Academic Journals Database
Disseminating quality controlled scientific knowledge

Search Articles for "technology"

ADD TO MY LIST
 
Undergraduate Program in Network Engineering and Security – A Feasibility Study

Author(s): Fahed Awad | Omar Banimelhem | Eyad Taqieddin | Raed Bani-Hani
Survey of MAC Layer Protocols for vehicular Ad Hoc Network

Author(s): Vimal Bibhu | Dhirendra Kumar Singh
Speech Quality Assessment of VoIP: G.711 VS G.722 Based on Interview Tests with Thai Users

Author(s): Therdpong Daengsi | Chai Wutiwiwatchai | Apiruck Preechayasomboon | Saowanit Sukparungsee
A Hybrid Algorithm for Classification of Compressed ECG

Author(s): Shubhada S.Ardhapurkar | Ramandra R. Manthalkar | Suhas S.Gajre
Chaotic Behavior of Heart Rate Signals during Chi and Kundalini Meditation

Author(s): Atefeh Goshvarpour | Ateke Goshvarpour
Human Identification by Gait Using Corner Points

Author(s): Mridul Ghosh | Debotosh Bhattacharjee
Fuzzy Logic Based Three Step Search Algorithm for Motion Vector Estimation

Author(s): Suvojit Acharjee | Sheli Sinha Chaudhuri
Recurrence Plots of Heart Rate Signals during Meditation

Author(s): Ateke Goshvarpour | Atefeh Goshvarpour
Ear Biometrics in Human Identification System

Author(s): V.K. Narendira Kumar | B. Srinivasan
Study of Noise Detection and Noise Removal Techniques in Medical Images

Author(s): Bhausaheb Shinde | Dnyandeo Mhaske | A.R. Dani
Using Fuzzy Logic to Evaluate Normalization Completeness for an Improved Database Design

Author(s): M. Rizwan Jameel Qureshi | Mahaboob Sharief Shaik | Nayyar Iqbal
Diversity Through N-Version Programming: Current State, Challenges and Recommendations

Author(s): Raphaël Khoury | Abdelwahab Hamou-Lhadj | Mario Couture | Robert Charpentier
Reconstruction of Shape and Position for Scattering Objects by Linear Sampling Method

Author(s): A.R. Eskandari | M. Naser-Moghaddasi | M. Eskandari
Simplified Method for Compiling Rule Base Matrix

Author(s): T. D. Dongale | T .G. Kulkarni | P. A. Kadam | R. R. Mudholkar
Matlab -based Simulation & Analysis of Three - level SPWM Inverter

Author(s): Kapil Jain | Pradyumn Chaturvedi
Noise Reduction of an Image by using Function Approximation Techniques.

Author(s): ABHISHEK ARVIND GULHANE | ABRAR SHAUKAT ALVI
Performance Analysis for Concatenated Coding schemes with Efficient Modulation Techniques

Author(s): Hala M. A. Mansour | Labib Francis Gergis | Mostafa A. R. Eltokhy | Hoda Z. Said
AGC & AVR of Interconnected Thermal Power System While Considering the Effect of GRCs

Author(s): Sandeep Kumar | Gourav Sharma | Gurdeepinder Singh
Private Cloud Secure Computing

Author(s): Gurudatt Kulkarni | Niraj Patil | Pradip Patil
A Smart and Secure Wireless Communication System: Cognitive Radio

Author(s): Shrikrishan Yadav | Santosh Kumar Singh | Krishna Chandra Roy
Kernel Based Approach toward Automatic object Detection and Tracking in Surveillance Systems

Author(s): Amir Aliabadian | Esmaeil Akbarpour | Mohammad Yosefi
Voltage Balancing in SVM Controlled Diode Clamped Multilevel Inverter for Adjustable drives

Author(s): P. S. Anish | S. Ramarajan | T. Arun Srinivas | M. Sasikumar
Comparison and Inspection of Harmonic Effects in PMSM and Induction Motors

Author(s): Seyed Zeinolabedin Moussavi | Aliakbar Rahmani
Interfacing of Sensor Network to Communication Network for Disaster Management

Author(s): Sanjay Patel | O. P. Vyas | Hansa Mehra
DENOISING ECG SIGNALS USING ADAPTIVE FILTER ALGORITHM

Author(s): Chinmay Chandrakar | M.K. Kowar
Position and Speed Control of Permanent Magnet Motors, State Space Approach

Author(s): Seyed Zeinolabedin Moussavi | Aliakbar Rahmani
Earlier Detection of Oral Cancer from Fuzzy Based Photo Plethysmography

Author(s): R.Hari Kumar | C.Ganesh babu | P.Shri vignesh
An Approach for Secure Data Transmission in Private Cloud

