Ant Colony based Dynamic source routing for VANET (English)
- New search for: Rajesh Kumar M,
- New search for: Routray, Sudhir K.
- New search for: Rajesh Kumar M,
- New search for: Routray, Sudhir K.
In:
2016 2nd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT)
;
279-282
;
2016
- Conference paper / Electronic Resource
-
Title:Ant Colony based Dynamic source routing for VANET
-
Contributors:Rajesh Kumar M, ( author ) / Routray, Sudhir K. ( author )
-
Published in:
-
Publisher:
- New search for: IEEE
-
Publication date:2016-01-01
-
Size:810977 byte
-
ISBN:
-
DOI:
-
Type of media:Conference paper
-
Type of material:Electronic Resource
-
Language:English
-
Source:
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Novel fuzzy classification approaches based on optimisation of association rulesKumar, Pullela S V V S R / Maddireddi, L R D Prasad / Lakshmi, V Anantha / Dirisala, Jeji Nagendra Kumar et al. | 2016
- 6
-
Estimation of Teager Energy using EMDRamakrishna, G. / Padmaja, N. et al. | 2016
- 12
-
Multimodal biometric system using index based algorithm for fast searchDivakar, Meghana A et al. | 2016
- 18
-
Traffic priority based gateway selection in Integrated Internet-MANETZaman, Rafi U / Khan, Khaleel ur Rahman / Waseem, M.A. / Farokhi, Ayesha / Reddy, A. Venugopal et al. | 2016
- 22
-
Dual layered secure algorithm for image steganographyGowda, Shreyank N et al. | 2016
- 25
-
Supervised Learning techniques for analysis of neonatal dataShirwaikar, Rudresh D. / Mago, Nikhit / Dinesh Acharya U, / Makkithaya, Krishnamoorthi / Govardhan Hegde K, et al. | 2016
- 32
-
A hybrid RSA and RC6 based secure image cryptography to minimize entropy and enhance correlationChaturvedi, Pooja / Jain, Dinesh Chandra et al. | 2016
- 38
-
Text mining: An improvised feature based model approachShivaprasad KM, / Reddy, T Hanumantha et al. | 2016
- 43
-
Different types of wearable sensors and health monitoring systems: A surveyBhelkar, Vaibhavi / Shedge, D.K et al. | 2016
- 49
-
A theoretical proposition to characterize speed based performance of Bulk transaction in Universal Serial Bus 3.0 SuperSpeed protocolAdithya Rangan C.K., / Kulkarni, Vikas / Shashidhara H. R., et al. | 2016
- 55
-
Performance evaluation of MANET protocols: A propagation model perspectiveNaseeruddin, / Patil, Venkanagouda C et al. | 2016
- 62
-
Bandwidth utilization in Wireless Sensor Networks with priority based multi-stack architecturePanimozhi, K. / Mahadevan, G. et al. | 2016
- 68
-
A trust-based scheme against Packet dropping attacks in MANETsShah, Sachi N. / Jhaveri, Rutvij H. et al. | 2016
- 76
-
Novel approach for detecting malicious activity in WSN using securing schemePavan Kumar S, / Nandini Prasad K S, et al. | 2016
- 81
-
A review on reconfigurable orthogonal frequency division multiplexing (OFDM) system for wireless communicationDrakshayini M N, / Singh, Arun Vikas et al. | 2016
- 85
-
An Adaptive Hypermedia Instructional FrameworkKhan, Mohd Javed / Mustafa, K. et al. | 2016
- 94
-
Enhancing security of Docker using Linux hardening techniquesAmith Raj MP, / Kumar, Ashok / Pai, Sahithya J / Gopal, Ashika et al. | 2016
- 100
-
Development of photovoltaic module tracking and web based data acquisition systemKhera, Neeraj / Singh, Saarthak / Sharma, Akhil / Kumar, Sheetal et al. | 2016
- 104
-
Wi-Fi Central Server integrated with Cloud for Collaborative e-Learning as a Service SystemNaik, N. Venkatesh / Madhavi, K. et al. | 2016
