IF

bh

 

VOLUME 5 ISSUE 2 March - April 2014

ISSN 0975 - 9646

1. Prioritization of Test Cases using Branch Coverage with Multiple criteria for Regression Testing
Pages : 972-974
Navleen Kaur, Manish Mahajan
Abstract | PDFPDF
2. Mobility Management Approaches for Mobile IP Networks
Pages : 975-977
V Anji Reddy, Swetha Tanavarapu,Harish Sampatharao,Vasavi Potipireddi, Shyam Pallanti
Abstract | PDFPDF
3. Reviewing and Reducing Hidden Cost by Proposing CSIPP-using DMT
Pages : 978-981
R. K. Seth and R. Chuchra
Abstract | PDFPDF
4. Integrity Verification in Multi-Cloud Storage Using Cooperative Provable Data Possession
Pages : 982-985
Megha Patil , Prof. G.R.Rao
Abstract | PDFPDF
5. A Novel Approach: Proactive Password Checking based on User Profiling
Pages : 986-990
Monika Pathak,Sukhdev Singh
Abstract | PDFPDF
6. Reliable Communication Using Topology Control in Mobile Ad-hoc Network
Pages :991-993
Sunil Deokule , Nivedita Malvadkar,Rupali Nimbalkar
Abstract | PDFPDF
7. A Survey on Location Based Routing Protocols in Mobile Ad-hoc Networks
Pages : 994-997
Abhishek Gupta , Samidha D Sharma
Abstract | PDFPDF
8. A Survey on Congestion Control in MANET
Pages : 998-1001
Geetika Maheshwari, Mahesh Gour,Umesh Kumar Chourasia
Abstract | PDFPDF
9. OCRP in Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Environment
Pages : 1002-1007
M.C. Babu, S.Umamageswari
Abstract | PDFPDF
10. Optical Character Recognition for English and Tamil Script
Pages : 1008-1010
Kanimozhi.V.M, Muthumani.I
Abstract | PDFPDF
11. Color and Shape Feature Extraction and Matching in Pill Identification Systems
Pages : 1011-1015
Dr.E.Annasaro, A.Hema
Abstract | PDFPDF
12. An Efficient Actionable 3D Subspace Clustering Based on Optimal Centroids
Pages : 1016-1019
V.Atchaya, C.Prakash
Abstract | PDFPDF
13. Secure Enhance Protocol for Vehicular Ad-hoc Networks
Pages :1020-1022
Manish Kumar Soni, Ashish Vashistha
Abstract | PDFPDF
14. A survey on Reducing Features to Improve Bug Prediction by Using Cos-triage Algorithm
Pages : 1023-1025
Veena Jadhav, Prof. Vandana Gaikwad
Abstract | PDFPDF
15. Survey on Opinion Mining and Summarization of User Reviews on Web
Pages : 1026-1030
Vijay B. Raut, D.D. Londhe
Abstract | PDFPDF
16. De Noising of Images With Moment Invariants
Pages : 1031-1034
Apoorva Mondal, Nishi Yadav
Abstract | PDFPDF
17. Improving Network Lifetime and Reducing Energy Consumption in Wireless Sensor Networks
Pages : 1035-1038
D.Suresh, K.Selvakumar
Abstract | PDFPDF
18. Enhancing the Features of Mobile Social Mass Media on Cloud Storage
Pages : 1039-1041
MA.Mohammed AnsarAli , M.Ramesh, S.SathishKumar
Abstract | PDFPDF
19. Detection of Routing Misbehavior Nodes Using Improved 2-ACK in MANET’S (Simulation through NS-2)
Pages : 1042-1044
P.Samba Siva Rao,.Aswini Meher,T.Kusuma, Y.Vasudha
Abstract | PDFPDF
20. Auditing Windows 7 Registry Keys to track the traces left out in copying files from system to external USB Device
Pages : 1045-1052
Abhijeet Ramani, Somesh Kumar Dewangan
Abstract | PDFPDF
21. An Enhanced Approach to Use SSL for End To End Security
Pages : 1053-1057
Swati Gupta, Saru Dhir
Abstract | PDFPDF
22. Survey on the RIP, OSPF, EIGRP Routing Protocols
Pages : 1058-1065
V.Vetriselvan, Pravin R.Patil, M.Mahendran
Abstract | PDFPDF
23. A Survey of the Existing Security Issues in Cloud Computing
Pages : 1066-1068
Parul Chachra
Abstract | PDFPDF
24. Survey and Analysis of Technique For Quality Image Retrieval On Web
Pages : 1069-1072
Sanjyot S.Desale, Y.C.Kulkarni
Abstract | PDFPDF
25. Cued Click Points: Graphical Password Authentication Technique for Security
Pages : 1073-1075
Shendage Swapnil Sunil, Dhainje Prakash, Yevale Ramesh Shivaji
Abstract | PDFPDF
26. Comparative Analysis of Clustering by using Optimization Algorithms
Pages : 1076-1081
Poonam Kataria, Navpreet Rupal , Rahul Sharma
Abstract | PDFPDF
27. An Efficient Algorithm for Update Scheduling in Streaming Data Warehouses
Pages : 1082-1085
Bolla Saikiran, Kolla Morarjee
Abstract | PDFPDF
28. Ensuring Better QoS through Call Admission Control in Wireless Network
Pages : 1086-1089
Abhishek M. Goswami. Shreyas Patel
Abstract | PDFPDF
29. Operating System Virtualization for Ubiquitous Computing
Pages : 1090-1094
Vikram S. Vairagade, Prof.Chanchal V. Dahat, Anjali V. Bhatkar
Abstract | PDFPDF
30. A New Model for Multiparty Collaborative Distributed Mining using Bloom Filter
Pages : 1095-1098
Deepak Joshy, Ms.PrinceMary
Abstract | PDFPDF
31. Efficient Routing Algorithm for Wireless Networks based on Bandwidth and Clock Rate
Pages : 1099-1102
Anto Premkumar, Shijo James, Saranya. R
Abstract | PDFPDF
32. Data Extraction and Alignment using Natural Language Processing
Pages : 1103-1105
M.S Vinu, L.Dhanam, Dr.Sudha Mohanram
Abstract | PDFPDF
33. Stimulated Particle Swarm Optimization Routing Protocol – A Review
Pages : 1106-1111
M.Ganesan, PravinR.Patil, M.Dhilsath Fathima, M.S.Saravanan
Abstract | PDFPDF
34. Impact of Different Methodologies in Software Development Process
Pages : 1112-1116
Preeti Rai, Saru Dhir
Abstract | PDFPDF
35. Rotation Invariable Method for Currency Coin Detection
Pages : 1117-1119
Sonali A Mahajan, Chitra M. Gaikwad
Abstract | PDFPDF
36. Article Removed
Pages : xxxx, xxxx
xxxx, xxxx, xxxx
Abstract | PDFPDF
37. Video Streaming Over Multihop Wireless Networks –Issues and Techniques
Pages : 1128-1130
Nimisha Joy, Preetha K G
Abstract | PDFPDF
38. Live Devices: Insider Threat to Resources
Pages : 1131-1134
Malik Junaid Gul , Pakeeza Samin, Dr. Rabia Riaz
Abstract | PDFPDF
39. Comparision and Development of Algorithm for Different 3G GSM Network Sites
Pages : 1135-1138
Abhilasha Sharma ,Dr. Naveen Choudhary, Dr. Dharm Singh
Abstract | PDFPDF
40. A Novel Method to Identify Audio Descriptors, Useful in Gender Identification from North Indian Classical Music Vocal
Pages : 1139-1143
Saurabh H. Deshmukh, Dr. S.G. Bhirud
Abstract | PDFPDF
41. Overview of Stemming Algorithms for Indian and Non-Indian Languages
Pages : 1144-1146
Dalwadi Bijal, Suthar Sanket
Abstract | PDFPDF
42. Extended Hill Cipher Decryption by Using Transposed Interweaved Shifting
Pages : 1147-1151
Divya Rathi, Parmanand Astya
Abstract | PDFPDF
43. An Enhanced Intrusion Detection System for MANETS using Hybrid Key Cryptography
Pages : 1152-1154
B.Suruthi, N.V.Rajeesh kumar
Abstract | PDFPDF
44. An Empirical Investigation on Thematic Accuracy of Landuse/Landcover Classification Using Fused Images
Pages : 1155-1161
