IF

bh

 

VOLUME 5 ISSUE 6 November - December 2014

ISSN 0975 - 9646

1. A Study of Service Users’ Attitudes towards E-Government Initiatives in the Kingdom Of
Saudi Arabia

Pages : 6892-6901
Raed Alotaibi, Kuldeep Sandhu, Luke Houghton
Abstract | PDFPDF
2. Mining High BeneficialItemsets from Transactional Database
Pages : 6902-6904
Supriya P. Bhosale
Abstract | PDFPDF
3. Mainframes- Still standing the test of time
Pages : 6905-6906
Sophia Sharda
Abstract | PDFPDF
4. Speech Database for Speech Analysis
Pages : 6907-6910
Ganga Banavath, Sreedhar Potla
Abstract | PDFPDF
5. A Brief Study of Power Efficient Hierarchical Routing Protocols in Wireless Sensor Networks
Pages : 6911-6915
Anuradha, Inderjeet Singh Gill
Abstract | PDFPDF
6. Secure Token for Secure Routing of Packet in MANET
Pages : 6916-6919
S.S.Zalte, Prof.(Dr.)Vijay R.Ghorpade
Abstract | PDFPDF
7. Optimal Decision Support System Using Multilayer Neural Networks for Incinerator Control
Pages :6920-6925
Prakash G L, Samson Saju, Snehil Mitra and Vedant Sharma
Abstract | PDFPDF
8. Privacy Preserving Data Sharing in Multi Groups
Pages : 6926-6928
M.Kavya, M.V. Jagannatha Reddy
Abstract | PDFPDF
9. Survey on Application Layer DDoS Attacks
Pages : 6929-6931
Anjali. M, B.Padmavathi
Abstract | PDFPDF
10. Library Management System Using RFID Technology
Pages : 6932-6935
Sree Lakshmi Addepalli, Sree Gowri Addepalli
Abstract | PDFPDF
11. An Efficient and Flexible DC to DC Converter With Feedback Control for Communication System
Pages : 6936-6938
Agus Harjoko, Tri Wahyu Supardi
Abstract | PDFPDF
12. Tonic Comprehension and Modeling of Analog Transmissions -An insight into the future of ‘Smart Music
Pages : 6939-6941
Siddhant Gawsane, Koninika Patil
Abstract | PDFPDF
13. Secure Data Storage and Log Records Using JAR, AES
Pages :6942-6945
K.Kartheek, C.Narasimha
Abstract | PDFPDF
14. An Enhanced SharePoint Authentication using Kerberos
Pages : 6946-6951
S.Vanitha, J.Jayachitra, K.Elavarasi
Abstract | PDFPDF
15. Comparison of TPatLetEn with TPF in Detecting and Preventing DoS Attack
Pages : 6952-6957
Durairaj M , Persia A
Abstract | PDFPDF
16. An Improved Heft Algorithm Using Multi- Criterian Resource Factors
Pages : 6958-6963
Renu Bala, Gagandeep Singh
Abstract | PDFPDF
17. Survey of Fingerprint Matching Techniques for Privacy Protection
Pages : 6964-6966
Sayali Kapre, Antara Bhattacharya
Abstract | PDFPDF
18. Privacy Protection over Network Communication in Manet
Pages : 6967-6971
Dr.K.Rajangam, L.Dhanam, Anuradha Balasubramanian
Abstract | PDFPDF
19. Article Removed
Pages : xxx-xxx
xxx, xxx
Abstract | PDFPDF
20. Intrusion Detection System using Ripple Down Rule learner and Genetic Algorithm
Pages :6976-6980
D.P. Gaikwad, R.C.Thool
Abstract | PDFPDF
21. Data Hiding & Visual Cryptography:A Review
Pages : 6981-6984
Deepti B. Khasbage, Prof. DR .P.R. Deshmukh
Abstract | PDFPDF
22. A Novel Approach for Transductive Decision Tree
Pages : 6985-6988
B. Veera sekhar Reddy, Y.C.A.Padmanabha Reddy, S.Mohommad.ghouse
Abstract | PDFPDF
23. Text Data Linkage of Different Entities Using Occt-One Class Clustering Tree
Pages : 6989-6991
E.Afreen Banu, R.Karthikeyan
Abstract | PDFPDF
24. A Fast and New Collaborative Web Recommendation System Using Fast Adaptive Association Rule Mining
Pages :6992-6995
Dr A. Kumar
Abstract | PDFPDF
25. Facial Expression Recognition with PCA And LDA
Pages : 6996-6998
Taqdir, Jaspreet Kaur
Abstract | PDFPDF
26. Touchscreen Using Web Camera
Pages : 6999-7001
Kuntal B. Adak, Adarsh N. Singh, Abhilash B. Kamble
Abstract | PDFPDF
27. Image Segmentation using Bi Directional Self Organize Neural Network (BDSONN)
Pages : 7002-7011
Rudranath Banerjee, Arun Kanti Manna
Abstract | PDFPDF
28. A Survey on Web Pre-Fetching Techniques
Pages : 7012-7021
Priyansha bangar, Kedar Nath Singh
Abstract | PDFPDF
29. A Survey on Web Log Mining Pattern Discovery
Pages : 7022-7031
Amit Vishwakarma, Kedar Nath Singh
Abstract | PDFPDF
30. Virtual Reality: The Future Interface of Technology
Pages :7032-7034
Raghav Toshniwal, Kanishka Ghosh Dastidar
Abstract | PDFPDF
31. A Modified Pixel Frequency Based Reversible Data Hiding for Secure Data Communication
Pages : 7035-7040
Sowmyashree, R.R.Sedamkar, Sanjay Sharma
Abstract | PDFPDF
32. Improving Efficiency of Data Mining through Neural Networks
Pages : 7041-7044
D. Prashanth Kumar, B. Yakhoob, N. Raghu
Abstract | PDFPDF
33. SOA AND REST Synergistic Approach
Pages : 7045-7049
Navdeep Dahiya, Neha Parmar
Abstract | PDFPDF
34. Privacy Based Query Search by Using Content and Location
Pages : 7050-7053
Navya Theja C., Satheesh KRK
Abstract | PDFPDF
35. Design Of Mobility Robust Tree Construction Framework For Zigbee Wireless Networks
Pages : 7054-7059
Chaitali G.Golhar, Prof.A.W.Motikar
Abstract | PDFPDF
36. A Framework To Optimize Task Scheduling in Cloud Environment
Pages : 7060-7062
R. Jemina Priyadarsini and L. Arockiam
Abstract | PDFPDF
37. A Review on Risk Score Based App Classification Using Enriched Contextual Information of App
Context

Pages : 7063-7066
Lokhande Prajakta Padmakar, Prof. Shivaji R Lahane
Abstract | PDFPDF
38. Simulation and Synthesis of 16×16 Switch for Feed Back Based Switch Systems
Pages : 7067-7070
P.Aruna, R. Mahesh Kumar , G.Mahammed Rafi
Abstract | PDFPDF
39. Transaction-Level Behavior Based Credit Card Fraud Detection Mechanism
Pages : 7071-7074
Bhakti Ratnaparkhi, Rahul Patil
Abstract | PDFPDF
40. Recent Advances in Audio Video Multimedia Communication Technology
Pages : 7075-7077
Narangale S. M., G. N. Shinde
Abstract | PDFPDF
41. Survey on Various Methods and Techniques for Searching Dimension in Incomplete Database
Pages : 7078-7081
Yogita M. Kapse, Antara Bhattacharya
Abstract | PDFPDF
42. Use of Genetic Algorithm with Fuzzy Class Association Rule Mining for Intrusion Detection
Pages : 7082-7087
Dipali Kharche, Prof. Rahul Patil
Abstract | PDFPDF
43. Improved Load Balanced & Energy Efficient Ad hoc on demand routing Algorithm
Pages : 7054-7059
Madhvi Saxena, K.J. Mathai
Abstract | PDFPDF
44. Privacy Preserving Multi-Keyword Ranked Search with Anonymous ID Assignment over Encrypted
Cloud Data

