Abstract is missing.
- An efficient algorithm for sampling of a single large graphVandana Bhatia, Rinkle Rani. 1-6 [doi]
- Sarcasm detection of tweets: A comparative studyTanya Jain, Nilesh Agrawal, Garima Goyal, Niyati Aggrawal. 1-6 [doi]
- Evaluation of parameters and techniques for genetic algorithm based channel allocation in Cognitive Radio NetworksDeepak Kumar Sharma, Anurag Singh, Anshul Khanna, Anubhav Jain. 1-6 [doi]
- Data clustering using enhanced biogeography-based optimizationRaju Pal, Mukesh Saraswat. 1-6 [doi]
- Performance evaluation of various data structures in building efficient indexing schemes for XML documentsG. Dhanalekshmi, Krishna Asawa. 1-3 [doi]
- Approaches for information retrieval in legal documentsRachayita Giri, Yosha Porwal, Vaibhavi Shukla, Palak Chadha, Rishabh Kaushal. 1-6 [doi]
- Smart intersection control algorithms for automated vehiclesMahmoud Pourmehrab, Lily Elefteriadou, Sanjay Ranka. 1-6 [doi]
- Adversarial attacks on computer vision algorithms using natural perturbationsArvind Ramanathan, Laura L. Pullum, Zubir Husein, Sunny Raj, Neslisah Torosdagli, Sumanta N. Pattanaik, Sumit Kumar Jha 0001. 1-6 [doi]
- Investigation of IR based topic models on issue tracking systems to infer software-specific semantic related term pairsDenzil Correa, Ashish Sureka, Sangeeta Lal. 1-5 [doi]
- Efficient design of full adder and subtractor using 5-input majority gate in QCARamanand Jaiswal, Trailokya Nath Sasamal. 1-6 [doi]
- Meta-heuristic solution for relay nodes placement in constrained environmentGaurav Kumar, Virender Ranga. 1-6 [doi]
- Impact of non-linear numerical methods on localization algorithmAmanpreet Kaur, Padam Kumar, Govind P. Gupta. 1-4 [doi]
- Cryptographic key generation from multimodal template using fuzzy extractorTaranpreet Kaur, Manvjeet Kaur. 1-6 [doi]
- CRUISE: A platform for crowdsourcing Requirements Elicitation and evolutionRicha Sharma, Ashish Sureka. 1-7 [doi]
- Secure live virtual machine migration through runtime monitorsAhmed M. Mahfouz, Md Lutfar Rahman, Sajjan G. Shiva. 1-5 [doi]
- A ranking based recommender system for cold start & data sparsity problemAnshu Sang, Santosh K. Vishwakarma. 1-3 [doi]
- Fraud detection and frequent pattern matching in insurance claims using data mining techniquesAayushi Verma, Anu Taneja, Anuja Arora. 1-7 [doi]
- Fixed and dynamic threshold selection criteria in energy detection for cognitive radio communication systemsAlok Kumar, Prabhat Thakur, Shweta Pandit, Ghanshyam Singh. 1-6 [doi]
- A feature-based analysis of MOOC for learning analyticsJyoti Chauhan, Anita Goel. 1-6 [doi]
- Design of people counting system using MATLABSurbhi Saxena, Dalpat Songara. 1-3 [doi]
- Biometric analysis for the recognition of spider species according to their websDavid Batista-Plaza, Carlos M. Travieso, Malay Kishore Dutta, Anushikha Singh. 1-6 [doi]
- Clickstream & behavioral analysis with context awareness for e-commercial applicationsSakshi Bansal, Chetna Gupta, Adwitiya Sinha. 1-6 [doi]
- Algorithms for projecting a bipartite networkSuman Banerjee, Mamata Jenamani, Dilip Kumar Pratihar. 1-3 [doi]
- Tension detection in online communitiesKriti Baindail, Pami Gupta, Parmeet Kaur. 1-5 [doi]
- An improved content based collaborative filtering algorithm for movie recommendationsAshish Pal, Prateek Parhi, Manuj Aggarwal. 1-3 [doi]
- Measuring the randomness of speech cues for emotion recognitionSeba Susan, Amandeep Kaur. 1-6 [doi]