Jeya Kumari N , Purushothaman B M, Suresh Babu S
Abstract | PDFPDF
45. Nymble:The Blocking System
Pages : 1162-1164
Akshay Sangrolkar, Yogesh Sawant , Akshay Shirole, N.V.Puri
Abstract | PDFPDF
46. Plant Disease Detection Techniques Using Canny Edge Detection & Color Histogram in Image Processing
Pages : 1165-1168
Shital Bankar, Ajita Dube,Pranali Kadam, Prof. Sunil Deokule
Abstract | PDFPDF
47. A Comprehensive Review of Image Compression Techniques
Pages : 1169-1172
Kitty Arora, Manshi Shukla
Abstract | PDFPDF
48. Cloud-Based Multimedia Storage System with QoS Provision
Pages : 1173-1176
Swati Vani, Bhagyashri Bhosale, Ganesh Shinde, Rajni Shinde, Prof.Manoj Pawar
Abstract | PDFPDF
49. Enhanced Packet Scheduling Scheme with Quality of Service support for WiMAX Networks
Pages : 1177-1180
D.M.S.Madhuri , M.L.N.Divya, G.Sravani, R.V.S.N.Raju
Abstract | PDFPDF
50. Forest Conservation Monitoring using E-Forest Clearance for Developmental Projects in the Perspective of E-Governance
Pages : 1181-1184
Rajesh Kumar Pathak
Abstract | PDFPDF
51. Multi-factor Authentication in Banking Sector
Pages : 1185-1189
Tushar Bhivgade , Mithilesh Bhusari , Ajay Kuthe , Bhavna Jiddewar ,Prof. Pooja Dubey
Abstract | PDFPDF
52. An Efficient Ripple Carry Adder Based Low Complexity Turbo Decoder
Pages : 1190-1195
Chandrapriya.G, Karthigailakshmi.S
Abstract | PDFPDF
53. A Novel Image Enhancement Technique for Ancient Images using Optimal Histogram Equalization and Fuzzy Enhancement Technique
Pages : 1196-1199
P. Naga Srinivasu
Abstract | PDFPDF
54. Identification of Misbehaviour Activities in Mobile Adhoc Networks
Pages : 1200-1203
Indhumathi.J, Prem Jacob.T
Abstract | PDFPDF
55. A Study on different Image Encryption Algorithms
Pages : 1204-1206
Suriya kala.L, Dr. R. Thangaraj
Abstract | PDFPDF
56. International Vulnerability Database Alliance as an Effective Vulnerability Disclosure Technique
Pages : 1207-1209
Tina Sebastian, Abey Abraham
Abstract | PDFPDF
57. Unauthorized Terror Attack Tracking Using Web Usage Mining
Pages : 1210-1212
Ramesh Yevale, Mayuri Dhage, Tejali Nalawade,.Trupti Kaule
Abstract | PDFPDF
58. Study on Landuse Pattern to Evaluate Groundwater Potential Zone for Bengaluru Urban Area Using RS &GIS Techniques
Pages : 1213-1218
Jeyapprabha.R, Revathy S.S, S.Sureshbabu
Abstract | PDFPDF
59. A Task Oriented View of Web Software Visualization and Architecture
Pages : 1219-1222
Laxmareddy.A, M.Ganesan, DR.E.Kannan, M.Dhilsath Fathima, M.S.Saravanan
Abstract | PDFPDF
60. Convergence of 5G Technology by Using Distributed System
Pages : 1223-1226
Aman Deep Varshney, Shivani Dubey
Abstract | PDFPDF
61. Improved Shortest Path Method to Select the Best Path from Multi-Path Web Service Composition Graph
Pages : 1227-1231
Dr. S. Justin Samuel, M.Gnana Sagaya Sharmila
Abstract | PDFPDF
62. Performing Enhancement and Providing Minutiae Matching Score in LQFI
Pages : 1232-1236
A. M.Jayalakshmi, B. P. Robert , C.G. Thiripura Sundari
Abstract | PDFPDF
63. An Improved Memetic Search in Artificial Bee Colony Algorithm
Pages : 1237-1247
Sandeep Kumar , Vivek Kumar Sharma , Rajani Kumari
Abstract | PDFPDF
64. ZigBee based Budget Distribution and Management
Pages : 1248-1250
Sateesh Gudla, K. Kamal Kumar , K.V.S.V.Prasad, D.V.S.Gayathri ,G.Santhi
Abstract | PDFPDF
65. Wifi Positioning System Using WLAN Signal Strengths by Block
Pages : 1251-1254
Prashant Agarwal, Monisha Singh, Sudhir Kumar Sharma
Abstract | PDFPDF
66. Sandbox- An Application Tool for Hadoop
Pages : 1255-1258
Gaurav Vaswani , Ajay Chotrani , Hitesh Rajpal
Abstract | PDFPDF
67. Burst Error Characterization for Wireless Ad-Hoc Network and Impact of Packet Interleaving
Pages : 1259-1264
Devaraju. R, Puttamadappa. C
Abstract | PDFPDF
68. Look Over on Mining Sequential Patterns in Evolving Data Stream
Pages : 1265-1268
Harsha Nair, Neeba E A
Abstract | PDFPDF
69. An Overview on Data Mining
Pages : 1269-1272
Vishal, Dr Saurabh Gupta
Abstract | PDFPDF
70. Review of QoS Based Service Populating for Cloud based Mobile Apps
Pages : 1273-1276
Prachi B.Gaikwad, Prof. S.M.Rokade
Abstract | PDFPDF
71. Double Layer Security in the Swarm Intelligence P2P Network
Pages : 1277-1282
K.Ramalakshmi, P.K.Sasikumar
Abstract | PDFPDF
72. Analysing Security and Software Requirements using Multi-Layered Iterative Model
Pages : 1283-1287
Sonia, Archana Singhal, Jyoti Balwani
Abstract | PDFPDF
73. A Survey on Detection and Prevention Techniques for Gray-Hole Attack in MANET
Pages : 1288-1290
Mahesh Kumar Kumawat, Jitendra Singh Yadav
Abstract | PDFPDF
74. Neuro-Genetic Hybrid Approach for Rainfall Forecasting
Pages : 1291-1295
Abhishek Saxena, Neeta Verma , K.C.Tripathi
Abstract | PDFPDF
75. Electricity Distribution System using Geospatial Technology – A Case Study for Hosur Town, Krishnagiri District
Pages : 1296-1300
Kanmani B, Suresh Babu S
Abstract | PDFPDF
76. An Efficient and Secure System for Detecting Malicious Nodes in Mobile Ad hoc Networks
Pages : 1301-1306
Sruthi. E , Pradeep. S
Abstract | PDFPDF
77. Study and Review of the Biomedical Signals With Respect To Different Methodologies
Pages : 1307-1309
Zainab Mizwan, Hemant kasturiwale
Abstract | PDFPDF
78. RS and GIS Based Coastal Wetland Inventory for Udupi District, Karnataka
Pages : 1310-1314
S. Aishwariya, M. S. Vinaya , S. Suresh Babu
Abstract | PDFPDF
79. Implementation of Enhanced Security on Vehicular Cloud Computing
Pages : 1315-1318
RajbhojSupriya K., Pankaj R. Chandre
Abstract | PDFPDF
80. Enhancing Data Security by Adapting Network Security and Cryptographic Paradigms
Pages : 1319-1321
Pushpa B R
Abstract | PDFPDF
81. Rule Based POS Tagger for Marathi Text
Pages : 1322-1326
Pallavi Bagul, Archana Mishra, Prachi Mahajan, Medinee Kulkarni, Gauri Dhopavkar
Abstract | PDFPDF
82. Advanced Online Banking Authentication System Using One Time Passwords Embedded in Q-R Code
Pages : 1327-1329
Abhishek Gandhi, Bhagwat Salunke, Snehal Ithape, Varsha Gawade, Prof.Swapnil Chaudhari
Abstract | PDFPDF
83. Finding Optimal Vehicular Route Based On GPS
Pages : 1330-1332
A.Renugambal , V.Adilakshmi Kameswari
Abstract | PDFPDF
84. Employing a Reconfigurable Virtual Networking Approach by using NICE Mechanism
Pages : 1333-1337
A.JensilinMary.M.E , E.SathishKumar , S.NavinChander , R.Naveenkumar , A.Prasanth
Abstract | PDFPDF
85. Auto-Healing Of Wireless Mesh Network
Pages :1338-1341
Kolhe Mahesh D., Gujar Siddhchakra R., Jadhav Amit A., Hase Manoj S.
