Basic Arithmetic Coding Based Approach to Compress a Character String
|
2017 |
Mondal, Ipsita |
Comparative Analysis of Different Feature Ranking Techniques in Data Mining-Based Android Malware Detection
|
2017 |
Bhattacharya, Abhishek |
Text Document Classification with PCA and One-Class SVM
|
2017 |
Kumar, B. Shravan |
A Hybrid Genetic Algorithm for Cell Formation Problems Using Operational Time
|
2017 |
Chaudhuri, Barnali |
Content-Aware Video Retargeting by Seam Carving
|
2017 |
Desai, Shrinivas D. |
Intelligence System Security Based on 3-D Image
|
2017 |
Anish, K. |
On the Security of Chaos-Based Watermarking Scheme for Secure Communication
|
2017 |
Ahmad, Musheer |
Venn Diagram-Based Feature Ranking Technique for Key Term Extraction
|
2017 |
Chakraborty, Neelotpal |
A Soft Computing Approach for Modeling of Nonlinear Dynamical Systems
|
2017 |
Kumar, Rajesh |
Optimization of Workload Scheduling in Computational Grid
|
2017 |
Goswami, Sukalyan |
Cloud Security and Jurisdiction: Need of the Hour
|
2017 |
Jena, Tamanna |
A Secure and Lightweight Protocol for Mobile DRM Based on DRM Community Cloud (DCC)
|
2017 |
Alsaghier, Hisham M. |
Abnormal Network Traffic Detection Using Support Vector Data Description
|
2017 |
Bodapati, Jyostna Devi |
Recognize Online Handwritten Bangla Characters Using Hausdorff Distance-Based Feature
|
2017 |
Sen, Shibaprasad |
Evaluation of Machine Learning Approaches for Change-Proneness Prediction Using Code Smells
|
2017 |
Kaur, Kamaldeep |
UWB BPF with Notch Band for Satellite Communication Using Pseudo-Interdigital Structure
|
2017 |
Gaurav, Yatindra |
BDN: Biodegradable Node, Novel Approach for Routing in Delay Tolerant Network
|
2017 |
Fatimah, Afreen |
B-Secure: A Dynamic Reputation System for Identifying Anomalous BGP Paths
|
2017 |
Sankar, A. U. Prem |
Feature Optimality-Based Semi-supervised Face Recognition Approach
|
2017 |
Taqdir |
Fuzzy-Based Algorithm for Resource Allocation
|
2017 |
Saini, Gurpreet Singh |