Collection's Items (Sorted by Submit Date in Descending order): 281 to 300 of 374
Issue Date | Title | Author(s) |
2015 | Optimal Power Allocation to Cognitive User Under Joint Power Constraints With Imperfect Channel State Information | Bharti, Bindu; Singh, Ghanshyam [Guided by] |
2015 | Wireless Sensor Network Node Lifetime Enhancement Using Mobile Sink Based on Hybrid Protocol | Arman, Anuja; Saini, D.S. [Guided by] |
2015 | Web Mining in Cloud Computing Framework RANKING | Rawat, Ashish; Saha, Suman [Guided by] |
2015 | Wavelet Based Watermarking Technique using Digital Images | Javeed, Anum; Singh, Amit Kumar [Guided by] |
2015 | Understanding the Role of Specific Micrornas in Psoriasis Patients, With an Immunological Perspective | Tomar, Shivani; Jain, Manju [Guided by] |
2015 | Triple Band Microstrip Patch Antenna for Public Protection and Disaster Relief Using Aperture Coupled Feed | Khushvinder; Kumar, Pardeep [Guided by] |
2015 | Texture Analysis of Mammograms for Classification of Breast Tissue Density | Kriti; Virmani, Jitendra [Guided by] |
2015 | Strengthening of Beam Column Joints With Modified Reinforcement Technique | Tiwary, Aditya Kumar; Mohan, Mani [Guided by]; Singh, Lav [Guided by] |
2015 | Seismic Upgradation of a G plus III Storeyed Existing Residential Building Located in Jammu | Gupta, Nikita; Dhiman, Poonam [Guided by] |
2015 | Secure and Robust Watermarking Techniques for Medical Imaging | Sharma, Abhilasha; Ghrera, Satya Prakash [Guided by]; Singh, Amit Kumar [Guided by] |
2015 | Performance Assessment of Devices Beyond the Scaling Limits- Doublegate and Surrounding-gate Mosfet | Sood, Himangi; Singh, Ghanshyam [Guided by] |
2015 | Performance Analysis of Linear and Non-linear Precoding Schemes With Leakage Based Precoding Schemes in Multi-user Mimo Systems | Agnihotri, Aditi; Bhooshan, Sunil Vidya [Guided by]; Gupta, Bhasker [Guided by] |
2015 | Optimization of Symmetric Key Management in Wireless Mesh Networks | Rao, Aashish; Saini, Hemraj [Guided by] |
2015 | Optimal Power Allocation to Cognitive User Under Joint Power Constraints with Imperfect Channel State Information | Bharti, Bindu |
2015 | Opportunistic Multihop Routing in Wireless Sensor Network | Sharma, Mayank; Singh, Yashwant [Guided by] |
2015 | On Reduced Cost and Attack Proof Secure Authentication for Multi-Operator domain of WMN using the Asymmetric Cryptographic Technique | Singh, Ninni; Saini, Hemraj [Guided by] |
2015 | Multi-window Comparison of Sir Performance in Extraction of Mono-aural Vocal and Non-vocal Components in Repet | Kher, Vansha; Lamba, T.S. [Guided by] |
2015 | Mining Numerical Association Rules Using Genetic Algorithm | Chaudhary, Shailza; Kumar, Pardeep [Guided by] |
2015 | Mining Indian Tweets to Understand Food Price Rise Crisis | Sheenu; Kumar, Pardeep [Guided by] |
2015 | Medical Informatics Driven by Intelligent Multi-agents | Tyagi, Neha; Dahiya, Deepak [Guided by] |
Collection's Items (Sorted by Submit Date in Descending order): 281 to 300 of 374