Abstract | PDFPDF
86. A Survey on Web based Interactive Information Retrieval
Pages : 1342-1345
Ratna Kumari Challa, B.Linga Murthy, K.Srinivasarao
Abstract | PDFPDF
87. Ranking With Cluster-Based Non-Segregated Approach to Multi-Document Categorization
Pages : 1346-1348
T.Sathish kumar, V.Sharmila
Abstract | PDFPDF
88. An Efficient Approach to Block DDoS Attacks Using Adaptive Selective Verification Protocol
Pages : 1349-1351
Gopinath.V, Anand.C
Abstract | PDFPDF
89. Visualization in Argument Based Recommender System
Pages : 1352-1357
Preeti, Ankit Rajpal, Purnima Khurana
Abstract | PDFPDF
90. Feature Extraction Based Dynamic Recommendation for Analogous Users
Pages : 1358-1362
Raj Bharath.R, Thanigaivel.K, Alfahath.A, Prasanth.T
Abstract | PDFPDF
91. Human Robotics Interaction (HRI) based Analysis – using DMT
Pages : 1363-1367
Rimmy Chuchra and R. K. Seth
Abstract | PDFPDF
92. A Survey on Automatic Annotation and Annotation Based Image Retrieval
Pages : 1368-1371
Himali Chaudhari , Prof D.D.Patil
Abstract | PDFPDF
93. Automatic Vehicle Classification System for Monitoring Highways
Pages : 1372-1374
R.Mohan,K.Divakar, M.Kumaresan ,R.Rajan
Abstract | PDFPDF
94. Privacy Preservation of Social Network Data against Structural Attack using K-Auto restructure
Pages : 1375-1381
V.Gnanasekar, S.Jayanthi
Abstract | PDFPDF
95. An Extensive Survey of Bat Species Identification based on Acoustics
Pages : 1382-1386
Gladrene Sheena Basil, Jayapriya K
Abstract | PDFPDF
96. Job Scheduling in Grid Computing using User Deadline
Pages : 1387-1392
S.Gokul Dev, R.Lalith Kumar
Abstract | PDFPDF
97. Fast Algorithm for Finding the Value-Added Utility Frequent Itemsets Using Apriori Algorithm
Pages : 1393-1397
G.Arumugam, V.K.Vijayakumar
Abstract | PDFPDF
98. Feature Selection Algorithm with Discretization and PSO Search Methods for Continuous Attributes
Pages : 1398-1402
Madhu.G, Rajinikanth.T.V, Govardhan.A
Abstract | PDFPDF
99. DEUDS: Data Extraction Using DOM Tree and Selectors
Pages : 1403-1410
Vinayak B. Kadam , Ganesh K. Pakle
Abstract | PDFPDF
100. Teaching Computer Architecture Using Simulation Tools
Pages : 1411-1413
Shine V.J, Sathish P.K
Abstract | PDFPDF
101. Intensification of Unreliable Radiant Images by using Instinctive Sustained Algorithms
Pages : 1414-1417
R.Arvind,C.M.Gowtham, M.Karthi,T.N.Prabhu
Abstract | PDFPDF
102. Defensive Surreptitious Method Attacks by Live Detection and Adoptable Learning System
Pages : 1418-1422
Keerthi P.S, S.Venkatesan, C.Kanimozhi, V.Neerathilingam, C.Diviya
Abstract | PDFPDF
103. Cache-Aside Approach For Cloud Design Pattern
Pages : 1423-1426
Narendra Babu Pamula, K Jairam, B Rajesh
Abstract | PDFPDF
104. Mapping the Groundwater Potential Zone for Bengaluru Urban District
Pages : 1427-1431
Nandishkumar.L, Karthick.M, Arul Prakash.A, Lokpal Bharani Dharaa.D, Revathy S.S, S.Sureshbabu
Abstract | PDFPDF
105. Delay Optimization in VANET Using Ant Colony Optimization and Wimax
Pages : 1432-1435
Manjot Singh Pandher , Amaninder Singh Grewal , Simrat Pal Kaur
Abstract | PDFPDF
106. Improve Server Utilization and Achieving Green Computing in Cloud
Pages : 1436-1439
M.Rajeswari, M.Savuri Raja, M.Suganthy
Abstract | PDFPDF
107. Dynamic Clustering in Wireless Sensor Network using Neural Network
Pages : 1440-1442
Amaninder Singh Grewal , Manjot Singh Pandhe , Simrat Pal Kaur
Abstract | PDFPDF
108. A Novel Approach for Data Acquisition and Handover Scheme in VANET
Pages : 1403-1410
Shanmuga Priya.S, Erana Veerappa Dinesh.S
Abstract | PDFPDF
109. A New Approach for Identifying Manipulated Online Reviews using Decision Tree
Pages : 1447-1450
Rajashree S. Jadhav , Prof. Deipali V. Gore
Abstract | PDFPDF
110. Distance Education Technologies: Using E-learning System and Cloud Computing
Pages : 1451-1454
Sudhir Kumar Sharma, Nidhi Goyal, Monisha Singh
Abstract | PDFPDF
111. Cloud Billing Model: A Review
Pages : 1455-1458
Danamma M.Bulla, Dr.V R.Udupi
Abstract | PDFPDF
112. Component Based Software Reusability and Framing Standards for Components to be Reused
Pages : 1459-1462
Anshul Kalia, Sumesh Sood
Abstract | PDFPDF
113. Improved Intrusion Detection System using C4.5 Decision Tree and Support Vector Machine
Pages : 1463-1467
Vaishali Kosamkar, Sangita S Chaudhari
Abstract | PDFPDF
114. Energy Efficient Network Reconfiguration Algorithm Based on Cooperation for Wireless Ad hoc Network
Pages : 1468-1474
Sachin Kumar Soni, Gajendra Singh
Abstract | PDFPDF
115. A Review Of Literature On Word Sense Disambiguation
Pages : 1475-1477
Ravi Mante, Mahesh Kshirsagar, Dr. Prashant Chatur
Abstract | PDFPDF
116. Article Removed
Pages : xxxx-xxxx
xxxx, xxxx, xxxx
Abstract | PDFPDF
117. An Enhanced Approach to Handle Missing Values in Heterogeneous Datasets
Pages : 1483-1485
Sandhya.GN, Saravanan.P
Abstract | PDFPDF
118. Incremental MVS based Clustering Method for Similarity Measurement
Pages : 1486-1491
Vinay C. Warad, B Baron Sam
Abstract | PDFPDF
119. Survey on Intrusion Detection Mechanisms for MANETS
Pages : 1492-1494
Shwetha M,Mamatha A
Abstract | PDFPDF
120. Brief Study of Positive and Negative Sides of Bluetooth Earpiece
Pages : 1495-1498
Nikita Sharma
Abstract | PDFPDF
121. Creating Adaptive Interface by Mining Web Log
Pages : 1499-1502
Harsheen Kaur,Kailash Bahl
Abstract | PDFPDF
122. e-F.I.R. Lodging System: A Step for Proper Maintenance of Law and Order
Pages : 1503-1505
Ashok, Pardeep Kumar, Dr. Harish Rohil
Abstract | PDFPDF
123. Algorithm Based Security Infrastructure in Online Fraud Detection
Pages : 1506-1508
Rupal Harishchandra Jadhav, Swapnali Sharad Hinge, Shahabaj Sanaullah Shaikh, Swapnil Subhash Kanade, Prof. K.S.Wagh
Abstract | PDFPDF
124. Enhanced Image Compression Algorithm for Image Processing Applications
Pages : 1509-1515
B. Kranthi, Dr. B. Ananda Krishna, Dr. M. Kamaraju, B. Rajasekhar
Abstract | PDFPDF
125. A Novel Dynamic Data Collection Paradigm for Wireless Sensor Networks (WSNs) by Mobile Users
Pages : 1516-1521
Zara Sumaiya, Rekha Patil
Abstract | PDFPDF
126. Video Compression Using JPEG2000
Pages : 1522-1525
N.Bharath, V.Prakash, G.Dinesh, V.Dillibabu, S.Kumarasamy
Abstract | PDFPDF
127. HLA Based Third Party Auditing For Secure Cloud Storage
Pages : 1526-1532
Chandinee Saraswathy K. , Keerthi D. , Padma G.
Abstract | PDFPDF
128. Family Card Security System Using Biometric Device
Pages : 1533-1535
R.Prasanth, V.Balamurugan, S.Roubavaan, E.Suresh, Dr. N.Purushothaman
Abstract | PDFPDF
129. Simulation of Misbehaving Nodes in AODV Routing
Pages : 1536-1539
Shweta Rohilla, Pankaj Sharma
Abstract | PDFPDF
130. Prevention of battery life depletion from Wireles Ad-Hoc Sensor Networks using Signal Strength
Pages : 1540-1544
C. Suganthini, S. Saranya, V.S. Sowmiya
Abstract | PDFPDF
131. Performance Analysis of Energy Efficient Routing for Mobile Ad-hoc Networks
Pages : 1545-1551
K.Prabu, Dr. A.Subramani
Abstract | PDFPDF
132. Retrieve Records from Web Database Using Data Alignment
Pages : 1552-1554
V.Kalyan Deepak, N.V.Rajeesh Kumar
Abstract | PDFPDF
133. Meta Paged Flash Translation Layer
Pages : 1555-1559
Shinde Pratibha, Srinivas
Abstract | PDFPDF
134. Privacy Preserving Data Mining Using Association Rule With Condensation Approach
Pages : 1560-1563
Supriya S. Borhade, Bipin B.Shinde
Abstract | PDFPDF
135. Unwanted Activity Detection System in Wireless Network
Pages :1564-1569
Sneha A. Deshmukh , Monika Rajput
Abstract | PDFPDF
136. Survey on Anti-forensics Operations in Image Forensics
Pages : 1570-1573
Pranita D. Pandit , Monika Rajput
Abstract | PDFPDF
137. Increasing the Production Rate by Automation Systems in Fields
Pages : 1574-1576
Murari DevaKannan Kamalesh, Garlapati.A.V.P.Gowtham , Mani Gandan
Abstract | PDFPDF
138. Performance Analysis of VoMAN using Routing Protocols to Improve QoS of VoIP flows
Pages : 1577-1580
V.Savithri, Dr.A.Marimuthu
Abstract | PDFPDF
139. Privacy Preserving in Horizontal Aggregation Using Homomorphic Encryption
Pages : 1581-1583
Patil Amrut A, D. M. Thakore
Abstract | PDFPDF
