1 |
STUDY OF VARIOUS IMAGE FILTERING TECHNIQUES IN VIDEO PROCESSING SYSTEM
Authors: Kamal Kant Verma, Amit Dixit, Brij Mohan Singh
|
2 |
A STUDY ON SECURITY ISSUES, VULNERABILITY AND THREATS CHALLENGES
Authors: Rishi Kumar Sharma, Vishal Vig
|
3 |
A MODEL FOR EMBEDDED MACHINE LEARNING AND
GENETICS IN IOT
Authors: Jagdish Chandra Patni, Ravi Tomar, Ankur Dumka, Hitesh Kumar Sharma
|
4 |
EMOTIONS RECOGNITION FROM SPEECH USING THE
TRAINED MODEL
Authors: Pramod Mehra, Parag Jain, Shushil Kumar
|
5 |
REVIEW OF DIFFERENT TECHNIQUES USED FOR
DETECTION AND APPEASE BLACK HOLE ATTACK IN AODV ROUTING PROTOCOL
Authors: Vishal Vig, Rishi Sharma
|
6 |
TO PREVENT HELMET THEFT AND WIRELESS
MONITORING OF THE BIKE THROUGH ANDROID APPLICATION
Authors: Abhishek Mittal, Ayush Mittal, Sandhya Samant
|
7 |
DESIGN AND GENERATION OF ERROR CORRECTION CODES
FOR COMMUNICATION NETWORKS USING PARTICLE SWARM OPTIMIZATION (PSO)
Authors: Ankit Agarwal, K. Srinivas
|
8 |
A THEORETICAL APPROACH TO REDUCE THE NUMBER OF
ITERATIONS IN PUMPING LEMMA
Authors: Ankit Tomar, Kapil Kumar
|
9 |
A SURVEY ON DENIAL-OF-SERVICE ATTACKS DETECTION
AND PREVENTION MECHANISMS IN WIRELESS SENSOR NETWORKS
Authors: Chunnu Lal
|
10 |
ENERGY EFFICIENT GREEN CLOUD SCHEDULING-A NOVEL
APPROACH
Authors: Tanu Shree, Mukesh Kumar
|
11 |
A ROBUST TECHNIQUE FOR PASSWORD SECURITY
Authors: Sandhya Samant, Jaspreet Srivastava, Abhishek Mittal
|
12 |
PREDICTION BASED ON SENTIMENT ANALYSIS OF GAME
Authors: Jagdish Chandra Patni, Ravi Tomar, Mahendra Singh Aswal, Ankur Dumka
|
13 |
IMPROVED EDGE FINDING ALGORITHM: ROBOTIC ARM ROBOT STUDIO
Authors: Mitender Kumar, Manish Mittal, Shobhit Prajapati
|
14 |
WIRELESS SENSOR NETWORKS LOCALIZATION AND ITS
LOCATION OPTIMIZATION USING BIO INSPIRED LOCALIZATION ALGORITHMS: A SURVEY
Authors: Parulpreet Singh, Arun Khosla, Anil Kumar, Mamta Khosla
|
15 |
THREATS OF CLOUD COMPUTING AND ITS SECURITY-A
SURVEY
Authors: Deepak Painuli, Divya Mishra
|
16 |
DENIAL OF SERVICE ATTACKS AND COUNTER MEASURES
IN WIRELESS SENSOR NETWORK
Authors: Ankur Rana, Jaspreet Srivastava, Mayur Srivastava
|
17 |
DESIGN AND IMPLEMENTATION OF HINDI LANGUAGE
INTERFACE TO DATABASE
Authors: Ashish Kumar
|
18 |
NETWORK LAYER ATTACKS -A REVIEW
Authors: Mayur Srivastava, Amit Dixit
|
19 |
REVIEW OF POPULAR EDGE DETECTION TECHNIQUE
Authors: Shobhit Prajapati, Mitender Arya, Sumit Kataria
|
20 |
RANSOMEWARE ATTACK IN CYBER SECURITY
:A CASE STUDY
Authors: Gaurav Kumar Sharma, Kamal Kant Verma
|
21 |
A SECURE KEY MANAGEMENT SCHEMES FOR IMPROVING
THE ENERGY EFFICIENCY OF MANET
Authors: Mukesh Kumar
|
22 |
IMPROVEMENT IN GPS AND GIS SYSTEM
