researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
Links
Filter by Year
OR
AND
NOT
1
2015
Filter by Tag
Filter by Author
[+]
OR
AND
NOT
1
A. Baskar
Ananthi Sheshasaayee
B. H. Shekar
Chandra Sekhar Vorugunti
Deepali Virmani
Dennis Gladis
K. Chandrasekaran
K. Sangeeta
M. Chandra Mouli Reddy
M. P. Nevetha
Mohammed Misbahuddin
Mrudula Sarvabhatla
Muzzammil Hussain
Ningrinla Marchang
Prema Nedungadi
Punam Bedi
Ruchika Malhotra
Sanjay Singh
Shrinivas D. Desai
Snehanshu Saha
Filter by Top terms
[+]
OR
AND
NOT
1
algorithm
approach
authentication
cloud
computing
data
detection
framework
image
images
management
mobile
multi
network
recognition
secure
system
time
using
wireless
WCI (wci)
Editions
Publications
Viewing Publication 1 - 100 from 121
2015
Is That Twitter Hashtag Worth Reading
Anusha A.
,
Sanjay Singh
.
wci 2015
:
272-277
[doi]
Comparative Study of Visual Attention Models with Human Eye Gaze in Remote Sensing Images
J. Amudha
,
D. Radha
,
A. S. Deepa
.
wci 2015
:
445-450
[doi]
Effect of Spam Filter on SPOT Algorithm
Anamika
,
K. V. L. P. Padmini
,
Vinela Guduru
,
K. Sangeeta
.
wci 2015
:
640-643
[doi]
Using PRUSS for Real-Time Applications on Beaglebone Black
Anjitha M. Anand
,
Balu Raveendran
,
Shoukath Cherukat
,
Shiyas Shahab
.
wci 2015
:
377-382
[doi]
Hallmarking Author Style from Short Texts by Multi-Classifier Using Enhanced Feature Set
U. Athira
,
Sabu M. Thampi
.
wci 2015
:
284-289
[doi]
Modeling Evolutionary Group Search Optimization Approach for Community Detection in Social Networks
Hema Banati
,
Nidhi Arora
.
wci 2015
:
109-117
[doi]
High performance SIFT features clustering of VHR satellite images for disaster management
Ujwala M. Bhangale
,
Surya S. Durbha
.
wci 2015
:
324-329
[doi]
A Mobile Based Remote User Authentication Scheme without Verifier Table for Cloud Based Services
Sumitra Binu
,
Mohammed Misbahuddin
,
Pethuru Raj
.
wci 2015
:
502-509
[doi]
An Efficient Way to Determine the Chromatic Number of a Graph Directly from its Input Realizable Sequence
Prantik Biswas
,
Chumki Acharya
,
Nirupam Chakrabarti
,
Shreyasi Das
,
Abhisek Paul
,
Paritosh Bhattacharya
.
wci 2015
:
458-462
[doi]
Robust and Adaptive Approach for Human Action Recognition Based on Weighted Enhanced Dynamic Time Warping
Bharathram Chandrasekaran
,
S. Chitrakala
.
wci 2015
:
412-418
[doi]
Subtracted Bit Representation and Frame Number Reduction using Adjacent Pixel Correlation for Video Compression
S. G. Charan
,
Chaya Reddy
.
wci 2015
:
149-154
[doi]
Comparative Study of Pitch Contour for Mentally Impaired
Kamakshi Chaudhary
,
Sumanlata Guatam
,
Latika Singh
.
wci 2015
:
169-173
[doi]
Graph Clustering for Large-Scale Text-Mining of Brain Imaging Studies
Manisha Chawla
,
Mounika Mesa
,
Krishna P. Miyapuram
.
wci 2015
:
163-168
[doi]
Attribute Reduction on Continuous Data in Rough Set Theory using Ant Colony Optimization Metaheuristic
Srilatha Chebrolu
,
Sriram G. Sanjeevi
.
wci 2015
:
17-24
[doi]
Primary User Authentication in Cognitive Radio Network using Signal Properties
Suditi Choudhary
,
Muzzammil Hussain
.