- A horizontal fat mesh interconnection networkAkash Punhani, Pardeep Kumar, Nitin 0001. 1-5 [doi]
- Stability analysis of SRAM cell using CNT and GNR field effect transistorsParmjit Singh, Rajeevan Chandel, Neha Sharma. 1-6 [doi]
- A fast GPU algorithm for biconnected componentsMihir Wadwekar, Kishore Kothapalli. 1-6 [doi]
- Currency recognition system using image processingVedasamhitha Abburu, Saumya Gupta, S. R. Rimitha, Manjunath Mulimani, Shashidhar G. Koolagudi. 1-6 [doi]
- Are tweets the real estimators of election results?Munaza Ramzan, Shikha Mehta, E. Annapoorna. 1-4 [doi]
- CPLAG: Efficient plagiarism detection using bitwise operationsShikha Jain, Parmeet Kaur, Mukta Goyal, G. Dhanalekshmi. 1-5 [doi]
- Disassembling and patching iOS applications at assembly levelChetna Gupta, Arpita Jadhav Bhatt, Sangeeta Mittal. 1-6 [doi]
- Aspects of entrepreneurship education in higher education institutesMukta Mani. 1-3 [doi]
- Smart pilgrim: A mobile-sensor-cloud based system to safeguard pilgrims through smart environmentRajdeep Niyogi, Manoj Misra, Tarun Kulshrestha, Dhaval Patel. 1-6 [doi]
- Implementation of Ciphertext Policy-Attribute Based Encryption (CP-ABE) for fine grained access control of university dataShardha Porwal, Sangeeta Mittal. 1-7 [doi]
- Efficient content based image retrieval using SVM and color histogramShiraaz Saad, Harendra Kumar, Tribhuwan Kumar Tewari. 1-3 [doi]
- A fast and scalable crowd sensing based trajectory tracking systemRajdeep Niyogi, Tarun Kulshrestha, Dhaval Patel. 1-6 [doi]
- Sentiment analysis using relative prosody featuresHarika Abburi, K. N. R. K. Raju Alluri, Anil Kumar Vuppala, Manish Shrivastava, Suryakanth V. Gangashetty. 1-5 [doi]
- Region and feature matching based vehicle tracking for accident detectionAbhinav Saini, Sameer Suregaonkar, Neena Gupta, Vinod Karar, Shashi Poddar. 1-6 [doi]
- Biometric identifier based on hand and hand-written signature contour informationFernando A. Pitters-Figueroa, Carlos M. Travieso, Malay Kishore Dutta, Anushikha Singh. 1-6 [doi]
- Diabetic retinopathy detection using feedforward neural networkJayant Yadav, Manish Sharma, Vikas Saxena. 1-3 [doi]
- A game-theoretic approach to solve the free-rider problemAvadh Kishor, Rajdeep Niyogi. 1-6 [doi]
- Quantum genetic algorithm with rotation angle refinement for dependent task scheduling on distributed systemsTanvi Gandhi, Nitin 0001, Taj Alam. 1-5 [doi]
- Delay-based workflow scheduling for cost optimization in heterogeneous cloud systemMadhu Sudan Kumar, Indrajeet Gupta, Prasanta K. Jana. 1-6 [doi]
- A frequent itemset reduction algorithm for global pattern mining on distributed data streamsShalini, Sanjay Kumar Jain. 1-6 [doi]
- Differential evolution-based subspace clustering via thresholding ridge regressionAnkur Kulhari, Mukesh Saraswat. 1-3 [doi]
- Keystroke dynamics based authentication using fuzzy logicJatin Yadav, Kavita Pandey, Shashank Gupta, Richa Sharma. 1-6 [doi]
- Acoustic features based word level dialect classification using SVM and ensemble methodsNagaratna B. Chittaragi, Shashidhar G. Koolagudi. 1-6 [doi]
- Image based search engine using deep learningSurbhi Jain, Joydip Dhar. 1-7 [doi]
- Sentiment analysis of text using deep convolution neural networksAnmol Chachra, Pulkit Mehndiratta, Mohit Gupta. 1-6 [doi]
- Randomized grey wolf optimizer (RGWO) with randomly weighted coefficientsKartikeya Jaiswal, Himanshu Mittal, Sonia Kukreja. 1-3 [doi]