Authors: Abishek Rauniyar, Mitender Arya
|
23 |
A RULE BASED HYBRID EXPERT SYSTEM MODEL FOR
DIAGNOSIS OF DIABETES
Authors: Deepak Painuli, Divya Mishra
|
24 |
PATH DETERMINATION AND OPTIMIZING: MANET
Authors: Ashish Joshi, Deepak Painuli
|
25 |
A REVIEW ON IMAGE SEGMENTATION TECHNIQUES
Authors: Satender Kumar, Brij Mohan Singh, Kuldeep Yadav
|
26 |
FUSION USING MULTI-SCALE TRANSFORM BASED
TECHNIQUES: AN APPLICATION TO MULTI-FOCUS CAMERA IMAGES
Authors: Upendra Kumar, Roshan Kumar, Gaurav Kumar
|
27 |
ENERGY EFFICIENT AND INCREASED THRESHOLD
SENSITIVE STABLE PROTOCOL FOR WIRELESS SENSOR NETWORK
Authors: Ashish Semwal, Ashish Joshi, Akshay Chamoli
|
28 |
STUDY ON MICROORGANISMS INVADED IN
THE COMPUTER COMPONENTS
Authors: Murugalatha N Kannan, Lali Growther, Anoop Badoni
|
29 |
CARRYING DGPS SURVEY AND PREPARATION OF DIGITAL
ELEVATION MODEL
Authors: Tarun Nehra
|
30 |
STUDY OF HIGH SPEED PREDICTIVE TEXT ENTRY IN
SMARTPHONES
Authors: Guru Prabhat, Neeta Sharma
|
31 |
COMPARATIVE STUDY OF DELAY & POWER DISSIPATION IN
CMOS LOGIC GATES
Authors: Nitin Sharma, Guru Prabhat
|
32 |
A COMPARISON OF LINUX CONTAINER AND VIRTUAL
MACHINES
Authors: Prateek Jain
|
33 |
IMPLEMENTATION OF VIDEO SHOT BOUNDARY
DETECTION USING DUAL TREE COMPLEX WAVELET TRANSFORM
Authors: Sweta Bhardwaj, Himanshu Tyagi
|
34 |
DENIAL OF SERVICE ATTACKS & DETECTION TECHNIQUE
IN WSN
Authors: Atul Koranga, Neeraj Mehra, Mayur Srivastava
|
35 |
CONTENT BASED IMAGE RETRIEVAL USING STRUCTURAL
CONNECTIONS
Authors: Himanshu Tyagi, Rajat Tyagi
|
36 |
LARGE SCALE OPINION MINING FOR SOCIAL, NEWS AND
BLOG DATA
Authors: Vishal Bhatt, Himanshu Tyagi
|
37 |
PROPOSED ALGORITHM FOR IMPROVING THE
PERFORMANCE OF MPLS NETWORK USING DELAY & BANDWIDTH PARAMETERS
Authors: Shishir Sangal, Dr. Manoj Kumar
|
38 |
CAR LOCKING ALCOHOL DETECTION MODEL
Authors: Kriti Singh Kushwaha
|
39 |
CLOUD SECURITY: ONGOING CHALLENGES IN IoT
Authors: Alka Verma, J. C. Patni, Amit Agarwal
|
40 |
SERVICE SELECTION IN CLOUD BASED ON MULTIOBJECTIVE
AND MULTI- CRITERIA SELECTION
Authors: Preeti Sirohi, Amit Agarwal, Piyush Maheshwari
|
41 |
DIVERSIFIED MULTI-OBJECTIVE WORKFLOW HEURISTIC
AND META-HEURISTIC SCHEDULING ALGORITHMS FOR CLOUD ENVIRONMENTS
Authors: Meenakshi Bist, Parag Jain, Amit Agarwal
|
42 |
SMART SECURITY AND SMART PRIVACY: BACKBONE OF
SMART CITIES
Authors: Neeraj Rathore, Alka Verma, Amit Agarwal
|
43 |
A COMPARISON OF SENSOR BASED AND SENSORLESS
TECHNIQUE FOR SPEED CONTROL OF PMSM DRIVE
Authors: Gaurav Aggarwal
|
44 |
OPINION MINING: INSIGHT
Authors: Abhilasha Singh Rathor, Dr. Amit Aggarwal, Dr. Preeti Dimri
|