IF

 

bh

 

VOLUME 5 ISSUE 5 September - October 2014

ISSN 0975 - 9646

1. Comparison of Algebraic Reconstruction Methods in Computed Tomography
Pages : 6007-6009
G Vijayalakshmi, P Vindhya
Abstract | PDFPDF
2. Implementation of Optimization of Latency in Wireless Mesh Network
Pages : 6010-6015
Kusuma M, Umapathi G R
Abstract | PDFPDF
3. A Study of Power and Energy Aware Routing Technologies in Wireless Sensor Network
Pages : 6016-6021
Roshani Kushavaha, Umesh kumar Chourasiya, Mahesh Gour
Abstract | PDFPDF
4. Optimal Resource Allocation in Wireless Mesh Network
Pages : 6022-6026
Amlan Roy, Umapathi G R
Abstract | PDFPDF
5. A Review on Cloud Data Storage in Virtual Perspective
Pages : 6027-6031
B.Nagarajan, Dr.J.Suguna
Abstract | PDFPDF
6. A Comprehensive Framework for Reengineering Method for Web services architectures
Pages : 6032-6034
Venkatsampath Raja Gogineni, Dr.Syed Umar
Abstract | PDFPDF
7. Comprehensive Review of Web Focused Crawling
Pages : 6035-6038
Promila Devi, Ravinder Thakur
Abstract | PDFPDF
8. Haptic Technology :- A Comprehensive Review of its Applications and Future Prospects
Pages : 6039-6043
Anupam Alur,Pratik Shrivastav,Aditya Jumde
Abstract | PDFPDF
9. Design and Implementation of a Low Power Second Order Sigma-Delta ADC
Pages : 6044-6049
K. Lokesh Krishna, M. Jagadeesh , T.Ramashri, K.Anuradha
Abstract | PDFPDF
10. A Survey: Outlier Detection in Streaming Data Using Clustering Approached
Pages : 6050-6053
Safal V Bhosale
Abstract | PDFPDF
11. A Survey on Privacy Preserving Data Mining Techniques
Pages : 6054-5056
Mayil.S and Vanitha.M
Abstract | PDFPDF
12. A Review on Participating Sensing Networking
Pages : 6057-6059
Ravinder Singh Sidhu, Varinderjit kaur
Abstract | PDFPDF
13. A Review Paper on Evolution of Cloud Computing, its Approaches and Comparison with Grid Computing
Pages : 6060-6063
Rajleen Kaur, Amanpreet Kaur
Abstract | PDFPDF
14. Performance Analysis of Clustering Based on Fuzzy System
Pages : 6064-6067
K.Vijayakumari, M. Preetha, K.Velusamy
Abstract | PDFPDF
15. Crime Detection and Avoidance in ATM: A New Framework
Pages : 6068-6071
Sujith B
Abstract | PDFPDF
16. Design and Development of Privacy Control Tool for Web Browsers using Value Sensitive Design
Pages : 6072-6078
Swarnangini Ghosh, Rajesh Shukla
Abstract | PDFPDF
17. CFixed and Mobile WiMAX Networks based on LTE
Pages : 6079-6084
Bhuteswar Jena
Abstract | PDFPDF
18. Comparative Evaluation of Cluster based CBIR using different Similarity Measures
Pages : 6085-6088
Seema Anand Chaurasia, Vaishali Suryawanshi
Abstract | PDFPDF
19. Intelligent Medical Image Segmentation Using FCM, GA and PSO
Pages : 6089-6093
Dilpreet Kaur, Yadwinder Kaur
Abstract | PDFPDF
20. Addressing the Security, Privacy and Trust Challenges of Cloud Computing
Pages :6094-6097
Rama Krishna Kalluri, Dr. C. V. Guru Rao
Abstract | PDFPDF
21. Honeypots: The Need of Network Security
Pages : 6098-6101
Navneet Kambow, Lavleen Kaur Passi
Abstract | PDFPDF
22. Automatic Toll Collection by Using QR Code Capturing
Pages : 6102-6105
Shital Y. Gaikwad, Chandrakant S. Audhutwar
Abstract | PDFPDF
23. Relevancy Enhancement of Query with Czekanowski Coefficient by Expanding it Using Genetic Algorithm
Pages : 6106-6110
Neha Soni, Jaswinder Singh
Abstract | PDFPDF
24. Comparative Evaluation of Transform Based CBIR Using Different Wavelets and Two Different Feature Extraction Methods
Pages : 6111-6115
Omprakash Yadav, Vaishali Suryawanshi
Abstract | PDFPDF
25. Review on FPGA Implementation of OFDM
Pages : 6116-6120
Prof. R. K. Paliwal, Dr. C. M. Jadhao, Prof. A.S. Kakad
Abstract | PDFPDF
26. Processing an Image using Inpainting and Super- Resolution Algorithm
Pages : 6121-6123
S. Vijayalakshmi
Abstract | PDFPDF
27. E-Learning :Technological Development in Teaching for school kids
Pages : 6124-6126
K. Udaya Sri, T.V.Vamsi Krishna
Abstract | PDFPDF
28. A Comprehensive Survey of Modern Content Based Image Retrieval Techniques
Pages : 6127-6129
Avneet Kaur Chhabra and Vijay Birchha
Abstract | PDFPDF
29. Enhancement of Radnet Protocol Using Red Routing Algorithm in Manets
Pages : 6130-6134
Balkar Singh, Vinay Bhardwaj
Abstract | PDFPDF
30. Image Denoising Algorithms and DWT: A Review
Pages : 6135-6137
Taranjot Kaur
Abstract | PDFPDF
31. Implementation of Text clustering using Genetic Algorithm
Pages : 6138-6142
Dhanya P.M, Jathavedan M, Sreekumar A
Abstract | PDFPDF
32. Effect of MANETS With and Without Malicious Node
Pages : 6143-6146
Katroth Balakrishna Maruthiram, Sri.Kare.Suresh Babu
Abstract | PDFPDF
33. A Survey on Predicting Student Performance
Pages : 6147-6149
A.Dinesh Kumar ,Dr.V.Radhika
Abstract | PDFPDF
34. Enacting A Service Engagement for Contracts Mining in Business Affairs and Temporal Constraints Using Cloud Computing
Pages : 6138-6142
Deepak M, Goutham R, Deeksha Hegde B, Chandrika C N
Abstract | PDFPDF
35. Comparative Study of Association Rule Mining Algorithms with Web Logs
Pages : 6153-6157
Archita Bonde, Deipali V. Gore
Abstract | PDFPDF
36. Stylometric Approach For Author Identification of Online Messages
Pages : 6158-6159
Smita Nirkhi, Dr.R.V.Dharaska, Dr.V.M.Thakre
Abstract | PDFPDF
37. Pattern Matching using Layered STRIFA for Intrusion Detection
Pages : 6160-6164
P Prudhvi, H Venkateswara reddy
Abstract | PDFPDF
38. Two Way Authentication Scheme for Mobile Applications and Web Application
Pages : 6165-6168
Md Jaleel Ahmed Ansari, P. Subhadra
Abstract | PDFPDF
39. A Survey on Speech Recogntion in Indian Languages
Pages : 6169-6175
Cini Kurian
Abstract | PDFPDF
40. Clean Migration of Data from Relational database to Object-Oriented database using three step data migration algorithm
Pages : 6176-6180
Sonali P. Dhawak, Prof. Akansha Jain, Prof. Amit Sinhal
Abstract | PDFPDF
41. A Smart Analytical Tool for Digital Governance with a Global Perspective employing Business
Intelligence