- Resolving identities on Facebook and TwitterSuyash Somani, Somya Jain. 1-3 [doi]
- Clustering based minimum spanning tree algorithmSakshi Saxena, Priyanka Verma, Dharmveer Singh Rajpoot. 1-3 [doi]
- Network diffusion for information propagation in online social communitiesShubham Jain, Govind Mohan, Adwitiya Sinha. 1-3 [doi]
- Impact analysis of rank attack with spoofed IP on routing in 6LoWPAN networkKrishna Kumar Rai, Krishna Asawa. 1-5 [doi]
- Design and implementation of an intelligent cab service systemAmar Nath, Ankit Khandelwal, Akul Kanojia, Ishitva Minocha, Rajdeep Niyogi. 1-6 [doi]
- Hybrid step size based cuckoo searchAvinash Chandra Pandey, Dharmveer Singh Rajpoot, Mukesh Saraswat. 1-6 [doi]
- Analyzing fault prediction usefulness from cost perspective using source code metricsLov Kumar, Ashish Sureka. 1-7 [doi]
- An approach to maintain attendance using image processing techniquesC. B. Yuvaraj, M. Srikanth, V. Santhosh Kumar, Y. V. Srinivasa Murthy, Shashidhar G. Koolagudi. 1-3 [doi]
- Keystroke dynamics based authentication system with unrestricted data collectionShashank Gupta, Kavita Pandey, Jatin Yadav, Richa Sharma. 1-6 [doi]
- Normalized videosnapping: A non-linear video synchronization approachAnkit Tripathi, Benu Changmai, Shrukul Habib, Nagaratna B. Chittaragi, Shashidhar G. Koolagudi. 1-6 [doi]
- Power-log based plateau limit histogram equalization algorithm for infrared image enhancementAbhisek Paul, Prantik Biswas, Paritosh Bhattacharya, Santi Prasad Maity. 1-5 [doi]
- No-escape search: Design and implementation ofcloud based directory content searchHarshit Gujral, Abhinav Sharma, Sangeeta Mittal. 1-6 [doi]
- MSD-Apriori: Discovering borderline-rare items using association miningShikhar Kesarwani, Astha Goel, Neetu Sardana. 1-4 [doi]
- Hybrid particle swarm training for convolution neural network (CNN)Yoshika Chhabra, Sanchit Varshney, Ankita. 1-3 [doi]
- Reach360: A comprehensive safety solutionSaumya Pandey, Nikita Jain, Aditi Bhardwaj, Gagandeep Kaur, Vimal Kumar. 1-3 [doi]
- Recognition of epilepsy from non-seizure electroencephalogram using combination of linear SVM and time domain attributesDebanshu Bhowmick, Atrija Singh, Sarini Sanyal. 1-4 [doi]
- Authorship attribution for textual data on online social networksRitu Banga, Pulkit Mehndiratta. 1-7 [doi]
- Deep sequential model for review rating predictionSharad Verma, Mayank Saini, Aditi Sharan. 1-6 [doi]
- KNNR: K-nearest neighbour classification based routing protocol for opportunistic networksDeepak Kumar Sharma, Aayush, Abhishek Sharma, Jaideep Kumar. 1-6 [doi]
- A study on the minimum dominating set problem approximation in parallelMahak Gambhir, Kishore Kothapalli. 1-6 [doi]
- The low-rate denial of service attack based comparative study of active queue management schemeSanjeev Patel, Abhinav Sharma. 1-3 [doi]
- Supporting collaborative software development in academic learning environment: A collaborative pair and quadruple programming based approachRitu Arora, Sanjay Goel, R. K. Mittal. 1-7 [doi]
- Fault tolerant streaming of live news using multi-node CassandraShubham Dhingra, Shreeya Sharma, Parmeet Kaur, Chetna Dabas. 1-5 [doi]
- Neural network with multiple training methods for web service quality of service parameter predictionLov Kumar, Ashish Sureka. 1-7 [doi]
- Designing energy efficient traveling paths for multiple mobile chargers in wireless rechargeable sensor networksAbhinav Tomar, Prasanta K. Jana. 1-6 [doi]