SN |
Paper |
1 |
Ameliorating the image matching algorithm of Sikuli using Artificial Neural Networks
Pragya Kuchhal
|
2 |
A Survey on an energy Efficient Routing Algorithms to Improve Performance & to Reduce Energy Consumption in Wireless Sensor Networks
Gagandeep kaur
|
3 |
Association Rule Mining: An Overview
Neesha Sharma, Chander Kant
|
4 |
Adaptive Estimation of the Doppler Shift in CDMA Using Monte Carlo Method
Nagarjuna.Telagam, Menaka devi. Nanjundan
|
5 |
Estimating Regression Effort in Agile Environment
Rashmi Popli, Priyanka Malhotra, Naresh Chauhan
|
6 |
Study on Security of Online Voting System Using Biometrics and Steganography
Neha Gandhi
|
7 |
An Efficient Approach for Detection and Extraction of Vehicle License Plates using Edge Detection Technique
Chetan Sharma, Ajit Singh
|
8 |
A Comparative Study of Different Biometric Technologies
Arun Kr. Yadav, Sanjiv Kr. Grewal
|
9 |
Video Search Engine Tool
Tarjni Vyas, Keyur Patel, Parth Shah
|
10 |
Optimized Data Aggregation Protocol in WSN for Automation of water Sprinklers
Parita Oza, Priyanka Sharma
|
11 |
Performance Evaluation of Ad-Hoc on-Demand Distance Vector Routing Protocol and its Multi-Path Variant AOMDV
Parita Oza, Pooja Shah
|
12 |
A Digital Image Processing Algorithm for Automation of Human Karyotyping
Priya Chaku, Pooja Shah, Sonal Bakshi
|
13 |
Semantic and Sentiment Analysis
Shivani Desai, Priyank Bhatt, Vraj Solanki
|
14 |
Analysis of Cryptography Techniques
Shivani Desai, Yamini Rathod
|
15 |
Movie Related Information Retrieval Using Ontology Based Semantic Search
Tarjni Vyas, Hetali Tank, Kinjal Shah
|
16 |
Adaptive Message Passing in Vehicular Ad-hoc Networks
Vijay Ukani, Jitendra Bhatia
|
17 |
A Survey on Peer-to-Peer File Sharing using Network Coding in Delay Tolerant Networks
Vishal U. Parikh, Zunnun Narmawala
|
18 |
Data Security using shifting the Bits: Algorithm SKG 2.1
Satish Kumar Garg
|
19 |
Securing Biometric System using Multibiometrics
Meenu Mittal
|
20 |
Enhancing the Lifetime of Wireless Sensor Networks and Balancing the Load Using LEACH Protocol and Iterative Deepening A* Algorithm
E. Mariappan, B.Paramasivan
|
21 |
Randomness analysis of A5/1 Stream Cipher for secure mobile communicationDarshana Upadhyay, Priyanka Sharma, Sharada Valiveti |
22 |
Rapid and Compact generic binary-to-BCD conversion circuit for less powerful computational devicesUjjwal Thaakar, Darshana Upadhyay |
23 |
Improving Biometric Recognition System performance using Multibiometrics
Suman
|
24 |
Vulnerability to Fingerprint Biometric Systems- An Overview
Ramesh Kumar
|
25 |
Security Issues and Challenges for Cloud Computing Environment
Dr. Rajesh Kumar, Naveen Monga
|
26 |
Evaluation of Usefulness of Unlabeled Data in Learning a Recommender
Vikas Parmar, Priyank Thakkar, K Kotecha
|
27 |
A Survey on Gene feature selection using microarray data for cancer classification
A.Natarajan, T.Ravi
|
28 |
Security Model based on Network coding & Homomorphic Encryption for Content Distribution in VANET
Binoli Shah, Jitendra Bhatia
|
29 |
Sentiment Analysis and Big Data Processing
Mo Karimkhan, Jitendra B. Bhatia
|
30 |
Parallelization of Synthetic Aperture Radar (SAR) Imaging Algorithms on GPU
Bhaumik Pandya, Nagendra Gajjar
|
31 |
Survey on Software Quality Assurance
Dhaval Jha, Vaishnavi Bhagat, Anjali Bidua
|
32 |
FPGAC: - High Level Synthesis Tool
Harish Bhutra, Usha Patel, Prof. Darshana Upadhyay
|
33 |
Frequent Pattern mining Using Novel FP-Growth Approach
Sanjay Patel, K.Kotecha, Viral Patel, Harsh Shukla, Dhyey Shah, Sharan Raghu
|
34 |
Conceptual Study of Agile Software Development
Sharnil Pandya, Ankur Kumar Yadav, Nikunj Dalsaniya, Vivek Mandir
|
35 |
A Composite Approach for Biometric Template Security
Sanjiv Kr. Grewal
|
36 |
Mobile Ad-hoc Network Performance Analysis: A Survey
Ajit Singh, R.S.Uppal
|
37 |
An Improved Approach to Multibiometrics Security
Gursimarpreet Kaur, Arun Kumar Yadav, Dr. Sheetal Chaudhary
|
38 |
ICT-A Novel way of Teaching, Learning & Research in Higher Education: A Case Study of University of Jammu
Nidhi Sambyal, Rohit Gupta
|
39 |
Security of Remote Devices with Personal Identification Card using Biometrics
Ravi Parkash Goela
|
40 |
A Gujarati Phonetic Engine using Microsoft SAPI
Dhaval Shah, Rucha Shah, Trupti Manik
|
41 |
FLCPlus: A Light-Weight Open-Source Library In C++ For Fuzzy Logic Controller
Krishna K Panduru
|
42 |
Performance Evaluation of Profit-Aware Optimized Task Scheduling in Load Balancing Algorithm
Sweta Kumari Meel, K. S. Raghuwanshi
|
43 |
A Mobility aware algorithm to Manage Network Performance over Mobile Ad-Hoc Network
Ajit Singh, R.S.Uppal
|
44 |
Moment Invariants based Blur Detection and Estimation for Blind Image Restoration
Ruchi Gajjar, Darshan Limbachiya, Tanish Zaveri, Kishor Upla
|
45 |
Elements of File Synchronous Technology
Neeharika Pandey, Sarabjeet Kaur
|
46 |
Fingerprint Matching Using Minutiae Points
Komal Sondhi, Yogesh Bansal
|
47 |
ETL-EXTRACT, TRANSFORM & LOAD TESTING
Rajesh Popli
|
48 |
Sorting Algorithms: A Comparative Study
Karmjit kaur
|