Pages : 7093-7096
Shiba Sampat Kale, Prof. Shivaji R Lahane
Abstract | PDFPDF
45. An Accurate Surfer Model to Enhance Web Search Criteria
Pages : 7097-7100
Neerumalla Swapna, S.Bhavani
Abstract | PDFPDF
46. Survey on Nearest Neighbor Search for Spatial Database
Pages : 7101-7103
Zarreen Anjum, Priti Saktel
Abstract | PDFPDF
47. Cloud Based SQL Query Mainframe
Pages : 7104-7106
Konolla Siva ramakrishna,Adoni Krishna Kumar,Kotagiri ManojKumar,Bikumalla Jaya Keerthi,Valiveti Krishna Priya
Abstract | PDFPDF
48. Smart Surveillance Monitoring System Using Raspberry PI and PIR Sensor
Pages : 7107-7109
Sanjana Prasad, P.Mahalakshmi, A.John Clement Sunder, R.Swathi
Abstract | PDFPDF
49. Advanced Cross-Layer Jamming Detection and Mitigation in Wireless Broadcast Networks
Pages : 7110-7113
Yogesh Adhar Mali, Anil Kumar Patidar
Abstract | PDFPDF
50. Survey on Semi-Supervised Feature Selection in Datamining
Pages : 7114-7117
Kalaiselvi.R, Premadevi.P, Hamsathvani.M
Abstract | PDFPDF
51. A Survey on Privacy Preserving in Roaming Network
Pages : 7118-7121
Kousalya.K, Anitha.P, Gowri.K
Abstract | PDFPDF
52. A Survey on Energy Conservation for Mobile-Sink in WSN
Pages : 7122-7125
Gowri.K, Dr.M.K.Chandrasekaran, Kousalya.K
Abstract | PDFPDF
53. A Novel Key Exchange Mechanism for Secure Intrusion-Detection System for MANET
Pages : 7126-7129
D.Anil, Dr. S. Vasundra
Abstract | PDFPDF
54. A New Method for Removal of Salt and Pepper Noise through Advanced Decision Based Unsymmetric Median Filter
Pages : 7130-7135
A.Srinagesh, BRLKDheeraj, Dr.G.P.Saradhi Varma
Abstract | PDFPDF
55. Review on: - Human Identification using GAIT Recognition Technique with PAL and PAL entropy, SVM and k-means with LDA
Pages : 7136-7141
Deepti Singh , Dr. Amit Dixit
Abstract | PDFPDF
56. Human Identification using GAIT Recognition Technique with PAL and PAL entropy, SVM and k-means with LDA
Pages : 7141-7145
Deepti Singh, Dr. Amit Dixit
Abstract | PDFPDF
57. Network Security Testing Using Discovery Techniques
Pages : 7146-7153
U. Palani, S. Vanitha, S. Lakshminarasimman
Abstract | PDFPDF
58. Performance Comparison of Diverse Routing Protocols in Wireless Multimedia Sensor Networks
Pages : 7154-7162
A.Sivagami, S.Malarkkann, S.Sandiya, R.Ramakrishnan
Abstract | PDFPDF
59. A Highly Secured Four Layer Architecture Using NTRU Algorithem ( TITEL)
Pages : 7163-7165
Vipanjit Kaur, Vinay Bhardwaj
Abstract | PDFPDF
60. A New Approach to Authenticate Images in Different Datasets Using a Lossless Image Watermarking Technique
Pages : 7166-7171
Arathi Chitla, Dr. M. Chandra Mohan
Abstract | PDFPDF
61. Role of Big Data Analytics in Rural Health Care - A Step Towards Svasth Bharath
Pages : 7172-7178
Muni Kumar N, Manjula R
Abstract | PDFPDF
62. Load Balancing For Presence Server Architecture
Pages : 7179-7183
M. Lokesh Kumar Rao, D. Kasi Viswanath
Abstract | PDFPDF
63. Intrusion Detection System using Genetic-Fuzzy Classification
Pages : 7184-7190
Prabhat Prakash, Dr. Rajendra Kumar Bharti
Abstract | PDFPDF
64. Review on Parallelized Multipattern Matching Using Optimized Parallel Aho-Corasick Algorithm
on GPU

Pages : 7191-7194
Prachi Oke, Prof. Mrs. A. S. Vaidya
Abstract | PDFPDF
65. Two Way Authentication For Android Client Against Active Directory
Pages : 7195-7198
Prof. Sunita M. Dol, Varsha Kulkarni, Vipula Moholkar
Abstract | PDFPDF
66. Performance Evaluation of Different Hybrid Optical Amplifiers for 64×10, 96×10 and 128×10
Gbps DWDM transmission system

Pages : 7199-7203
Rashmi, Anurag Sharma, Vikrant Sharma
Abstract | PDFPDF
67. Checking Language Dependent Accuracy of Web Applications using Data Mining Techniques
Pages : 7204-7209
Maninderjit Kaur, Dr. Sushil Kumar Garg
Abstract | PDFPDF
68. Half Life Variable Quantum Time Round Robin (HLVQTRR)
Pages : 7210-7217
Simon Ashiru , Salleh Abdullahi , Sahalu Junaidu
Abstract | PDFPDF
69. Ranking of Research Papers using WPCR with Clustering Algorithm
Pages : 7218-7222
Manpreet Kaur Gill, Jasmeet Singh
Abstract | PDFPDF
70. Proposals Assignment using Fuzzy C-Means and CART Algorithm
Pages : 7223-7227
Gurpreet Kaur, Jasmeet Singh
Abstract | PDFPDF
71. A Comparative Analysis of DSR and AODV Protocols under Blackhole and Grayhole Attacks in MANET
Pages : 7228-7231
Monika Verma, Dr. N. C. Barwar
Abstract | PDFPDF
72. An Encryption Algorithm Based on ASCII Value of Data
Pages : 7232-7234
Satyajeet R. Shinge, Rahul Patil
Abstract | PDFPDF
73. Study of Various Crossover Operators in Genetic Algorithms
Pages : 7235-7238
Nitasha Soni, Dr .Tapas Kumar
Abstract | PDFPDF
74. A Review on Side Information Entangling For Effective Clustering Of Text Documents in Data
Mining