140. A Hybrid Approach for Extractive Document Summarization Using Machine Learning and Clustering Technique
Pages : 1584-1586
M. S. Patil , M. S. Bewoor, S. H. Patil
Abstract | PDFPDF
141. A Modified O (1) Algorithm for Real Time Task in Operating System
Pages : 1587-1589
Rohan R. Kabugade, S. S Dhotre, S H Patil
Abstract | PDFPDF
142. Demands Apply Base Data Replication Over Cloud Computing
Pages : 1590-1594
Musmade Anjali J., S. M. Rokade
Abstract | PDFPDF
143. Enhanced Performance Evaluation for Broadcasting Safety Messages In VANET
Pages : 1595-1598
Varsha H, Pradeep. S
Abstract | PDFPDF
144. Enhancement of Nymble through Ontological Approach
Pages : 1599-1602
Sateesh Gudla, Sarat Chandra Mongam, Sindhuri Boddu, Satish Mallampalli
Abstract | PDFPDF
145. Bus Locator via SMS Using Android Application
Pages : 1603-1606
Karan Punjabi, Pooja Bolaj, Pratibha Mantur, Sneha Wali
Abstract | PDFPDF
146. An Overview of Anonymous Routing ALERT Protocol
Pages : 1607-1609
Snehlata Handrale, Prof. S. K. Pathan
Abstract | PDFPDF
147. Design Technique of Phase-Locked Loop Frequency Synthesizer in CMOS Technology: A Review
Pages : 1610-1614
Purushottamkumar T. Singh, Devendra S. Chaudhari
Abstract | PDFPDF
148. Study & Analysis of Different Face Detection Techniques
Pages : 1615-1618
Mayank Chauhan, Mukesh Sakle
Abstract | PDFPDF
149. Ranking Of XML Documents by Using Adaptive Keyword Search
Pages :1619-1621
Varun Varma Sangaraju
Abstract | PDFPDF
150. Face Image Retrieval Using Facial Attributes By K-Means
Pages :1622-1625
I.Sudha, [V.Saradha, M.Tamilselvi, D.Vennila
Abstract | PDFPDF
151. ADMIT – A simple Adaptive Data Rate Model for Medical Image Transmission over Wireless Network
Pages :1626-1629
Saranya S, Kavitha P
Abstract | PDFPDF
152. Tractable Form of Non-Monotonic Reasoning to Generate Belief Set
Pages :1630-1637
Dipanjan kumar Dey
Abstract | PDFPDF
153. Comparative Evaluation of AODV, DSDV and AOMDV based on end-to-end delay and routing overhead using Network Simulator
Pages :1638-1641
Mitul K. Patel, Vasundhara Uchhula, Bannishikha Banerjee
Abstract | PDFPDF
154. A Review on Infrequent Weighted Itemset Mining using Frequent Pattern Growth
Pages :1642-1647
Shipra Khare , Prof. Vivek Jain
Abstract | PDFPDF
155. GNDA: Good Neighbor Node Detection for Selfish node Identification in Mobile Ad Hoc Networks
Pages :1648-1651
T. Suganya, R. Abirami, L. Anuprabha, J. Anupriya
Abstract | PDFPDF
156. A Dynamic Priority Based Self Scheduling of Virtual Machines for Cross- Cloud Computing Environment
Pages :1652-1654
Srilatha.M, G.Praveen Babu
Abstract | PDFPDF
157. A Survey on HTML Structure Aware and Tree Based Web Data Scraping Technique
Pages :1655-1658
Vinayak B. Kadam , Ganesh K. Pakle
Abstract | PDFPDF
158. Survey on Location Based Routing Protocols in MANET
Pages :1659-1663
Vivek Nikam, Prof. G.T. Chavan
Abstract | PDFPDF
159. Use of Tobacco in India and the Influencing Factors: An Analysis on National Family and Health Survey Data (NFHS-III)
Pages :1664-1667
M.Mamatha,V.Nageswara Rao
Abstract | PDFPDF
160. Analysis and Comparison of Wireless Sensor Networks Coverage Algorithms
Pages :1668-1670
Swapnil Jain, Sunita Gupta
Abstract | PDFPDF
161. An Algorithm to Optimize the Traditional Backfill Algorithm Using Priority of Jobs for Task Scheduling Problems in Cloud Computing
Pages :1671-1674
Lal ShriVratt Singh, Jawed Ahmed, Asif Khan
Abstract | PDFPDF
162. Automatic Caption Generation for News Images
Pages :1675-1677
Priyanka Jadhav, Sayali Joag, Rohini Chaure, Sarika Koli
Abstract | PDFPDF
163. Diagnosis of Heart Disease Using Data Mining Algorithm
Pages :1678-1680
Deepali Chandna
Abstract | PDFPDF
164. Improving Security of Cloud Environment in Dynamic Cloud Network
Pages :1681-1684
Chetan S. Kadu, Abhay A. Jadhav, Prashant L. Mandale
Abstract | PDFPDF
165. Individualized Travel Recommendation by Mining People Ascribes and Travel Logs Types from Community Imparted Pictures
Pages :1685-1687
S.Saranya,S.Sivaranjani, G.Surya, A.Ramachandran
Abstract | PDFPDF
166. Knowledge Extraction Mechanism using Vertically Partition id3 and Fuzzy based System
Pages :1688-1691
Mona Shrivastava, Nirest Sharma, Gaurav Shrivastava
Abstract | PDFPDF
167. A Review on Designing of Distributed Data Warehouse and New Trends in Distributed Data Warehousing
Pages :1692-1695
Shaweta
Abstract | PDFPDF
168. Hybrid Message Authentication Protocol in VANET
Pages :1696-1697
R.Rajan, S.Narendran, M.Prasanth, R.Raj kumar
Abstract | PDFPDF
169. Approaches for Automated Web Service Discovery
Pages :1698-1700
Gajanan V. Bhole , Prof. Prakash. R. Devale
Abstract | PDFPDF
170. Content Based Image Retrieval System Use for Similarity Analysis of Images
Pages :1701-1704
Swapnil Khobragade, ,Shobhit Nikose, Mussavir Shaikh
Abstract | PDFPDF
171. Performance Improvement Using Link Management in Wired and Wireless Networks
Pages :1705-1708
Karthik.N, Jeyasekhar.A
Abstract | PDFPDF
172. A Review on Ontology Based Information Retrieval in Semantic Web
Pages :1709-1713
Naveen Malik, Navdeep Kumar, Mradula Gupta
Abstract | PDFPDF
173. A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Overhead in Mobile Ad Hoc Networks
Pages :1714-1717
Lahari.P, Pradeep.S
Abstract | PDFPDF
174. Contrast Enhancement of HDR images using Linear Transformation and Kernel Padding
Pages :1718-1723
Kesharee Singh Yaduwanshi, Nitin Mishra
Abstract | PDFPDF
175. Optimization of DBSCALE Clustering Algorithm for Weather Forecasting
Pages :1724-1728
Archana Tomar, Neetesh Gupta, Amit Sinhal
Abstract | PDFPDF
176. Coverage Optimization based on Redundant Sense Area Ratio in Wireless Multimedia Sensor
Networks

Pages :1729-1733
T.Sridevi, R.Vinothini, N.Ramya, T.N.Prabhu
Abstract | PDFPDF
177. Secure Data Access control in Cloud Environment
Pages :1734-1737
G. Praveen Babu, B. Sushma Rao
Abstract | PDFPDF
178. A Strategy Implementing System for Secure Ad hoc Networks
Pages :1738-1743
Nikesh Kumar Sharma, ]Aamir Mohammad, Shilpi Jain
Abstract | PDFPDF
179. Review of Various Steganalysis Techniques
Pages :1744-1747
Manveer Kaur1, Gagandeep Kaur
Abstract | PDFPDF
180. A System to Filter Unwanted Words Using Blacklists In Social Networks
Pages :1748-1753
K.Babu , P.Charles
Abstract | PDFPDF
181. Minimizing Interference in Multihop Wireless Networks in the Presence of Hidden Terminals
Pages :1754-1758
Sheryl Jose, R.Annie Uthra
Abstract | PDFPDF
182. Text Extraction Using Adaptive Thresholding
Pages :1759-1763
Savita Borole, Minal Thobde, Reshma Hore, Shraddha Shinde
Abstract | PDFPDF
183. A stratified sampling technique based on correlation feature selection method for heart disease risk prediction system
Pages :1764-1767
Lalita Sharma , Vineet Khanna
Abstract | PDFPDF
184. Context Based Performance Review of AODV and DSDV Protocols in Adhoc community
Pages :1768-1773
B.Naresh kumar, Dr.K.Raghava Rao
Abstract | PDFPDF
185. Improved Schemes to Secure Distributed Data Storage against Untrusted Users
Pages :1774-1777
P.Sahithi Chaitanya, M.Murali
Abstract | PDFPDF
186. Home Automation using ZigBee Protocol
Pages :1778-1780
Pankaj Jadhav ,Amit Chaudhari , Swapnil Vavale
Abstract | PDFPDF
187. Automation of Manufacturing Welding Electrode Extruder Control Panel with PLC
Pages :1781-1784
S. Karthiga, P,Ananth, V.Deepika, K.Gunasekaran,A.Janani
Abstract | PDFPDF
188. Data Hiding Technique Using Steganography
Pages :1785-1787
Pramod Khandare, Pooja Kambale, Prajakta Narnavar , Gauri Galande.Jayshree Narnavar
Abstract | PDFPDF
189. Secure Multi-Cloud Storage Using Elastic Scattered Storage and Scalable Auditing
Pages :1788-1795
Durairaj Moorthy, Chandrasekar C
Abstract | PDFPDF
190. A Dual Framework for Targated Online Data Delivery Algorithms
Pages :1796-1799
Ch.Srikanth, D.Naveen Kumar, S.P. Anandaraj
Abstract | PDFPDF
191. A Comparative study of Algorithms in SEO& approach for Optimizing the search engine results using Hybrid of Query Recommendation and Document clustering, Genetic algorithm
Pages :1800-1802