Pages : 6181-6183
Aditya Vinay Jumde, Sayali Makarand ghaisas
Abstract | PDFPDF
42. Migration from One CSP to Another using Meta- Cloud
Pages : 6184-6192
G. Satish, Dr. G. Venkata Rami Reddy
Abstract | PDFPDF
43. A Survey of File Systems and File Access Systems
Pages : 6193-6197
R.Prathyusha, G.Praveen Babu
Abstract | PDFPDF
44. Implementing an Efficient Task to Build Data Sets for Datamining Analysis
Pages : 6198-6201
B.K.Manasa, H.Venkateswara Reddy
Abstract | PDFPDF
45. Experimental study of RED Performance by regulating Upper Threshold Parameter
Pages : 6202-6204
Rajeev Sharma, Dr. Gireesh Dixit
Abstract | PDFPDF
46. Achieving Efficiency of Power, Privacy and QoS for Online Videos
Pages : 6205-6207
Maneesha Patan, Krishna Sagar.B
Abstract | PDFPDF
47. Techniques for Reducing the Down Time during Virtual Machine Migration: Resource Failure &
Live Migration Circumstances

Pages : 6208-6212
Dr. Abhay Kothari, Ashish Agrawal
Abstract | PDFPDF
48. Performance Evaluation of an approach for Secret data transfer using interpolation and LSB
substitution with Watermarking

