Collection's Items (Sorted by Submit Date in Descending order): 41 to 60 of 82
Issue Date | Title | Author(s) |
2017 | Automatic Plant Leaf Recognition Using Morphological Based Approach | Rupinder Kaur |
2017 | Automatic Emotion Detection Model From Facial Expression Using Gradient Features | Arora, Malika |
2018 | An Optimized Feature Extraction Approach for Automatic Face Emotion Detection System | Jindal, Sonia |
2017 | Hybrid Clustering Algorithm with Angular and Distance Based Layered Distribution of the Wireless Sensor Networks | Ravneet Kaur |
2018 | Quadrature Distributed Energy Efficient Clustering Technique for Energy Conservation in Wireless Sensor Network | Gupta, Lata |
2017 | An Efficient Hybrid Approach for Secure Speech Cryptography | Sharma, Jyoti |
2019; 2019 | Energy Efficient Clustering Algorithm for Wireless Sensor Network Using Type-2 Fuzzy Logic | Kumar, Manoj; Kumar, Manoj |
2016 | Improved Cooperative Bait Detection Scheme for Detection and Prevention of Blackhole Attacks in MANETs | Gill, Ravinder Kaur |
2016 | A Home Security Mechanism Using Paired Key for Sensor to Cloud Communications | Garg, Nandini |
2017; 2017 | Novel Clustering Approach to Maintain the Connectivity of Vehicles in Vehicular Ad-hoc Networks | Harpreet Kaur; Harpreet Kaur |
2016 | An Improvement in Automatic Segmentation of Blood Vessels in Retinal Images | Sharma, Anchal |
2016 | Fraud Detection in E-commerce Websites Using Randomized Algorithm in R and SparkR | Goel, Eesha |
2016 | Defence Against Vampire Attacks in WSNs | Bansal, Neha |
2016 | Human Action Recognition Using SVM and KNN Classifiers | Jasreet Kaur |
2017 | Spurious Minutiae Removal Technique Using Msplitends Case | Nagpal, Ankita |
2016 | Spell Checking and Error Correcting System for Text Paragraphs Written in Punjabi-Hindi Language Using Hybrid Approach | Harpreet Kaur |
2016 | Design and Performance Evaluation of WLAN Network at Hotspot Locations Using ACE Application in OPNET | Bala, Preet |
2017 | Image Compression Using Hybrid Technique | Binni |
2018 | Efficient Steganography Algorithm Based on DCT and Entropy Thresholding Technique | Satvir Singh |
2016 | Sentimental Analysis of Social Networking Site Using R Language and Hadoop:Rhadoop | Kumar, Sunny |
Collection's Items (Sorted by Submit Date in Descending order): 41 to 60 of 82