- 109
-
Adaptation Trust based Protocol for IoT using Smartphones in social media: Travel map guideVidya M N, / Nandini Prasad K.S, et al. | 2016
- 114
-
Comparison of algorithms for segmentation of blood vessels in fundus imagesPrakash, Tejaswi D. / Rajashekar, Deepthi / Srinivasa, Gowri et al. | 2016
- 119
-
Study of Indian Classical Ragas Structure and its Influence on Human Body for Music TherapyBardekar, A.A. / Gurjar, Ajay. A. et al. | 2016
- 124
-
A real-time distributed hardware health monitoring frameworkVenkata, Sai Santhan Kusam / Bharadwaj, Jahnavi / Dobbie, Gillian / Manoharan, Sathiamoorthy et al. | 2016
- 130
-
Agile: Adapting to need of the hour: Understanding Agile methodology and Agile techniquesSunner, Daminderjit et al. | 2016
- 136
-
Simultaneous mapping and navigation for rendezvous in space applicationsJahagirdar, Nandakishor / Hiremath, Anand / Sudeesh B, et al. | 2016
- 139
-
Prediction of Web Service response time using Grey system modelUma, S. / Geetha, D. Evangelin / Kumar, T. V. Suresh et al. | 2016
- 144
-
Underwater wireless sensor localization scheme in distributed networksYashwanth N, / Sujatha, B R et al. | 2016
- 150
-
Design of cluster-chain based WSN for energy efficiencySen, Soumita / Chowdhury, Chandreyee / Neogy, Sarmistha et al. | 2016
- 155
-
Wireless Sensor Network based Water Monitoring Systems: A surveyPujar, Prasad. M. / Kenchannavar, Harish. H. / Kulkarni, U. P. et al. | 2016
- 160
-
A survey on energy efficient routing protocol for MANETDodke, Siddhant / Mane, P. B. / Vanjale, M.S. et al. | 2016
- 165
-
Ferry based data gathering in Wireless Sensor NetworksVanarotti, Gurudevi C. / Kulkarni, Umesh M. / Kenchannavar, Harish H. et al. | 2016
- 171
-
Design and analysis of AC to DC converters for input Power Factor CorrectionArora, Khushboo / Katiyar, Sapna / Patel, Rachit et al. | 2016
- 177
-
Texture primitive unit extraction using different wavelet transforms for texture classificationKumar, Pullela S V V S R / Sekhararao, Vasamsetti. Ch. / Ramadevi, Ayanavalli / Swathi, Ch. N.Durga / Mallidi, P Raviraja Reddy et al. | 2016
- 182
-
A frequency-domain adaptive filter (FDAF) prediction error method and ARLS for speech echo cancellationPraveen N, / Ranjitha S, / Suresh, H N et al. | 2016
- 188
-
Nighttime vehicle detection for intelligent headlight control: A reviewSevekar, Pushkar / Dhonde, S. B. et al. | 2016
- 191
-
Development of robust VAD schemes for Voice Operated Switch application in aircrafts: Comparison of real-time VAD schemes which are based on Linear Energy-based Detector, Fuzzy Logic and Artificial Neural NetworksBharath Y.K, / Veena S, / Nagalakshmi K.V, / Darshan, Manjunath / Nagapadma, Rohini et al. | 2016
- 196
-
Analysis of crowd sourced soil data for small scale ginger farmsSharma, Surabhi / Kausthub Naarayan B, / Rajeshwari K, et al. | 2016
- 201
-
Continuous RF monitoringJadhav, Aditya V. / Patil, Ajinkya P. / Ajwilkar, Pratik G. / Nadkarni, Rugved N. / Bhise, Suvarna et al. | 2016
- 207
-
Wireless interface of servo motors using potentiometers via Bluetooth module and RFGourav, Ankit / Madhu B M, / Kumar, Prince et al. | 2016
- 211
-
Context based in-patient monitoring systemChandra Prabha K. S., / Chittaragi, Nagaratna B. / Pushpa G., / Venkataram, Pallapa et al. | 2016
- 216
-
Bitcoins and secure financial transaction processing, recent advancesQuamara, Sidharth / Singh, Awadhesh Kumar et al. | 2016