Pages : 6213-6217
Sonia Bajaj, Manshi Shukla
Abstract | PDFPDF
49. Implementation of TCP Recognition of Broken Order (TCP-BO) Algorithm
Pages : 6218-6224
Monika Nath, Nidhi Sharma
Abstract | PDFPDF
50. Data Mining:Review
Pages : 6225-6228
Paramjit Kaur, Kanwalpreet Singh Attwal
Abstract | PDFPDF
51. Healthcare applications of the Internet of Things: A Review
Pages : 6229-6232
Alok Kulkarni, Sampada Sathe
Abstract | PDFPDF
52. Secure Multi-party Computation Protocols For Collaborative Data Publishing With m-Privacy
Pages : 6233-6237
K. Prathyusha, Sakshi Siva Ramakrishna
Abstract | PDFPDF
53. The Hadoop distributed file system
Pages : 6238-6243
Pooja S.Honnutagi
Abstract | PDFPDF
54. Implementation of Cloud computing for Mobile Users
Pages : 6244-6247
P.Dileep , S.Tirupati Rao
Abstract | PDFPDF
55. A Survey on Green Computing Techniques
Pages : 6248-6252
Sonu Choudhary
Abstract | PDFPDF
56. New Approach of Information Security through Steganography by using Wavelet Transformation
and Symmetric Encryption

Pages : 6253-6260
Komal Hirachandani, Gaurav Soni, Prof. Rajesh Nigam
Abstract | PDFPDF
57. Comparative Study of Classification Algorithms used in Sentiment Analysis
Pages : 6261-6264
Amit Gupte, Sourabh Joshi, Pratik Gadgul, Akshay Kadam
Abstract | PDFPDF
58. Fuzzified Denoising Technique for Directional Total Variation Minimization on Color Image
Pages : 6265-6269
Hema Jagat, Rashmi Shrivas
Abstract | PDFPDF
59. Body Odor as a Biometric Authentication
Pages : 6270-6274
P.Inbavalli, G.Nandhini
Abstract | PDFPDF
60. An Extended Visual Cryptography Algorithm for Quality-Improved Gray Scale Image with Sigmoid
Function.

Pages : 6275-6277
Santosh Kumar, Prof. Sini Shibu
Abstract | PDFPDF
61. Efficient Algorithm for Fault Tolerance in Cloud Computing
Pages : 6278-6281
Jasbir Kaur, Supriya Kinger
Abstract | PDFPDF
62. An Efficient Technique of Image Noising and Denoising using Neuro Fuzzy and SVM
Pages : 6282-6285
Jyoti Sharma and Mrs.Rupinder Kaur
Abstract | PDFPDF
63. Performance Evaluation of Mobility Management using Mobile IPv4 and Mobile IPv6 protocols
Pages : 6286-6289
G B Himabindu, A.M Vedhagrani, S R Raj Kumar
Abstract | PDFPDF
64. Doctor App: A life saving Mobile Application
Pages : 6290-6295
Mayank Aggarwal, Akshay Mathur , Yatin Karel
Abstract | PDFPDF
65. Effect of Varying Initial Energy on Multihop Routing Protocol in Wireless Sensor Network
Pages :6296-6302
Namita Sharma
Abstract | PDFPDF
66. Image Restoration by Using Hybrid Filling-in Technique
Pages :6303-6306
Gurpinder Kaur Sivia, Amanpreet Kaur
Abstract | PDFPDF
67. Incorporation of Swarm Intelligence in Autonomous Cars
Pages : 6307-6309
Yadhu Prakash, Kahan Prabhu, Shruti Kamtekar, Sainath Gadhe
Abstract | PDFPDF
68. A Survey on Load Balancing Techniques Using ACO Algorithm
Pages : 6310-6314
Preeti Kushwah
Abstract | PDFPDF
69. Improve Security of Attribute Based Encryption for Secure Sharing of Personal Health Records
Pages : 6315-6317
Able E Alias, Neethu Roy
Abstract | PDFPDF
70. Comparative Study of Wireless Network Technologies
Pages : 6318-6321
Harshil Shah , Lakshmi Kurup
Abstract | PDFPDF
71. Comparative Analysis and Classification of Multispectral Remote Sensing Data
Pages : 6322-6325
Kusum, Paramvir Rathi
Abstract | PDFPDF
72. Approaches for Information Security Modeling
Pages : 6326-6328
Harshitaa.B, G.Praveen Babu
Abstract | PDFPDF
73. Comparative Analysis of TCP variants with AODV in Mobile Ad Hoc Network
Pages :6329-6332
Sandeep Sandhu, Anirudh Menon, Parikshit Sinha, Nirav Afinwale, Mrs.Payal T. Mahida
Abstract | PDFPDF
74. Effect of Mobile Social Networks on Secondary School Students
Pages : 6333-6335
Abba Almu and Bello Alhaji Buhari
Abstract | PDFPDF
75. Optimization of Security Policies on Virtual Machines using Flow Differentiator & Zone Manager
Pages : 6336-6340
J.Madhulatha, E.S.Phalguna Krishna , E.Sandhya
Abstract | PDFPDF
76. Captcha and Its Techniques: A Review
Pages : 6341-6344
Kiranjot Kaur, Sunny Behal
Abstract | PDFPDF
77. Multicast Routing and Its Protocols
Pages : 6345-6349
Mithun B Patil
Abstract | PDFPDF
78. Detailed Survey on Exemplar Based Image Inpainting Techniques
Pages :6350-6354
Jaspreet Kaur Chhabra and Mr. Vijay Birchha
Abstract | PDFPDF
79. Feature Based Video Extraction Using Tree Pruning
Pages : 6355-6360
R. Manjunath, B. Sreepathi
Abstract | PDFPDF
80. Hybrid Approach for Hindi to English Transliteration System for Proper Nouns
Pages : 6361-6366
Veerpal Kaur, Amandeep kaur Sarao, Jagtar Singh
Abstract | PDFPDF
81. Image Filtering and Re-ranking Using Data mining Techniques
Pages : 6367-6372
N.Lakshmi Prasanna, Thirumala Sree G
Abstract | PDFPDF
82. A Location Based Protocol for Anonymity Protection of Nodes and Routes at Low Cost
Pages : 6373-6378
M.Bhavana, M.R.Pavan Kumar
Abstract | PDFPDF
83. Predicting Error in Software Effort Estimate using K-means and Quad Tree algorithm
Pages : 6379-6382
Rutvi Vanapalli, Ch.Satyananda Reddy
Abstract | PDFPDF
84. Detection of Ozone Layer Depletion Using Image Processing and Data Mining Technique
Pages : 6383-6388
Nomula Divya,Narasimha Prasad Lakkakula,Arjun Nelikanti
Abstract | PDFPDF
85. Optimized Method for Tracking of Data Leaving the Cloud Environment
Pages : 6389-6394
Lokendra Vishwakarma, Pallavi Gupta, Awadheshwari patel
Abstract | PDFPDF
86. Using Attribute-Based Encryption with Advanced Encryption Standard for Secure and Scalable
Sharing of Personal Health Records in Cloud