Pages : 7239-7242
Y.R.Gurav, P.B.Kumbharkar
Abstract | PDFPDF
75. Avance Bibliothek Management System
Pages : 7243-7251
Maddirala Jagadish, Palli Hemanth Kumar, Pamarthi Jagadish
Abstract | PDFPDF
76. A Survey: Face Recognition Techniques
Pages :7252-7256
Arun Agrawal, Ranjana Sikarwar
Abstract | PDFPDF
77. A Review on Recommendations and Overlapping Communities for Location Based Social Networks
Pages : 7257-7261
Kavita G. Gare, Nilesh V. Alone
Abstract | PDFPDF
78. Human User Identification Using Multi-Sensor Data Fusion
Pages : 7262-7264
Naman Patel, Ms Sindhu Nair, Harsh Trivedi
Abstract | PDFPDF
79. Real Time Optical Heart Rate Monitor
Pages : 7265-7269
Deepak Verma, Mahika Bhasin
Abstract | PDFPDF
80. A Novel Approach for Video Transmission in MANET
Pages : 7270-7275
Maddirala Jagadish, Palli Hemanth Kumar, Pamarthi Jagadish
Abstract | PDFPDF
81. DDoS Attack Detection based on Chaos Theory and Artificial Neural Network
Pages : 7276-7279
Anjali. M, B.Padmavathi
Abstract | PDFPDF
82. Comparative Study of Privacy Preservation Techniques in Data Mining
Pages : 7280-7287
Avruti Srivastava
Abstract | PDFPDF
83. A Novel Approach to Predict the Learning Skills of Autistic Children using SVM and Decision Tree
Pages :7288-7291
M.S.Mythili, Dr.A.R.Mohamed Shanavas
Abstract | PDFPDF
84. An Intensifying Concept of Intrusion Detection to Accelerate Accuracy and Effectiveness with
Knowledge

Pages : 7292-7295
Vipin Singh, Himanshu Arora
Abstract | PDFPDF
85. A Survey on Various Algorithms Used for Elliptic Curve Cryptography
Pages :7296-7301
Christina Thomas, Gnana Sheela K, Saranya P Krishnan
Abstract | PDFPDF
86. Hybrid cryptography technique using modified Diffie-Hellman and RSA
Pages :7302-7304
Shyam Deshmukh, Prof.Rahul Patil
Abstract | PDFPDF
87. Adaptive Texture Segmentation using M Band Wavelet Transform and Wavelet Packet
Pages :7305-7308
Taramati Taji, Deipali Gore
Abstract | PDFPDF
88. Centroid Based Clustering Algorithms- A Clarion Study
Pages :7309-7313
Santosh Kumar Uppada
Abstract | PDFPDF
89. DDoS Prevention on Rest Based Web Services
Pages :7314-7317
Neha Lad, Jwalant Baria
Abstract | PDFPDF
90. A Study on Large Scale Network Simulators
Pages :7318-7322
Gayatry Borboruah, Gypsy Nandi
Abstract | PDFPDF
91. A Review on Deterministic Finite Automata Compression Techniques for Efficient Pattern Matching Process
Pages :7323-7325
Utkarsha P. Pisolkar, Shivaji R. Lahane
Abstract | PDFPDF
92. A Review on Meta Information Based Text Data Clustering
Pages :7326-7329
Mrunal V. Upasani, Rucha C. Samant
Abstract | PDFPDF
93. A Survey on Intrusion detection System for Mobile Ad-hoc Networks
Pages :7330-7333
Ranjit j. Bhosale, R.K.Ambekar
Abstract | PDFPDF
94. Review On Data Replication with QoS and Energy Consumption for Data Intensive Applications in
Cloud Computing

Pages :7334-7338
More Reena S, Nilesh V. Alone
Abstract | PDFPDF
95. A Review Paper on Filter Unwanted Messages from OSN
Pages :7339-7345
Tambe Ujwala S, Archana S. Vaidya
Abstract | PDFPDF
96. Automotive User Profiling Using Vehicle Data Considering Different Driving Scenarios
Pages :7346-7349
Bharat S. Dangra, Mangesh V. Bedekar, Suja S. Panicker
Abstract | PDFPDF
97. Survey on Modeling Human object interactions in Still Images
Pages :7350-7352
A.N.Bhagat, N.B.Pokale
Abstract | PDFPDF
98. Color Image Segmentation using Median Cut and Contourlet Transform : A Parallel Segmentation
Approach

Pages :7353-7358
Smita Patil, Aparna Junnarkar
Abstract | PDFPDF
99. Security Enhancement for Cloud Storage Systems
Pages :7359-7362
Harmanbir kaur, Meenakshi Sharma
Abstract | PDFPDF
100. A Survey on Impact of Social Media on Election System
Pages :7363-7366
Gayatri Wani , Nilesh Alone
Abstract | PDFPDF
101. A Survey: Power efficiency Live Migration for Data Centers in Cloud
Pages :7367-7370
Yogesh Eknathrao Gaikwad, Seema Singh Solanki
Abstract | PDFPDF
102. Promoting E-Commerce in India: Main Issues and Challenges
Pages :7371-7375
Sonnet Debbarma, Gypsy Nandi
Abstract | PDFPDF
103. Performance Analysis of Hash Algorithms and File Integrity
Pages :7376-7379
Hanumantu Rajeswari, Ramesh Yegireddi , Vudumula Govinda Rao
Abstract | PDFPDF
104. Survey of Trajectory Based Forwarding and Its Applications
Pages :7380-7384
Subhashini.S , Dr. T.V.P Sundararajan, Priyanga. D, Sanjanaprasad
Abstract | PDFPDF
105. A Review on Parallelization of Node based Game Tree Search Algorithms on GPU
Pages :7385-7388
Rutuja U. Gosavi, Payal S. Kulkarni
Abstract | PDFPDF
106. A Survey: Peer-to-Peer Traffic Identification technologies
Pages :7389-7392
S. R. Patil, Suraj S. Dangat
Abstract | PDFPDF
107. Securing Multimedia on Hybrid Architecture with Extended RBAC
Pages :7393-7398
Gurpinder Kaur, Monika Bharti
Abstract | PDFPDF
108. Axiomization of nw-MVD
Pages :7399-7403
V. Sangeetha, V. Valli Kumari
Abstract | PDFPDF
109. Assorted Image Based Obscure Techniques In Visual Cryptography
Pages :7404-7406
Thanuganesh.M, Saranya.R
Abstract | PDFPDF
110. A Survey on High Utility Itemset Mining Using Transaction Databases
Pages :7407-7410
Maya Joshi, Mansi Patel
Abstract | PDFPDF
111. Survey on Satellite Image Enhancement Techniques
Pages :7411-7414
Ravi B. Mehta , Richard Sonaliya
Abstract | PDFPDF
112. A Hybrid Image Contrast Enhancement Approach Using Genetic Algorithm and Neural Network
Pages :7415-7419
Cheenu Sharma, Rupinder Kaur
Abstract | PDFPDF
113. Paradigm Shift in Voting - Secure Mobile Voting
Pages :7420-7422
Neha Kapoor, Rampur Srinath, Lokesh S, Rajesh N
Abstract | PDFPDF
114. Dynamic Shortest Path Routing In Mobile Adhoc Networks Using Modified Artificial Bee Colony
Optimization Algorithm

