![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
WIR 2016: Indore, India
- Durgesh Kumar Mishra, Rashid Sheikh, Sarika Jain:
WIR '16: Women in Research 2016, Indore India, March, 2016. ACM 2016, ISBN 978-1-4503-4278-0 - Shimpy Harbajanka, Preeti Saxena:
Security Issues and Trust Management in Cloud Computing. 1-3 - Rashi Dhagat, Pankaj Jagtap:
An Approach Used In Wireless Network to Detect Denial of Service Attack. 4-6 - Pooja Shejawal, Jayshree R. Pansare:
Nearest Neighbor Search Technique Using Keywords and Threshold. 7-11 - Jayshree R. Pansare, V. D. Bajad:
Errors Detection in Big Sensor Data on Cloud using Time Efficient Technique. 12-14 - Shital M. Dharrao, Vijay D. Choudhary, Kantilal Pitambar Rane
:
Intelligent Bus stand Monitoring and Control. 15-19 - Seema Kolkur, Dhananjay R. Kalbande
:
Review of Machine Learning Algorithms in R software for Diagnosis of ESD Diseases. 20-25 - Aditi Nema, Basant Tiwari
, Vivek Tiwari:
Improving Accuracy for Intrusion Detection through Layered Approach Using Support Vector Machine with Feature Reduction. 26-31 - Jasleen Kaur, Jatinderkumar R. Saini
:
Punjabi Stop Words: A Gurmukhi, Shahmukhi and Roman Scripted Chronicle. 32-37 - Jaheda S. Ambekari, Sumedha Sirsikar
:
Comparative Study of Optimal Clustering Techniques in Wireless Sensor Network: A Survey. 38-44 - Suwarna Latambale, Sumedha Sirsikar
:
A Survey of various Sink Mobility based Techniques in Wireless Sensor Network. 45-50 - Shwetambari Pawar, Nilakshi Jain
, Swati Deshpande:
System Attribute Measures of Network Security Analyzer. 51-54 - Nilakshi Jain
, Priyanka Sharma, Rashmi Anchan, Apoorva Bhosale, Pooja Anchan, Dhananjay R. Kalbande
:
Computerized Forensic Approach Using Data Mining Techniques. 55-60 - Nilakshi Jain
, Dhananjay R. Kalbande
, Priyanka Sharma:
Empirical relationship between Victim's occupation and their knowledge of Digital Forensic. 61-65 - Dolly Meghani, S. Geetha
:
ECG Steganography to secure patient data in an E-Healthcare System. 66-70 - Anjali S. Yeole
, Dhananjay R. Kalbande
:
Use of Internet of Things (IoT) in Healthcare: A Survey. 71-76 - Neha Singh, Saurabh Singh, Naveen Kumar, Rakesh Kumar:
Key Management Techniques for Securing MANET. 77-80 - Ankita Gandhi, Amarjeet Poonia:
Image Visualization as per the User Appeal through Deep Learning. 81-86 - Srishti, Sapna Yadav:
Execution and Analysis of Topology Based Routing Protocols in VANET. 87-91 - Shikha Jindal, Manmohan Sharma:
Design and Implementation of Kerberos using DES Algorithm. 92-95 - Gayatri M. Phade
, Sandhya Save, Vivek Ratnapakhari:
Narrow Band LNA Design Using OGMOSFET for Noise and Gain Analysis. 96-99 - Asha A. Bharambe
, Dhananjay R. Kalbande
:
Techniques and Approaches for Disease Outbreak Prediction: A Survey. 100-102 - Anjali Bishnoi, H. M. Chawla:
Extending Storage Life of Pears Using a Formulation Developed from a Terpenoidal Oligomer from Lac. 103-108 - Neha Mahnot, Rekha Mehra, Shikha Maheshwary:
Double Layer Anti-Reflective Coating of SiO2/ZnO for Photovoltaic Cell. 109-111 - Anil Kumar Dubey, Khushbu Gulabani:
Gesture Recognition for VW & VO: Virtual Writing and Virtual Operation. 112-117 - Shashi Mehrotra
, Shruti Kohli:
The Study of the Usage of Data Analytic and Clustering Techniques for Web Elements. 118-120 - B. Malathi
, K. Chandra Sekharaiah
, H. Jayasree:
Analytical Trends and Practices of Web Intelligence. 121-125 - Sharon Christa
, V. Suma:
Significance of Ticket Analytics in Effective Software Maintenance: Awareness. 126-130 - Praveen Kumar, M. Ruthwik, Manisha K. Sree, Misba Saad, Annapurna P. Patil:
Implementation of an Emergency Evacuation System Using Intelligent Routing Using QualNet Simulator. 131-138 - Kamlesh Ahuja, Durgesh Kumar Mishra, Sarika Jain:
A Survey Paper on a Compact Data Structure Based Technique for Mining Frequent Closed Item Set. 139-141 - Rajdeep Chowdhury, Jenifar Khan, Subham Sengupta, Saswata Dasgupta, Soupayan Datta, Mallika De:
Dynamic Referencing Data Warehouse Employing Proposed Time Integrated Seed Based Element Engendered Cryptographic Algorithm. 142-149
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.