Pages : 6395-6399
B. Sri Varsha, P.S. Suryateja
Abstract | PDFPDF
87. A New Methodology for Improvement of Contrast to Show Fractures in X-ray Images
Pages : 6400-6403
Priya Thamman, Rekha Bhatia
Abstract | PDFPDF
88. A Novel Secured Communication Channel Based On Genetic Functions
Pages : 6404-6409
Lakshmikanth Gurlanka, Vasupalli Mahesh, Y.Ramesh kumar
Abstract | PDFPDF
89. A Novel Secured Data Communication and Prevention of Forgery Attacks Using Digital Certificates
Pages : 6410-6415
Sharina Toor, Kesava Rao Seerapu, Y.Ramesh kumar
Abstract | PDFPDF
90. A Novel Secured Transmission Of Color Extended Visual Images Using Error Diffusion
Pages : 6416-6420
Srujan pentakota, Maher Prasad, Y.Ramesh kumar
Abstract | PDFPDF
91. Efficient Summarization of Text Data Based on Categorized Keywords Ranking
Pages : 6421-6426
Sailaja Madhu, B.Ramesh Babu, Y.Ramesh kumar
Abstract | PDFPDF
92. A Secured Multicasting Key and Data Exchange By Using Extended Chebhysev Map
Pages : 6427-6431
Jyothsna Ivaturi, K.Ravindra, Y.Ramesh Kumar
Abstract | PDFPDF
93. Improving Audit Service in Cloud for Outsourced Storage Dynamically
Pages : 6432-6435
N.Praveen kumar, S.Bavaji
Abstract | PDFPDF
94. Improving the Performance of Processing for Small Files in Hadoop: A Case Study of Weather
Data Analytics