Pages :7423-7426
E. Hemalatha Jai Kumari, Dr. Kannammal
Abstract | PDFPDF
115. Congestion Control Approach for TCP by Differentiating NCL and PR upon the ERT in Wireless Mesh Networks
Pages :7427-7429
Neha Patil, Prof. Gajendra Singh Chandel
Abstract | PDFPDF
116. Genetic Algorithm Approach for Bandwidth Optimization in Near Video on Demand System
Pages :7430-7438
Kriti Priya Gupta
Abstract | PDFPDF
117. Web Database Annotation for Fast and Accurate Retrieval
Pages :7439-7442
VijayaLakshmi K, Sudhakar Yadav N
Abstract | PDFPDF
118. An Approach to Securely Transfer a Secret Image Using Reversible Color Transformations and HSV Color Model
Pages :7443-7445
Shruti Sarwate, Hemlata Dakhore
Abstract | PDFPDF
119. Hidden Markov Model for Credit Card Fraud Detection
Pages :7446-7451
Ankit Vartak, Chinmay D Patil,Chinmay K Patil
Abstract | PDFPDF
120. Utilizing ICT to Fight against Crime: Emerging ICT Tools, Forms of Crime and Its Solutions
Pages :7452-7457
Ramandeep Kaur, Neeru Sharda
Abstract | PDFPDF
121. Vedic Mathematics in Computer: A Survey
Pages :7458-7459
Shivangi Jain , Prof. V. S. Jagtap
Abstract | PDFPDF
122. Securing User Location in Geo Social Networking Using Coordinate Conversions
Pages :7460-7466
J Maruthi Nagendra Prasad, N.Penchalaiah
Abstract | PDFPDF
123. Impact Analysis and Detection Method of Malicious Node Misbehavior over Mobile Ad Hoc Networks
Pages :7467-7470
Priyanka Jain, Mehul Maharshi
Abstract | PDFPDF
124. A Review on Semantic Ontology based E-Learning Framework
Pages :7471-7476
V. Geetha, Dr.M.V.Srinath, Dr. OmarA. AlHeyasat
Abstract | PDFPDF
125. Knowledge Discovery from Various Algorithms: A Survey
Pages :7477-7479
VINOD L.MANE , PROF. S. S. PANICKER , PROF. V. B. PATIL
Abstract | PDFPDF
126. Third-Party Net Stalk: Policy and Technology
Pages :7480-7487
S.Vanitha, U.Palani, A.Arthibala
Abstract | PDFPDF
127. Focused and Deep Web Crawling-A Review
Pages :7488-7492
Saloni Shah, Siddhi Patel , Prof. Sindhu Nair
Abstract | PDFPDF
128. Implementation of Modern RSA Variants
Pages :7493-7495
Akansha Tuteja, Amit Shrivastava
Abstract | PDFPDF
129. Compendium of Reversible Data Hiding
Pages :7496-7500
S.Bhavani and B.Ravi teja
Abstract | PDFPDF
130. CAPTCHAs based on the Principle- Hard to Separate Text from Background
Pages :7501-7503
Niket Kumar Choudhary, Rahul Patil
Abstract | PDFPDF
131. Portability in User Profiles: Single User – Multiple Devices
Pages :7504-7507
Saniya Zahoor ,Dr. Mangesh Bedekar ,Pranali Kosamkar
Abstract | PDFPDF
132. Curvelet and Wavelet Image Fusion using Neural Network Algorithm
Pages :7508-7512
Ankita Kaushal, Paramjeet Kaur
Abstract | PDFPDF
133. Review on: Blood Vessel Extraction and Eye Retinopathy Detection
Pages :7513-7516
Manvir Kaur, Dr Rajnessh Talwar
Abstract | PDFPDF
134. Ameliorate Degraded Document Images Using Synergized Technique
Pages :7517-7520
K.Lakshmipriya, K.Udhayalakshmi
Abstract | PDFPDF
135. Proficient Method towards Concurrency Control in Distributed Database
Pages :7521-7524
Anil Ahir
Abstract | PDFPDF
136. Survey on Adaptive Traffic Signal Re-Timing In Vehicular Ad-Hoc Network
Pages :7525-7527
Sarika Rakhade
Abstract | PDFPDF
137. Ant Colony Optimization Technique for Secure Various Data Retrieval in Cloud Computing
Pages :7528-7531
K.Sriprasadh, M.Prakash Kumar
Abstract | PDFPDF
138. CA Review on A highly scalable Privacy preserving content based Publisher/Subscriber system using event based encryption
Pages :7532-7535
Handore Jayshree Shrikant, Prof. Shivaji R. Lahane
Abstract | PDFPDF
139. Review: Various Image Segmentation Techniques
Pages :7536-7539
Swati Matta
Abstract | PDFPDF
140. Association Rule Mining in Horizontally Distributed Databases
Pages :7540-7544
Manali Rajeev Raut, Hemlata Dakhore
Abstract | PDFPDF
141. Detection and Localization of Spoofing in Wireless and Sensor Networks
Pages :7545-7552
Chandrakant M. Jadhav, Sharad S. Shinde
Abstract | PDFPDF
142. A Review on Software Testing Framework in Cloud Computing
Pages :7553-7562
D.Anitha and Dr.M.V.Srinath
Abstract | PDFPDF
143. Hybrid Encryption System
Pages :7563-7566
Sushant Susarla , Gautam Borkar
Abstract | PDFPDF
144. A Smart Crypto Scheme for Multi Owner Data Authentication over Cloud Service
Pages :7567-7571
V.Kiruthika, B.R.Laxmi Sree
Abstract | PDFPDF
145. Image Authentication by Features Extraction and Biomeric key
Pages :7572-7576
S.Saravanan
Abstract | PDFPDF
146. A Survey on Performance Modelling and Optimization Techniques for SpMV on GPUs
Pages :7577-7582
Aditi V. Kulkarni, Prof. C. R. Barde
Abstract | PDFPDF
147. Article Removed
Pages :7583-7587
xxx, xxx
Abstract | PDFPDF
148. SLA Provided Collaboration Cloud using OLAP
Pages :7588-7589
K.Vijay Kumar, A.Sathyavani, M.Yesudoss Winster
Abstract | PDFPDF
149. Evaluating Facial Expressions with Different Occlusion around Image Sequence
Pages :7590-7594
Ankita Vyas, Ramchand Hablani
Abstract | PDFPDF
150. Higher Order Fitting based Image De-noising using ANN
Pages :7595-7601
Barjinder Kaur, Manshi Shukla
Abstract | PDFPDF
151. Distributed Algorithm for Independent Fairness Management to Control the Congestion in Wireless Sensor Network
Pages :7602-7605
Padmashree T, Dr.N.K.Cauvery, Manasa M B
Abstract | PDFPDF
152. Intelligent System in Behavioural Analysis
Pages :7606-7608
Madhura Parlikar, Anjali Chavan, Kedar Khire, Ajit Ingavale
Abstract | PDFPDF
153. Design of New Low Power –Area Efficient Static Flip-Flops
Pages :7609-7613
M.Jagadeesh Kumar, Dr. R Ramana Reddy
Abstract | PDFPDF
154. A Probabilistic Model of Real Time Event Detection and Reporting
Pages :7614-7617
Dharnasi Rama Devi, Naga Aswani Puduru
Abstract | PDFPDF
155. Forgery Detection using Noise Inconsistency: A Review
Pages :7618-7622
Savita Walia, Mandeep Kaur
Abstract | PDFPDF
156. A Survey of Data Uncertainty in Face Recognition
Pages :7623-7625
Shubhangi G. Khadse
Abstract | PDFPDF
157. Dynamic Load Balancing Mechanism In Multiservice Cloud Storage
Pages :7626-7630
Karishma B. Badgujar, Prof. Pravin R. Patil
Abstract | PDFPDF
158. Implementation of NTRU Algorithm for the Security of N-Tier Architecture
Pages :7631-7636
Amandeep Kaur Gill, Charanjit Singh
Abstract | PDFPDF
159. Classifier Model for Intrusion Detection Using Bio-inspired Metaheuristic Approach
Pages :7637-7642
P.Amudha, S.Karthik, S.Sivakumari
Abstract | PDFPDF
160. A Survey Paper on an Efficient Approach towards Image Mining Using Association Rule with Fusion
Pages :7643-7645
Yugandhara A.Thakare, Prof.Shraddha P.Mankar
Abstract | PDFPDF
161. Access Control for Semantic Data Repository Using Description Logic
Pages :7646-7648
Suganyasree.K , Nagajothi.P
Abstract | PDFPDF
162. Review on Common Feature Discriminant Analysis for Matching Infrared Face Images To Optical Face Images
Pages :7649-7651
Shubhangi G. Rode
Abstract | PDFPDF
163. A Novel Load Balancing Model Using RR Algorithm for the Cloud Computing
Pages :7652-7655
B.Bhaskar, E. Madhusudhana Reddy
Abstract | PDFPDF
164. EEG Based Emotion Recognition System
Pages :7656-7658
Prashant Lahane, Shrutika Lokannavar, Apurva Gangurde, Poonam Bhosale, Pooja Chidre
Abstract | PDFPDF
165. Clustering Sentence-Level Text Using a Hierarchical Fuzzy Relational Clustering Algorithm
Pages :7659-7660
Deepika U. Shevatkar, V.K.Bhusari
Abstract | PDFPDF
166. Review On Image Portion Mixing With Background Using In-painting Technique
Pages :7661-7663
Neha Dangre, Prakash Mohod
Abstract | PDFPDF
167. Web Based User Interface Framework
Pages :7664-7667
Saroja Rani Polamarasetty
Abstract | PDFPDF
168. A Survey on Image Feature Descriptors
Pages :7668-7673
Rekhil M Kumar, Sreekumar K
Abstract | PDFPDF
169. Faster Transfer of AES Encrypted Data over Network
Pages :7674-7676
Suvarna Patil, Rahul Patil
Abstract | PDFPDF
170. Deep Web Data Extraction by Using Vision-Based Item and Data Extraction Algorithms
Pages :7677-7682
B.Sailaja, Ch.Kodanda Ramu, Y.Ramesh Kumar
Abstract | PDFPDF
171. Secure Secret Key Transfer Using Modified Hash Based LSB method
Pages :7683-7685
Aniket G. Meshram, Prof. Rahul Patil
Abstract | PDFPDF
172. A Parallel Genetic Algorithm for Generalized Vertex Cover Problem
Pages :7686-7689
Drona Pratap Chandu
Abstract | PDFPDF
173. An Enhancement of Mining Videos Based On Annotation Reranking Method Using Ncut Algorithms
Pages :7690-7696
R.Ranjani. S. Selva Seeba
Abstract | PDFPDF
174. A Compressive Survey on Restructuring User Search Results by Using Feedback Session
Pages :7697-7701
Shinde Sonali Bhaskar
Abstract | PDFPDF
175. Weighted Clustering Algorithm with Ant Colony Optimization to Provide Better Quality of Service
Pages :7702-7705
Sowmya K S, N. K. Cauvery
Abstract | PDFPDF
176. Cloud Service Reservation System with Price& Time Slot Negotiation
Pages :7706-7709
Sukeshini S.Gawai
Abstract | PDFPDF
177. Study of Process of Localization and Methods of Localization in Wireless Body Area Networks
(WBANs)

