561 | Mining social media information to predict social behavioural patterns |
Researcher: | Arunima, Hima |
Guide: | Gladston, Raj |
University: | Mahatma Gandhi University, Kottayam |
Language: | English |
562 | |
Researcher: | K.R., Anil |
Guide: | S., Gladston Raj |
University: | Mahatma Gandhi University, Kottayam |
Language: | English |
563 | Hidden markov model based keyword spotting for Malayalam speech analytics |
Researcher: | P., Vivek |
Guide: | V.L., Lajish |
University: | University of Calicut, Kozhikode |
Language: | English |
564 | |
Researcher: | C.C., Benson |
Guide: | V.L., Lajish |
University: | University of Calicut, Kozhikode |
Language: | English |
565 | |
Researcher: | Joshi, Hardik |
Guide: | Pareek, Jyoti |
University: | Gujarat University, Ahmedabad |
Language: | English |
566 | Efficient multi-kernel learning algorithms for multiple data sets |
Researcher: | J., Kanchana |
Guide: | S., Gladston Raj |
University: | Mahatma Gandhi University, Kottayam |
Language: | English |
567 | |
Researcher: | Mathew, Terry Jacob |
Guide: | Sherly, Elizabeth |
University: | Mahatma Gandhi University, Kottayam |
Language: | English |
568 | |
Researcher: | Varghese, Jina |
Guide: | nair, K.N. Ramachandran |
University: | Mahatma Gandhi University, Kottayam |
Language: | English |
569 | |
Researcher: | Bali, Narinder |
Guide: | Mehra, Raghav |
University: | Bhagwant University |
Language: | English |
570 | Migrating legacy application to SaaS cloud: analysis of application level adaptations |
Researcher: | Parnami, Pooja |
Guide: | Jain, AmanSharma, Navneet |
University: | The IIS University |
Language: | English |
571 | A resilient application level vulnerability prevention techniques for injection method |
Researcher: | Raj, Shaji N. |
Guide: | Sherly, Elizabeth |
University: | Mahatma Gandhi University, Kottayam |
Language: | English |
572 | |
Researcher: | Vyas, Vivek |
Guide: | Atkotiya, Kishor H. |
University: | Saurashtra University, Rajkot |
Language: | English |
573 | Secret sharing approach based on steganography and cryptography for data security |
Researcher: | Donga, HItendra |
Guide: | Atkotiya, Kishor H. |
University: | Saurashtra University, Rajkot |
Language: | English |
574 | |
Researcher: | Gohel Payal , Dhirajlal |
Guide: | Atkotiya, Kishor H. |
University: | Saurashtra University, Rajkot |
Language: | Arabic |
575 | |
Researcher: | Punjani , Narbheram |
Guide: | Atkotiya, Kishor H. |
University: | Saurashtra University, Rajkot |
Language: | Arabic |
576 | Design of efficient algorithms for task scheduling in cloud computing |
Researcher: | Gupta, Indrajeet |
Guide: | Jana, P. K. |
University: | Indian School of Mines, Dhanbad |
Language: | English |
577 | Analytical and numerical study of hydromagnetic flow through porous and non-porous media |
Researcher: | Mandal, Prashanta kumar |
Guide: | Seth, G. S. |
University: | Indian School of Mines, Dhanbad |
Language: | English |
578 | |
Researcher: | Bhujade, Moreshwar Ramji |
Guide: | Isaac, J R |
University: | Indian Institute of Technology-Bombay |
Language: | English |
579 | On some problems in the analysis and design of decision tables |
Researcher: | Biswas, Somnath |
Guide: | Rajaraman, V |
University: | Indian Institute of Technology-Delhi |
Language: | English |
580 | Replication and placement strategies in complier code optimization |
Researcher: | Dhamdhere, Dhananjay Madhav |
Guide: | Isaac, J R |
University: | Indian Institute of Technology-Bombay |
Language: | English |