Pages : 6436-6439
Guru Prasad M S, Nagesh H R, Deepthi M
Abstract | PDFPDF
95. Text Search Optimization Using Latent Semantic Indexing
Pages : 6440-6442
Navneet kaur Waraich, Hardeep Singh Sindher
Abstract | PDFPDF
96. Improved Similarity Based Matrix Completion Algorithm Using Latent Semantic Indexing
Pages : 6443-6448
Navneet kaur Waraich, Hardeep Singh Sindher
Abstract | PDFPDF
97. A Survey on Image Feature Selection Techniques
Pages : 6449-6452
Dr. Sanjay Kumar , Er. Ankur Chauhan
Abstract | PDFPDF
98. Comparative Analysis of Clustering & Enhancing Classification Using Bio- Inspired Approaches
Pages : 6453-6457
Navpreet Rupal , Poonam Kataria
Abstract | PDFPDF
99. Ranking Objects by Evaluating Spatial Points through Materialized Datasets
Pages : 6458-6463
K.Swathi, B.Renuka Devi
Abstract | PDFPDF
100. A Flexible and Efficient Natural Language Query interface to databases
Pages : 6464-6467
B.Sujatha, Dr.S. Viswanadha Raju
Abstract | PDFPDF
101. Spatial Index Keyword Search in Multi dimensional Database
Pages : 6468-6471
C. Usha Rani , N.Munisankar
Abstract | PDFPDF
102. Categorising Web Search Results from Search Engine Logs
Pages : 6472-6474
K.Morarjee, Bijam.Mownika
Abstract | PDFPDF
103. Hybrid Approach to Enhance Architecture Supporting WSN Using AODV AND DPR
Pages : 6475-6477
Kulbir Singh Khatra,Vinay Bhardwaj
Abstract | PDFPDF
104. Comparative Analysis of AntHocNet, AODV, DSR Routing Protocols for Improvising Loss Packet Delivery Factor
Pages : 6478-6482
Maahi Amit Khemchandani, Prof. B. W. Balkhande
Abstract | PDFPDF
105. Developers Harness Open Source Cloud Management Platforms for Novel Applications
Pages : 6483-6486
Dr. Urmila R. Pol
Abstract | PDFPDF
106. Data Mining Techniques For Diagnosis And Prognosis Of Breast Cancer
Pages : 6487-6490
Jaimini Majali, Rishikesh Niranjan, Vinamra Phatak, Omkar Tadakhe
Abstract | PDFPDF
107. Face Recognition Using Principal Component Analysis
Pages : 6491-6496
Ningthoujam Sunita Devi, K. Hemachandran
Abstract | PDFPDF
108. Lifetime Improvement of WSN by Trust Level based Ant Colony Optimization
Pages : 6497-6501
Dr.V.Raghunatha Reddy, A.Rajasekhar Reddy
Abstract | PDFPDF
109. Detection of DDoS Attacks based on Network Traffic Prediction and Chaos Theory
Pages : 6502-6505
Anjali. M
Abstract | PDFPDF
110. Secure Data Spread using Dispersed Key Cohort Scheme in Wireless Sensor Networks
Pages : 6506-6513
R.Kavitha
Abstract | PDFPDF
111. Study of Different Security Issues in Cloud Storage
Pages : 6514-6516
Dandawate Vrushali Vilas, Dr. Ravindra C. Thool
Abstract | PDFPDF
112. Video Surveillance for Theft Detection
Pages : 6517-6520
Abhiram Chaudhari, Ajinkya Jaisingkar, Ankit Patil, Rishi Kajgaonkar
Abstract | PDFPDF
113. Enhanced Offline Signature Recognition Using Neuro- Fuzzy and SURF Features Techniques
Pages : 6521-6527
Rupali Mehra, Dr.R.C.Gangwar
Abstract | PDFPDF
114. A Novel Gaussian Error Diffusion based Colour Extended Visual Cryptography
Pages :6528-6531
T. Anuradha, Dr. K. Usha Rani
Abstract | PDFPDF
115. An Indian Coin Recognition System Using Artificial Neural Networks
Pages : 6532-6537
Loveneet Kaur, Rekha Bhatia
Abstract | PDFPDF
116. Literature Survey on Digital Watermarking
Pages : 6538-6542
Manoranjan Kr Sinha , Dr. Rajesh Rai, Prof. G. Kumar
Abstract | PDFPDF
117. Enhancement in AODV protocol to select the secure and shortest path in Mobile Ad hoc Network
Pages : 6543-6546
Gagandeep Singh Hundal, Rajeev Bedi, Dr. Sunil Kumar Gupta
Abstract | PDFPDF
118. An approach for VM Migration
Pages : 6547-6550
Lavneet Kaur, Er. Kanchan Lalit
Abstract | PDFPDF
119. Anomaly Detection and SQL Prepare Data Sets for Data Mining Analysis
Pages : 6551-6555
P.V.Balakrishna, B.Rama Ganesh
Abstract | PDFPDF
120. Implementing REA Algorithm to Increase Performance of the Encrypted Databases While
Query Processing