Pages :7710-7714
Shubhangi Sonone, Vishal Shrivastava
Abstract | PDFPDF
178. A Survey on Search Results Annotation
Pages :7715-7719
Rosamma K S , Jiby J Puthiyidam
Abstract | PDFPDF
179. A Survey on Detecting Compromised Nodes in Wireless Sensor Networks
Pages :7720-7722
K.Sumathi & Dr.M.Venkatesan
Abstract | PDFPDF
180. Hybrid Solution in Honeypot Mechanism using Hadoop
Pages :7723-7726
Girija Srikanth, R.Sathish
Abstract | PDFPDF
181. A Survey of Building a Reverse Dictionary
Pages :7727-7728
Jincy A K, Sindhu L
Abstract | PDFPDF
182. Knowledge based Inter-point Braille document Analysis and Recognition
Pages :7729-7732
Srinath.S, C.N. Ravi kumar
Abstract | PDFPDF
183. Novel Method for Trusted Third Party Security Services for Cloud
Pages :7733-7737
Kalyani Madurwar , Prof. Ismail
Abstract | PDFPDF
184. A Survey on Event Detection for Geographical Packets Forwarding in Wireless Sensor Networks
Pages :7738-7739
Rajani Anandrao Madame
Abstract | PDFPDF
185. Effective Demonstrate Recommendation on Scarce Data
Pages :7740-7744
A.Srinivas, K.Rama Krishna, B.Kavitha Laxmi, M. Sravani
Abstract | PDFPDF
186. Using Advanced Encryption Standard for Secure and Scalable Sharing of Personal Health Records
in Cloud

Pages :7745-7747
B. Sri Varsha, P.S. Suryateja
Abstract | PDFPDF
187. A Survey on Reversible Data Hiding in Encrypted Image
Pages :7748-7751
Princy Raj, Sreekumar K
Abstract | PDFPDF
188. ZigBee based Wireless Sensor Networks
Pages :7752-7755
Kanchan Kaushal, Taranvir Kaur, Jaspinder Kaur
Abstract | PDFPDF
189. Designing of Fingerprint Enhancement Based on Curved Region Based Ridge Frequency Estimation
Pages :7756-7760
Navjot Kaur, Gagandeep Singh
Abstract | PDFPDF
190. Impact of Social Influence on Entrepreneurs to Use e-Commerce in Saudi Arabia
Pages :7761-7772
Abdullah Almaimouni, Luke Houghton, Kuldeep Sandhu
Abstract | PDFPDF
191. A Modified Approach for Aggreration Technique in WSN
Pages :7773-7775
Balihar Singh, Varinderjit Kaur
Abstract | PDFPDF
192. Forensic-as-a-Service for Mobile Devices (Literature Survey)
Pages :7776-7778
Prashant N. Ninawe, Shrikant B. Ardhapurkar
Abstract | PDFPDF
193. Design and Implementation of Performance Guaranteed Symmetric Load Balancing Algorithm
Pages :7779-7783
Shaik Nagoor Meeravali, R. Daniel, CH. Srinivasa Reddy
Abstract | PDFPDF
194. Designing an Efficient Image Encryption-Then- Compression System with Haar and Daubechies
Wavelet