wci 2015
:
290-296
[doi]
A Control Mechanism for Power Management of Electrical Devices Using Android Phone in a Zigbee Network
Archana Das
,
Amal Ganesh
.
wci 2015
:
79-86
[doi]
Seeded Watershed Segmentation Based Proteomics for 2D-Gel Electrophoresis Images
Shrinivas D. Desai
,
S. D. Savitha
.
wci 2015
:
303-308
[doi]
Off-line Handwritten Modi Numerals Recognition using Chain Code
Manisha S. Deshmukh
,
Manoj P. Patil
,
Satish R. Kolhe
.
wci 2015
:
388-393
[doi]
Fast Modular Artificial Neural Network for the Classification of Breast Cancer Data
Doreswamy
,
M. Umme Salma
.
wci 2015
:
66-72
[doi]
Anomalies in Landsat Imagery and Imputation
Soumya Goswami
,
K. Sangeeta
.
wci 2015
:
353-358
[doi]
Distributed Multi Class SVM for Large Data Sets
Aruna Govada
,
Bhavul Gauri
,
Sanjay Kumar Sahay
.
wci 2015
:
54-58
[doi]
Comparative Study of Personality Models in Software Engineering
Jayati Gulati
,
Priya Bhardwaj
,
Bharti Suri
.
wci 2015
:
209-216
[doi]
Copy-Move forgery detection based on Harris Corner points and BRISK
Meera Mary Isaac
,
M. Wilscy
.
wci 2015
:
394-399
[doi]
A Computational Approach of Data Smoothening and Prediction of Diabetes Dataset
Shivani Jakhmola
,
Tribikram Pradhan
.
wci 2015
:
744-748
[doi]
Computing the Prestige of a journal: A Revised Multiple Linear Regression Approach
Neelam Jangid
,
Snehanshu Saha
,
Anand Narasimhamurthy
,
Archana Mathur
.
wci 2015
:
1-4
[doi]
Poster: An Efficient Low Power & High Performance in MPSOC
K. Jayasree
,
B. Naresh Kumar Reddy
,
B. Srinuvasu Kumar
,
J. V. N. Ramesh
,
Pranose J. Edavoor
,
Mohd Kashif Zia Ansari
.
wci 2015
:
708-711
[doi]
RosyRecommends: Collaborative Filter Analysis of Listening Behavior Using User Similarity Metrics Based on Timbral Clusters
Adarsh Jois
,
Jasmine Hsu
.
wci 2015
:
371-376
[doi]
Medical Image Mining System: MIMS
Neethu C. Joseph
,
Aswathy Wilson
.
wci 2015
:
438-444
[doi]
Is Stack Overflow Overflowing With Questions and Tags
Ranjitha R. K.
,
Sanjay Singh
.
wci 2015
:
278-283
[doi]
Fusion Mechanism for Multimodal Biometric System-Palmprint and Fingerprint
Bhagyashri Kale
,
Pravin Gawande
.
wci 2015
:
577-581
[doi]
Language Modelling and English Speech Prediction System to Aid People with Stuttering Disorder
Pramati S. Kalwad
,
Shailja Pattanaik
,
T. L. Chandana
,
G. Ram Mohana Reddy
.
wci 2015
:
191-195
[doi]
Physical to Virtual Migration of Ubuntu System on OpenStack Cloud
Pooja Karande
,
Sonam Gaherwar
,
Manish Kurhekar
.
wci 2015
:
510-515
[doi]
An Analogy of F0 Estimation Algorithms Using Sustained Vowel
V. Prarthana Karunaimathi
,
Dennis Gladis
,
D. Balakrishnan
.
wci 2015
:
217-221
[doi]
Two Phase Static Analysis Technique for Android Malware Detection
Priyadarshani M. Kate
,
Sunita V. Dhavale
.
wci 2015
:
650-655
[doi]
Face Recognition Based Person Specific Identification for Video Surveillance Applications
S. Kokila
,
B. Yogameena
.
wci 2015
:
143-148
[doi]
Learning to Grade Short Answers using Machine Learning Techniques
R. Krithika
,
Jayasree Narayanan
.
wci 2015
:
262-271
[doi]
Condition Monitoring in Roller Bearings using Cyclostationary Features
S. Sachin Kumar
,
Neethu Mohan
,
Prabaharan Poornachandran
,
K. P. Soman
.
