研究文章
Robust and High-Secured Watermarking System Using Zernike Moments
A Survey: A Hybrid Approach to Secure Transmitted Message by Combining Steganography and Asymmetric Cryptography
Customize Approach for Detection and Prevention of Unsolicited Call in VoIP Scenario: A Review
Password less Authentication Using Keystroke Dynamics: A Survey
A Lightweight Framework for Detection and Resolution for Phishing, Pharming and Email Spoofing
Power Optimization Using Clock Gating Technique
Identifying Prevelance Flood Attacks in Delay Tolerant Networks
Scratch Recognition With In Wireless Sensor Networks
Mixed Scheduling Coupled With Power Control and Routing for Wireless Adhoc Networks
Design of UWB Microstrip Filter Using Quarter Wavelength Short Circuited Stubs
A Direct Injection-Locked QPSK Modulator Based on Ring VCO
LAN Based Industrial Automation with GSM Connectivity
Trust Aware Routing Framework for WSN
CORDIC Based FM Demodulator for Digital Telecommand Receiver
Mobile Communication in 4G Technology
An Innovative Approach for Dynamic Authentication in Public Cloud: Using RSA, Improved OTP and MD5
Comparison of Three Phase Voltage Back to Back Converter and Matrix Converter
An Efficient Indoor Localization of Mobile Nodes on Novel Cooperative Algorithm
An Innovative Method to Improve Security in Cloud: Using LDAP and OSSEC
Data Compression in Wireless Sensor Network: A Survey
Optimized Locking and Unlocking a System Using Arduino
Survey on Two Layer Encryption System
Secured Neuro Genetic Approach for Predicting the Risk of Heart Disease
Product Aspect Ranking Techniques: A Survey
A Survey on Sentiment Analysis and Opinion Mining
Data Reduction Techniques in Wireless Sensor Network: A Survey
Improvise P2P File Sharing for Routing Efficiency
Review on DRINA: A Lightweight and Reliable Routing Approach for In-Network Aggregation in Wireless Sensor Networks
Performance Evolution of XML Data Searching by Using Fuzzy Type a head Search
User and Query Based Ranking for Web Data Bases
A Review on Secure Routing Protocols in MANET
Enhanced M-Privacy for Collaborative Data Publishing
An Exclusive Survey on Web Usage Mining For User Identification
An Analytical Study on 2D Ultrasound Fetal Anatomy Measurement
Optimal Path Search with User-Defined Queries
Tweets Mining: Knowledge from the Social Web
A Survey on Privacy Preservation Recent Approaches and Techniques
Review on Stable Relational Pattern Mining in Dynamic Networks
A Survey on Opportunistic Routing Protocols
Secure Distribution of File on Cloud
Performance Evaluation of Modern Sophisticated Parking Management System with Space Modeling
Effect of Different Substrate Material on Performance of H Shaped Patch Antenna
Energy Efficient, Power Based, Secured Routing Method for Wireless Sensor Network
Review On Architecture & Security Issues of SDN
Algorithms for Reducing the Size of Network
Data Cube Materialization Using Map Reduce
A Token Based Approach for Detecting Replica Node Attack in Static WSNs
Analyzing the Effect of Number of Nodes, Network Area and Base Station Position In HEED Protocol for Wireless Sensor Networks
An Extremely Scalable Input Pre-Distribution Proposal on Behalf of Wireless Sensor Networks
Various Approaches for Intrusion Detection System: An Overview
Survey Paper on Web Image Re-Ranking Using Semantic Signature
Survey on Load Rebalancing For Distributed File System in Cloud with Security
An Efficient Two-Server Password Only Authenticated Key Exchange Secure Against Dictionary Attacks
Single Sign-On Secure Authentication Password Mechanism
Personalize Web Search Using User Feedback Sessions
Evaluating the Vulnerability of Network Devices to Sophisticated DDoS Attacks
Enhancing Data Securing In Cloud Using Scalable Transactions
Efficient Two Server Authentication and Verification Using ECC
Database Security Approach for Distributed Datasets: A Survey
Cross-Domain Privacy-Preserving Cooperative Firewall Optimization
Cloud-Based Mobile Multimedia Recommendation System with User Behavior Information
Biometric Recognition Using Unimodal and Multimodal Features
A Survey on Secure Sharing In Cloud Computing
A Survey on Information Extraction in Web Searches Using Web Services
A Survey on Audio Retrieval System for Classification
A Survey of Intrusion Detection System Using Different Data Mining Techniques
A Study on Online Web Log Prediction System Using web Mining Technologies: a Review
A Scalable Two-Phase Top-Down Specialization Approach for Data Anonymization Using Map Reduce On Cloud
A Probabilistic Misbehavior Detection Scheme in DTN: Survey
