研究文章
Privacy Preserving Data Sharing with Encrypted Anonymous ID Assignment
Facial Image Annotation Search using CBIR and Supervised Label Refinement
Secured Personalized Web Search using Ontology and Hashing Technique
Multi-Keyword Ranked Search for Spatial Network using Big Data
Efficient and Reliable Data Storage Security against Malicious Data Modification in Cloud Computing
Lightweight and Reliable Routing Approach for In-Network Aggregation in Wireless Sensor Networks
Survey on Secured Data Transferring in Cloud Computing
Preserving Data Confidentiality and Query Privacy Using KNN-R Approach
Extraction and Recognition of Alphanumeric Characters from Vehicle Number Plate
Pose Invarient for Face Recognition and Lightening Conditions Using SVM Classifier
An Efficient Nonlinear Filter for Removal of Impulse Noise in Color Video Sequences
Mobile e-Voting Service for m-Governance in Ethiopia
A Comparative Study of Ranking Techniques for Hidden Web and Surface Web
The Implementation of Light Weight Localization Algorithms in Wireless Sensor Network Applications
Shared Data Based Privacy Preserving Authentication in Cloud for Public Auditing
Shortest Path Finding Using a Star Algorithm and Minimum weight Node First Principle
Location Privacy Context Information Effects Using Bayesian Inference Framework
Design of Modified Three Stage Sharpened CIC Filter for Decimation
An Efficient Approach to Encrypted Cloud Database
OFDM-STBC Based Transceiver for WiMAX 802.16e
Knowledge Discovery Process: The Next Step for Knowledge Search
Performance Comparison of Roulette Wheel Selection and Steady state Selection in Genetic Nucleotide Sequence
Semantic Web Usage Mining Techniques for Predicting Users’ Navigation Requests
Automatic Text Summarization Using Regression Model (GA)
Sparse Signal Reconstruction using Basis Pursuit Algorithm
Cooperative Relaying In Power Line Environment: A Survey and Tutorial
Privacy Clustered Mining of Association Rules in Distributed Database by Using Fuzzyfication
Personalized Smartphone Search Engine Enhanced Security Using MAC Technique
Combine Approach of CADS and USHER Interfaces for Document Annotation
A Lab VIEW Based Virtual Instrument for Background Correction of Spectrum for Chemical Identification
Scalability Study of the Hybrid ZigBee Multipath Routing Protocol
Digital Image Classification and Clustering
Secured Data Sharing In Cloud through Key Aggregation
Location Based Reminder Using Android and Google Maps
File Inclusion Vulnerability Analysis using Hadoop and Navie Bayes Classifier
Distributed Cut Detection in Wireless Sensor Network
Security Enhancement by Remote Lock and Wipe to Personalized Smartphone Search Engine
Multi Aspect Based Document Level Sentiment Analysis for Educational Institute Analysis
A Study on Key Management in MANETs
Non Invasive Microwave Sensor For Near Field Biological Applications
Designing of Hybrid RSA Encryption Algorithm for Cloud Security
Swarm Intelligence Based Warmhole Detection Technique For Under Water Sensor Networks
Optimization of Cognitive Radio Sensing Techniques Using G enetic Algorithm
A Secure Cooperative Bait Detection Approach for Detecting Malicious Nodes in MANETs
Two New Secure and Efficient Data Transmission Protocols SET-IBS and SETIBOOS for WSN
A New Efficient Algorithm for Removal of High Density Salt and Pepper Noise Using Modified DBUF Median Filter for Video Restoration
Intelligent Portable Data Acquisition System with Predictive Features
Efficient Vertical Handoff in Heterogeneous Wireless Network
Mediator Free From the Security System Using NBE- Noble Based Encryption
Automatic Test Setup for Measurement and Characterization of Accelerating Cavity Using LabVIEW
FPGA Based Digital Controller for DC-DC Buck Converter
A Better Thresholding Technique For Image Denoising Based On Wavelet Transform
A Novel PFC Zeta Converter for Speed Control of PMBLDC Motor
Smart Highway Electronic Toll Collection System
Fault Tolerant Routing in Irregular Modified Shuffle Network
An Energy Efficient Virtual Machine Consolidation in Cloud Computing
A Result Analysis on Secure Communication for Mobile Application Using Cloud Hosted Key
Error minimization in Brain tissue extraction for T1 weighted MR images
Captcha Authenticated Unwanted Message Filtering Technique for Social Networking Services
Schedule System through Mobile Application
The Cloud Computing: A Systematic Review
Implementation of Real Time Hand Gesture Recognition
Touch-less Fingerprint Recognition Using SVM and GMM: A Comparative Study
Efficient Cluster based Fault Detection and Recovery in Wireless Sensor Network
A Novel Computational Model for Transform Coding of Colour Images with Orthogonal Polynomials in difference Colour Spaces
Energy Effective Routing Protocol for Maximizing Network Lifetime of WSN
Extracting Salient Brain Patterns for Classification of Neurodegenerative Diseases
Low Power, Area Efficient & High Performance Carry Select Adder on FPGA
A Single Operator Implementation of Task Based Multiple Unmanned Vehicle
A Literature Review: Cryptology and Cryptosystem
Information Security System and Its Different Techniques
Statistical Analysis of Web Server Logs Using Apache Hive in Hadoop Framework
Cloud Based Public Transport Information System for Android Devices Using Crowd Sourcing
A Review of Various Algorithms Used to Optimize RWA Problem in WDM Network