Ashish Kumar Kushwaha , Nitin Chopde
Abstract | PDFPDF
192. Secure Cloud Computing Environment against DDOS and EDOS Attacks
Pages :1803-1808
I. Mettildha Mary, P.V.Kavitha, Priyadharshini M, Vigneshwer S Ramana
Abstract | PDFPDF
193. Survey on Implementation of E-learning System Using Cloud Solutions
Pages :1809-1813
Abhay S. Jadhav, Mahesh Toradmal, Ganesh K. Pakle
Abstract | PDFPDF
194. Automation in Video Security Surveillance using Mobile Remote Control
Pages :1814-1817
Abhishek Kumar Pandey , Aditya Ashok Kulkarni ,Shruti Jitendra Shah
Abstract | PDFPDF
195. Review of Classification of Microcalcifications in Digital Mammograms
Pages :1818-1820
Komal Chaudhari, Prof Priti Subramanium
Abstract | PDFPDF
196. ASA-Mall Management System
Pages :1821-1824
Abhishek Chaturvedi, Anindita Chakraborti, Shubhi Bartaria , Rahul Neve
Abstract | PDFPDF
197. Handling Non-Linear Attacks in Multilevel Trust Privacy Preserving Data Mining
Pages :1825-1827
Kamaleswari S, Balachander T
Abstract | PDFPDF
198. Transitive Trust Extended Authentication Mechanism in Wireless Sensor Networks
Pages :1828-1832
K.SaiAditya, C.Santwana, S.Magesh
Abstract | PDFPDF
199. Virtual Machine Placement in Cloud
Pages :1833-1835
Noumankhan Pathan, Balaji Shetty
Abstract | PDFPDF
200. RFID and GPS Combination Approach Implementation in Fisher Boat Tracking System
Pages :1836-1838
Prof. Homera Durani, Prof. Nirav Bhatt , Prof. Hardik Mehta
Abstract | PDFPDF
201. Privacy and Security in the Cloud
Pages :1839-1843
Navneet Gupta
Abstract | PDFPDF
202. Texture Segmention : Comparasion between Clustering and Classification
Pages :1844-1848
Sunita Dalai, Manaswini sahu
Abstract | PDFPDF
203. Level Segmentation of Colour Images to Detect the Specular Regions
Pages :1849-1851
Thirumoorthy T, Baskar A
Abstract | PDFPDF
204. Diminution of Packet Drop by Efficient Selection of Network Route in MANET
Pages :1852-1855
Manish V M , J Vaijayanthimala
Abstract | PDFPDF
205. A Survey on Security and Vulnerabilities of Web Application
Pages :1856-1860
Gopal R. Chaudhari, Prof. Madhav V. Vaidya
Abstract | PDFPDF
206. Secure Data Transmission Using Reversible Data Hiding
Pages :1861-1863
Ashwind S , Ganesh K , Gokul R ,Ranjeeth Kumar C
Abstract | PDFPDF
207. A Framework for Mining Closed Sequential Patterns
Pages :1864-1866
V. Purushothama Raju, G.P. Saradhi Varma
Abstract | PDFPDF
208. Hypervisor based Mitigation Technique for Keylogger Spyware Attacks
Pages :1867-1870
C.Santwana, K. Sai Aditya, Dr. S.Magesh
Abstract | PDFPDF
209. A Novel Approach to Enhance the Performance of Cloud Computing Using Load Balancing in File
Systems

Pages :1871-1874
Pradheep M,Anjandeep Kaur Rai ,Anup Parkash Singh
Abstract | PDFPDF
210. Article Removed
Pages :xxx-xxx
xxx,xxx
Abstract | PDFPDF
211. Mobile Cloud Computing: World’s Leading Technology for Mobile Devices
Pages :1886-1891
Surabhi S.Golechha , Prof. R.R.Keole
Abstract | PDFPDF
212. Preliminary Review of Swarm Intelligence: A Clever Algorithm and Data Clustering
Pages :1892-1899
NazneenTarannum S. H. Rizvi, Prof.R.R.Keole
Abstract | PDFPDF
213. Principal Lines Region of Interest Extraction Method for Palmprint
Pages :1900-1902
S. S. Patil, A. V. Deorankar, P. N. Chatur
Abstract | PDFPDF
214. Congestion Control for TCP in Data-Center Networks
Pages :1903-1907
Samba Siva Reddy Maripalli# , Abirami G
Abstract | PDFPDF
215. Implementation of Binary Search on a Singly Linked List Using Dual Pointers
Pages :1908-1910
Sreemana Datta, Parichay Bhattacharjee
Abstract | PDFPDF
216. An Analysis and Defending of Mobile Malware in the Android Devices
Pages :1911-1913
P Surendra, K.Navin
Abstract | PDFPDF
217. Preventing Packet Loss in Aggregated Streaming Data
Pages :1914-1917
Pragati Gautam , C. Santhanakrishnan
Abstract | PDFPDF
218. Squid Proxy Server Cache Management using K-means Algorithm
Pages :1918-1923
Subhash Chand and Sanjay Mathur
Abstract | PDFPDF
219. Dynamic Movement based Performance Analysis of EDSR with Different Protocols
Pages :1924-1929
C.Mari Venkatesth, R. Kanaga Sundar,V. Jefrins, M.Ashok Kumar
Abstract | PDFPDF
220. Kerberos Authentication System using Public key Encryption
Pages :1930-1933
Pushkar Bhadle, Sonal Gugale, Sakshi Trar, Harjot Kaur, Shital Salve
Abstract | PDFPDF
221. A Comparative Study: Various Approaches for Cloud Data Security
Pages :1934-1937
Richa Singh, Amit Kumar Sharma
Abstract | PDFPDF
222. Ultimate Cloud (a scheme which uses all formidable technologies culminated together
to form a most secure mechanism for cloud data fortification)

Pages :1938-1942
K. Naga Sumanth, Dr. Magesh Sriramula
Abstract | PDFPDF
223. Congestion Control in Multi-Flow Environment Using Multipath Routing Base in MANET
Pages :1943-1948
Neha Tiwari, Sini Shibu
Abstract | PDFPDF
224. An Optimized ANFIS Classifier Approach for Screening of COPD from Chest CT Scans with Adaptive Median Filtering
Pages :1949-1957
K. Meenakshi Sundaram, C.S.Ravichandran
Abstract | PDFPDF
225. Multi-Objective Particle Swarm Optimization for Multicast Load Balancing in Wireless Mesh
Networks

Pages :1958-1963
Mijahed Nasser Aljober, R.C.Thool
Abstract | PDFPDF
226. A Comparative Study of Performances of Various Classification Algorithms for Predicting Salary
Classes of Employees

Pages :1964-1972
Swapnajit Chakraborti
Abstract | PDFPDF
227. A Secured and High Octane Rank Based Analysis in Cloud Computing Environment
Pages :1973-1976
Poojitha Koneru, Dr. S.Prabakaran
Abstract | PDFPDF
228. Publishing Search Logs by Guarantee Users Privacy
Pages :1977-1980
Sridevi Sunkavalli, A.M.J.Muthukumaran
Abstract | PDFPDF
229. Proposing an Efficient Multicast Group Management Algorithm for Ad Hoc Networks
Pages :1981-1983
Poomalar Selvan, Jeysree J
Abstract | PDFPDF
230. A Survey of Routing Protocol in MANET
Pages :1984-1988
R.RagulRavi, V.Jayanthi
Abstract | PDFPDF
231. New Secure Intrusion-Detection System for Manet’s Using Hybrid Cryptography Techniques
Pages :1989-1994
E.Malini, T.Ravi
Abstract | PDFPDF
232. An Efficient Technique for CHARACTER RECOGNITION Using Neural Network & Surf Feature Extraction
Pages :1995-1997
Reetika Verma , Rupinder Kaur
Abstract | PDFPDF
233. Effective Performance Comparative Analysis of Pro-AODV Routing Protocol in MANET using NS-2
Pages :1998-2003
K.Hanumanthu Naik, Dr.N.Geethanjali
Abstract | PDFPDF
234. Providing Security to Debit Cards Using Message Authentication
Pages :2004-2007
Moshina Priyadharshini, Arokiaraj Jovith.A
Abstract | PDFPDF
235. A Secure IDS against DDOS attack in Wireless MANET
Pages :2008-2012
Gokulakannan R , Prasath P, Aruna A, Harshavardhini U
Abstract | PDFPDF
236. Parallel face Detection and Recognition on GPU
Pages :2013-2018
Shivashankar J. Bhutekar, Arati K. Manjaramkar
Abstract | PDFPDF
237. Dynamic Referencing of Web Services via Service Discovery and Natural Language Processing
Pages :2019-2022
Kanmani Sivagar, Krishna Chaitanya
Abstract | PDFPDF
238. Application of Data Mining – A Survey Paper
Pages :2023-2025
Aarti Sharma, Rahul Sharma,Vivek Kr. Sharma,Vishal Shrivatava
Abstract | PDFPDF
239. Visual Cryptography Scheme for Privacy Protection
Pages :2026-2029
Nayan A. Ardak Prof. Avinash Wadhe
Abstract | PDFPDF
240. Survey on: Integrated platform for Development Rural Agriculture in India using ICT platform
Pages :2030-2032
Tushar Hanwate, Madhav Vaidya, Ankush Sawarkar
Abstract | PDFPDF
241. A Synthesizable RTL Design of Asynchronous FIFO Interfaced with SRAM
Pages :2033-2037
Mansi Jhamb , Sugam Kapoor
Abstract | PDFPDF
242. An Efficient Technique of Image Noising and Denoising Using Neuro- Fuzzy and SVM (Support Vector Machine)-A Survey
Pages :2038-2041
Jyoti Sharma and Rupinder Kaur
Abstract | PDFPDF
243. Accelerate Communication Authenticate Protocol for Vehicular Adhoc Networks
Pages :2042-2045
S.Jeevidha, J.Revathi, A.Rajeswari, M.Kanimozhi, P.Gugapriya
Abstract | PDFPDF
244. Filtering Undesired Messages from Online Social Networks: A Content Based Filtering Approach
Pages :2046-2049
Dhruv Vashistha, Sivagami.G.
