All Stories

  1. Image Encryption Using Homomorphic Transform
  2. An improved cryptographic technique using homomorphic transform
  3. Land cover classification of spaceborne multifrequency SAR and optical multispectral data using machine learning
  4. Hybrid Genetic Firefly Algorithm-Based Routing Protocol for VANETs
  5. Use of Homomorphic Transform in Encryption
  6. An Encryption Method Involving Homomorphic Transform
  7. Semantic segmentation of PolSAR image data using advanced deep learning model
  8. WITHDRAWN: PBeiD Priority-based Information Dissemination Protocol for V2V Communication
  9. Prediction of Interpolants in Zero Diluted Images
  10. Multi-Dimensional Rajan Transform
  11. SUBSURFACE IMAGING USING GROUND PENETRATING RADAR FOR UNDERGROUND OIL AND MINERALS EXPLORATION
  12. Set Theoretic Rajan Transform and its Properties
  13. A V2I BASED APPROACH TO MULTICAST IN VEHICULAR NETWORKS
  14. Comparative Study of Learning and Execution of Bipedal by Using Forgetting Mechanism in Reinforcement Learning Algorithm
  15. <p>Localization of Nuclei in Breast Cancer Using Whole Slide Imaging System Supported by Morphological Features and Shape Formulas</p>
  16. Automated Detection and Classification of Ki-67 Stained Nuclear Section Using Machine Learning Based on Texture of Nucleus to Measure Proliferation Score for Prognostic Evaluation of Breast Carcinoma
  17. A Novel Protocol for Information Dissemination in Vehicular Networks
  18. An Efficient Path Planning Algorithm for Networked Robots using Modified Optimization Algorithm
  19. Data Security Measures using Hybrid Encryption Technique
  20. Design, development and deployment of a RSSI based wireless network for post disaster management
  21. Performance Analysis of Cloud Data Verification Using MD5 and ECDSA Method
  22. Secure Public Auditing Using Batch Processing for Cloud Data Storage
  23. Wireless Sensor Node Localization based on LNSM and Hybrid TLBO- Unilateral technique for Outdoor Location
  24. A Review on VANET Routing Protocols and Wireless Standards
  25. Analysis of beaconing performance in IEEE 802.11p on vehicular ad-hoc environment
  26. Data verification using block level batch auditing on multi-cloud server
  27. Synthesis of nano-textured polystyrene/ZnO coatings with excellent transparency and superhydrophobicity
  28. Computer vision based personalized clothing assistance system: A proposed model
  29. Guidance, Navigation and Control of a Powered Parafoil Aerial Vehicle
  30. Kinematic Modelling of Multi-Terrain Pine Needle Collecting Robot (PiNCoR) for the Hilly areas of Uttarakhand
  31. Graph Structured Data Security using Trusted Third Party Query Process in Cloud Computing
  32. Evaluation of mobility managed reactive protocol AODVMM in a sparsely deployed mobile ad hoc network
  33. DCT Based Fuzzy Image Watermarking
  34. Data encryption and decryption algorithms using key rotations for data security in cloud system
  35. Efficient data security method to control data in cloud storage system using cryptographic techniques
  36. DE-LEACH: Distance and Energy Aware LEACH
  37. MEECDA: Multihop Energy Efficient Clustering and Data Aggregation Protocol for HWSN
  38. A Proposed Architecture for Efficient Data Delivery and Route Maintenance in a Sparsely Deployed Mobile Ad Hoc Network
  39. Distance based (DBCP) Cluster Protocol for Heterogeneous Wireless Sensor Network
  40. Use of Reinforcement Learning as a Challenge: A Review
  41. Preface