wci 2015
:
690-697
[doi]
Multi-view Ensemble Learning: A Supervised Feature Set Partitioning for High Dimensional Data Classification
Vipin Kumar
,
Sonajharia Minz
.
wci 2015
:
31-37
[doi]
Illumination Invariant Text Recognition System Based On Contrast Limit Adaptive Histogram Equalization in Videos/Images
L. Smitha M.
,
B. H. Shekar
.
wci 2015
:
174-179
[doi]
SQAMPS: Secure Quorum Architecture for Mobile Presence Services with End-to-End Encryption
Dipti Madankar
,
Aaradhana Deshmukh
,
Vaishali Maheshkar
,
Albena Mihovska
.
wci 2015
:
608-613
[doi]
A Mobile Crowd Sensing Framework for Toll Plaza Delay Optimization
Usha Mahalingam
,
P. Leela Manju
.
wci 2015
:
180-185
[doi]
An Integrated Digital Image Analysis System for Detection, Recognition and Diagnosis of Disease in Wheat Leaves
Diptesh Majumdar
,
Dipak Kumar Kole
,
Aruna Chakraborty
,
Dwijesh Dutta Majumder
.
wci 2015
:
400-405
[doi]
A Web Metric Collection and Reporting System
Ruchika Malhotra
,
Anjali Sharma
.
wci 2015
:
661-667
[doi]
Multi Layer Versus Functional Link Single Layer Neural Network for Solving Nonlinear Singular Initial Value Problems
Susmita Mall
,
S. Chakraverty
.
wci 2015
:
678-683
[doi]
Fuzzy based Estimation of Received Signal Strength in a Wireless Sensor Network
M. Meenalochani
,
S. Sudha
.
wci 2015
:
624-628
[doi]
A Secure Image-Based Authentication Scheme Employing DNA Crypto and Steganography
Mohammed Misbahuddin
,
C. S. Sreeja
.
wci 2015
:
595-601
[doi]
Prognosis and Disclosure of Functional Modules from Protein-Protein Interaction Network
Manali R. Modi
,
K. P. Merry
.
wci 2015
:
25-30
[doi]
Applying Image Processing for Detecting On-Shelf Availability and Product Positioning in Retail Stores
Rahul Moorthy
,
Swikriti Behera
,
Saurav Verma
,
Shreyas Bhargave
,
Prasad Ramanathan
.
wci 2015
:
451-457
[doi]
Survey on Tag SNP selection methods using soft computing techniques
Divya P. Nair
,
Keerthana Dayanand
,
M. V. Judy
.
wci 2015
:
722-728
[doi]
Secure E-ticketing System based on Mutual Authentication using RFID
Lekshmi S. Nair
,
V. S. Arun
,
Sijo Joseph
.
wci 2015
:
673-677
[doi]
Rainfall Prediction using Artificial Neural Network on Map-Reduce Framework
K. Namitha
,
A. Jayapriya
,
G. Santhosh Kumar
.
wci 2015
:
492-495
[doi]
Entropy based content filtering for Mobile Web Page Adaptation
Neetu Narwal
,
Sanjay Kumar Sharma
,
Amit Prakash Singh
.
wci 2015
:
588-594
[doi]
Automatic Book Spine Extraction and Recognition for Library Inventory Management
M. P. Nevetha
,
A. Baskar
.
wci 2015
:
44-48
[doi]
Applications of Text Detection and its Challenges: A Review
M. P. Nevetha
,
A. Baskar
.
wci 2015
:
712-721
[doi]
Truthful Resource Allocation Detection Mechanism for Cloud Computing
Sasmita Parida
,
Suvendu Chandan Nayak
,
Chitaranjan Tripathy
.
wci 2015
:
487-491
[doi]
Impedance Cardiography Used For Diagnosis of Disease
Samrudhi Patil
,
P. Choudhari
.
wci 2015
:
406-411
[doi]
Time and Energy Saving through Computation Offloading with Bandwidth Consideration for Mobile Cloud Computing
Apurva Pawar
,
Vandana Jagtap
,
Mamta Bhamare
.
