Электротехника - 621.3

Научные статьи

В разделе "Электротехника"
An Analysis on Digital Watermarking in Videos based on Frequency Domain Techniques
Monasa Yengkhom, Pradeep Kumar Singh
Error Measurement & its Impact on Bilateral -Canny Edge Detector-A Hybrid Filter
Sangita Roy, Sheli Sinha Chaudhuri
A Low Cost High Speed FPGA-Based Image Processing Framework
Mohammad Reza Mahmoodi, Sayed Masoud Sayedi
Lossy Compression of Color Images using Lifting Scheme and Prediction Errors
Manoj Kumar, Ankita Vaish
GCSTLPP: Face Recognition using Gabor Center-Symmetric Tensor Locality Preservative Projection Approach in Video
Rajeshwari.J, K. Karibasappa, Gopalkrishna M.T
E-Mail Spam Detection Using SVM and RBF
Reena Sharma, Gurjot Kaur
Hackathon for Learning Digital Theology in Computer Science
Emmanuel Awuni Kolog, Erkki Sutinen, Eeva Nygren
Novel Reversible DS Gate for Reversible Logic Synthesis
Shaveta Thakral, Dipali Bansal
A Review of NBTI Degradation and its Impact on the Performance of SRAM
Umesh Dutta, M.K Soni, Manisha Pattanaik
Modular Design of 2n:1 Quantum Dot Cellular Automata Multiplexers and its Application, via Clock Zone based Crossover
Sonali Singh, Shraddha Pandey, Subodh Wairya
Email Spam Detection Using Combination of Particle Swarm Optimization and Artificial Neural Network and Support Vector Machine
Mohammad Zavvar, Meysam Rezaei, Shole Garavand
Design of Quantum Dot Cellular Automata Based Parity Generator and Checker with Minimum Clocks and Latency
Prateek Agrawal, S.R.P.Sinha, Neeraj Kumar Misra, Subodh Wairya
Optimization and Tracking of Vehicle Stable Features Using Vision Sensor in Outdoor Scenario
Kajal Sharma
Fault Tolerant ALU using Parity Preserving Reversible Logic Gates
Shaveta Thakral, Dipali Bansal
Study of Recent Charge Pump Circuits in Phase Locked Loop
Umakanta Nanda, Jyotirmayee Sarangi, Prakash Kumar Rout
A Novel Radiation Hardened Parallel IO Port for Highly Reliable Digital IC Design
Nastaran Rajaei, Ramin Rajaei
Modifying AODV to Reduce Load in MANETs
Gaurav Sharma, Manoj Singh, Prashant Sharma
Performance Analysis of Routing Protocols for Target Tracking in Wireless Sensor Networks
Sanjay Pahuja, Tarun Shrimali
Model for Targeting Customers Based on Analytics in Telecom Domain
Inderpreet Singh, Sukhpal Singh
Computer Modeling and Simulations of Logic Circuits
Gergana Kalpachka
Modeling of Haze Image as Ill-Posed Inverse Problem & its Solution
Sangita Roy, Sheli Sinha Chaudhuri
Resource Allocation Strategy with Lease Policy and Dynamic Load Balancing
Pooja S. Kshirsagar, Anita M. Pujar
Dynamic Malware Analysis and Detection in Virtual Environment
Akshatha Sujyothi, Shreenath Acharya
Design and Development of IoT Device to Measure Quality of Water
Chandrappa S, Dharmanna L, Shyama Srivatsa Bhatta U V, Sudeeksha Chiploonkar M, Suraksha M N, Thrupthi S
A Novel Reduced-Precision Fault-Tolerant Floating-Point Multiplier
Maryam Mohajer, Mojtaba Valinataj
Fault Repairing Strategy Selector for Service-Oriented Architecture
Guru Prasad Bhandari, Ratneshwer
A New High-Performance Bridge Structure for 4-to-2 Compressor using CMOS and CNFET Technology
Mehdi Darvishi, Mehdi Bagherizadeh
Computational Approach to Image Segmentation Analysis
Gourav, Tejpal Sharma, Harsmeet Singh
Error prone transmission system to resist data loss in a wireless sensor network
Sunil Kumar, C. Rama Krishna, A. K. Solanki
Enhancing the QoS of IoT networks with lightweight security protocol using Contiki OS
Haytham Qushtom, Khalid Rabaya’h
An extended approach for enhancing packet-loss of inter-SGSN in 3G mobile networks
Shadi Nashwan, Ala Hamarsheh
Estimating the sample size for training intrusion detection systems
Yasmen Wahba, Ehab ElSalamouny, Ghada ElTaweel
A programmable and managed software defined network
Priyesh Kumar, Rajnarayan Dutta, Rakesh Dagdi, Kavitha Sooda, Archana Naik
Energy consumption in mobile phones
Ambrin Javed, Muhammad Alyas Shahid, Muhammad Sharif, Mussarat Yasmin
Monitoring of military base station using flooding and ACO technique: an efficient approach
Abdus Samad, Mohammed Shuaib, Mohd Rizwan Beg
Achieving confidentiality in electronic health records using cloud systems
Robert French-Baidoo, Dominic Asamoah, Stephen Opoku Oppong
An improved model for securing ambient home network against spoofing attack
Solomon A. Akinboro, Adebayo Omotosho, Modupe O. Odusami
A comprehensive review of congestion control techniques in M2M and cellular networks
Chidanandan V., Arun Raj Kumar P.
Effective use method of cloudlet resources by mobile users
Rashid G. Alakbarov, Oqtay R. Alakbarov
Inter integrated WSN for crude oil pipeline monitoring
Bhavyarani M. P., U. B. Mahadeva Swamy, M. B. Shrynik Jain