Search


Start a new search
Add filters:

Use filters to refine the search results.


Results 7701-7750 of 12439 (Search time: 0.008 seconds).
Item hits:
Issue DateTitleAuthor(s)
2016A Methodical Review on Issues of Medical Image Management System with Watermarking ApproachVasudeva, Kshitiza; Singh, Pradeep Kumar; Singh, Yashwant
2014A Novel Human Computer Interaction Aware Algorithm to Minimize Energy ConsumptionGupta, P. K.; Singh, G.
2016A Novel Approach to Outlier Detection using Modified Grey Wolf Optimization and k-Nearest Neighbors AlgorithmAswani, Reema; Ghrera, S. P.; Chandra, Satish
2016A Survey on Green Power Efficient Resource Allocation Algorithm for Cloud InfrastructureSingh, A.A.; Gupta, Punit; Bhatt, Pansul; Goyal, M.K.
2014A New Group Key Transfer Protocol using CBU Hash FunctionKumar, Mohit; Ghrera, S. P.
2017Affect of Adversity Quotient on the Occupational Stress of IT Managers in IndiaSingha, Sandeep; Sharmab*, Tanu
2020An Attack Resilient Framework in Cognitive Radio Network Environment for Inter‑domain and Intra‑domain CommunicationRathee, Geetanjali; Jaglan, Naveen; Kanaujia, Binod Kumar
2020An Energy Efficient and Adaptive Threshold VM Consolidation Framework for Cloud EnvironmentKhattar, Nagma; Singh, Jaiteg; Sidhu, Jagpreet
2012Analysis of the Effect of Ground Plane Size on the Performance of a Probe-fed Cavity Resonator Microstrip AntennaJha, Kumud Ranjan; Singh, G.
2016An Integration Framework of Three-Dimensional Wireless Multimedia Sensor Network with Cloud Computing for Surveillance ApplicationsBhatt, Ravindara; Atishay, Atishay; Bhatt, Pansul
2016A Systematic Analysis on Mobile Application Software Vulnerabilities: Issues and ChallengesKhurana, P.; Sharma, Sharma; Singh, Pradeep Kumar
2016An Energy Efficient Opportunistic Routing Metric for Wireless Sensor NetworksKumar, Nagesh; Singh, Yashwant
2016A Vampire Act of Sybil Attack on the Highest Node Degree Clustering in Mobile Ad Hoc NetworksVasudeva, Amol; Sood, Manu; Prakash, Prem
2016Anaphora Resolution in Hindi: Issues and DirectionsAshima; Mohana, Rajni
2022Robust and Imperceptible Watermarking Techniques for Multimedia DataAgarwal, Namita; Kumar, Amit [Guided by]; Singh, Pradeep Kumar [Guided by]
2017Combining Mexican hat wavelet and spread spectrum for adaptive watermarking and its statistical detection using medical imagesChauhan, D. S.; Singh, A. K.; Adarsh, A.; Kumar, B.; Saini, J. P.
2017Design and Development of an Efficient EBG Structures Based Band Notched UWB Circular Monopole AntennaJaglan, Naveen; Kanaujia, Binod Kumar; Gupta2, Samir Dev; Srivastava, Shweta
2017Clock Synchronization in IoT Network Using Cloud ComputingJha, Ravi Shankar; Gupta, Punit
2017Computationally efficient joint imperceptible image watermarking and JPEG compression: a green computing approachSrivastava, Rohini; Kumar, Basant; Singh, Amit Kumar; Mohan, Anand
2017De-noising of ultrasound image using Bayesian approached heavy-tailed Cauchy distributionSahu, Sima; Singh, Harsh Vikram; Kumar, Basant; Singh, Amit Kumar
2017Aspects of Trusted Routing Communication in Smart NetworksRathee, Geetanjali; Saini, Hemraj; Singh, Ghanshyam
2016Computational Tools; Indispensable Armamentarium of Medical BiotechnologyNutan; Jain, Swapnil; Shilpa; Tomar, Akanksha; Changotra, Harish; Vashistt, Jitendraa
2019Comparative analysis of VM consolidation algorithms for cloud computingNagma; Singh, Jaiteg; Sidhu, Jagpreet
2015Design of Azimuthally Periodic Wedge-Shaped Circular Ring Bandpass Frequency Selective Surface Using Transmission-Line MethodBharti, Garima; Jha, Kumud Ranjan; Singh, G.; Jyoti, Rajeev
