


default search action
WIR 2016: Indore, India
- Durgesh Kumar Mishra, Rashid Sheikh, Sarika Jain:

WIR '16: Women in Research 2016, Indore India, March, 2016. ACM 2016, ISBN 978-1-4503-4278-0 - Shimpy Harbajanka

, Preeti Saxena:
Security Issues and Trust Management in Cloud Computing. 1-3 - Rashi Dhagat, Pankaj Jagtap:

An Approach Used In Wireless Network to Detect Denial of Service Attack. 4-6 - Pooja Shejawal, Jayshree R. Pansare:

Nearest Neighbor Search Technique Using Keywords and Threshold. 7-11 - Jayshree R. Pansare, V. D. Bajad:

Errors Detection in Big Sensor Data on Cloud using Time Efficient Technique. 12-14 - Shital M. Dharrao, Vijay D. Choudhary, Kantilal Pitambar Rane

:
Intelligent Bus stand Monitoring and Control. 15-19 - Seema Kolkur

, Dhananjay R. Kalbande
:
Review of Machine Learning Algorithms in R software for Diagnosis of ESD Diseases. 20-25 - Aditi Nema, Basant Tiwari

, Vivek Tiwari
:
Improving Accuracy for Intrusion Detection through Layered Approach Using Support Vector Machine with Feature Reduction. 26-31 - Jasleen Kaur, Jatinderkumar R. Saini

:
Punjabi Stop Words: A Gurmukhi, Shahmukhi and Roman Scripted Chronicle. 32-37 - Jaheda S. Ambekari, Sumedha Sirsikar

:
Comparative Study of Optimal Clustering Techniques in Wireless Sensor Network: A Survey. 38-44 - Suwarna Latambale, Sumedha Sirsikar

:
A Survey of various Sink Mobility based Techniques in Wireless Sensor Network. 45-50 - Shwetambari Pawar, Nilakshi Jain

, Swati Deshpande:
System Attribute Measures of Network Security Analyzer. 51-54 - Nilakshi Jain

, Priyanka Sharma, Rashmi Anchan, Apoorva Bhosale, Pooja Anchan, Dhananjay R. Kalbande
:
Computerized Forensic Approach Using Data Mining Techniques. 55-60 - Nilakshi Jain

, Dhananjay R. Kalbande
, Priyanka Sharma:
Empirical relationship between Victim's occupation and their knowledge of Digital Forensic. 61-65 - Dolly Meghani, S. Geetha

:
ECG Steganography to secure patient data in an E-Healthcare System. 66-70 - Anjali S. Yeole

, Dhananjay R. Kalbande
:
Use of Internet of Things (IoT) in Healthcare: A Survey. 71-76 - Neha Singh, Saurabh Singh, Naveen Kumar, Rakesh Kumar:

Key Management Techniques for Securing MANET. 77-80 - Ankita Gandhi, Amarjeet Poonia:

Image Visualization as per the User Appeal through Deep Learning. 81-86 - Srishti, Sapna Yadav:

Execution and Analysis of Topology Based Routing Protocols in VANET. 87-91 - Shikha Jindal, Manmohan Sharma:

Design and Implementation of Kerberos using DES Algorithm. 92-95 - Gayatri M. Phade

, Sandhya Save, Vivek Ratnapakhari:
Narrow Band LNA Design Using OGMOSFET for Noise and Gain Analysis. 96-99 - Asha A. Bharambe

, Dhananjay R. Kalbande
:
Techniques and Approaches for Disease Outbreak Prediction: A Survey. 100-102 - Anjali Bishnoi

, H. M. Chawla:
Extending Storage Life of Pears Using a Formulation Developed from a Terpenoidal Oligomer from Lac. 103-108 - Neha Mahnot, Rekha Mehra

, Shikha Maheshwary:
Double Layer Anti-Reflective Coating of SiO2/ZnO for Photovoltaic Cell. 109-111 - Anil Kumar Dubey, Khushbu Gulabani:

Gesture Recognition for VW & VO: Virtual Writing and Virtual Operation. 112-117 - Shashi Mehrotra

, Shruti Kohli:
The Study of the Usage of Data Analytic and Clustering Techniques for Web Elements. 118-120 - B. Malathi

, K. Chandra Sekharaiah
, H. Jayasree:
Analytical Trends and Practices of Web Intelligence. 121-125 - Sharon Christa

, V. Suma:
Significance of Ticket Analytics in Effective Software Maintenance: Awareness. 126-130 - Praveen Kumar, M. Ruthwik, Manisha K. Sree, Misba Saad, Annapurna P. Patil:

Implementation of an Emergency Evacuation System Using Intelligent Routing Using QualNet Simulator. 131-138 - Kamlesh Ahuja, Durgesh Kumar Mishra

, Sarika Jain:
A Survey Paper on a Compact Data Structure Based Technique for Mining Frequent Closed Item Set. 139-141 - Rajdeep Chowdhury, Jenifar Khan, Subham Sengupta, Saswata Dasgupta, Soupayan Datta, Mallika De:

Dynamic Referencing Data Warehouse Employing Proposed Time Integrated Seed Based Element Engendered Cryptographic Algorithm. 142-149

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







last updated on 2026-04-27 22:56 CEST by the 







