All Stories

  1. Cloud Services through a Blockchain to Enhance the Security
  2. Integration of the Cloud with Fog Computing to Secure Data Transmission between IoT and Cloud
  3. Cloud-based Cost Effective IIoT Model Towards Industry 5.0
  4. An Efficient Approach for Secured Data Transmission Between IoT and Cloud
  5. An Efficient Technique for Improving Trust and Privacy in Blockchain as a Service (BaaS)
  6. An Improved Indexing Technique for Tribal Art Retrieval System
  7. Sign Language versus Spoken English Language—A Study with Supervised Learning System Using RNN for Sign Language Interpretation
  8. An optimized facial stimuli paradigm for hybrid SSVEP+P300 brain computer interface
  9. Real-Time Cyber-Physical System for Healthcare Monitoring in COVID-19
  10. Human Vs. Machine Eye for Chart Interpretation
  11. BlockCloud: Blockchain as a Cloud Service
  12. Blockchain for Smart Systems
  13. Effective Multicast Routing Protocol for Ad Hoc Network
  14. Textese : To Minimise Cell Phone’s Memory
  15. ChartVi: Charts summarizer for visually impaired
  16. Resource-Efficient Pareto-Optimal Green Scheduler Architecture
  17. An Algorithm for High-Resolution Satellite Imagery Pre-processing
  18. Vedic Mathematics Approach to Speedup Parallel Computations
  19. Analysis of Factors of Parallelism and their Impact on Dense Algebra Problems
  20. Monitoring and Safety System for Underground Coalmines
  21. A Techno Aid to Ease in e-Rehabilitation
  22. Effective Real Time Disaster Management Using Optimized Scheduling
  23. Cloud Computing Technologies for Smart Agriculture and Healthcare
  24. Cloud Model for Real-Time Healthcare Services
  25. Community Cloud Service Model for People with Special Needs
  26. Virtualization Technology for Cloud-Based Services
  27. Optimization Mechanism for Energy Management in Wireless Sensor Networks (WSN) Assisted IoT
  28. Computing Technologies and Applications
  29. Real Time Edge Computing: An Edge of Automation
  30. Facial Expression Recognition System
  31. Cluster formation techniques for hierarchical real time tasks allocation on multiprocessor system
  32. Special Children Behaviour Pattern and Their Teaching Strategies
  33. Tasks Scheduling Using Dynamic Cluster-Based Hierarchical Real-Time Scheduler for Autonomous Car
  34. Cluster Based Real Time Scheduling for Distributed System
  35. Dynamic Multi-agent Real Time Scheduling Framework for Production Management
  36. Real Time Resource Scheduling Framework for Smart City
  37. Distributed Education System for Deaf and Dumb Children and Educator: A Today’s Need
  38. Impact Analysis of Hypervisors on the Performance of Virtualized Resources
  39. Multiple Clustering Method for Real-Time Distributed Denial-of-Service Attack Detection
  40. Role of Machine Learning and Deep Learning Approaches in Designing Network Intrusion Detection System
  41. Online Healthcare Consultation System for Deaf & Dumb During Pandemic Situation
  42. Real Time on Bed Medical Services : A Technological Gift to the Society
  43. Review on Multi-Factor Authentication (MFA) Sources and Operation Challenges
  44. POF-SVLM: pareto optimized framework for seamless VM live migration
  45. Real Time Entry Prohibition System for Coalmines
  46. Analysis of Geographical Change Detection using Satellite Images
  47. Suggesting teaching methods by analyzing the behavior of children with special needs
  48. Fog Computing Architecture, Applications and Security Issues
  49. An optimized facial stimuli paradigm for hybrid SSVEP+P300 brain computer interface
  50. Optimization of External Stimulus Features for Hybrid Visual Brain–Computer Interface
  51. Sarcasm Detection for Workplace Stress Management
  52. Standardization of Handwritten Words to Improve Readability
  53. Energy based incentive scheme for secure opportunistic routing in vehicular delay tolerant networks
  54. Adaptive classification to reduce non-stationarity in visual evoked potential brain-computer interfaces
  55. Deep Learning Neural Network for Identification of Bird Species
  56. Time-Critical Transmission Protocols in Wireless Sensor Networks: A Survey
  57. Template Based Approach for Question Systematization
  58. Agent Based Multilingual Information Retrieval System: A Design Approach
  59. E-MAC: Efficient MAC Protocol for Time-Critical Transmission in Wireless Sensor Networks