- 220
-
Deep learning algorithms based text classifierVenkataraman, Arthi et al. | 2016
- 225
-
Analysis and prevention of wormhole attack using trust and reputation management scheme in MANETParbin, Shabina / Mahor, Leeladhar et al. | 2016
- 229
-
Biometric authentication using near infrared hand vein pattern with adaptive threshold techniqueDruva Kumar L, / Alavalapati, Goutham Reddy et al. | 2016
- 235
-
Extenuate DDoS attacks in CloudKiranmai, B. / Damodaram, A. et al. | 2016
- 239
-
Efficient Incremental Itemset Tree for approximate Frequent Itemset mining on Data StreamPavitra Bai S, / Ravi Kumar G K, et al. | 2016
- 243
-
Efficient pairing computation for Attribute Based Encryption using MBNR for Big Data in cloudChandrasekaran, Balaji / Balakrishnan, Ramadoss et al. | 2016
- 248
-
Bearing fault detection using PCA and Wavelet based envelope analysisChopade, Smita A. / Gaikwad, Jitendra A. / Kulkarni, Jayant V. et al. | 2016
- 254
-
Open CV pattern based smart bank security system with theft & identification using AndroidBlessed Joshua A., / Jenita Grace J., / George, Allan Mary et al. | 2016
- 258
-
Architectural based congestion management for Network on Chip implemented on FPGAKavyashree G S, / Bhusare, Saroja S. / Shirahatti, Sunita et al. | 2016
- 264
-
Resource scheduling algorithms for LTE using weightsSuganya S, / Maheshwari, Sumit / Latha, Yaram Swarna / Ramesh C, et al. | 2016
- 270
-
Performance analysis of Group based Cooperative Sensing SchemesJyostna, K. / Bhandari, B.N. / Roja, Swathi et al. | 2016
- 275
-
Visible Light Communication for IoTKadam, Krishna / Dhage, Manisha R. et al. | 2016
- 279
-
Ant Colony based Dynamic source routing for VANETRajesh Kumar M, / Routray, Sudhir K. et al. | 2016
- 283
-
32 bit power efficient carry select adder using 4T XNOR gateRashmi S.B, / Oli, Veena et al. | 2016
- 288
-
Digital identity based recommendation system using social mediaJaywant, Nikhil / Shetty, Sanjay / Musale, Vinayak et al. | 2016
- 293
-
Classification of Intervertebral Disc on Lumbar MR Images using SVMBeulah A., / Sharmila, T. Sree et al. | 2016
- 298
-
Machine Translation of Telugu plural pronoun declensions to SanskritRao, T. Kameswara / Prasad, T. V. et al. | 2016
- 305
-
A study and implementation of Smart ID card with M-Learning and Child securityRengaraj, Vinoth / Bijlani, Kamal et al. | 2016
- 312
-
Converting an E-commerce prospect into a customer using streaming analyticsSahana Raj G, / Babu, B Sathish et al. | 2016
- 318
-
Operation and control of hybrid microgrid using Z-Source converter in grid tied modeVigneysh T, / Kumarappan, N. et al. | 2016
- 324
-
An efficient algorithm for mining top-rank-K frequent patterns from uncertain databasesGoyal, Neha / Jain, S K et al. | 2016
- 329
-
Intelligent network intrusion detection system using data mining techniquesSultana, Amreen / Jabbar, M.A. et al. | 2016
- 334
-
Optimal relay gain allocation in AF relay based system for energy efficient data transmissionChaudhuri, Aditya / Ghosh, Sayantani / Ghosh, Sutanu et al. | 2016
- 339
-
Optimal analysis of Detection Probability in cooperative MIMO system over Nakagami fading channelChaudhuri, Aditya / Ghosh, Sutanu / Nandy, Avilash et al. | 2016
- 342
-
Effect of energy variation in WSN for static and Dynamic deploymentKulkarni, Umesh M. / Kenchannavar, Harish H. / Kulkarni, Umakant P. et al. | 2016