wci 2015
:
527-532
[doi]
Privacy and Personalization Perceptions of the Indian Demographic with respect to Online Searches
Saraswathi Punagin
,
Arti Arya
.
wci 2015
:
136-142
[doi]
Smart and Secure Monitoring of Industrial Environments using IoT
Shruthi Puranik
,
Jayashree Mohan
,
K. Chandrasekaran
.
wci 2015
:
644-649
[doi]
A Discrete Wavelet Transform based Adaptive Steganography for Digital Images
Pooja Rai
,
Sandeep Gurung
,
Mrinal Kanti Ghose
.
wci 2015
:
432-437
[doi]
Identifying Health Domain URLs using SVM
R. Rajalakshmi
.
wci 2015
:
203-208
[doi]
Distributed Binary Decision-Based Collaborative Spectrum Sensing in Infrastructure-less Cognitive Radio Network
Roshni Rajkumari
,
Ningrinla Marchang
.
wci 2015
:
335-340
[doi]
Building Web Personalization System with Time-Driven Web Usage Mining
P. T. Ramya
,
G. P. Sajeev
.
wci 2015
:
38-43
[doi]
Classification and Prediction of Breast Cancer Data derived Using Natural Language Processing
G. Johanna Johnsi Rani
,
Dennis Gladis
,
Joy Mammen
.
wci 2015
:
250-255
[doi]
Smart Mom: An architecture to monitor children at home
Sohini Roy
,
Uma Bhattacharya
.
wci 2015
:
614-623
[doi]
MoveFree: A ubiquitous system to provide women safety
Sohini Roy
,
Abhijit Sharma
,
Uma Bhattacharya
.
wci 2015
:
545-552
[doi]
Teaching Advanced Algebra to Engineering Majors: Dealing with the classroom challenges
Snehanshu Saha
,
Bhoomika Agarwal
,
Priyal Mehta
.
wci 2015
:
155-162
[doi]
Image Scrambling using Kekre's Walsh Sequency and Non Sinusoidal Transforms in Different Color Spaces
Tanuja K. Sarode
,
Pallavi N. Halarnkar
.
wci 2015
:
734-738
[doi]
A Robust and Light Weight Authentication Framework for Hadoop File System in Cloud Computing Environment
Mrudula Sarvabhatla
,
M. Chandra Mouli Reddy
,
Chandra Sekhar Vorugunti
.
wci 2015
:
463-468
[doi]
Shadow Detection and Removal from Real Images: State of Art
Remya K. Sasi
,
V. K. Govindan
.
wci 2015
:
309-317
[doi]
Information Risk Analysis in a Distributed MOOC Based Software System Using an Optimized Artificial Neural Network
Nimisha Sharath
,
Shivani S. Parikh
,
K. Chandrasekaran
.
wci 2015
:
256-261
[doi]
Integrating AI Techniques In SDLC: Design Phase Perspective
Shreta Sharma
,
S. K. Pandey
.
wci 2015
:
383-387
[doi]
A Distributed Cooperative Approach to Detect Gray Hole Attack in MANETs
Bobby Sharma
.
wci 2015
:
560-563
[doi]
A Novel Data Mining Approach for Detecting Spam Emails using Robust Chi-Square Features
Mugdha Sharma
,
Jasmeen Kaur
.
wci 2015
:
49-53
[doi]
Design of Dependable Task Scheduling Algorithm in Cloud Environment
Suruchi Sharma
,
Pratyay Kuila
.
wci 2015
:
516-521
[doi]
Architecting Solutions for Scalable Databases in Cloud
Gitanjali Sharma
,
Pankaj Deep Kaur
.
wci 2015
:
469-476
[doi]
Post Release Versions based Code Change Quality Metrics
Meera Sharma
,
Madhu Kumari
,
V. B. Singh
.
wci 2015
:
235-243
[doi]
Malware Detection in Android files based on Multiple levels of Learning and Diverse Data Sources
Shina Sheen
,
Anitha Ramalingam
.
wci 2015
:
553-559
[doi]
Gabor Moments Based Shot Boundary Detection
B. H. Shekar
,
K. P. Uma
.
