Search Results - "International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014)"

Refine Results
  1. 1

    Analysis of Supervised Maximum Likelihood Classification for remote sensing image by Sisodia, Pushpendra Singh, Tiwari, Vivekanand, Kumar, Anil

    “…In this paper, Supervised Maximum Likelihood Classification (MLC) has been used for analysis of remotely sensed image. The Landsat ETM+ image has used for…”
    Get full text
    Conference Proceeding
  2. 2

    Vehicular pollution monitoring using IoT by Manna, Souvik, Bhunia, Suman Sankar, Mukherjee, Nandini

    “…Degradation of air quality in cities is the result of a complex interaction between natural and anthropogenic environmental conditions. With the increase in…”
    Get full text
    Conference Proceeding
  3. 3

    A hybrid approach to Image Enhancement using Contrast Stretching on Image Sharpening and the analysis of various cases arising using histogram by Negi, Shailendra Singh, Bhandari, Yatendra Singh

    “…Image Enhancement is one of the first steps in Image processing. In this technique, the original image is processed so that the resultant image is more…”
    Get full text
    Conference Proceeding
  4. 4

    A simple algorithm for distribution system load flow with distributed generation by Mishra, Sivkumar, Das, Debapriya, Paul, Subrata

    “…With increasing penetration of distributed generators (DG) in power distribution system, the distribution system load flow methods also need to be modified…”
    Get full text
    Conference Proceeding
  5. 5

    Static analysis approaches to detect SQL injection and cross site scripting vulnerabilities in web applications: A survey by Gupta, Mukesh Kumar, Govil, M. C., Singh, Girdhari

    “…Dependence on web applications is increasing very rapidly in recent time for social communications, health problem, financial transaction and many other…”
    Get full text
    Conference Proceeding
  6. 6

    Comparison of classification techniques for intrusion detection dataset using WEKA by Garg, Tanya, Khurana, Surinder Singh

    “…As the network based applications are growing rapidly, the network security mechanisms require more attention to improve speed and precision. The ever evolving…”
    Get full text
    Conference Proceeding
  7. 7

    A novel intrusion detection system for ad hoc flooding attack using fuzzy logic in mobile ad hoc networks by Chaudhary, Alka, Tiwari, Vivekananda, Kumar, Anil

    “…Mobile ad hoc networks are very prone to internal and external attacks due to its complex properties such as dynamic topologies, no clear line of protection…”
    Get full text
    Conference Proceeding
  8. 8

    Combination approach to score level fusion for Multimodal Biometric system by using face and fingerprint by Telgad, Rupali L., Deshmukh, P. D., Siddiqui, Almas M. N.

    “…Biometric System is used for person's recognition and identification for various applications. The Biometric system is unimodal and multimodal biometric…”
    Get full text
    Conference Proceeding
  9. 9

    Comparative analysis of maximum power point (MPP) tracking techniques for solar PV application using MATLAB simulink by Dash, Soubhagya Kumar, Verma, Deepak, Nema, Savita, Nema, R. K.

    “…The renewable energy sources such as PV cells, fuel cells or energy storage devices are most popular. Among which photovoltaic energy is becoming one of the…”
    Get full text
    Conference Proceeding
  10. 10

    Optimal sizing of PV-battery for loss reduction and intermittency mitigation by Kalkhambkar, Vaiju, Kumar, Rajesh, Bhakar, Rohit

    “…Over these years, dependency of electric generation on renewables is increasing steadily. The renewable energy sources are usually connected to the electric…”
    Get full text
    Conference Proceeding
  11. 11

    Expert system and it's requirement engineering process by Agarwal, Mahak, Goel, Shivani

    “…Expert systems are basically developed to help in solving complex problems by reasoning about knowledge already known like a human expert does. It does not…”
    Get full text
    Conference Proceeding
  12. 12

    Moving object detection with moving background using optic flow by Patel, Milin P., Parmar, Shankar K.

    “…In recent scenario, video surveillance systems are important to monitor security sensitive areas such as banks, crowded public places and borders. Hence,…”
    Get full text
    Conference Proceeding
  13. 13

    A self explanatory review of decision tree classifiers by Anuradha, Gupta, Gaurav

    “…Decision tree classifiers are considered to serve as a standout amongst the most well-known approaches for representing classifiers in data classification. The…”
    Get full text
    Conference Proceeding
  14. 14

    Energy aware data collection in wireless sensor network using chain based PEGASIS by Gupta, Madhuri, Saraswat, Laxmi

    “…This paper proposes a variant approach for chain formation in the wireless sensor network which is a modified version of chain based PEGASIS protocol. It also…”
    Get full text
    Conference Proceeding
  15. 15

    Performance analysis of modified RC4 encryption algorithm by Jindal, Poonam, Singh, Brahmjit

    “…RC4 is one of the most widely accepted stream cipher on account of its structural simplicity, encryption and decryption speed and efficiency. In this paper, we…”
    Get full text
    Conference Proceeding
  16. 16

    Enhanced sentiment analysis of informal textual communication in social media by considering objective words and intensifiers by Bhaskar, Jasmine, Sruthi, K., Nedungadi, Prema

    “…Sentiment analysis is a valuable knowledge resource to understand collective sentiments from the Web and helps make better informed decisions. Sentiments may…”
    Get full text
    Conference Proceeding
  17. 17

    2-Bit magnitude comparator using GDI technique by Shekhawat, Vijaya, Sharma, Tripti, Sharma, Krishna Gopal

    “…In recent years, low power design has become one of the prime focuses for the digital VLSI circuit. Keeping the same in mind a new design of 2-Bit GDI based…”
    Get full text
    Conference Proceeding
  18. 18

    Survey on Graph and Cluster Based approaches in Multi-document Text Summarization by Meena, Yogesh Kumar, Jain, Ashish, Gopalani, Dinesh

    “…In today's era of World Wide Web, on-line information is increasing exponentially day by day. So there is a need to condense corpus of documents into useful…”
    Get full text
    Conference Proceeding
  19. 19

    Energy efficient communication protocol for wireless sensor networks with mobile node by Kumar Deva Sarma, Hiren, Rai, Prativa, Deka, Bhupesh

    “…Wireless Sensor Networks have become hot research stuff in the current age. This field has got tremendous scopes in various application areas. Generally, a…”
    Get full text
    Conference Proceeding
  20. 20

    Comparative assessment of leakage current in a photovoltaic grid connected single phase transformerless inverter system by Kumar, Deepak, Pattanaik, Akash, Singh, S. K.

    “…Innovation in PV technology and increase in production capacity is making PV panel installation cost less expensive than past. To utilize available solar power…”
    Get full text
    Conference Proceeding