- 348
-
Fuzzy C Means based Hierarchical Routing Protocol in WSN with Ant Colony OptimizationGhosh, Saurav / Mondal, Sanjoy / Biswas, Utpal et al. | 2016
- 355
-
RSim: Routing simulator for analyzing the performance of routing algorithms in a networkShishira SR, / Kandasamy, A. / Chandrasekaran, K. et al. | 2016
- 359
-
Fault tolerant public auditing system in cloud environmentUdagatti, Anusha Koteppa / Sunitha, N R et al. | 2016
- 363
-
Design of an RoF Downlink System for generation of dual frequency millimetre wave carrier signal by frequency multiplicationDas, Soumyadeep / Dutta, Parikhit / Ghorai, S.K. et al. | 2016
- 368
-
Network steganography and steganalysis - a concise reviewSeo, Jun O / Manoharan, Sathiamoorthy / Mahanti, Aniket et al. | 2016
- 372
-
Power-Normalized Cepstral Coefficients (PNCC) for Punjabi Automatic Speech Recognition using phone based modelling in HTKKaur, Arshpreet / Singh, Amitoj et al. | 2016
- 376
-
Masking selected region of moving object using RGB masking TechniqueShilpa, / Sunitha M.R, et al. | 2016
- 381
-
Predictive analytics to prevent and control chronic diseasesDeepika, Kumari / Seema, S. et al. | 2016
- 387
-
Single picture super resolution of natural images using N-Neighbor Adaptive Bilinear Interpolation and absolute asymmetry based wavelet hard thresholdingSuresha D, / Prakash H N, et al. | 2016
- 394
-
Solitary pulmonary nodules classification based on tumor size and volume of nodulesMekali, Vijayalaxmi / Girijamma H.A, et al. | 2016
- 399
-
Bearing fault diagnosis using discrete Wavelet Transform and Artificial Neural NetworkPatil, Aditi B. / Gaikwad, Jitendra A. / Kulkarni, Jayant V. et al. | 2016
- 406
-
Minimization of Digital Combinational Circuit using Genetic programming with modified fitness functionSharma, Peeyush / Sasamal, Trailokya Nath et al. | 2016
- 411
-
Chaos based Combined Multiple Recursive KEY Generator for Crypto-SystemsBaby H.T., / Sujatha B.R., et al. | 2016
- 416
-
Sentiment analysis on Twitter Data-set using Naive Bayes algorithmParveen, Huma / Pandey, Shikha et al. | 2016
- 420
-
Robust Quantum Key Distribution based on two level QRNA technique to generate encrypted keyDeepthi, M. / Murali, G. et al. | 2016
- 424
-
Machine learning models for material selection: Framework for predicting flatwise compressive strength using ANNAntony P.J., / Jnanesh N.A., / Prajna M.R., et al. | 2016
- 428
-
Fast three level DNA Cryptographic technique to provide better securitySrilatha, N. / Murali, G. et al. | 2016
- 433
-
Intellectual property (IP) protection using Watermarking and Fingerprinting techniquesLeitao, Flavia et al. | 2016
- 439
-
Real-time credit card fraud detection using Streaming AnalyticsRajeshwari U, / Babu, B Sathish et al. | 2016
- 445
-
Performance of motes in Wireless Sensor NetworksKalnoor, Gauri / Agarkhed, Jayashree et al. | 2016
- 451
-
Speaker recognition for noisy speech in telephonic channelMaurya, Ankur / Aggarwal, R.K. et al. | 2016
- 457
-
Calculating the dimensions of an object using a single camera by learning the environmentMane, Sanjana Sanjay / Yangandul, Chaitra Gajanan et al. | 2016
- 461
-
Advanced Security AnalyticsKhatravath, Sreevidya / Laha, Sumanta et al. | 2016
- 465
-
A reliable spectrum aggregation protocol in Cognitive Radio NetworkGarg, Pooja / Sharma, R.M. et al. | 2016
- 469
-
A survey of routing algorithms in Delay Tolerant NetworksAmirthavalli, R. / Dhaya, R. / Chandrasoodan, M.S. et al. | 2016
