ஆய்வுக் கட்டுரை
GPS Based Advanced Railway Level Crossing Management System Using FPGA
A Survey of Self-Organizing Networks (SON)
A Review on Passive Optical Network
Challenges and Opportunities with Cloud Computing
Survey on Preserving Location Privacy in Geosocial Applications
Swarm Intelligence for Traffic Routing
A Novel Based Approach for Face Recognition
Cognitive Human Emotion Detection with Vocal Output
A Secure Visual Cryptography Scheme for Sharing Secret Image using RSA
RFID Integrated Drug Information System to Prevent Medical Errors Leading to Drug Interactions
Optical Flow Estimation with Gradient Detection for Identifying Flames
Survey on DSTC and PA-PSO Algorithm through Cross Layer Design in MANET
Text Watermarking using Sinusoidal Greyscale Variations of Font based on Alphabet Count
Efficient Analysis of Pharmaceutical Compound Structure Based on Enhanced K-Means Clustering Algorithm
Improved Writing Capabilities Using LMS
Design of Positive Edge Triggered D Flip-Flop Using 32nm CMOS Technology
Real Time Face Detection System for Safe Television Viewing
Technique for Prevent Straight and Indirect Bias in Information Mining
Preserving User’s Profile Protection for Personalized Web Search
On-Lib: An Application and Analysis of Fuzzy-Fast Query Searching and Clustering on Library Database
Enhancing the Security in Cross Layer Method which reduces the Link Failure in Networks using CP-ABE
Automatically Extract the Left and Right Ventricular Myocardium from CT Images by Using Region Based Segmentation
Brotherhood : Co-Relation of Robotics Perception and Social World
A Survey on Optimal Fault Tolerant Strategy for Reliability Improvement in Cloud Migration
Automatic Lobar Segmentation Algorithm for Pulmonary Lobes from Chest Ct Scans Based On Fissures and Blood Vessels
Accident Alarm System using GSM, GPS and Accelerometer
A Model Based Neuromuscular Blockade Control System with Injector
Design and Implementation of Tracking System
Memory Optimization Using Genetic Algorithm of Relational Keyword Search Techniques
Authenticating Location Based Nearest Neighbour Search with Keywords
Developing an Efficient Algorithm for Image Fusion Using Dual Tree- Complex Wavelet Transform
DCT Domain Video Watermarking Technique for AVI Video
An Efficient Security Scheme Authentication and Encryption
An Efficient Searching for Non-Formulating Queries
Multi-hop Cellular Networks for Load Balancing and Interference Coordination Using OFDMA
Implementation of Artificial Intelligence for IDS in Cloud Data Centers
A Survey on Product Aspect Ranking Techniques
Low Power High Speed Differential Current Comparator
A Survey on Data Mining Of Gene Expression Data for Gene Function Prediction
A Survey on Different Software Security Attacks and Risk Analysis Based on Security Threats
Enhancement of Gain of Printed T Monopole Antenna Using Uniplanar EBG for ISM Band (2.4GHz) Applications
A Real-Time Electronic System with Zigbee for the Prevention of Rodent in Agricultural Fields
Defense Against the Sybil Attack with the Grid Based Transitory Master Key in Wireless Sensor Networks
Frequency Domain Approaches for Fingerprint Based Gender Classification
Implementation of Logo Matching & Recognition System Based on Context Dependency for Image & Video
Minimization of ICI Using Pulse Shaping in MIMO OFDM
A Study on Effective Business Logic Approach for Big Data Mining
Secure Group Communication to Prevent Unauthorized Messages in DTN Based Mobile Ad Hoc Networks
Systematic Approach of Knuckle System Implementation for Human Identification
An IoT Based Accident Prevention & Tracking System for Night Drivers
Efficient Segmentation of the Foetal Ultrasound Image Using Smoothing Algorithm
Performance Analysis of Cluster Based Protocols in Sensor Networks and their Vulnerabilities
A Technical Analysis of Image Stitching Algorithm Using Different Corner Detection Methods
The Learning Method of Speech Recognition Based on HMM
Evaluation and Review of Security Algorithm on Cloud Computing Environment
Improving Personalized Web Search Quality in Information Retrieval
A Review: Novel Protocol for Clumping in Mobile Ad hoc Networks
Unwanted Message Filtration From Online Social Network (OSN)
Android Based Complaint Management System: People’s Corner
Quality of Service Based Impact Provider Model for Composition of Web Services
Design of a Vertical Cavity Optical Micro- Electromechanical Filter
High Utility Itemset Mining from Transaction Database Using UP-Growth and UP-Growth+ Algorithm
PAPR Reduction Techniques Comparison in OFDM System
Extracting Spread-Spectrum Hidden Data from Digital Media
Performance Enhancement of Digital Image Deblurring Using Hybrid Approach
A Review of Various Industrial Applications of Barcode Technology
Enhancing Map-Reduce Mechanism for Big Data with Density-Based Clustering