  60. Performance Analysis of Web Traffic Based on Visitors Behavior
  61. Finger Spelling in Air System for Deaf and Dumb
  62. Multi Language Text from an Image to English Translation
  63. ESPY: assistive aid to visually impaired for desktop access
  64. Complexity Analysis of Vedic Mathematics Algorithms for Multicore Environment
  65. Performance Analysis for Pareto-Optimal Green Consolidation Based on Virtual Machines Live Migration
  66. Interpretation of sign language into English using NLP techniques
  67. Hurdles For Designing Flowcharting Process
  68. Dynamic clustered hierarchical real time task assignment & resource management for IoT based smart human organ transplantation system
  69. Adverse conditions and techniques for cross-lingual text recognition
  70. Challenges and opportunities in finger spelling recognition in air
  71. Conversion of Tactile Sign Language into English for Deaf/Dumb Interaction
  72. News Headline Building using Hybrid Headline Generation Technique for Quick Gist
  73. Dependency Analysis for Secured Code Level Parallelization
  74. Effective Cache Management and Pollution Reduction for Online Privacy
  75. Image Bit Depth Plane Digital Watermarking for Secured Classified Image Data Transmission
  76. Multiple Applications Sharing for Effective Load Balancing in Secured Distributed Environment
  77. Transliteration of Secured SMS to Indian Regional Language
  78. Comparison between Famous Game Engines and Eminent Games
  79. Dynamic memory allocation technique for virtual machines
  80. RFS-UCM: A unified multilevel cache management policy
  81. Approach towards V M management for green computing
  82. Classification of high resolution pixels into non-heterogeneous groups using rule based fuzzy approach
  83. Desktop operations procreate ease for visually impaired
  84. Minimizing cache related preemption delay in preemptive scheduler
  85. Multilingual number image interpreter
  86. Hybrid Multi-level Cache Management Policy
  87. Robust fault tolerant job scheduling approach in Grid environment
  88. Virtual batching approach for green computing
  89. Multilanguage voice dictionary for ubiquitous environment
  90. Pros and cons of load balancing algorithms for cloud computing
  91. Medical image fusion techniques for remote surgery
  92. Pattern Based Real Time Disk Scheduling Algorithm for Virtualized Environment
  93. An Efficient Approach to Keystroke Saving for the Blinds
  94. Aggregation of EDF and ACO for Enhancing Real Time System Performance
  95. Methodology for Performance Improvement of Future Request Predicting Disk Scheduler for Virtualization
  96. Performance Analysis of DTSA in Distributed Network
  97. Block pattern based buffer cache management
  98. Modified address resolution protocol for delay improvement in distributed environment
  99. Prefix matching for keystroke minimization using B+ tree
  100. Word prediction using B+ tree for braille users
  101. An Adaptive Methodology for Ubiquitous ASR System
  102. A HYBRID METHOD FOR AUTOMATIC SPEECH RECOGNITION PERFORMANCE IMPROVEMENT IN REAL WORLD NOISY ENVIRONMENT
  103. Two Level Security Implementation for Voice Data Transmission
  104. Performance analysis for improved RAM utilization for Android applications
  105. Context based domain identification for resolving ambiguity
  106. Hiding speaker characteristics for security
  107. Normalization techniques for hiding speakers identity
  108. Probabilistic N-gram language model for SMS Lingo
  109. Survey of channel assignement schemes in wireless mesh network
  110. Improving speech intelligibility in an adverse condition using subband spectral subtraction method
  111. Speech user interface for computer based education system
  112. Voice Activity Detector and Noise Trackers for Speech Recognition System in Noisy Environment
  113. Feature Extraction for a Speech Recognition System in Noisy Environment: A Study
  114. Noise Estimation and Noise Removal Techniques for Speech Recognition in Adverse Environment
  115. Genetic Algorithm with Histogram Construction Technique
  116. Secured Communication in Real Time VANET
  117. Speech Packet Concealment Techniques Based on Time-Scale Modification for VoIP
  118. Error concealment schemes for speech packet transmission over IP network
  119. Hurdles for designing an application based on speech interface
  120. Interacting with Computer Using Ears and Tongue