wci 2015
:
359-364
[doi]
Shape Representation and Classification Based on Discrete Cosine Transformation and IDSC
B. H. Shekar
,
Bharathi Pilar
.
wci 2015
:
341-347
[doi]
A Theoretical Model for Big Data Analytics using Machine Learning Algorithms
Ananthi Sheshasaayee
,
J. V. N. Lakshmi
.
wci 2015
:
635-639
[doi]
An unsupervised approach for morphological segmentation of highly agglutinative Tamil language
Ananthi Sheshasaayee
,
V. R. Angela Deepa
.
wci 2015
:
739-743
[doi]
Content Based Audiobooks Indexing using Apache Hadoop Framework
Sonal Shetty
,
Akash Sabarad
,
Harish Hebballi
,
Moula Husain
,
S. M. Meena
,
Shiddu Nagaralli
.
wci 2015
:
496-501
[doi]
User intervention based segmentation of Myocardium In cardiac cine MRI images
Heenakousar Shigli
,
M. H. Tejas
,
Lohit Narayan
,
Shrinivas D. Desai
.
wci 2015
:
684-689
[doi]
Performance Based Energy Efficient Techniques For VM Allocation In Cloud Environment
Bela Shrimali
,
Hiren Patel
.
wci 2015
:
477-486
[doi]
Correlation based Feature Selection for Diagnosis of Acute Lymphoblastic Leukemia
Vanika Singhal
,
Preety Singh
.
wci 2015
:
5-9
[doi]
Mathematics Tutoring Apps for Low-Cost Devices: an Ethnographic Study of Requirements
Aishini Sinha
,
Anupama M. Dhareshwar
,
L. Saloni Joshi
,
Viraj Kumar
.
wci 2015
:
729-733
[doi]
Detecting Overlapping Communities in LBSNs with Enhanced Location Privacy
K. Sreelekshmi
,
Pretty Babu
.
wci 2015
:
87-90
[doi]
Cognitive Radio for Smart Home Environment
T. Sudha
,
Kiran Selvan
,
V. Anand
,
Krishna Anilkumar
,
V. G. Kavya
,
K. P. Anagha Madhav
.
wci 2015
:
629-634
[doi]
Discourse Translation from English to Telugu
T. Suryakanthi
,
Kamlesh Sharma
.
wci 2015
:
222-227
[doi]
Analog BIST for Capacitive MEMS Sensor using PLL
Favoureen Swer
,
V. Pradeep
,
Siva S. Yellampalli
.
wci 2015
:
348-352
[doi]
CODES: A COllaborative DEtection Strategy for SSDF Attacks in Cognitive Radio Networks
Amar Taggu
,
Chukhu Chunka
,
Ningrinla Marchang
.
wci 2015
:
118-123
[doi]
Integrated Energy Management Framework: Aatral
Muthuraman Thangaraj
,
S. Anuradha
.
wci 2015
:
698-707
[doi]
Automatic Generation of Templates using Ontology
S. Thenmalar
,
T. V. Geetha
.
wci 2015
:
668-672
[doi]
Improving the Accuracy of Document Similarity Approach using Word Sense Disambiguation
G. Veena
,
U. B. Umesha Sree Veni
.
wci 2015
:
196-202
[doi]
Gaussian filter based à-trous algorithm for image fusion
Susmitha Vekkot
,
Pancham Shukla
.
wci 2015
:
330-334
[doi]
An Efficient Deblurring Algorithm on Foggy Images using Curvelet Transforms
Monika Verma
,
Vandana Dixit Kaushik
,
Vinay Kumar Pathak
.
wci 2015
:
426-431
[doi]
Detection of Stealth Process using Hooking
Deepti Vidyarthi
.
wci 2015
:
602-607
[doi]
Maestro Algorithm for Sentiment Evaluation
Deepali Virmani
,
Taneja Shweta
,
Pooja Bhatia
.
wci 2015
:
244-249
[doi]
Intelligent Information Retrieval Technique for Wireless Sensor Networks
Deepali Virmani
,
Kaur Savneet
,
Geetika Malhotra
.
wci 2015
:
91-96
[doi]
Sign in
or
sign up
to see more results.