
- 1315
-
Robust classification of primary brain tumor in Computer Tomography images using K-NN and linear SVMSundararaj, G. Kharmega / Balamurugan, V. et al. | 2014
- 1320
-
High performance single and multi-GPU acceleration for Diffuse Optical TomographySaikia, Manob Jyoti / Kanhirodan, Rajan et al. | 2014
- 1324
-
An Approach for Designing of Sequence Generator by Counter and Multiplexer of Reversible GatesMamataj, Shefali / Das, Biswajit / Chandran, Saravanan et al. | 2014
- 1330
-
Quantum cost realization of new reversible functions using ESOP based synthesisJayashree, H. V / Agrawal, V K / Kumari, Deepika et al. | 2014
- 1336
-
Irrigation control system using distributed embedded systemLad, Hiteshkumar J. / Joshi, Vibhutikumar G. et al. | 2014
- 1340
-
An expert system based on texture features and decision tree classifier for diagnosis of tumor in brain MR imagesSundararaj, G. Kharmega / Balamurugan, V. et al. | 2014
- 1345
-
Symmetric Key Image Encryption Scheme with Key Sequences Derived from Random Sequence of Cyclic Elliptic Curve Points over GF(p)Sowmya, S / Sathyanarayana, S. V. et al. | 2014
- 1351
-
A steganographic system for embedding image and encrypted textPriyanka, B G / Sathyanarayana, S. V. et al. | 2014
- 1356
-
Security analysis of TLS authenticationRanjan, Aditya Kaushal / Kumar, Vijay / Hussain, Muzzammil et al. | 2014
- 1361
-
Enhanced authentication technique for next generation 3GPP networksGururaj, H L / Sunitha, R / Ramesh, B et al. | 2014
- 1366
-
Performance comparison of HOVA and SOVA for image transmission in AWGN channelViraktamath, S. V. / Kotihal, Akshata / Attimarad, Girish V. et al. | 2014
- 1370
-
Impact of interleaver and trace back length on performance of CODEC for burst errorsViraktamath, S. V. / Sakaray, Divya / Attimarad, Girish V. et al. | 2014
- 1374
-
Assistive social robots for people with special needsMagnenat-Thalmann, Nadia / Zhang, Zhijun et al. | 2014
- 1381
-
Uberveillance and the Internet of Things and peopleMichael, M.G. / Michael, Katina / Perakslis, Christine et al. | 2014
- i
-
Front matters| 2014