2017Guest Editorial: Robust and Secure Data Hiding Techniques for Telemedicine ApplicationsKumar, Pardeep; Ghrera, S. P.; Gupta, Pradeep Kumar; Mohan, Anand
2022Distributed PEP–PDP Architecture for Cloud DatabasesDeep, Gaurav; Sidhu, Jagpreeet; Mohana, Rajni
2018Guest Editorial: Multimedia for Predictive AnalyticsSingh, Sanjay Kumar; Singh, Amit Kumar; Kumar, Basant; Sarkar, Subir Kumar; Arya, Karm Veer
2012Fair Single Code and Multi Code Designs for 3G and Beyond CDMA SystemsSaini, Davinder S.; Sood, Munish
2016Energy Consumption Pattern at Household Level: A Micro Level Study of Himachal PradeshBhushan, Puneet; Singh, Pradeep Kumar; Singh, Yashwant
2017Effect of Emotional Intelligence on Job Performance of IT employees: A gender studyDhania, Priyam; Sharma, Tanu
2020Does bug report summarization help in enhancing the accuracy of bug severity ClassificationKukkar, Ashima; Mohana, Rajni; Kumar, Yugal
2016Efficient Approach for Securing Message Communication in Wireless Sensor Networks from Node Clone AttackMohindru, Vandana; Singh, Yashwant
2016Improved hybrid algorithm for robust and imperceptible multiple watermarking using digital imagesSingh, Amit Kumar
2016Improving the Average Number of Network Coded Transmission in AODV Routing Protocol with Network Coding SchemeGoyal, Mayank Kumar; Ghrera, Satya Prakash; Gupta, Jai Prakash
2015Hybrid technique for robust and imperceptible multiple watermarking using medical imagesSingh, Amit Kumar; Dave, Mayank; Mohan, Anand
2016Influence of Educational Qualification on Different Types of Cyber Crime: A Statistical InterpretationRao, Yerra Shankar; Rauta, Aswin Kumar; Saini, Hemraj; Panda, Tarini Charana
2016Intelligent Transport System: A Progressive ReviewZear, Aditi; Singh, Pradeep Kumar; Singh, Yashwant
2016Iris based secure NROI multiple eye image watermarking for teleophthalmologyPandey, Richa; Singh, Amit Kumar; Kumar, Basant; Mohan, Anand
2016Improving Anaphora Resolution by Resolving Gender and Number Agreement in Hindi Language using Rule based ApproachAshima, Ashima; Mohana, B. Rajni
2020Hybrid artificial chemical reaction optimization algorithm for cluster analysisSingha, Hakam; Kumar, Yugal
2015Information Fusion and Change Point Detection in Mutual Exclusive Distributive ClusteringSingha, Yashwant; Chugh b, Urvashi; MurthyC, Ramana
2014Moment Generating Function Based Performance Analysis of Maximal-Ratio Combining Diversity Receivers in the Generalized-K Fading ChannelsDwivedi, Vivek K.; Singh, G.
2016Mathematical Ontology for Infectious Virtual Machines in IaaS Cloud EnvironmentDash, S. B.; Saini, H.; Panda, T. C.; Mishra, A.
2017Multi-criteria Decision Making with Triangular Intuitionistic Fuzzy Number based on Distance Measure & Parametric Entropy ApproachSainia, Namita; Bajajb, Rakesh Kumar; Gandotraa, Gandotraa; Dwivedia, Ram Prakash
2015Multilevel Encrypted Text Watermarking on Medical Images Using Spread-Spectrum in DWT DomainSingh, Amit Kumar; Dave, Mayank; Mohan, Anand
2015Multilevel Encrypted Text Watermarking on Medical Images Using Spread-Spectrum in DWT DomainSingh, Amit Kumar; Dave, Mayank; Mohan, Anand
2015Modified Buyer Seller Watermarking Protocol based on Discrete Wavelet Transform and Principal Component AnalysisKumar, Ashwani; Ghrera, S. P.; Tyagi, Vipin
2016On Reduced Computation Cost for Edwards and Extended Twisted Edwards CurvesKumar, Gautam; Saini, Hemraj
2019Optimal Sensing and Transmission of Energy Efficient Cognitive Radio NetworksAwasthi, Meenakshi; Nigam, M. J; Kumar, Vijay
2008OVSF Code Sharing and Reducing the Code Wastage Capacity in WCDMASaini, Davinder S.; Bhooshan, Sunil V.
Results 7701-7750 of 12439 (Search time: 0.008 seconds).