- 474
-
The design of Multiprotocol Interface DeviceShwetha S., / Karunavathi R.K, et al. | 2016
- 477
-
Fast Realtime data transfer using XMPPKrishnapur, Pooja M / Shruthi M, / Chetan Adhikary Y., et al. | 2016
- 480
-
A Big Data MapReduce Hadoop distribution architecture for processing input splits to solve the small data problemManjunath R., / Tejus, / Channabasava R.K, / Balaji S., et al. | 2016
- 488
-
Wireless sensor network for smart agricultureSahitya, G. / Balaji, N. / Naidu, C.D et al. | 2016
- 494
-
Self-sustaining WBAN implants for biomedical applicationsPandey, Bhanu / Jain, Abhinandan et al. | 2016
- 504
-
Effective testcase retaining using branch coverage techniqueVelmurugan, P. / Mahapatra, Rajendra Prasad et al. | 2016
- 509
-
Automatic generation of Context Sensitive Dictionary using computational linguistics approachNarasimhan, V. Lakshmi / Bhargavi, V. / Prakash, Ravi et al. | 2016
- 515
-
Analysis of software component quality to improve object utilization in software development processRahul, Kumar / Sinha, Brijesh Kumar et al. | 2016
- 519
-
A review on multilingual document analysis in Indian contextManjula S., / Hegadi, Ravindra S. et al. | 2016
- 523
-
A video surveillance system methods at public zoneGhasemi, Abouzar / Kumar, C.N. Ravi et al. | 2016
- 527
-
Leg rehabilitation and mobility aid for paralytic patients using bionicsAkhil C, / Manjunath N, / Sanjith R, / Suhas P, / Shashikala B. N., et al. | 2016
- 533
-
Dorsal hand vein Biometric authentication using complex Walsh transformVasagiri, Krishnasree / Parvata, Sudhakar Rao et al. | 2016
- 538
-
Implementation of H.264/AVC video authentication system using watermarkManasa C, / Sunagr, Pramod et al. | 2016
- 544
-
Centralized scheduling and efficient channel assignment algorithm in Wireless Mesh NetworksMathad, K.S. / Mangalwede, S.R. et al. | 2016
- 548
-
Mobile agent and distributed data miningPatel, Darshana / Shah, J.S. et al. | 2016
- 551
-
Relay node placement in wireless sensor networks using modified genetic algorithmGeorge, Jobin / Sharma, Rajeev Mohan et al. | 2016
- 557
-
FPGA implementation of OFDM for Wireless Sensor NetworksHussana Johar R.B., / Sujatha B.R., et al. | 2016
- 561
-
Increasing the performance of the firewall by providing customized policiesSreevathsa C.V, / Daina K.K, / Hemalatha K.L, / Manjula K, et al. | 2016
- 565
-
Fusion of fingerprint, palmprint and hand geometry for an efficient multimodal person authentication systemVinodkumar, / Srikantaswamy, R. et al. | 2016
- 571
-
Privacy preserving in banking sectorVirupaksha, V. Shashidhar / Bhramaramba, V. et al. | 2016
- 576
-
Biometric authentication of a user using online dynamic signatureBaraki, Parashuram / Ramaswamy, V. et al. | 2016
- 582
-
Review tree: An unsupervised method to autogenerate visual summary of online reviewsDas, Bhaskarjyoti / Prathima V R, et al. | 2016
- 588
-
Prediction of GPS user position using LM and CGF AlgorithmsFahmeen, Sameeha / Masroorah, / Raziuddin, Syed / Sultana, Quddusa et al. | 2016
- 592
-
Sentiment analysis of movie review data using Senti-lexicon algorithmMumtaz, Deebha / Ahuja, Bindiya et al. | 2016
- 598
-
Human Facial Expression Recognition from static images using shape and appearance featureNaveen Kumar H N, / Jagadeesha S, / Jain, Amith K et al. | 2016
- 604
-