Pages :7784-7788
Harmanpreet Kaur Aujla, Rajesh Sharma
Abstract | PDFPDF
195. Location Based and Energy Efficient Anonymous Routing Protocol for MANET
Pages :7789-7794
Snehlata Handrale , Prof. S. K. Pathan
Abstract | PDFPDF
196. An E-learning system with Image compression
Pages :7795-7798
Milind Tambe, Azar Maniyar, Rohan Patil, Kiran Uttekar
Abstract | PDFPDF
197. Area Extraction of beads in Membrane filter using Image Segmentation Techniques
Pages :7799-7803
Neeti Taneja, Sudha Goyal
Abstract | PDFPDF
198. Increasing Throughput Capacity of Multihop Wireless Networks
Pages :7804-7806
K.Sumithra devi, .R.Sivakani and M.Pabitha
Abstract | PDFPDF
199. A Survey on Forwarding Game Theory in Mobile Ad hoc Network
Pages :7807-7809
Ashwini Chandrashekhar Maske
Abstract | PDFPDF
200. A Study of Wireless Networks: WLANs, WPANs, WMANs, and WWANs with Comparison
Pages :7810-7813
Kanika Sharma, Neha Dhir
Abstract | PDFPDF
201. A Comprehensive Overview on Data Mining: Approaches and Applications
Pages :7814-7816
Deepti Mishra, Dr. DevpriyaSoni
Abstract | PDFPDF
202. A Survey on Security Frameworks for Software-as-a-Service
Pages :7817-7820
Sithara Sahadevan , Jiby J Puthiyedam
Abstract | PDFPDF
203. Analysis of Real Time Driver Fatigue Detection Based on Eye and Yawning
Pages :7821-7826
Narender Kuamr, Dr. N.C. Barwar
Abstract | PDFPDF
204. Clustering of Random Data: A New Concept
Pages :7827-7830
Bhumika Ingale, Antara Bhattacharya
Abstract | PDFPDF
205. User-Centric Based Crawler System
Pages :7831-7836
Santosh Kumar Uppada
Abstract | PDFPDF
206. Energy Efficient Mobile Cloud Computing
Pages :7837-7840
Siddiqui Mohammad Saad, S.C.Nandedkar
Abstract | PDFPDF
207. Impact of queuing policy variations on MaxProp DTN routing protocol
Pages :7841-7843
Mohsin Naziruddin
Abstract | PDFPDF
208. Enhancement of Security in Data Mining Using FEAL (Fast Encryption Algorithm)
Pages :7844-7846
Amarpreet Singh, Vinay Bhardwaj
Abstract | PDFPDF
209. A Survey on Image Feature Descriptors-Color, Shape and Texture
Pages :7847-7850
Alphonsa Thomas, Sreekumar K
Abstract | PDFPDF
210. P2P Topological Ad-hoc Routing Protocol (P2P-ARP)
Pages :7851-7854
Mriganka Sarmah, Pradeep Sharma, Pallabi Borah, Meenakshi Sharma
Abstract | PDFPDF
211. Overview of Offloading in Smart Mobile Devices for Mobile Cloud Computing
Pages :7855-7860
Roopali, Rajkumari
Abstract | PDFPDF
212. A Survey on Expert System in Agriculture
Pages :7861-7864
Divya Joy, Sreekumar K
Abstract | PDFPDF
213. A Survey on Collaborative Tagging
Pages :7865-7869
Pradnya Deshmane, Prof.N.R.Wankhade
Abstract | PDFPDF
214. A Study on Different JPEG Steganograhic Schemes
Pages :7870-7874
Alphy Ros Mathew, Sreekumar K
Abstract | PDFPDF
215. Survey on Online Spam Review Detection Methods
Pages :7875-7876
Kalyani Adhav, S.Z Gawali, Ravindra Murumkar
Abstract | PDFPDF
216. A Survey on Image Segmentation and Feature Extraction Methods for Acute Myelogenous
Leukemia Detection in Blood Microscopic Images

Pages :7877-7879
Athira Krishnan, Sreekumar
Abstract | PDFPDF
217. A Study of Similarity Functions Used in Textual Information Retrieval in Wide Area Networks
Pages :7880-7884
Jaswinder Singh, Parvinder Singh , Yogesh Chaba
Abstract | PDFPDF
218. Content Based Image Retrieval of User’s Interest Using Feature Fusion and Optimization Using
Genetic Algorithm: A Survey

Pages :7885-7888
Ajimi Ameer, SreeKumar.K, Minu K.K
Abstract | PDFPDF
219. A Survey on Automatic Text Summarization
Pages :7889-7893
Saranyamol C S, Sindhu L
Abstract | PDFPDF
220. The Study of Various Server Architectures for Mobile Presence Services in Social Network
Applications

Pages :7894-7898
Jareena Shaikh, Bhandari G. M.
Abstract | PDFPDF
221. Gateway Load Balancing in Integrated Internet- MANET to Improve Network Performance
Pages :7899-7903
Ajay Kumar, Udai Shankar, Mahesh Kumar Tiwari
Abstract | PDFPDF
222. Intrusion Detection through Session Hijacking
Pages :7909-7913
Keshav Jain
Abstract | PDFPDF
223. Content Leakage Detection by Using Traffic Pattern for Trusted Content Delivery Networks
Pages :7841-7843
V.S.Motade, Deepak Gupta
Abstract | PDFPDF
224. Virtualization Study in Education Era with Some Environmental Beneficial Issues
Pages :7914-7916
Nitin R. Suradkar and Amol S. Gadkari
Abstract | PDFPDF
225. Beneficial Implementing GIS in Optical Fiber Communication in Government and Private Industries an Overview
Pages :7917-7919
Rahul D. Taur, Dr. Santosh S. Lomte
Abstract | PDFPDF
226. Overview of Database Security
Pages :7920-7921
Manisha R.Shinde
Abstract | PDFPDF
227. Detection of Node Replication Attacks in Mobile Sensor Networks Using Localized Algorithms
Pages :7922-7926
Pooja Chaturvedi, Shyam S. Gupta
Abstract | PDFPDF
228. A Comparative Analysis of Provable Data Possession Schemes in Cloud
Pages :7927-7931
Pooja Natu, Shikha Pachouly
Abstract | PDFPDF
229. Survey Paper On Big Data
Pages :7932-7939
Vibhavari Chavan, Rajesh. N. Phursule
Abstract | PDFPDF
230. Task Scheduling in Cloud Computing: Review
Pages :7940-7944
Raja Manish Singh, Sanchita Paul, Abhishek Kumar
Abstract | PDFPDF
231. A Survey of Personalized Web Search in Current Techniques
Pages :7945-7947
Priyanka C. Ghegade, Vinod Wadane
Abstract | PDFPDF
232. Cost Minimization Assignment Problem Using Fuzzy Quantifier
Pages :7948-7950
G. Nirmala and R. Anju
Abstract | PDFPDF
233. Ultimate Way to Preserve Privacy in Data Mining
Pages :7951-7953
Neha Agrawal, Nidhi Chaturvedi
Abstract | PDFPDF
234. A Survey on Security Vulnerabilities And Its CountermeasuresAt Network Layer In MANET
Pages :7954-7957
Rishikesh Teke, Manohar Chaudhari
Abstract | PDFPDF
235. Centralized Profile Translation Architecture Using Enhance Security
Pages :7958-7960
Priyanka Badwaik
Abstract | PDFPDF
236. Binate Code WAP Approach to access Sequential Pattern Mining for Web Log
Pages :7961-7964
Abhilasha Vyas, Priyanka Dhasal
Abstract | PDFPDF
237. A Comparative Analysis of Proposed Schemes for Increasing Channel Utilization In 3G Networks
Pages :7965-7971
Shekhar Tyagi, Hariom Tyagi
Abstract | PDFPDF
238. 3D Face Detection and Recognition under Occlusion
Pages :7972-7976
V.Ramaswamy, Parashuram Baraki
Abstract | PDFPDF
239. Article Withdrawn
Pages :xxx-xxx
xxxxxxxxx
Abstract | PDFPDF
240. Comparision between Quad tree based K-Means and EM Algorithm for Fault Prediction
Pages :7984-7988
Swapna M. Patil, R.V.Argiddi
Abstract | PDFPDF
241. Visual up Gradation of Mammogram Image Using Grey Scale Extending Techniques
Pages :7989-7992
N. Angayarkanni, D. Kumar
Abstract | PDFPDF
242. Search Results From the Web Databases Using Ontology-Assisted Data Extraction
Pages :7993-7997
J. Siva Jyothi , Ch. Satyananada Reddy
Abstract | PDFPDF
243. Design of Ripple Carry Adder using Quantum Cellular Automata
Pages :7998-8002
B Praveenkumar, J Thirumal Murugan, R. Prabhakar
Abstract | PDFPDF
244. Human Identification with Finger Veins Using Repeated Line Tracking, Even Gabor and Automatic Trimap Generation Algorithms
Pages :8003-8007
Prabjot kaur, Prince Verma
Abstract | PDFPDF
245. Survey On Sleep And Awake Method Using Geographic Opportunistic Routing In Wireless Sensor Networks
Pages :8008-8011
B.Senthamil Selvi, S.P.Kavya
Abstract | PDFPDF
246. Extending functionalities of default clipboard
Pages :8012-8014
Sarang B. Kimmatkar
Abstract | PDFPDF
247. Comparative Analysis of Genetic Algorithm Based Approach for Gene Cancer Classification using
prominent features with PSO for Dimensionality Reduction and FFBNN as Classifier