Pages : 6556-6561
Rohini A. Chirde, Prof. S. S. Kulkarni
Abstract | PDFPDF
121. A Novel Secured Data and Key Exchange Mechanism for Sensor Networks
Pages : 6562-6566
Bhargavi, Vasupalli Mahesh, Y.Rameshkumar
Abstract | PDFPDF
122. A Novel Secured Protocol for Data Transmission in Adhoc Networks Using Clustering
Pages : 6567-6571
K.Komali, V.Mahesh, Y.Ramesh Kumar
Abstract | PDFPDF
123. A Web Search Engine Application to Compare Semantic Equivalence between Two Words
Pages : 6572-6577
Mallela Haribabu, H.Devaraj, Y.Ramesh Kumar
Abstract | PDFPDF
124. Application of Concept-Based Mining Model in Text Clustering
Pages : 6578-6582
Modu Sowjanya, K.Ravindra, Y.Ramesh Kumar
Abstract | PDFPDF
125. THR: Efficient Technique to Reduce Delay with F-Cast in MANET
Pages : 6583-6585
G.Vasundara Devi, Surya Bahadur
Abstract | PDFPDF
126. Human Motion Analysis with the Help of Video Surveillance: A Review
Pages : 6586-6590
Kavita V. Bhaltilak, Harleen Kaur, Cherry Khosla
Abstract | PDFPDF
127. A Report on the Analysis of Metrics and Measures on Software Quality Factors – A Literature Study
Pages : 6591-6595
Vanitha N, ThirumalaiSelvi R
Abstract | PDFPDF
128. Adaptive Node Resurgence in Wireless Sensor- Actuator Networks
Pages : 6596-6598
T Sridepa, G Vijaybaskar
Abstract | PDFPDF
129. Assay of Data Security in Cloud Computing
Pages : 6599-6601
Navan Preet Singh, Bhavkaran Singh Walia
Abstract | PDFPDF
130. Semantic Image Retrieval:A Review
Pages : 6602-6605
Ashitha.S.S
Abstract | PDFPDF
131. Packet Hiding Scheme without Packet Loss (PHSPL) for defensive against Jamming Attack
Pages : 6606-6608
Archana Patil, Prof. S.P.Pingat
Abstract | PDFPDF
132. A Review on Transform Domain Adaptive Filters
Pages : 6609-6613
Sangeeta Sharma, Deepak Gupta, V K Gupta, Mahesh Chandra
Abstract | PDFPDF
133. Survey on Clustering Techniques in Wireless Sensor Network
Pages : 6614-6619
Priya Vyas, Manoj Chouhan
Abstract | PDFPDF
134. Wormhole Detection and Prevention Scheme using Beacon Node Mechanism with Neighbor Node
Discovery

