IF

bh

 

ACEIT Conference Proceedings - 2016

ISSN 0975 - 9646

1. Sentiment Analysis of Social web data: A Review
Raj Kumar Verma, Dr. Ritu Tiwari, Prof. Nirmal Roberts
PDFPDF
2. Reliable Data Transmission Using Improved Packet Retransmission Timeout Calculation For Wireless Sensor Network
Roshan Jahan, Nida Khan, Shoeb Ahad Siddiqui, Mohd. Ishaque
PDFPDF
3. Recognition and Anticipation of Wormhole Attack in ALARM Protocol (MANETs)
Preetam Suman, Amrit Suman, Mohd. Amir Siddiqui, Rupshi Jha
PDFPDF
4. AEvolution of Knowledge Engineering Infrastructure at SGPGIMS, Lucknow Network Application in Hospital Environment
Repu Daman, Saroj K. Mishra
PDFPDF
5. Remote Sensing and GIS Application: An Overview
Dinesh Kumar Misra, Asif Siddiqui
PDFPDF
6. Secure Data Transfer & File Sharing Use of Cloud Service for Mobile Application
Swati Sharma, Ravindra Sharma
PDFPDF
7. A Review on Shifting Software Testing to Cloud
Akanksha Singh, Kusum Kardam , Mohammad Suaib
PDFPDF
8. Data and Virtualization Security in Cloud
Khushbu Dixit, Amrit Suman, Sadhna K. Mishra
PDFPDF
9. Approach to Prioritize the Requirements Using Fuzzy Logic
Neha Mishra, M.Akheela Khanum, Kavita Agrawal
PDFPDF
10. A Ubiquitous Computing – One of the Step Towards Smart Environment
Saba Khan, Dinesh Kumar Tiwari
PDFPDF
11. Preventive Measures for Security Threat in Big Data Environment
Sheeba Praveen, Sumaiya
PDFPDF
12. Energy Efficient Congestion Control mechanism in MANET
Pratibha Tripathi, Dr. Shish Ahmad
PDFPDF
13. AEnergy Efficient Routing Algorithm in MANET Using Optimized Euler Digraph
Mohita Dixit, Shish Ahmad, Mohd. Arif
PDFPDF
14. Proposal for Avoiding Ambiguity in Requirement Engineering using Artificial Intelligence
Shagun Sinha, Mohd Shahid Husain
PDFPDF
15. Software Quality Management: A Process to Improve the Quality of Software Project Using SQA
Chinmaya Dash, Dr. D Ramesh , Prakash C Behera
PDFPDF
16. 4G Wireless Network: A Review
Dr NitinGoel, Sudheer Kumar Singh, Shashank Singh, Mohd Sameer, Kavita Agrawal
PDFPDF
17. Use of Social Media to Drive Business Advantage in Banking
M.Akheela Khanum, Sajjad Anees Nagrami, Prof. M.C.Trivedi
PDFPDF
18. Detection of Knee Osteoarthritis Using X-Ray
Mahima Shanker Pandey, Dr. S S Soam , Dr. Surya Prakash Tripathi
PDFPDF
19. Analysis of Security Challenges in Vehicular Adhoc Network
Nazish Siddiqui, Mohd Shahid Husain, Mohammad Akbar
PDFPDF
20. Collision Free Cichelli Perfect Hash Function
Rajeev Ranjan Kumar Tripathi, Deepak Singh Dikhit, Rajesh Kumar Singh
PDFPDF
21. A Survey of Sequence Alignment Algorithms
Arunima Mishra,Sudhir Singh Soam, Surya Prakash Tripathi
PDFPDF
22. Real Time Video Content Based Contextual Advertisement
Tarun Sharma , Susheel S, Prashanth T.K, Uthej Mopathi, Tarun S,Rugwed Mahamune
PDFPDF
23. Zigbee Sensor Based Automatic Room Light Controller with Visitor Counter
Faizan Arif Khan, Prabhat Ranjan Sarkar, Saima Rahman, Fatima Yasmeen
PDFPDF
24. Identification of Systems With Multi-Model Error Surface by Ant Colony Optimization
Shikha Tripathi , Mohd Asif Ikbal
PDFPDF
25. An Intelligent Spatial Aware Search Engine Using Lucene and Solr
Thirunavukkarasu K, Priyank Tripathi, Deepak Upadhay and Dr.Manoj Wadhawa
PDFPDF
26. Metrics for Dynamic Load Balancing in a Parallel System
Mohd Haroon, Manish Madhav Tripathi, Riyazuddin
PDFPDF
27. Improvement Opportunities in the Design of Multi-Objective Evolutionary Fuzzy Classifiers: Handling Rule Selection and Interpretability-Accuracy Tradeoff
Praveen Kumar Dwivedi , Surya Prakash Tripathi
PDFPDF
28. Performance Analysis of AODV, DSR & LAR1 Routing Protocols for MANET
Ajay Kumar, Amit Kumar Kar, Abhishek Kumar, Deepak Dikhit
PDFPDF
29. Web Personalization and Recommendation: A Review
Nayab Zya , Mohammad Suaib, M S Husain
PDFPDF
30. A Comparative Study & Performance Evaluation of Different Clustering Techniques in Data Mining
Amit Kumar Kar, Shailesh Kumar Patel, Rajkishor Yadav
PDFPDF
31. Analytical Study of Big Data Classification
Neha Khan, Mohd Shahid Husain, Manish Madhav Tripathi