A survey on image segmentation by Fuzzy C Means clustering techniquesBharathi, S. / Venkatesan, P. et al. | 2016
- 609
-
An improved LSB embedding technique for image steganographySugathan, Sherin et al. | 2016
- 613
-
Constructing key dependent dynamic S-Box for AES block cipher systemManjula G., / Mohan H.S., et al. | 2016
- 618
-
Clustering of dissimilar perception phase constructed for similarity measures using k-means algorithmBindiya M.K, / RaviKumar G.K, et al. | 2016
- 623
-
SAT based rectilinear steiner tree constructionKundu, Sudeshna / Roy, Suchismita / Mukherjee, Shyamapada et al. | 2016
- 628
-
Application of machine learning techniques to sentiment analysisJain, Anuja P / Dandannavar, Padma et al. | 2016
- 633
-
Secure computation over cloud using fully homomorphic encryptionBilakanti, Anusha / Anjana N.B., / Divya A., / Divya, K. / Chakraborty, Nilotpal / Patra, G. K. et al. | 2016
- 637
-
Ant Colony Optimization applied to selective harmonic elimination in Multilevel invertersPatil, Sarika D / Kadwane, Sumant G / Gawande, Snehal P et al. | 2016
- 641
-
Image processing using Modified Multiple kernel fuzzy c-means clustering (MMKFCM) techniqueDhanalakshmi L, / Ranjitha, S. / Suresh H N, et al. | 2016
- 647
-
A review on various Handwritten cursive characters segmentation techniquesAravinda C.V, / Prakash H.N, et al. | 2016
- 652
-
Design and implementation of a Test Coverage Algorithm for verification and validation of a processor IP corePrasanna Kumar N, / Yellampalli, Siva / Chetwani, Rajiv R et al. | 2016
- 657
-
Abnormality detection in retinal images using Haar wavelet and First order featuresGiraddi, Shantala / Gadwal, Savita / Pujari, Jagadeesh et al. | 2016
- 662
-
Text frame classification and recognition using segmentation techniqueManisha S., / Sharmila, T. Sree et al. | 2016
- 667
-
Modal analysis of Power System and study of oscillatory instabilityNair, Digvijay V / Murty, M.S.R. et al. | 2016
- 673
-
Content extraction studies using total distance algorithmPrakash, Kolla Bhanu et al. | 2016
- 680
-
Content extraction issues in online web educationPrakash, Kolla Bhanu / Kumar, K Sravan / Rao, S Uma Maheswara et al. | 2016
- 686
-
Compressive Sensing approach for data recovery from incomplete measurements for one dimensional signalParate, Pratik / Kanjalkar, Pramod et al. | 2016
- 692
-
Gaussian Process Regression based iris polar image super resolutionDeshpande, Anand / Patavardhan, Prashant et al. | 2016
- 697
-
Optimal sensor selection from sensor pool in IoT environmentBabu, K R Remesh / George, Sheba Jiju / Samuel, Philip et al. | 2016
- 703
-
Water parameter analysis for industrial application using IoTNikkam, Shailaja M. Gunda / Pawar, V. R. et al. | 2016
- 708
-
Overview of fault diagnosis and detection methods used in Switched Mode Power SuppliesKiran Y M, / Preethi Sharma K, / Nandihalli, Rudranna et al. | 2016
- 713
-
A Hybrid Cryptosystem approach for file security by using merging mechanismSharma, Meenakshi / Sharma, Vishu et al. | 2016
- 718
-
Ensuring an online Chat Mechanism with accountability to sharing the non-downloadable file from the CloudKeerthan Kumar T G, / Virupakshaiah, H K / Nanda K V, et al. | 2016
- 722
-
Data utility measures-a surveyRajeshwari N O, / Sowmyarani C N, et al. | 2016
- 726
-
Iris Recognition using feature optimizationCharan S G, et al. | 2016
- 732
-
Trade-off between length of the Hash code and performance of hybrid routing protocols in MANETsDilli, Ravilla / Reddy, Putta Chandra Shekar et al. | 2016