SNSC: Secure and Dependable Network Coding For the Storage Repair in a Cloud-Of- Clouds
A Secure Cluster Based En-route Filtering Scheme in Wireless Sensor Networks
Implementation of Driver Drowsiness Detection and Accident Avoidance in Vehicles- A Review
A Study of Distributed Network Management Architectures
Pseudo-Anonymization of Social Networks by Sequential Clustering and Classification
A Review Article On Design Techniques for Low Power Consumption in a Storage Element
Mollifying Atmospheric Instability in Video Surveillance System Using DT-CWT
A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis
Proposed Framework Based on Performance Evaluation and Analysis of Testing Tool
Simulation of Opinion Mining In Hindi Language Based on Natural Language Processing
A Study on Cloud Robotics: Ad-Hoc Cloud (Cloud Seeding)
Implementation of Many-to-Many Data Linkage using OCCT for Matching and Non- Matching Pairs
Exploiting RASP Data Perturbation to Build Confidential Query Services in the Cloud
The Amalgamation of NLP with Text Categorization
Prediction Using Back Propagation and k- Nearest Neighbor (k-NN) Algorithm
Automatic Speech Recognition using ELM and KNN Classifiers
Human Age Estimation through Fingerprint
Efficient Classification of Lung Tumor using Neural Classifier
Evolutionary Load Forecasting using Artificial Neural Network
Online Video Promotion with User Specific Information
Develop an Efficient Algorithm to Recognize, Separate and Count Indian Coin From Image using MATLAB
Clustering Based Routing Protocol (LEACH Protocol)
Data Access Service through Web Service by Auto-Updation Mechanism
Security for Wireless Sensor Network with Spin Protocol
Indoor LED Lighting Control System Using WSN Considering User Satisfaction
Classroom Monitoring System by Wired Webcams and Attendance Management System
Watermarking of Relational Databases Using Optimization Technique
Stability Analysis of Two Dimensional Continuous Filters
Survey on Industrial Wireless Sensor Networks
Seamless Mobility Management in Next Generation Hybrid Networks
Generation of Vessel Tree Structure from Retinal Fundus Image
Case Study: Hand Gesture Based Digital Pen
The Oxford College of Engineering
Moving Object Detection and Tracking Using Hybrid Approach in Real Time to Improve Accuracy
Clinic + - A Clinical Decision Support System Using Association Rule Mining
A Survey on Optimized QOS Provisioning for NGMN
Triangular and Circular Sierpinsky Fractal Antenna with Coupling Patches for Dual Band Applications
Multi-Keyword Ranked Search and Dual Security on Cloud Data Using Homomorphic Encryption
Improving Energy efficiency in Clustered Wireless Sensor Networks
Design of A PIFA Antenna with Slots on Ground to Improve Bandwidth
Arduino based Wireless Powered Chess
Survey Paper on Effective Email Classification into Spam and Non-Spam Mails
Disease Identification in Cotton Plants Using Spatial FCM & PNN Classifier
An Effective Colour Interpolation in CFA Images using Adaptive Enhancement Technique and SIFT Design
Energy Efficient Hierarchical Clustering Based Routing Protocol with TDMA for Wireless Sensor Networks
Design of FIR Filter Using SMB Recoding Technique
Hand Action Recognition Using Accelerometer
Certificate Based Encryption for Securing Broker-Less Publish/Subscribe System in Wireless Network
Analysis of Energy Efficiency and Data Density in WSN
Photometric Based Sensor for Fat Detection in Fresh Milk
Base of the Networking Protocol – TCP/IP Its Design and Security Aspects
Reliability of Memory Storage System Using Decimal Matrix Code and Meta-Cure
Study of Standard Techniques for Mitigating the Intrusion Events in Mobile Adhoc Network
Improving Detection Method for Covert Channel in TCP/IP Network
Resolution Enhancement of the Satellite Image Processing using DT CWT Techniques
Optimum Channel Sharing in Cognitive Radio Network
Application of Artificial Neural Network Techniques in Text Recognition from an Image
Optic Eye in Sky Unmanned Quad Copter for Agriculture Automation
Fault Prediction and Relay Node Placement in Wireless Sensor Network
Implementation of Low Power All Digital Phase Locked Loop
Modified Taxonomy Based Anita Approach for Dynamic Environment
Secure Data Share in Drop Box Using Key- Aggregate Cryptosystem
Information Detection in Distributed Environment using Agents
Review on Significance Research on Enhancing the Quality of the Brain Image Using Neuro-Fuzzy System
Space Vecor Modulated Three Level Neutral Point Clamped Inverter Using A Single Z Source Network
Reproducing a Human Body from Image by Coarse to Fine Technique
A Research on Trusted Cloud Computing with Secure Resources for Multiple Clouds using Data Coloring
Survey of One Time Signature Schemes on Cloud Computing
Verification of Authorized Auditing Accuracy Using Genchallenge Method