Pages :8015-8021
Vaishali P Khobragade, M.Anup Kumar
Abstract | PDFPDF
248. Optimizing and Generating Dynamic intricate Cluster construction in MANETs using Integer Linear Programming with Rough set (ILPR) Model Technique
Pages :8022-8026
S.R.M. Krishna , M. N. Seeta Ramanath, V. Kamakshi Prasad
Abstract | PDFPDF
249. QOS Oriented Vertical Handoff for Wimax/Wlan in Overlay Network
Pages :8027-8030
M.Ramya, R.T.Thivya Lakshmi, D.Sujeetha Lakshmi
Abstract | PDFPDF
250. Li-Fi Technology
Pages :8031-8032
Polshetwar Poonam V. , Mr. Saad Siddiqui
Abstract | PDFPDF
251. Performance Analysis of Energy Dissipation in WSNs Using Multi-Chain PEGASIS
Pages :8033-8036
Mukesh Prajapat, Dr. N.C. Barwar
Abstract | PDFPDF
252. Predicting Educational Performance of a Student Failure and Dropout by using Data mining Techniques
Pages :8037-8040
U.Harilatha, N.Sudhakaryadav
Abstract | PDFPDF
253. An Exploratory Review of Face Recognition Techniques and Algorithms
Pages :8041-8045
Ajit Kumar Tiwari, Shrikant Lade
Abstract | PDFPDF
254. Efficiently Detection of Intrusion in Multi-tire Web Applications Using DoubleGuard: A Survey
Pages :8046-8050
Prerna U. Randive
Abstract | PDFPDF
255. Optimal Dynamic Load Balance in Distributed Systems for Client Server Assignment
Pages :8051-8054
D.Saritha, Ch. Satyananda Reddy
Abstract | PDFPDF
256. An Efficient Generation of Potential High Utility Itemsets from Transactional Databases
Pages :8055-8060
Velpula Koteswara Rao, Ch. Satyananda Reddy
Abstract | PDFPDF
257. Ayurvedic leaf recognition for Plant Classification
Pages :8061-8066
Sethulekshmi A V, Sreekumar K
Abstract | PDFPDF
258. An analysis of Projection Based Multiplicative Data Perturbation for K-means Clustering
Pages :8067-8069
Bhupendra Kumar Pandya, Umesh Kumar Singh, Keerti Dixit
Abstract | PDFPDF
259. A Novel Approach for Record Deduplication using Hidden Markov Model
Pages :8070-8073
R.Parimala devi, V.Thigarasu
Abstract | PDFPDF
260. Hash Based Approach for Providing Privacy and Integrity in Cloud Data Storage using Digital
Signatures

Pages :8074-8078
N Gowtham Kumar, K Praveen Kumar Rao
Abstract | PDFPDF
261. A Review on Dynamic Query Forms for Database Queries
Pages :8079-8081
Priyanka P. Nikam
Abstract | PDFPDF
262. Single-Sign on Using Social Networking Sites
Pages :8082-8085
K.Naveen
Abstract | PDFPDF
263. Iterative Methods of Order Four for Solving Nonlinear Equations
Pages :8086-8090
V.B. Kumar,Vatti, Shouri Dominic and Mounica,V
Abstract | PDFPDF
264. Survey on Analysis of Students’ Emotions through Social Media Data Mining
Pages :8091-8095
Ranjeeta Rana, V. L. Kolhe
Abstract | PDFPDF
265. World Wide Web and Its Journey from Web 1.0 to Web 4.0
Pages :8096-8100
Nupur Choudhury
Abstract | PDFPDF
266. Review on Preserving Cloud Consistency Using CAAS Model
Pages :8101-8102
Yogesh Chimate, Prof. P. B. Kumbharkar
Abstract | PDFPDF
267. Integrity Verification and Availability Using PDP in Multi-Cloud
Pages :8103-8105
Vrushali K Gaikwad
Abstract | PDFPDF
268. Problem Solving Strategy for Decision Making in Market Basket Analysis
Pages :8106-8109
Sneha Sawlani, Piyush Vyas
Abstract | PDFPDF
269. A Novel Approach for Detecting of Tampering On Images
Pages :8110-8113
Sajja.Karthik, M.Gargi
Abstract | PDFPDF
270. Survey of Approaches for Discrimination Prevention in Data Mining
Pages :8114-8118
Harshali M. Saindane, V. L. Kolhe
Abstract | PDFPDF
271. Finger Writing in Air using Kinect
Pages :8119-8121
Utsav Jambusaria, Neerja Katwala, Manali Kadam, Harish Narula
Abstract | PDFPDF
272. A New Approach for Inferring User Search Goals using user’s implicite Feedback
Pages :8122-8126
Vidya V. Hire , Swati K. Bhavsar
Abstract | PDFPDF
273. Load Balancing in Cloud Environment Using Task Transfer: A Review
Pages :8127-8129
Syam Sankar, Devi Dath
Abstract | PDFPDF
274. Efficient Node Address Auto configuration in MANET
Pages :8130-8134
Vikas Subhashrao Shinde, K.Vishal Reddy
Abstract | PDFPDF
275. A review on Digital Image Steganography
Pages :8135-8137
Navjot Kaur, Ashima Bansal
Abstract | PDFPDF
276. A Novel Techinque For Ranking of Documents Using Semantic Similarity
Pages :8138-8143
Rajni Kumari Rajpal, Yogesh Rathore
Abstract | PDFPDF
277. QRcode Based Navigation System on Cloud Computing Platforms
Pages :8144-8146
Chaithra M H, Sridevi S, Mamatha E
Abstract | PDFPDF
278. A Survey on Various Algorithms of Sequential Frequent Pattern Mining and Uncertain Data Mining
Pages :8147-8149
Kshiti S Rana, Hiren V Mer
Abstract | PDFPDF
279. A Survey On Facilitating Document Annotation Using Content And Querying Value
Pages :8150-8152
Sonal Nikam, Prof.J.V.Shinde
Abstract | PDFPDF
280. A Survey on Outlier Detection Methods
Pages :8153-8156
Sreevidya S S
Abstract | PDFPDF
281. Differential Privilege based Secure Authorized Deduplication Using Public Private Cloud
Pages :8157-8160
Amit Harish Palange , Prof.Deepak Gupta
Abstract | PDFPDF
282. Implementation of Perception Classification based on BDI Model using Bayesian Classifier
Pages :8161-8165
Vishwanath Y, Murali T S, Dr M.V Vijayakumar
Abstract | PDFPDF
283. A Survey on Secure Data Hiding Techniques in Encrypted Images
Pages :8166-8169
Anjaly Mohanachandran, Mary Linda P.A.
Abstract | PDFPDF
284. EMET: Extracting Metadata using ElementTree to Recommend Tags for Web Contents
Pages :8170-8177
Pushpa C N, Shankar R, Thriveni J, Venugopal K R, L M Patnaik
Abstract | PDFPDF
285. An Effective Use of Meta Information Using Clustering and Classification Techniques for Text
Mining: A Survey