- 736
-
Test vector Generation using different logic regression methodShashidhara H. R., et al. | 2016
- 743
-
Cloud-based approach to increase the performance of execution of binary by using the separate debug fileMeghana D K, / Reddy, J Geetha et al. | 2016
- 747
-
Association rule mining with modified apriori algorithm using top down approachShah, Ashish et al. | 2016
- 753
-
Lip reading techniques: A surveyAgrawal, Shreya / Omprakash, Verma Rahul / Ranvijay, et al. | 2016
- 758
-
Energy efficient resource reservation mechanism for constrained networksShubha Rao V, / Dakshayini, M. et al. | 2016
- 764
-
A survey on detection and mitigation of zombie attacks in cloud environmentRakshitha C M, / Ashwini B P, et al. | 2016
- 770
-
Optimized MCE scheduling algorithm to allocate radio resources using evolved Round Robin schedulingDamera, Baburao / Babu, P Chitti / Mohamed, J. Sheik et al. | 2016
- 776
-
Comparison of IDMA with other multiple access in wireless mobile communicationPatil, Asharani / Biradar, G.S. et al. | 2016
- 781
-
Beaglebone black based e-system and advertisement revenue hike scheme for Bangalore city public transportation systemShariff, Saleem Ulla / Swamy, J.C.Narayana / Seshachalam, D et al. | 2016
- 787
-
Estimation of MIMO power line communication Channel capacity using multi-conductor transmission line theoryKasthala, Shashidhar / Venkatesan, G.K.D.Prasanna et al. | 2016
- 793
-
Energy Aware Multicast Clustering (EAMC) with increased Quality of Service (QoS) in MANETsVijayalakshmi, M. / Rao, D.Sreenivasa et al. | 2016
- 799
-
An energy efficient routing protocol using RD-MAC in WSNsAnanda Babu J, / Siddaraju, / Guru R, et al. | 2016
- 804
-
Containers & Docker: Emerging roles & future of Cloud technologySingh, Sachchidanand / Singh, Nirmala et al. | 2016
- 808
-
Artificial Neural Network modeling of MEMS cantilever resonator using Levenberg Marquardt algorithmSutagundar, Manjula / Nirosha H., / Sheeparamatti, B.G. et al. | 2016
- 812
-
An effective Multi-Objective task scheduling algorithm using Min-Max normalization in cloud computingGajera, Vatsal / Shubham, / Gupta, Rishabh / Jana, Prasanta K. et al. | 2016
- 817
-
Signal power analysis in MANETs using AMCShenoy, Sharada U / Range Gowda G J, / Sharmila Kumari M, et al. | 2016
- 820
-
JustQuick: Intelligent LBS using Android with GPS and geo-tagging applicationsTiwari, Sudhir K. / Varshney, Gaurav K. / Qadeer, Mohammed A. / Umar, M. Sarosh et al. | 2016
- 825
-
Context aware Topology Control in wireless sensor networksBhajantri, Lokesh B. / Pavithra H.C, / Patil, Meera et al. | 2016
- 831
-
Statistical modeling for communication networksShreesha S, / Routray, Sudhir K. et al. | 2016
- 835
-
Rayleigh and Ricean Fading Channel simulator-a reviewBhise, Suvarna / Khot, Uday Pandit et al. | 2016
- 842
-
The propensity of acquiring higher academic degree through virtual learning: A case studyMantri, Jibendu Kumar / Barterjee, Debdas / Sengupta, Subir / Gahan, P. et al. | 2016
- 848
-
Reverse engineering in Big Data using Cloud computing and Open Stack virtual machineManjunath R., / Akshatha A., / Balaji S., et al. | 2016
- 854
-
S2R2: An enhanced method to improve the performance of CPU scheduling using sort-split Round-Robin technique for load balancingPadmashree M G, / Shridharamuthy, Savita et al. | 2016
- i
-
Front matter| 2016