Abstract | PDFPDF
245. Survey on Hand Gesture Recognition Approaches
Pages :2050-2052
Rama B. Dan ,P. S. Mohod
Abstract | PDFPDF
246. Credit Card Fraud Detection Using Hidden Markov Model
Pages :2053-2055
Gaurav Mhatre , Oshan Almeida , Dhiraj Mhatre ,Poonam Joshi
Abstract | PDFPDF
247. Comparison of Robust Nearest Neighbour fuzzy Rough Classifier (RNN-FRC) with KNN and NEC Classifiers
Pages :2056-2062
Bichitrananda Behera, Sudhakar Sabat
Abstract | PDFPDF
248. Minimization of Image Retrieval Time using Clustering
Pages :2063-2065
Mohammad Naved – Ul – Haque, Prof. Dr. S. S. SikchI
Abstract | PDFPDF
249. Monitoring the Delay and Directivity of Antennas in Gigabit WPAN (802.15.3c)
Pages :2066-2073
Arpan Desai , Ronak Vashi , Ripal Patel ,Anish Vahora
Abstract | PDFPDF
250. PSO Based SVM for Optimizing Classification in Remotely Sensed Images
Pages :2074-2076
Humayun Khan, Prof. Sandeep kumar, Prof. J.P.Maurya
Abstract | PDFPDF
251. Automatic Answering System for English Language Questions
Pages :2077-2079
Abhay Mone , Ishwar Mete , Priyanka Gangarde ,Malhari Kharad
Abstract | PDFPDF
252. Efficient Data Storing and Retrieving from University Database using Feature Selection and Clustering Method
Pages :2080-2082
Vaidehi Ambekar, Prof. P.S.Mohod
Abstract | PDFPDF
253. Energy Efficient Cooperative Spectrum Sensing and Sharing Strategy Selection for Cognitive MIMO Sensor Networks
Pages :2083-2087
Nibedita Sahu , Sudhansu Sekhar Singh
Abstract | PDFPDF
254. Optical Character Recognition Implementation Using Pattern Matching
Pages :2088-2090
Faisal Mohammad, Jyoti Anarase, Milan Shingote, Pratik Ghanwat
Abstract | PDFPDF
255. Cloud Data Mining based on Association Rule
Pages :2091-2094
CH.Sekhar, S Reshma Anjum
Abstract | PDFPDF
256. Modified PSO Based Feature Selection for Classification of Lung CT Images
Pages :2095-2098
S. Sivakumar , Dr.C.Chandrasekar
Abstract | PDFPDF
257. Idea of handling short-lived network failures using LOLS and loop free convergence using FCFR
Pages :2099-2102
Rama Gaikwad and S. P. Pingat
Abstract | PDFPDF
258. Survey on Security Mechanisms in Wireless Mesh Networks
Pages :2103-2106
Priti Gupta , Suveg Moudgil
Abstract | PDFPDF
259. Performance Comparision of Single& 3-Ø Controlled and Uncontrolled Rectifier Using Matlab-Simulink
Pages :2107-2111
Robinson P. Paul, Ghansyam B. Rathod, Milan Bareja, Pratyaksh Maru
Abstract | PDFPDF
260. A Secured Wireless XML Streaming Supporting Twig Pattern Queries
Pages :2112-2116
K. Preethi, S. Ganesh Kumar
Abstract | PDFPDF
261. Squeezing the DNA Sequences with Pattern Recognition Techniques in Multi-Processing Environment
Pages :2117-2120
Panneer Arokiaraj S, Robert L
Abstract | PDFPDF
262. Incremental Data Migration in Multi-database Systems Using ETL Algorithm
Pages :2121-2125
Rajesh Yadav, Prabhakar Patil, Uday Nevase, Kalpak Trivedi, Prof. Bharati Patil
Abstract | PDFPDF
263. Securing Big Data Hadoop: A Review of Security Issues, Threats and Solution
Pages :2126-2131
Priya P. Sharma, Chandrakant P. Navdeti
Abstract | PDFPDF
264. Implications and Emerging Trends in Digital Image Processing
Pages :2132-2135
Monika Pathak , Sukhdev Singh
Abstract | PDFPDF
265. A New Approach for Finding the Guilt Agent in Dynamic Groups on Cloud Computing
Pages :2136-2143
Y. Venkateswarlu, K. Sowrya, and T. Anuradha
Abstract | PDFPDF
266. Watermarking of Datasets Using Usability Constraints
Pages :2144-2147
Anuj Shrivastav, R.Vidhya
Abstract | PDFPDF
267. A Survey on Multimodal Biometric
Pages :2148-2151
Sakshi Kalra , Anil Lamba
Abstract | PDFPDF
268. Article Removed
Pages :xxx-xxx
xxx,xxx
Abstract | PDFPDF
269. Design of New Security Protocol
Pages :2155-2156
K .Seena Naik, Dr G.A Ramachandra , M V Bramhananda Reddy
Abstract | PDFPDF
270. Mass Customization of Products
Pages :2157-2161
Disha Bavishi, Pralam Shah, Nikunj Patel, Anand Shukla, Vandana Munde
Abstract | PDFPDF
271. Survey on Metadata Management Schemes in HDFS
Pages :2162-2165
Abhinay Gupta , Raviraj Gundety, Vivek Fernando, Neeraj Iyer, Beatrice.S
Abstract | PDFPDF
272. Autism and its Classification Techniques -A Review
Pages :2166-2170
Rachna Ahuja , Darvinder Kaur
Abstract | PDFPDF
273. Neuro-Fuzzy Methodology for Diagnosis of Autism
Pages :2171-2172
Rachna Ahuja, Darvinder Kaur
Abstract | PDFPDF
274. Efficient Implementation of Niblack Thresholding for MRI Brain Image Segmentation
Pages :2173-2176
Senthilkumaran N, Kirubakaran C
Abstract | PDFPDF
275. Security Enhanced Communication Scheme with Error Correction Capability and Efficient Channel Utilization
Pages :2177-2185
Poornima.P.V, Amrutha.V
Abstract | PDFPDF
276. Sensitive Dependence on Initial Conditions, and Chaotic Group Actions
Pages :2186-2190
Murtadha Mohammed Abdulkadhim
Abstract | PDFPDF
277. Novel Approach for Fault Detection in Wireless Sensor Network
Pages :2191-2194
Kavita Tandon, Neelima Mallela, Nishi Yadav
Abstract | PDFPDF
278. New Approaches to Web Personalization Using Web Mining Techniques
Pages :2195-2201
Beatric , Ryan Fernandes, Leo. J. Peo, Nikhila Kamat, Sergius Miranda
Abstract | PDFPDF
279. A Novel Approach for Secret Data Transfer using Interpolation and LSB Substitution with Watermarking: A Survey
Pages :2202-2203
Murtadha Mohammed Abdulkadhim
Abstract | PDFPDF
280. A Survey: On Routing Protocols in Cognitive Radio Ad Hoc Networks
Pages :2204-2206
Shikha Jain , Anshu Dhawan, Dr. C.K Jha
Abstract | PDFPDF
281. Users Task Personalizing by LBS
Pages :2207-2209
Nikhilesh Patve, Pooja Yadav, Ruchita Sinha
Abstract | PDFPDF
282. A Survey on CUDA
Pages :2210-2214
Paramjeet kaur and Nishi
Abstract | PDFPDF
283. Survey of Consumer Oriented AR
Pages :2215-2217
Siddharth Gupta , Payal Diwan ,Andrew Gaikwad ,Aaron Gonsalves ,Beatrice S.