Pages :8178-8181
Nitin J.Ghatge, Poonam D. Lambhate
Abstract | PDFPDF
286. MDA based approach towards Design of Database for Online HealthCare System
Pages :8182-8187
Dr. Suman Kumar Mishra, Vansh Raj Upadhyay
Abstract | PDFPDF
287. Analysis of CMOs Dynamic Comparators for Low Power and High Speed ADCs
Pages :8188-8194
Vaijayanthi.M, Vivek.K, Hemaprabha.A
Abstract | PDFPDF
288. A Novel Secured Data Exchange Mechanism for Text Data Using Encode and Decode Mechanism
Pages :8195-8198
V.S.Aravind Nambala, H.Deva Raj, Y.Ramesh kumar
Abstract | PDFPDF
289. A Parallel Recursive Approach for Solving All Pairs Shortest Path Problem on GPU using OpenCL
Pages :8198-8204
Manish Pandey, Sanjay Sharma
Abstract | PDFPDF
290. A Survey on Service Integrity in Software as a Service
Pages :8205-8209
Gohila Priyadharshini.C, Mohana.S
Abstract | PDFPDF
291. Security for Data Mining
Pages :8210-8213
N.Kohila, P.Poornima, P.Elamathi
Abstract | PDFPDF
292. Next generation tools for Oil and Gas Companies? – Cloud Computing
Pages :8214-8220
C.Subhalakshmipriya, R.Tamilarasi
Abstract | PDFPDF
293. Multiple Routing Configurations for Fast IP Network Recovery
Pages :8221-8224
Aditi Thakkar
Abstract | PDFPDF
294. Privacy-Preserving Decentralized Key Policy Attribute-Based Encryption
Pages :8225-8228
Girija Patil
Abstract | PDFPDF
295. Securing Online Reputation Systems through Trust Modelling and Temporal Analysis
Pages :8229-8232
Aanum Shaikh
Abstract | PDFPDF
296. Article Removed
Pages :8233-8235
xxx, xxx, xxx
Abstract | PDFPDF
297. A Survey on Different Backup and Restore Techniques used in Mobile devices
Pages :8236-8238
Pratap P.Nayadkar, B.L Parne
Abstract | PDFPDF
298. An Improved Extraction Algorithm from Domain Specific Hidden Web
Pages :8239-8242
Juhi Sharma, Mukesh Rawat
Abstract | PDFPDF
299. Survey on Fast IP Network Recovery
Pages :8243-8245
Manoj Baingne, K. Palanivel
Abstract | PDFPDF
300. A Method for Privacy Preserving Data Mining in Secure Multiparty Computation using Hadamard
Matrix

Pages :8246-8249
Neha Pathak, Anand Rajavat
Abstract | PDFPDF
301. Enhanced Sentence-Level Text Clustering using Semantic Sentence Similarity from Different
Aspects

Pages :8250-8254
Saranya.J, Arunpriya.C
Abstract | PDFPDF
302. Lambda Calculus
Pages :8255-8258
Sampa Das
Abstract | PDFPDF
303. Security in Multi-Cloud Storage with Cooperative Provable Data Possession
Pages :8259-8262
Megha Patil, G.R.Rao
Abstract | PDFPDF
304. A Review of Data Warehousing and Business Intelligence in different perspective
Pages :8263-8268
Vijay Gupta, Dr. Jayant Singh
Abstract | PDFPDF
305. A Review on Content Based Image Retrieval and Search Based Face Annotation on Weakly Labeled
Images

Pages :8269-8271
Krishna Prasanth I B, Anoop S
Abstract | PDFPDF
306. A Survey on Content Based Image Retrieval Based On Edge Detection
Pages :8272-8275
S.Asha, R.Rajesh Kanna
Abstract | PDFPDF
307. Enforcing Text Summarization using Fuzzy Logic
Pages :8276-8279
Rajesh D. Shinde, Suraj H. Routela, Savita S. Jadhav, Smita R.Sagare
Abstract | PDFPDF
308. NeuroSVM: A Graphical User Interface for Identification of Liver Patients
Pages :8280-8284
Kalyan Nagaraj, Amulyashree Sridhar
Abstract | PDFPDF
309. Automatic Text Detection and Information Retrieval on Mobile
Pages :8285-8292
Mohit K.Chauhan, Gaurav Kumar
Abstract | PDFPDF
310. MCD based Principal Component Analysis in Computer Vision
Pages :8293-8296
R. Muthukrishnan , E.D. Boobalan, R. Mathaiyan
Abstract | PDFPDF
311. Sector Based Cloud Storage of Blood Groups
Pages :8297-8299
Anuraag Vikram Kate, Nikilav P V, Praneeth Ramesh, Sriniketh R, Naren J
Abstract | PDFPDF
312. Optimal Energy Efficient Multicast Algorithm for MANETs
Pages :8300-8302
Lakshmi Kala Pampana, Srija Kathi
Abstract | PDFPDF
313. Emperical Resource Allocation Using Dynamic Distributed Allocation Policy in Cloud Computing
Pages :8303-8308
Sasmita Parida, Suvendu Chandan Nayak
Abstract | PDFPDF
314. A Study on 5th Generation Mobile Technology - Future Network Service
Pages :8309-8313
D. Hema Latha, D. Rama Krishna Reddy, K. Sudha, Azmath Mubeen, T.S.Savita
Abstract | PDFPDF
315. High Security Provided through a Secret Password Using Steganographic Technique
Pages :8314-8315
Minakshi Kumari, Somesh Kumar Dewangan
Abstract | PDFPDF
316. MRAR: Mining Ranked Association Rules Using Information Extraction
Pages :8316-8320
M. Kanaka Surya Padmaja, S. Siva Skandha, Ch. Raja Kishore
Abstract | PDFPDF
317. A Survey Paper on Hop by Hop Message Authentication in Wireless Sensor Network
Pages :8321-8324
N.R.Wankhade, Jadhav Ashvini B.
Abstract | PDFPDF
318. Secured E-Voting Using NFC Technology
Pages :8325-8327
Rutuja Nikam, Monika Rankhambe, Diksha Raikwar, Atharv Kashyap
Abstract | PDFPDF
   
-All rights are reserved by International Journal of Computer Science and Information Technologies-