Pages : 6620-6625
Akansha Agrawal, Prof. Amit Saxena
Abstract | PDFPDF
135. An Energy Efficient Zigbee Standard 802.15.4 Enviornment for a Holter Device
Pages : 6626-6630
Jaspreet Singh, Parminder Kaur, Ashish Verma
Abstract | PDFPDF
136. Performance Analysis of A Novel Scheduling Algorithm for Different Traffics in LTE Networks
Pages : 6631-6634
Vallari Sharma, Prof. P.K Chopra
Abstract | PDFPDF
137. Mobile Cloud Computing : Issues, Security,Advantages, Trends
Pages : 6635-6639
Dhammapal Tayade
Abstract | PDFPDF
138. Improve Multi Path Congestion Control Technique Using EIA
Pages : 6640-6643
Ankur Nahar, Neeraj Shrivastwa
Abstract | PDFPDF
139. Performance Analysis and Designing of Fingerprints Enhancement Technique Based on Segmentation, oF Estimation and Ridge Frequency, Gabor Filters with Wavelet Transform
Pages : 6644-6651
Nadira Quadri, Surendra Singh Choudhary
Abstract | PDFPDF
140. Extended Framework for Social Trust-aware Recommendation System
Pages : 6652-6655
YashneetTyagi, Swati Tiwari
Abstract | PDFPDF
141. Intrusion Detection System Using Clustering
Pages : 6656-6658
Madhulika Deshmukh, Prof. S.K. Shinde
Abstract | PDFPDF
142. Reversible Data Hiding in Images using Circular Hough Transform
Pages : 6659-6663
Sukhdeep Kaur, Manshi Shukla
Abstract | PDFPDF
143. Tamil Speech Recognition Using Hybrid Technique of EWTLBO and HMM
Pages : 6664-6669
Dr.E.Chandra, S.Sujiya
Abstract | PDFPDF
144. Analysis of Fragment Mining on Indian Financial Market
Pages : 6670-6675
Rajesh V. Argiddi, Dr.Mrs.S.S.Apte
Abstract | PDFPDF
145. A Hybrid Framework of Facial Expression Recognition using SVD & PCA
Pages : 6676-6679
Rupinder Saini, Narinder Rana
Abstract | PDFPDF
146. Improving Data Integrity for Data Storage Security in Cloud Computing
Pages : 6680-6685
Poonam M. Pardeshi, Prof. Bharat Tidke
Abstract | PDFPDF
147. A Survey on Face Identification Methodologies in Videos
Pages : 6686-6688
Deepti Yadav, Ms. Antara Bhattacharya
Abstract | PDFPDF
148. A Review of Web Crawler Algorithms
Pages :6689-6691
Apoorv Vikram Singh , Vikas , Achyut Mishra
Abstract | PDFPDF
149. Agent Based Simulation of Street Robbery
Pages : 6692-6696
Amrutha S
Abstract | PDFPDF
150. A Comparative Study of Various Metaheuristic Algorithms
Pages :6701-6704
Prabhneet kaur , Taranjot kaur
Abstract | PDFPDF
151. A Research for Modified PEPSI Architecture
Pages : 6697-6700
Shreya Ahuja, Amninder Kaur Gill
Abstract | PDFPDF
152. Privacy Preserving in Collaborative Data Publishing
Pages : 6705-6706
K. Reddi Kumari, P.Rajarajeswari, Dr.D.Vasumathi
Abstract | PDFPDF
153. Human Activity Tracking and Analysis for Surveillance
Pages : 6707-6711
Swati Chourasia, Vishal Jain
Abstract | PDFPDF
154. Power and Data Aware Best Fit Algorithm for Energy Saving in Cloud Computing
Pages : 6712-6715
Pradeep Kumar, Dilbag Singh, Ankur Kaushik
Abstract | PDFPDF
155. DACD: Delegated Access Control of Data in Cloud computing environment
Pages :6716-6718
Dhanamjay.K, Krishna Sagar.B
Abstract | PDFPDF
156. Optimization of Examination Timetable Using Harmony Search Hyper-Heuristics (HSHH)
Pages : 6719-6723
Ms.Jayashree Rankhambe, Mrs.S.Kavita
Abstract | PDFPDF
157. Anonymization of Centralized and Distributed Social Networks by Incremental Clustering
Pages : 6724-6727
Ms. Sonali M. Khairnar, Prof. Sanchika Bajpai
Abstract | PDFPDF
158. Student Profile Assessor for University Prognosis Using Classification Algorithms
Pages : 6728-6731
Divyansh Jain, Ameya Shringi
Abstract | PDFPDF
159. Evaluating Performance of Compressive sensing for speech signal with Combined Basis
Pages :6732-6735
Siddhi Desai
Abstract | PDFPDF
160. Literature Review of Model Based Test case Prioritization
Pages :6736-6738
Shweta A. Joshi, Prof. B.S. Tiple
Abstract | PDFPDF
161. Blind Source Separation via Independent Component Analysis : Algorithms and Applications
Pages : 6739-6743
Jaya Kulchandani, Kruti J. Dangarwala
Abstract | PDFPDF
162. Recent Trends in Users’ Query Clustering
Pages : 6744-6749
Sami Uddin , Amit kumar Nandandwar
Abstract | PDFPDF
163. Finding Best Time Quantum for Round Robin Scheduling Algorithm to avoid Frequent Context
Switch

Pages : 6750-6754
D Praveen Kumar, T. Sreenivasula Reddy, A. Yugandhar Reddy
Abstract | PDFPDF
164. Hybrid Approach for Improvement of Web page Response Time
Pages : 6755-6759
Kushwant Kaur, Prof. Kanwalvir Singh Dhindsa
Abstract | PDFPDF
165. Disaster Management System on Mobile Phones Using Google Map
Pages :6760-6763
Varsha S. Sonwane
Abstract | PDFPDF
166. Recognition and Classification Of Speech And Its Related Fluency Disorders
Pages : 6764-6767
Monica Mundada , Bharti Gawali ,Sangramsing Kayte
Abstract | PDFPDF
167. Multi-point Gesture Recognition Using LED Gloves For Interactive HCI
Pages : 6768-6773
Manisha R.Ghunawat
Abstract | PDFPDF
168. Design of Lightweight Secure and Distributed Reprogramming Protocol for Wireless Sensor
Networks using Identity-Based Signature Scheme