Abstract | PDFPDF
284. ABig Data Storage and Challenges
Pages :2218-2223
M.H.Padgavankar, Dr.S.R.Gupta
Abstract | PDFPDF
285. A Hybrid Classifier for Classification of Rice Crop Varieties
Pages :2224-2230
B. Mahendra Kumar, DR. Karthik S , Dr.V.K.Shunmughanaathan
Abstract | PDFPDF
286. Construction of Database Design- A Reverse Engineering Process
Pages :2231-2234
N. Asha, M. Varun Kumar, C. Barath Kumar
Abstract | PDFPDF
287. Data Analysis and Prediction of Hepatitis Using Support Vector Machine (SVM)
Pages :2235-2237
C. Barath Kumar, M. Varun Kumar, T. Gayathri, S. Rajesh Kumar
Abstract | PDFPDF
288. Comparative Performance Analysis of DSDV, AOMDV and ZRP Routing Protocols in VANET using NS2
Pages :2238-2241
Varun Singla, Nailja Wadhwa
Abstract | PDFPDF
289. Survey of Different Types of CAPTCHA
Pages :2242-2245
Ved Prakash Singh, Preet Pal
Abstract | PDFPDF
290. A Theoretical Study of Text Document Clustering
Pages :2246-2251
Yogesh Jain , Amit Kumar Nandanwar
Abstract | PDFPDF
291. CSB Sorting Algorithm
Pages :2252-2255
RinkleAswani, Anjali Arora, PallaSujitha
Abstract | PDFPDF
292. Retrieving Data through Two Way Security Methods In Dynamic Cloud Storage Systems
Pages :2256-2258
Vamsi Krishna Kondragunta , Md. Mohsin Shariff , V.Roopesh , Dr.T.V Surya Narayana
Abstract | PDFPDF
293. To Mitigate Online Password Guessing Attack By Implementing: P3-HA
Pages :2259-2262
P.P Wakodikar , A.S. Bhattacharya
Abstract | PDFPDF
294. Survey on Speech Recognization Techniques. (Natural Language Processing)
Pages :2263-2267
Anushree R. Pore, Prof. Amit Sahu
Abstract | PDFPDF
295. An Effective Secured Cloud Based Log Management System Using Homomorphic Encryption
Pages :2268-2271
A. Murugan, Tarun Kumar Kala
Abstract | PDFPDF
296. Survey on Clustering Techniques in Data Mining
Pages :2272-2276
K.Kameshwaran, K.Malarvizhi
Abstract | PDFPDF
297. Text-Based Shoulder Surfing Resistant Graphical Password Scheme
Pages :2277-2280
Manjunath G , Satheesh K , Saranyadevi C,Nithya M
Abstract | PDFPDF
298. Tracking Learning and Detection of Multiple Objects using Static Camera
Pages :2281-2283
Abhishek Khanolkar , Dhaval Shah, Ayushi Desai
Abstract | PDFPDF
299. Restructure Effective Examining Based on User Search Goals with Feedback Sessions
Pages :2284-2288
Baron Sam B
Abstract | PDFPDF
300. Tracking People Motion Based on Lloyd’s Clustering Algorithm
Pages :2289-2292
R.Rajeev, S.S.Sridhar
Abstract | PDFPDF
301. PKC Based Mutual Node Authentication in Wireless Mesh Network Using ECC Algorithm
Pages :2293-2296
Ajit P. Shiralkar, Prof. Ranjit R. Keole
Abstract | PDFPDF
302. DFT: A Novel Algorithm for Data Cleansing
Pages :2297-2301
Shweta Taneja , Ishita Ashri , Shipra Gupta , Mehak Sharma
Abstract | PDFPDF
303. Fast Efficient Artificial Neural Network for Handwritten Digit Recognition
Pages :2302-2306
Viragkumar N. Jagtap , Shailendra K. Mishra
Abstract | PDFPDF
304. Review Paper on Bitcoin a Secured Transaction over p2p Network
Pages :2307-2309
Unnati A. Dabre, Prof. Dr. Prashant V. Ingole
Abstract | PDFPDF
305. A Review on Privacy Preserving Data Mining: Techniques and Research Challenges
Pages :2310-2315
Shweta Taneja, Shashank Khanna, Sugandha Tilwalia, Ankita
Abstract | PDFPDF
306. Towards Secure the Multi-Cloud using Homomorphic Encryption Scheme
Pages :2316-2319
Suresh Babu Bodduluri, P.Savaridassan
Abstract | PDFPDF
307. Association Rule Mining: A Survey
Pages :2320-2324
Gurneet Kaur
Abstract | PDFPDF
308. Creation of Replica Path Using Maxdisjoint in Tree Based Routing
Pages :2325-2328
Sivanthiya T,Ramyapreethi S,Geethalakshmi P,Jagadeesh Mailu Dheevambiga P
Abstract | PDFPDF
309. Classification and Analysis of High Dimensional Datasets using Clustering and Decision tree
Pages :2329-2333
Avinash Pal, Prof. Shraddha Pandit, Prof. JayPrakash Maurya
Abstract | PDFPDF
310. ENCIPHER A Text Encryption and Decryption Technique Using Substitution-Transposition and Basic Arithmetic and Logic Operation