Human Surveillance with Android based S.M.A.R.T Emergency Application
Location Aware Selective Unlocking for Enhancing RFID Security
The Design and Evaluation of an Information Sharing System for Human Networks
Implementation of Knock Based Security System
A Survey on the Secure Routing Protocols in MANETs
A Survey on Various Mechanisms to Detect and Remove Collaborative Attacks in MANETs
Dynamic and Efficient Routing Algorithm for Multi-Sink Wireless Sensor Networks
An Efficient Iterative Framework for Semi- Supervised Clustering Based Batch Sequential Active Learning Approach
Data Relay Against Hotspot-Locating Attack in Wireless Sensor Networks Using Mobile Elements
EABPF: Efficient Algorithm to Overcome Battery Power Failures in Mobile Ad Hoc Networks
Road Traffic Reduction via Implementation of Android Based Carpooling Application
Efficient Feature Subset Selection using Kruskal's Process in Big Data
A Literature analysis on Privacy Preserving Data Mining
Secure and Efficient Data Transmission in Cluster Based Wireless Sensor Networks using SET-IBS and SET-IBOOS Protocol
Inductive Coupled Rectangular Wide Slot Antenna using CPW-Fed Technique
Performance Analysis of Hybrid DSTATCOM with Different Type of Loads
Study of CPW-Fed Slot Antenna for UWB Application
KNN Based Classification Energy Efficient Routing Algorithm for Maximizing Network Lifetime of MANETs
Video Forensic Framework for Video Forgeries
A Modified Design of FFT Architecture for Wi-Max OFDM Standards to Support both Variable Length and Multi-streaming
A New Approach for Information Security in an Embedded Executable Build
Advance Platform for Computerized and Electronic Hospitality Development
QoE-Based Algorithm to Assign Channel using Distributed Method for IEEE 802.11WLANs
Energy Efficient Routing Protocols for Wireless Sensor Networks
Detection of Websites Based on Phishing Websites Characteristics
FPGA Based Design Implementation for Detection of Exudates Using XSG
Key Aggregate Policies for Secure Data Sharing in Cloud Storage
Data Security in Proactive Network using Secret Sharing Mechanism
An Approach for Detecting and Preventing Content Leakage Using Traffic Pattern of Transmission
Data Security in IoT Environment
Obstacle-Avoiding Rectilinear Steiner Minimum Tree: A Survey
Selecting Optimal Meeting Point with Security Measures
Routing Method to Extend Network Lifetime in Wireless Sensor Network
Fuzzy Approach for Throughput Selection in Mobile Ad hoc Network
Transmission Efficient Data Gathering Using Compressive Sensing in Wireless Sensor Network
FPGA Implementation of Multiply Accumulate (MAC) Unit based on Block Enable Technique
An Energy Efficient Data Collection Scheme for Multiple Sinks in Wireless Sensor Network
Two Way Authentication for Web Services using Video CAPTCHA and Kerberos
Cluster Head with Multiple Base Stations Can Lead To Extended Lifetime of WSN
Shaheed Bhagat Singh State Technical Campus
Text Independent Speaker Modeling and Identification Based On MFCC Features
Improving the Performance of AODV by Minimizing Flooding Through High Power Routing Node
Credit Card Fraud Detection Using Advanced Combination Heuristic and Bayes’ Theorem
Implementation of Multipath Routing Scheme for Detecting Malicious Node in MANET
A Review on Word Sense Disambiguation
Redundant Data Filtering in WSN and RFID Network Integration
Image Processing on Eye Image Using SURF Feature Extraction
Implementation of Enhanced & Adaptive Intrusion Detection System for MANET
Utilization of Energy from Attacks Using RSA Algorithm in Wireless Ad hoc Sensor Network
Survey on Auditing Mechanism for Preserving Privacy in Cloud Computing
Expressive Sentiment Analysis of Product Reviews Using Opinion Mining
Underwater Image De-noising by using Adaptive Wavelet Transformation
Moving Object Extraction Based on Background Reconstruction
Multiple Appliances Controlling and Monitoring System based on Wireless Embedded Home Gateway
Prin. L. N. Welingkar Institute of Management Development and Research
Enhancing Privacy Preservation of Web Service through Negotiation Mechanism
An Approach for Keyword Searching in Uncertain Graph Data
Detection of Possibility of Brain Tumor Using Image Segmentation
Detection and Localization of Multiple Spoofing Attackers Using Cluster Analysis in Wireless Network
Crosstalk Improvement of Array Waveguide Grating Based on Different Channels (64) Spacing
Localization of Wireless Sensor Networks with Ranging Quality in Woods
A Cluster-based Routing Scheme to Improve the Network Lifetime in Wireless Sensor Networks with a Mobile Sink
Image Authentication by Detecting Traces of Demosaicing and Color Classification Methods
Simple and Efficient Way to Cluster Documents for Growing Database
Multi-Agent Intrusion Detection System Based on Immune Principle
மேலும் பார்க்க