PDFPDF
32. Optimization and Performance Analysis of AODV Routing Protocol in MANET Using AI
Shriom Maurya, Dr. Shish Ahmad, Mohd Haroon
PDFPDF
33. StableWatermarking for Geometrical Attacks
Manish Madhava Tripathi, Dr. S P Tripathi, Mohd Haroon
PDFPDF
34. Cloud Computing for Medical Applications & Healthcare Delivery:Technology, Application, Security and Swot Analysis
Repu Daman, Manish M. Tripathi, Saroj K. Mishra
PDFPDF
35. Bayesian Equalizers Literature Survey with Analytical Comparison
Anurag Srivastava, Kavita Agarwal, Md. Shahid Hussain
PDFPDF
36. Bayesian Equalizer for Inter-symbol and Co-channel Interference using Mamdani Fuzzy System
Anurag Srivastava, Kavita Agarwal, Md. Shahid Hussain
PDFPDF
37. An Indiscriminate Semantic Similarity Search Using Latent Semantic Indexing in Data Mining
Nudrat Fatima, Saba Khalid, Halima Sadia
PDFPDF
38. Fuzzy Query: An Impression in Query processing
Ankita Srivastava, Sonali Yadav, Niharika Srivastava, Zaina Khan
PDFPDF
39. AUnderstanding Decision tree Algorithm by using R Programming Language
Akshat Sharma, Anuj Srivastava
PDFPDF
40. Role and Responsibility of Membership Service in Group Communication
Rajeev Ranjan Kumar Tripathi, Rajesh Kumar Singh, Shrawan Kumar Pandey, Rakesh Kumar Pandey
PDFPDF
41. Detection and Prevention Methods of Block Hole & Gray Hole Attacks in MANET - A Critical Survey
Vipin Dwivedi, Shish Ahmad
PDFPDF
42. Smart Feedback System Based E-Learning Model
Prof. Mohammad Ubaidullah Bokhari, Rizwan Alam
PDFPDF
43. Role of Semantically Enriched Ontologies for Information Retrieval in Indian E-Governance
Namrata Rastogi, Dr. Parul Verma
PDFPDF
44. Buffer Overflow : Anomaly in Application Security
Anwar Ahamed Shaikh,Anurag Srivastava,Ariq Ahmad,Ashutosh Singh and Adnan Abdul Rashid
PDFPDF
45. Key Management in Hierarchical MANET Using Kerberos
Satyendra Kr. Srivastav, Mohammad Arif, Bably Dolly
PDFPDF
46. A Novel Microwave Bandpass Filter for Rf Applications
Er. Ashish Tripathi
PDFPDF
47. Application of Information Technology in Construction Management
Abdul Ahad, Zishan Raza Khan, Mohammad Khasif Khan
PDFPDF
48. Role of IT in Parking Management
Abdul Ahad, Zishan Raza Khan, Syed Aqeel Ahmad, Mohammad Tayyab
PDFPDF
49. Comparative Study of Plasma and Metallic Antenna
Syed Mohammad Adnan, PallaviAsthana , O. P. Singh, Mohd. Maroof Siddiqui
PDFPDF
50. Applications of Metamaterials for Antenna
Syed Mohammad Adnan, PallaviAsthana, O. P. Singh, Mohd. Maroof Siddiqui
PDFPDF
51. A COMPARATIVE STUDY OF CLUSTERING ALGORITHMS FOR WHEAT DATA
Dileep Kumar Yadav, Maitreyee Dutta
PDFPDF
52. Requirement Elicitation in Mobile Apps: A Review
Bably Dolly, M. Akheela Khanum
PDFPDF
53. Parallel Algorithm for Adding Long Integers
Sanjeev Gangwar, Prashant Kumar Yadav
PDFPDF
54. The Factors of Quality Assurance in Agile Environment
Ayesha Saad, Manish Madhav Tripathi, Preetam Suman
PDFPDF
55. Software Effort Estimation Using Fuzzy Approach
Salma Tarannum, Mohammad Arif, Dr. Shish Ahmad
PDFPDF
56. Software Quality Model - Comparative Study
Falak khursheed, Mohd Haroon, Jameel Ahmad
PDFPDF
57. Distributed Job Processing Approach in Distributed Network
Anwar Ahmad Sheikh, Afsaruddin, Ijtaba Saleem Khan
PDFPDF
58. Software Elicitation Technique
Rudrendra Bahudar Singh, Mohammad Arif , Manish Madhav Tripathi
PDFPDF
59. A Critical Survey on Requirement Prioritization Techniques
Saman Khan, Shish Ahmad, Jameel Ahmad, Mohd Haider
PDFPDF
60. Development Effort, Software Quality and Cycle Time of Software Projects
Sadaf, Jameel ahmad, Afsaruddin
PDFPDF
61. An Analytical Study of Software Estimation Models: A Review
Tabbassum Iqbal, Kavita Agarwal, Jameel Ahmad
PDFPDF
62. A Critical Survey on Quality Models in Software Engineering
Saurabh Pandey, Sheikh Fahad Ahmad, Mohd. Hussain
PDFPDF
63. A Survey on Object-Oriented Software Testing
Harendra Singh Kharkwal, Mohammad Arif, Abu Daud Mohd Fayak, Afsaruddin Khan
PDFPDF
-All rights are reserved by International Journal of Computer Science and Information Technologies-