Author(s): Anurag Porwal | Rohit Maheshwari | B.L.Pal | Gaurav Kakhani
Temperature Control System Using ANFIS

Author(s): T.P.Mote | Dr.S.D.Lokhande
Flux Balance Analysis of Melanogenesis Pathway

Author(s): Prashana Balaji V. | Anvita Gupta Malhotra | Khushhali Menaria
Hardware Implementation of Mix Column Step in AES

Author(s): Pratap Kumar Dakua | Manoranjan Pradhan | Subba Rao Polamuri
Path Congestion Control in Centralized Autonomous System

Author(s): Jaspreet Kaur Bagga | Kshitij Pathak | Narendra S. Chaudhari
Analyzing Methodologies of Irregular NoC Topology Synthesis

Author(s): Naveen Choudhary | Dharm Singh | Surbhi Jain
Energy Efficient Dynamic Integration of Thresholds for Migration at Cloud Data Centers

Author(s): Richa Sinha | Nidhi Purohit | Hiteishi Diwanji
An Approach for SMS Security using Authentication Functions

Author(s): Neetesh Saxena | Narendra S. Chaudhari
A New Security Protocol for Mobile Ad Hoc Networks

Author(s): K. Sahadevaiah | Prasad Reddy P.V.G.D. | G. Narsimha
Spatial and Frequency Domain for Grey level Digital Images

Author(s): Dharm Singh | Naveen Choudhary | Madhuri Agrawal
An Approach to Increase Bandwidth Utilization under Suspected Flood Attack

Author(s): Raman Singh | Harish Kumar | R.K. Singla
Honeysand: An Open Source Tools based Sandbox Environment for Bot Analysis and Botnet Tracking

Author(s): Saurabh Chamotra | Rakesh Kumar Sehgal | Raj Kamal
Analyzing Digital Signature Robustness with Message Digest Algorithms

Author(s): Rubina B. Patel | Naveen Chaudhary
An Integrated Framework for Malware Collection and Analysis for Botnet Tracking

Author(s): Rakesh Kumar Sehgal | D. S. Bhilare | Saurabh Chamotra
Social Impact of Internet Access: A Survey

Author(s): Poonam Dhaka | Sandeep Upadhyay | Drashti Dave
Privacy-Preserving Data Sharing Using Data Reconstruction Based Approach

Author(s): Kshitij Pathak | Narendra S. Chaudhari | Aruna Tiwari
A New Bit Wise Technique for 3-Partitioning Algorithm

Author(s): Rajkumar Jain | Narendra S. Chaudhari
Performance Evaluation of Traffic Permutations for Mesh On-Chip Networks

Author(s): Naveen Choudhary | Dharm Singh | Abhilasha Sharma
Using Genetic Algorithm to Solve Game of Go-Moku

Author(s): Sanjay M Shah | Dharm Singh | J.S Shah
Real Time Opinion Polarity Detection in Blogs by Weighted Ranking TF-IDF Algorithm

Author(s): Abhishek Tiwari | Upasna Tiwari | Narendra S Chaudhari
Speaker Independent Recognition System with Mouse Movements

Author(s): R.L.K.Venkateswarlu | R. Vasantha Kumari | A.K.V.Nagayya
K-anonymity Model for Multiple Sensitive Attributes

Author(s): Nidhi Maheshwarkar | Kshitij Pathak | Narendra S. Choudhari
Imperialist Approach to Cluster Head Selection in WSN

Author(s): S. M. Hosseinirad | S.K. Basu
Analysis and Simulation of UDP-based application for Wireless Network

Author(s): Lal Chand Bishnoi | Dharm Singh | Shailendra Mishra
Realization & Implementation of Wireless Parking System with GSM Based Security

Author(s): Meenakshi Tripathi | M. S. Gaur | Vijay Laxmi
A Study of Wireless Environment by means of Multiple Wireless Nodes

Author(s): Amit Kumar Sanghi | Dharm Singh | Henna Rathore
Simulation Study of Black Hole and Jellyfish attack on MANET Using NS3

Author(s): Nidhi Purohit | Richa Sinha | Hiteishi Diwanji
Impact of Node Density on Scalable Routing Protocol in Wireless Mesh Networks

Author(s): Sanjeev Jain | Vinay Kumar | Sudarshan Tiwari
Performance of Routing Protocols in MANETs with Node Density and Mobility using Omni and Directional Antenna

Author(s): Vinay Kumar | Sanjeev Jain Motilal Nehru National | Sudarshan Tiwari
Enhanced Expanding Ring Search Algorithm for AODV

Author(s): Purvi N. Ramanuj | Hiteishi M. Diwanji
Comparative Analysis of Energy Efficient Routing Protocol for Wireless Sensor Network

Author(s): Munish Bhardwaj | Surender Soni | Dinesh Kumar Kotary
Web based Farmers Bulletin for agricultural development using PAP Approach