Design of 6-Element, 432.2 MHz QUAGI Antenna Using 4NEC2 Tool
QoS Provision in a Cloud-Based Multimedia Storage System
Security Architecture and Verification of Java Bytecode
Design of Low Power Low Voltage DCVS Logic Based Comparator
A Study on Various Search Engine Optimization Techniques
Predicting the Risk of Heart Attacks using Neural Network and Decision Tree
FPGA Implementation of 3/6 SRFFT Algorithm for Length 6*m DFTS
Implementation of Data Mining Techniques to Perform Market Analysis
SoapUI and Soap Sonar Testing Tool Using Vulnerability Detection of Web Service
Material Fault Detection Using FPGA for Nitrile Butadience Rubber Float
Data Mining with Rough Set Using Map- Reduce
Design and Analysis of Digital Circuits Using Quantum Dot Cellular Automata (QCA)
Design Of Efficient Shift Register with Double Edge Triggered Flip-Flop
Audio Signal Separation and Classification: A Review Paper
Implementing Dynamic Authority Based Search Using Binrank Algorithm
Performance Analysis of Classifiers to Effieciently Predict Genetic Disorders Using Gene Data
Comparison of Interleaved Boost Converter Topologies with Voltage Multiplier for Battery Charging Of PHEV
A Survey on Activity Detection using Data Mining
Simulation of Mouse Using Human Face (HCI)
A Survey on Effective User Navigation through Website Using Optimal Links
Detecting Critical Link and Critical Node Vulnerability for Network Vulnerability Assessment
Kernel Fisher Analysis Based Feature Extraction for Face Recognition Using Euclidean Classifier
Implementation of Efficient Modified Booth Recoder for Fused Sum-Product Operator
Survey on Security Issues in Cloud Computing Enviro nment
Energy Efficient Mobicast Protocol for Underwater Sensor Networks
Data Broadcasting Using Backbone Driven Operation for Two Dimensional Highways in VANET
A Comparative Study on Various Scheduling Algorithms in Cloud Environment
A Comparative Study on Privacy-Preserving Public Auditing for Secure Cloud Storage
Study on Techniques for Cluster Head Formation over Mobile Ad Hoc Networks
Analysis of Area – Delay Low Power Adders in QCA Using VHDL Code
An Overview on Image Processing Techniques
A Pragmatic Approach of Preprocessing the Data Set for Heart Disease Prediction
RFID and GSM Based ATM Money Transfer Prototype System
A Novel Speech Separation Based On Ica Strategical C lassification
Design and Implementation of Application Software for CSR MK II Controller Card
A Modified MPPT-SRF Configuration of a Single Stag Grid-Connected PV System Inverter Based on Voltage-Oriented Control
Modified Dijkstra’s Shortest Path Algorithm
Visual Exploration of Amnesic Time Series Data Streams
An Efficient Packet Scheduling Scheme in Wireless Sensor Networks to Prevent the Deadlock
Review on Low Power Theme over VLSI Design Circuit
Analysis of PWM Strategies for a Single-Phase Multilevel Inverter with Reduced Number of Switches for PV Application
Implementation of High Speed Low Power Split-SAR ADCs
An Approach to Evaluate Subjective Questions for Online Examination System
A Review of Anomaly Detection Techniques in Network Intrusion Detection System
Bandwidth Enhancement of Rectangular Array Using Cross Slots DGS Pattern in Ground Plane
Oral Cancer Early Detection and Stages Using Various Methods
A Review on Hybrid Techniques of Security In Cloud Computing
Model to Predict Price Movement of GWAR for North Gujarat Using Classification Rules: A Data Mining Approach
Rule Based and Association Rule Mining On Agriculture Dataset
Enhancement of the Security of Pass-Go Pattern Password Using Shuffling Grid-Shapes
Analysis of Different Bit Carry Lookahead Adder with Reconfigurability in Low Power VLSI Using Verilog Code
A Review of Performance Evaluation of the Routing Protocols in MANETs
Intrusion Detection Technique using Data Mining Approach: Survey
Discovering Probabilistic Frequent Sequential Patterns in Uncertain Databases under Systolic Tree
Measuring Wind Turbine Parameters Using Microcontroller as Data Acquisition
A Review on Load and Energy Based Routing In Wireless Mesh Network
Implementation of IPv6/IPv4 Dual-Stack Transition Mechanism
Design and Implementation of a Global Positioning System Based Automatic Vehicle Location System
Framework for Enhancing e-Health Security: Case of South African Healthcare
Quadtree Segmented Double Predictor DPCM Image Compression
Big Integer Multiplication with CUDA FFT (cuFFT) Library
New Planar CPW Fed Antenna for UWB Applications with Excellent Performance
Gensolution: Website through Bioinformatics Approach
查看更多