Task Scheduling in Heterogeneous Cloud Environment—A Survey
|
2020 |
Pradhan, Roshni |
Plain Text Encryption Using Sudoku Cipher
|
2020 |
Dey, Kashi Nath |
Performance Comparison Between Different Dispersion Compensation Methods in an Optical Link
|
2020 |
Singh, Manjit |
CMOS-Based XOR Gate Design for Full Swing Output Voltage and Minimum Power Delay Product (PDP)
|
2020 |
Gupta, Mangaldeep |
Two-Way Handshake User Authentication Scheme for e-Banking System
|
2020 |
Prasanalakshmi, B. |
Periocular Biometrics for Non-ideal Images Using Deep Convolutional Neural Networks
|
2020 |
Kumari, Punam |
Potential Threat Detection from Industrial Accident Reports Using Text Mining
|
2020 |
Ghosh, Sohan |
A Method to Detect Blink from the EEG Signal
|
2020 |
Panigrahi, Narayan |
Application of Generalized Possibilistic Fuzzy C-Means Clustering for User Profiling in Mobile Networks
|
2020 |
Ashwini, K. |
Power-Efficient Reversible Logic Design of S-Box for N-Bit AES
|
2020 |
Hongal, Rohini |
A Faster Fuzzy Clustering Approach for Recommender Systems
|
2020 |
Debgupta, Rajdeep |
Real-World Anomaly Detection Using Deep Learning
|
2020 |
Koppikar, Unnati |
The Role of Parallelism for Rust Defect Recognition Using Digital Image Processing
|
2020 |
Sahu, Mridu |
An Enhanced Bit-Map-Assisted Energy-Efficient MAC Protocol for Wireless Sensor Networks
|
2020 |
Debasis, Kumar |
Automated Video Surveillance System Using Video Analytics
|
2020 |
Rajesh, T. M. |
EVaClassifier Using Linear SVM Machine Learning Algorithm
|
2020 |
Vinothina, V. |
Supporting QoE-Aware Live Streaming Over Peer-to-Peer Network
|
2020 |
Tripathy, Swati Kumari |
Action Recognition Using 3D CNN and LSTM for Video Analytics
|
2020 |
Umamakeswari, A. |
Security Issues Due to Vulnerabilities in the Virtual Machine of Cloud Computing
|
2020 |
Bhagat, Swapnil P. |
Comparative Analysis of Apache Spark and Hadoop MapReduce Using Various Parameters and Execution Time
|
2020 |
Meena, Bhagavathula |