Author(s): N.Manikandan | M.Sakthiganesh | P.J.Kumar | M.SenthilKumar
SL-SecureNet: Intelligent Policing Using Data Mining Techniques

Author(s): M.A.P. Chamikara | Y.P.R. D. Yapa | S.R.Kodituwakku | J. Gunathilake
Introduction to Query Techniques for Large CBIR Systems

Author(s): Pravin D. Pardhi | Prashant L. Paikrao | Devendra S. Chaudhari
Sequential Pattern Mining: Survey and Current Research Challenges

Author(s): Chetna Chand | Amit Thakkar | Amit Ganatra
Effect Of Polygamy With Selection In Genetic Algorithms

Author(s): Rakesh Kumar | Jyotishree
A Review of Image Data Clustering Techniques

Author(s): Ashwini Gulhane | Prashant L. Paikrao | D. S. Chaudhari
An Empirical Evaluation of Density-Based Clustering Techniques

Author(s): Glory H. Shah | C. K. Bhensdadia | Amit P. Ganatra
Facial Expression Recognition using Neural Network –An Overview

Author(s): Pushpaja V. Saudagare | D.S. Chaudhari
Speech Emotion Recognition

Author(s): Ashish B. Ingale | D. S. Chaudhari
A Survey and Current Research Challenges in Multi-Label Classification Methods

Author(s): Purvi Prajapati | Amit Thakkar | Amit Ganatra
NUMERICAL ANALYSIS OF HELICOPTER ROTOR AT 400 RPM

Author(s): K.M. Pandey | A. Surana | D. Deka
Analysis of Secure Mobile Agent System

Author(s): Rajesh Shrivastava | Pooja Mehta (Gahoi)
TEXT TO SPEECH: A SIMPLE TUTORIAL

Author(s): D.Sasirekha | E.Chandra
A Study of Role Based Access Control policies and Constraints

Author(s): Miriyala Markandeyulu | Bussa V.R.R.Nagarjuna | Akula Ratna Babu | A.S.K.Ratnam
A Method to Align Images Using Image Segmentation

Author(s): K.Poornima | R.Kanchana
Formulation of Etoricoxib Into Immediate Release Tablets

Author(s): Santhosh Kumar Kasanagottu1, Pendota Santhosh2, K. Satish Kumar3, N. Nishanth Kumar4
Particle Swarm Optimized I-PD Controller for Second Order Time Delayed System

Author(s): S. J. Suji Prasad | P. A. Balakrishnan | Susan Varghese
ADVANCED ROTOR POSITION DETECTION TECHNIQUE FOR SENSORLESS BLDC MOTOR CONTROL

Author(s): S.JOSHUWA | E.SATHISHKUMAR | S.RAMSANKAR
Performance Analysis of an InGaAs Based p-i-n Photodetector

Author(s): Diponkar Kundu | Dilip Kumar Sarker | Md. Galib Hasan | Pallab Kanti Podder | Md. Masudur Rahman
New Approach of Data Encryption Standard Algorithm

Author(s): Shah Kruti R | Bhavika Gambhava
An Improved Fuzzy-Based CPU Scheduling (IFCS) Algorithm for Real Time Systems

Author(s): H. S. Behera | Ratikanta Pattanayak | Priyabrata Mallick
Development and Comparative Studies of Bio-based and Synthetic Fiber Based Sandwich Structures

Author(s): Sripathy Mallaiah | Krishna Vinayak Sharma | M Krishna
PRIVACY AWARE MONITORING FRAMEWORK FOR MOVING TOP-K SPATIAL JOIN QUERIES

Author(s): U.L.Sindhu | V.Sindhu | P.S.Balamurugan
K-ANONYMITY: The History of an IDEA

Author(s): Swagatika Devi
CFD Analysis of Flow through Compressor Cascade

Author(s): K.M.Pandey | S.Chakraborty | K.Deb
Cloud Computing: Different Approach & Security Challenge

Author(s): Maneesha Sharma | Himani Bansal | Amit Kumar Sharma
Software Quality Modeling and Current State of the Art

Author(s): N. Rajasekhar Reddy | R.J.Ramasree
Influence of Spray-Dryer Operating Variables on the Quality of Vernonanthura ferruginea (Less.) H. Rob. Extracts With Antiulcer Potential

Author(s): Ezequiane Machado Silva Oliveira1, Renê Oliveira Couto1, Mariana Viana Pinto1, José Luís Rodrigues Martins2,
Fuzzy C-Mean Clustering Algorithm Modification and Adaptation for Applications

Author(s): Bassam M. El-Zaghmouri | Marwan A. Abu-Zanona
Save time & money - Smart Internet Solutions      Why do you need a reservation system?