Pages : 6774-6778
Pooja Motwani, Purnima Soni, Priyanka Fulare
Abstract | PDFPDF
169. Dataset Watermarking Using Hybrid Optimization and ELM
Pages : 6779-6784
Vithyaa Raajamanickam, Ms.R. Mahalakshmi
Abstract | PDFPDF
170. Multipurpose Web Log Analyzer: A Survey
Pages : 6785-6788
Lalit Agrawal
Abstract | PDFPDF
171. Self Adaptive Harmony Search Algorithm for Optimizing ECG Signal
Pages : 6789-6791
Asha J Gomez, Mitha Rachel Jose
Abstract | PDFPDF
172. Attribute Based Encryption with Privacy Preserving using Asymmetric Key in Cloud Computing
Pages : 6792-6795
S Sankareswari , S.Hemanth
Abstract | PDFPDF
173. H-ARPT: A Hybrid Adaptive Random Partition Testing for Improved Bug Detection and Test Coverage
Pages : 6796-6801
Mahesh Malviya, Reetika Patidar
Abstract | PDFPDF
174. Body Area Network- A Perspective
Pages : 6802-6809
Gomita Verma , Prof.Moinuddin
Abstract | PDFPDF
175. Stealthy P2P Botnet Detection Based on Automated Threshold Computing Using Genetic
Algorithm

Pages : 6810-6813
Vishnu S Sekhar, Neena Joseph
Abstract | PDFPDF
176. Comparisons of Test t Case Prioritization Algorithm with Random Prioritization
Pages : 6814-6818
Thillaikarasi Muthusamy, Dr. Seetharaman.K
Abstract | PDFPDF
177. A Review on Storage & Prevention in Cloud Computing
Pages : 6819-6823
Tarun Soni, Piyush Singh
Abstract | PDFPDF
178. Cut Paste Detection in Document Images Using Neural Network
Pages : 6824-6826
Sarabjot Singh , Nishu Bansal
Abstract | PDFPDF
179. A Simple and Effective Optical Character Recognition System for Digits Recognition using the
Pixel-Contour Features and Mathematical Parameters

Pages : 6827-6830
Jenil Shah, Viral Gokani
Abstract | PDFPDF
180. Segmentation of Skin Lesions from Digital Images using an Optimized Approach: Genetic Algorithm
Pages : 6831-6837
Hina Sood, Manshi Shukla
Abstract | PDFPDF
181. Performance Comparison of K-means and Rectangle Segmentation Algorithms in Compression of Color Images
Pages : 6838-6845
Kitty Arora, Manshi Shukla
Abstract | PDFPDF
182. Cellular-Genetic Key Generation Algorithm
Pages : 6846-6848
Neha Singla
Abstract | PDFPDF
183. Understanding Focused Crawler
Pages : 6849-6852
Vruksha Shah, Riya Patni , Vivek Patani, Rhythm Shah
Abstract | PDFPDF
184. Image Encryption using AES Algorithm based on FPGA
Pages : 6853-6859
Anup.Gujar
Abstract | PDFPDF
185. Survey on Improvement of Efficiency of Classified Machinery Datasets Using VPRS
Pages : 6860-6863
Rashmi Rani Upadhyay, Ritesh Shah
Abstract | PDFPDF
186. Sharing of Personal Health Records Securely in Cloud Computing with Attribute Based Encryption
Pages : 6864-6866
Muhib Anwar Lambay, M. Jhansi Lakshmi, Pralhad S. Gamare
Abstract | PDFPDF
187. Deep Web Query Extraction Algorithm for Information Retrieval System
Pages : 6867-6870
Divya Dalal, Anil Panwar
Abstract | PDFPDF
188. GWSVM Algorithm for a Grid System
Pages : 6871-6876
P.Vishvapathi, Dr.S.Ramachandram, Dr.A.Govardhan
Abstract | PDFPDF
189. RICEsmart: An Expert System to Enhance Rice Yield
Pages : 6877-6879
Shailendra Kumar Yadav, Niraj Singhal and Vivek Yadav
Abstract | PDFPDF
190. A Replica Distribution Based Fault Tolerance Management For Cloud Computing
Pages : 6880-6887
Ajitabh Mahalkari, Prof. Ritu Tondon
Abstract | PDFPDF
191. Comparative Study of Reactive Routing Protocols AODV and DSR for Mobile Ad hoc Networks
Pages : 6888-6891
Nikhil Kumar, Vishant Kumar,Nitin Kumar
Abstract | PDFPDF
-All rights are reserved by International Journal of Computer Science and Information Technologies-