Wireless Medical History Tracker and Token Generator Using Finger Biometric Technology and Arm
A Novel Evaluation of Civic Suggestion in Civil Project Work Completion Using Android IoT Devices
An Enhanced Data Gathering Protocol for Wireless Sensor Network with Sink Mobility
Computational Gene Analysis and Mutation Processing Using Hadoop
A Comparison between Bat Algorithm and Cuckoo Search for Path Planning
Artery/Vein Discrimination Using Graph Based Approach and LDA Classifier
Progressive Image Transmission over OFDM System with Minimum Peak to Average Power Ratio (PAPR)
Review on LEACH-Homogeneous and Heterogeneous Wireless Sensor Network
Achieving Remote Data Integrity Verification and Eradicating Semihonest Attack in Multicloud Storage
Security in Cloud using Ciphertext Policy Attribute-Based Encryption with Checkability
Sharing Secured Scalable Data in Cloud Environment Using Key Aggregate Cryptology
Currency Recognition Using Image Processing
Real Time Human Detection from Video Surveillance
Architecture of Hybrid Intrusion Detection System using TAN & GA Algorithm
Haar Features Based Face Detection and Recognition for Advanced Classroom and Corporate Attendance
Asterisks Internet Protocol Private Branch Exchange with Smartphone
Sentence-Similarity Based Document Clustering Using Birch Algorithm
Searching on Encrypted Cloud Documents using Keywords
Multimode Power Gating Architecture And Energy Storage Using Charge Pump Circuit
Ensure Data Privacy in Back Propagation Neural Network Learning over Encrypted Cloud Data
Hashing Technique - SQL Injection Attack Detection & Prevention
Trace Management, Debug, Analysis and Testing Tool for Embedded Systems
ATM Pin Transfer Using Visual Cryptography
Implementation of Algorithm for Remotely Access & Control Smart Phone Devices
Key Distribution for Symmetric Key Cryptography: A Review
Biometric Cryptosystems: for User Authentication
A Novel Trip Planner Using Effective Indexing Structure
A Survey on Load Balancing Gateway Selection Techniques in Wireless Mesh Networks
Low Power Phase Locked Loop Design with Minimum Jitter
Implementing Decision Tree for Software Development Effort Estimation of Software Project
A Study of Tools Used in Implement Agent Oriented Software Engineering
A Geographic Routing Oriented Sleep Scheduling Algorithm in Duty-Cycled Mobile Sensor Networks
Digital down Converter for Pulse Radar Receiver
A Rain Pixel Recovery Algorithm for Videos
FPGA Implementation of Cryptographic Algorithm in a Multiprocessing System
Android based Smart Parking System
A Study on Optical Switching: An Efficient Switching Tool for Optical Communication Network
Analysis of Chaotic Communication over Traditional Communication
A Database Hadoop Hybrid Approach of Big Data
A Methodology for Sensitive Attribute Discrimination Prevention in Data Mining
The Significant Impact of Biometric Watermark for Providing Image Security using DWT based Alpha Blending Watermarking Technique
Ranking Based Shared Authority Privacy Preserving Authentication Protocol in Cloud Computing
Enabling Efficient Sensor Rescue Service in Mobile Cloud Computing with Assisted Sensor
The Novel Approach based on Improving Apriori Algorithm and Frequent Pattern Algorithm for Mining Association Rule
Slicing Technique to Prevent Generalized Losses and Membership Disclosure in Micro Data Publishing
A Novel Approach To Solve Tsp Using Ant Colony Optimization
Design and Implementation of a System for Denial of Service Attack Detection Based on Multivariate Correlation Analysis
To Enhance Recommendation By Providing Location Privacy In GeoSocial Application
Design and Implemenation of High Speed 64- Bit Multiply and Accumulator Unit Using FPGA
Spoofing Attacks Detection and Localizing Multiple Adversaries in Wireless Networks
Packet Switching - Queuing Architecture: A Study
Energy Efficient Routing By Choosing Alternate Path Selection in Cognitive Radio Networks
Design of an Area Efficient Adder Using Minority Gates in QCA
Base Station Switching Using Transfer Actor- Critic Learning Algorithm for Energy Saving In Heterogeneous Networks
Secure Management with IDS Framework for Power System Delivery
Design of Double Tail Comparator Using Dual Mode Logic in PTL Design
A New Reversible 'SMT' Gate and its Application to Design Low Power Circuits
A Simulation Model for the Spiral Software Development Life Cycle
A Review on an Access Point-Based FEC Mechanism for Video Transmission over Wireless LANs
Simulation and Performance Analysis of Efficient Wireless Channel in WiMAX MIMO Using Real Time Data Transmission
An Efficient Power Reduction in Multiplexer Based On Cordic Using Cadence-Digital IC Design
Power Optimization Using Dual Dynamic Node Pulsed Hybrid Flip-Flop Based on Footed Logic
Survey on Context Based Input of Microenvironment through Sensors and Inference of Activity to Alert Smartphone User
Survey on Localization of Smartphone User in an Indoor Environment Using WIFI and Navigation through Layout of the Floor Plans
Driver Aided System Using Open Source Computer Vision
Comparison of Frequency Domain Digital Watermarking Techniques on the Basis of PSNR
Survey on Data Privacy in Big Data with K- Anonymity
A Real Time Driver’s Eye Tracking Design Proposal for Detection of Fatigue Drowsiness
Sentiment Analysis: A Survey of Current Research and Techniques
QoS-aware Video Transcoding Service Composition Process in a Distributed Cloud Environment
查看更多