Pages :2334-2337
Devendra Prasad, Govind Prasad Arya, Chirag Chaudhary, Vipin Kumar
Abstract | PDFPDF
311. Detection & Classification of Network Anomalies using SVM and Decision Tree
Pages :2338-2341
Mayank Nagar, Prof. Shraddha Pandit, Prof. JayPrakash Maurya
Abstract | PDFPDF
312. Energy-Efficient Urgent Packet Forwarding Mechanism
Pages :2342-2344
Achyut Shankar, T Manoranjitham
Abstract | PDFPDF
313. Improving the Lifetime of Wireless Sensor Network through Energy Conservation
Pages :2345-2347
Smitasri Chattopadhyay, G.Vijayalakshmi
Abstract | PDFPDF
314. Software Fault Prediction Model for Embedded Systems: A Novel finding
Pages :2348-2354
Pradeep Singh, Shrish Verma
Abstract | PDFPDF
315. Privacy Preservation of Published Data Using Anonymization Technique
Pages :2355-2357
Isha K.Gayki, Arvind S.Kapse
Abstract | PDFPDF
316. Quality Analysis of Indian Basmati Rice Grains Using Digital Image Processing- A Review
Pages :2358-2360
Sheetal Mahajan, Sukhvir Kaur
Abstract | PDFPDF
317. Classification of Real Value and Complex Value Data using Machine Learning Concepts
Pages :2361-2364
S.Padma, B.Kanchana Devi
Abstract | PDFPDF
318. A Cost Efficient Resource Provisioning Approach Using Virtual Machine Placement
Pages :2365-2368
S. Phani Praveen, U.Tulasi, K. Ajay Krishna Teja
Abstract | PDFPDF
319. A Cloud Computing Solution for EHR Maintenance in PHCC
Pages :2369-2372
Y.C. Ashok Kumar, M. Tanooj Kumar
Abstract | PDFPDF
320. A Survey on Denial of Service Attacks
Pages :2373-2376
T.Gunasekhar, K.Thirupathi Rao, P.Saikiran, P.V.S Lakshmi
Abstract | PDFPDF
321. Book Search by Capturing Text from Digital Images Using Optical Character Recognition
Pages :2377-2379
Dr S.Vasavi,Srikanth Varma.Ch,Anil kumar.Ch,Santosh.D.M,Sai Ram.S
Abstract | PDFPDF
322. eAoushad: IT-based Personalized Medico Advisory System
Pages :2380-2383
S. Sricharan, V. Suresh, Dr. J. Rajendra Prasad, T.D.Ravi kiran,Dr R Kiran Kumar
Abstract | PDFPDF
323. Computer-Based Clinical Decision Support System for Prediction of Heart Diseases Using Naïve Bayes Algorithm
Pages :2384-2388
D Ratnam, P HimaBindu, V.Mallik Sai, S.P.Rama Devi, P.Raghavendra Rao
Abstract | PDFPDF
324. Flooding Antivirus to Clustered Systems
Pages :2389-2390
J.Hari Krishna, Dr G.Ramakoteswara Rao, M.Samuel John
Abstract | PDFPDF
325. Content Based Medical Image Retrieval Using Lifting Scheme Based Discrete Wavelet Transform
Pages :2391-2396
G. Prathibha, Sk. Sajida Parveen, C. V. Rashmi, B. Chandra Mohan
Abstract | PDFPDF
326. Vehicle Image Classification using Image Fusion at Pixel Level based on Edge Image
Pages :2397-2402
Dr.A.Sri Krishna, M.Pompapathi, N.Neelima
Abstract | PDFPDF
327. Protection for Cloud Computing Using Level-Based Cryptography
Pages :2403-2407
Venugopal Gaddam, Srinivasulu Singaraju, M.Sundar babu, S.Sai Kumar
Abstract | PDFPDF
328. Research on HTML5 in Web Development
Pages :2408-2412
Ch Rajesh, K S V Krishna Srikanth
Abstract | PDFPDF
329. Digital Color Image Watermarking In RGB Planes Using DWT-DCT-SVD Coefficients
Pages :2413-2417
K.Chaitanya, Dr E. Srinivasa Reddy,Dr K. Gangadhara Rao
Abstract | PDFPDF
330. Testing of Cloud Applications in the Cross-Cloud Environment
Pages :2418-2421
SK.Jameela, Dr.K.Thirupathi Rao, V. Krishna Reddy, A.Haritha
Abstract | PDFPDF
331. What is opinion? Who influences? and how it gets influenced?
Pages :2422-2427
Sr.SujathaYeruva (Ph.D), Dr. Mrs. T. Devi
Abstract | PDFPDF
332. Fuzzy Art Based Image Segmentation and Statistical Analysis
Pages :2428-2431
B.V.R.V.Prasad, M.Jogendra Kumar, Dr. B.V.Subba Rao
Abstract | PDFPDF
333. Secured Bank Authentication using Image Processing and Visual Cryptography
Pages :2432-2437
B.Srikanth , G.Padmaja, Dr. Syed Khasim, Dr. P.V.S.Lakshmi, A.Haritha
Abstract | PDFPDF
334. Predictive Analysis on Nutritional Disorders in Rice Plants using Regression
Pages :2438-2442
B.Srividhya, G.SudheerKumar, K.JhansiLakshmi, D.SandeepKumar, L. Ravi Kumar
Abstract | PDFPDF
335. Non Linear Classification for Emotion Detection on Telugu Corpus
Pages :2443-2448
B.S.Yalamanchili, Anusha.K.K, Santhi.K, Sruthi.P, SwapnaMadhavi.B
Abstract | PDFPDF
336. Information Retrieval Using Subjective Analysis on Social Blogs
Pages :2449-2452
Haritha. A , Ch. Manohar Venkat, J.S.N.S. Sneha Priya, P.V.S.Lakshmi, G.Lakshmi
Abstract | PDFPDF
337. Detecting Abnormality in Activities Performed by People with Dementia in a Smart Environment
Pages :2453-2457
H. Karamath Ali, Dr. D. I. George Amalarethinam
Abstract | PDFPDF
338. Educational Data Mining and its role in Educational Field
Pages :2458-2461
P. Meena Kumari, SK.Abdul Nabi and Puppal Priyanka
Abstract | PDFPDF
339. Performance Evaluation in Content Delivery Networks Using Fluid Queue Algorithm
Pages :2462-2466
Kothuru Srinivasulu , Nalini N
Abstract | PDFPDF
340. Review On: Image Fusion Using Wavelet and Curvelet Transform
Pages :2467-2470
Navneet kaur, Madhu Bahl,Harsimran Kaur
Abstract | PDFPDF
341. Fuzzy Relational Spectral Clustering Method for Document Clustering
Pages :2471-2476
R.Nagaraj, Dr.V.Thiagarasu
Abstract | PDFPDF
342. Dynamic Service Composition for Evaluating Services in Service-Oriented Architectures: A Review Analysis
Pages :2477-2480
Sarvesh, Naveen Bilandi
Abstract | PDFPDF
343. Ensemble Neural Network and K-NN Classifiers for Intrusion Detection
Pages :2481-2485
Shalinee Chaurasia, Anurag Jain
Abstract | PDFPDF
344. A Survey on Sequential Pattern Mining Algorithms
Pages :2486-2492
Vishal S. Motegaonkar, Prof. Madhav V. Vaidya
Abstract | PDFPDF
345. Secure Smart Environment Using IOT based on RFID
Pages :2493-2496
Jebah Jaykumar, Abishlin Blessy
Abstract | PDFPDF
346. Implementation of JPEG2000 Algorithm for Gray scale and Colour Images
Pages :2497-2500
S.Jagadeeswara rao, K.Sesha sai, S.Likitha, N.Kalidasu, S.Sridhar
Abstract | PDFPDF
347. Effect of Different Distance Measures on the Performance of K-Means Algorithm: An Experimental Study in Matlab
Pages :2501-2506
Dibya Jyoti Bora, Dr. Anil Kumar Gupta
Abstract | PDFPDF
348. Classification of Hyper Spectral Images using the Unsupervised Technique
Pages :2507-2510
Battula Sateesh, S.S.Sridhar
Abstract | PDFPDF
349. Offloading Application for Android Phones Using Cloud
Pages :2511-2514
Harsh Bandhu Parnami, Mayank Arora, Deepika Khokhar
Abstract | PDFPDF
350. A Note on Authentication Accuracy with Multiplicity of Biometric Images
Pages :2515-2517
Mohammed Aamir Ali T and Varun Kumar M
Abstract | PDFPDF
351. Time Comparison of Various Feature Extraction of Content Based Image Retrieval
Pages :2518-2523
Srikanth Redrouthu, Annapurani.K
Abstract | PDFPDF
352. Estimating The Software Metrics Using Automatic Testing And Integrating Testing
Pages :2524-2527
Lithu Mathew, Mr. P.M.S.S. Chandu
Abstract | PDFPDF
353. Scrutinize Evidences for Android Phones
Pages :2528-2533
Pooja Khandelwal, Divya Rishi Sahu, Deepak Singh Tomar
Abstract | PDFPDF
354. The Performance and Simulative analysis of MANET Routing Protocols with Different Mobility Models
Pages :2534-2539
Ashutosh Bharadwaj, Dr. Ajit Singh
Abstract | PDFPDF
355. A Review on Wireless Network Attacks
Pages :2540-2542
M. Sri Lakshmi, Dr. S. Prem Kumar, S. Ashok
Abstract | PDFPDF
356. Image Segmentation using Improved Watershed Algorithm
Pages :2543-2545
Samina Tahir Rizvi, Mandeep Singh Sandhu, Shan E Fatima
Abstract | PDFPDF
357. Lesion Segmentation in Dermoscopic Image Using Decision based Neuro Fuzzy Model
Pages :2546-2552
Binamrata Baral, Sandeep Gonnade, Toran Verma
Abstract | PDFPDF
358. A Survey on SQL Injection Attack, Detection And Prevention Techniques
Pages :2553-2555
Atul M. Shegokar, Arati K. Manjaramkar
Abstract | PDFPDF
359. Data Leakage Detection
Pages :2556-2558
Chandni Bhatt, Prof.Richa Sharma
Abstract | PDFPDF
360. New Local Search Strategy in Artificial Bee Colony Algorithm
Pages :2559-2565
Sandeep Kumar , Pawan Bhambu , Vivek Kumar Sharma
Abstract | PDFPDF
361. Analysis of Crypto Components of a Chaotic Function to Study its Random Behavior
Pages :2566-2568
Kangkana Bora, Abdul Wadood, Mayur Hazarika, Zahid Ahmed
Abstract | PDFPDF
362. E-payment Gateway Model
Pages :2569-2573
Anuja Pande , Prof. A.B. Deshmukh , Prof.M. D. Tambakhe
Abstract | PDFPDF
363. PCI Express Interface Development and Simulation for High Speed Data Transmission
Pages :2574-2577
Vijitha.C.V, Najla.A.P, Jayaraj.U.Kidav
Abstract | PDFPDF
364. Creating Materialized View Over Integrated Heterogeneous Databases
Pages :2578-2581
Ankush J.Paturde, Anil V. Deorankar, P.N.Chatur
Abstract | PDFPDF
365. RFID Based Toll Collection System
Pages :2582-2585
Rakhi Kalantri, Anand Parekar, Akshay Mohite, Rohan Kankapurkar
Abstract | PDFPDF
366. Advanced Approaches for Medical Image Compression
Pages :2586-2591
Gunpreet Kaur
Abstract | PDFPDF
367. Analysis of different Scheduling Algorithms under Cloud Computing
Pages :2592-2595
Sunny Kumar, Shivani Khurana
Abstract | PDFPDF
368. User Authentication Using Multimodel Finger-Print Recognition
Pages :2596-2603
Prashant Jain, Dr. Shailja Shukla, Dr. S. S. Thakur
Abstract | PDFPDF
369. An Approach towards Improving the Lifetime and Security in Wireless Sensor Network
Pages :2604-2611
Mayuri P. Kawalkar, Dr. S.A.Ladhake
Abstract | PDFPDF
370. Design, Modeling and Simulation of Prostate Cancer Biosensor with ssDNA biomarker and DGFET Biosensor
Pages :2612-2620
B.N. Shobha, N.J.R. Muniraj
Abstract | PDFPDF
371. A New Lightweight EAP-PK Authentication Method for IEEE 802.11 standard Wireless Network
Pages :2621-2626
Dhiraj M. Londe, Prof. Nitin Chopde
Abstract | PDFPDF
372. Extending the Lifetime of Wireless Sensor Networks by Adjusting the Node Density Near the
Base Station

Pages :2627-2632
Divya Shree H.L, Chaitra R , Shakunthala B S
Abstract | PDFPDF
373. Artificial Intelligence in Hypertension Diagnosis: A Review
Pages :2636-2642
Arpneek Kaur, Abhishek Bhardwaj
Abstract | PDFPDF
374. Linear Programming Model of Sensor Network
Pages :2582-2585
Ambika.N, G.T.Raju
Abstract | PDFPDF
375. LZW based Image Steganography using Kekre’s Algorithm
Pages :2643-2648
Isha Kajal, Harish Rohil, Abhishek Kajal
Abstract | PDFPDF
376. Improved Web Service Self-Healing Connector
Pages :2649-2657
Khalid Kaabneh, Suha Afaneh, Heba Almalahmeh, Issam Alhadid
Abstract | PDFPDF
377. Forecasting the Reliability of Software via Neural Networks
Pages :2658-2661
Yogita Kansal, Shailee Choudhary
Abstract | PDFPDF
378. Physics Engine: Deformation Simulation
Pages :2662-2664
Abhishek Bhandwalda, Akshay Gandhi, Mohan Ghule, Nikhil Bansode
Abstract | PDFPDF
379. Routing Attacks in Wireless Sensor Networks: A Survey
Pages :2665-2671
Deepali Virmani, Ankita Soni, Shringarica Chandel, Manas Hemrajani
Abstract | PDFPDF
380. Mobile Money: M-payment System for India
Pages :2672-2675
Sujata P. Deshmukh, Archana M. Naware
Abstract | PDFPDF
   
-All rights are reserved by International Journal of Computer Science and Information Technologies-