A Fuzzy Approach to Approximate String Matching for Text Retrieval in NLP
Medical Image Compression Using MultiWavelet Transform and MBTC
Performance Evaluation of Feature Descriptors in the Context of Tiny Video Classification
Mobility Compliance in WSN with Channel Load Balancing
The Strategic Risk Management in Software Engineering Approach
An Intrusion Detection System for Network Security Using Artificial Immune System
SCADA System Application for Power Distribution in Hyderabad City
An Effective Assistance System for a Visually Impaired Person
Designing Effective Schemes for Static Slot Configuration in Hadoop
Prediction of Enrolment in Higher Educational Institution Using Machine Learning
Designing Content based Video Retrieval System for Real Time Applications
Designing Hybrid Data Mining Technique for Efficient Industrial Engineering Domain
Black Box Attack of Simulation Secret Key Using Neural-Identifier
Survey on Design of MAC Protocols forWireless Sensor Networks
Prototype of Slotted Microstrip Patch Antenna for Multiband Application
An Optimal Solution Analysis of Microgrid Using Mixed Integer Linear Programming
Accurate Fault-location Algorithm by Least Error Squares (LES) Technique
A Short Review on Analytic Techniques and Challenges of Big Data
A Framework for Intrusion Detection and Prevention in Cloud Computing Network
Automated Smart Irrigation System for Typical Environment Using IoT
Novel Solution to Improve Mental Health by Integrating Music and IoT with Neural Feedback
An Analytical Approach for Solution of Vibration of Partially Cracked Thin Orthotropic Plates
Analysis of Lifetime and Energy Consumption While Data Collection in Wireless Sensor Networks
Electrochemical and Magnetic Behavior of Copper Ferrite Nanoparticles Prepared by Sol-gel Method
A Novel Approach for Initial Centroid Computation in Clustering
A Multi-modal Biometric User Authentication Scheme for Wireless Sensor Network Security
Real Time Visual Data Mining of Multimedia Objects -A SOM based Interactive Approach
Windows based Malware Prediction System Using Deep Learning Techniques
Secure Login System for Online Transaction Using Two Layer Authentication Protocol
A Survey on Identity based Cryptography
A Review of Software Defect Prediction Using Soft Computing Techniques
A Deep Learning Approach for Web API Classification
Online/Offline Decentralized Attribute based Encryption for Mobile Clouds
An Intelligent System for Early Assessment and Classification of Thyroid Disease