VOLUME 6 ISSUE 1 January - February 2015

ISSN 0975 - 9646

1. Talent Management in Organizations Using Mining Techniques
Pages : 1-5
Manogna.N, Sumedha Mehta
Abstract | PDFPDF
2. Survey Paper On Modoc: Multi Owner Data Sharing Over Cloud
Pages : 6-9
Shobha D. Patil, S. B. Sonkamble
Abstract | PDFPDF
3. Survey on Secure Public Auditing and Privacy Preserving in Cloud
Pages : 10-13
Madhumati B.Shinde, S. B. Sonkamble
Abstract | PDFPDF
4. Quantum Cryptography
Pages : 14-17
Lavannya Varghese , Raisa Varghese, Vince Paul, Sankaranarayanan P N
Abstract | PDFPDF
5. Securing MANETs using Cluster-based Certificate Revocation Method: An Overview
Pages : 18-22
Dipti S. Sawant, J. E. Kamalasekaran
Abstract | PDFPDF
6. Centralizing Cloud Security by Audit Management Using MASM
Pages : 23-26
Kalangi Naga Mallika, Vemula Rajiv Jetson
Abstract | PDFPDF
7. Multimodal Finger Biometric Score Fusion Verification Using Coarse Grained Distribution Function
Pages :27-33
J.Stanly Jayaprakash, Dr.S.Arumugam
Abstract | PDFPDF
8. Enhancement of the Face Recognition Using Gabor Filter
Pages : 34-36
Rahul Nayak, Dr.Rajesh Pathak, Ajay Kumar
Abstract | PDFPDF
9. Intrusion Determent using Dempster-Shafer Theory in MANET Routing
Pages : 37-41
Karuturi.Satish, K. Ramesh
Abstract | PDFPDF
10. An Adaptive MRI Tumor Detection Using Neural Network Based Adaboost Algorithm
Pages : 42-47
V.Trinadh babu, Sk.Salma begum
Abstract | PDFPDF
11. Semantic Web Technology and Ontology designing for e-Learning Environments
Pages : 48-51
Shaileshkumar K. Patel, Dr. Harshad B. Bhadka
Abstract | PDFPDF
12. A New Approach to Partial Face Recognition
Pages : 52-56
Amit V. Manapure, Nitin Mishra
Abstract | PDFPDF
13. An Improved Framework for Tamper Detection in Databases
Pages :57-60
Manisha K. Kambire, Pooja H. Gaikwad,Sujata Y. Gadilkar,Yogesh A. Funde
Abstract | PDFPDF
14. The Blue Brain Technology Using Wetware Technology and Fuzzy Logic
Pages : 61-68
Remya Vinayakumar, Deepthi Varghese, Vince Paul
Abstract | PDFPDF
15. Top 5 Proven Strategies to Boost PPM Software Adoption
Pages : 69-70
Rajeshwar Vayyavur
Abstract | PDFPDF
16. Practical Outsourcing of Linear Programming in Secured Cloud Computing
Pages : 71-73
Lochan .B
Abstract | PDFPDF
17. Survey of Fingerprint Matching Techniques for Privacy Protection
Pages :74-80
Anjali Rajak, Dr.Asif Ullah Khan, Asst Prof.Surendra Dubey, Dr.Bhupesh Gour
Abstract | PDFPDF
18. A Survey on Energy Efficient Routing Protocol for Wireless Sensor Networks
Pages : 81-83
Pallavi S. Katkar, Prof. (Dr.) Vijay R. Ghorpade
Abstract | PDFPDF
19. An Autoconfigurated Hybrid Honeypot for Improving Security in Computer Systems
Pages : 84-88
Shyamasundar L B
Abstract | PDFPDF
20. A Review of Secure Authorized Deduplication with Encrypted Data for Hybrid Cloud Storage
Pages :89-91
Bhavanashri Shivaji Raut, Prof. H. A. Hingoliwala
Abstract | PDFPDF
21. A Review of Image Processing for Pomegranate Disease Detection
Pages : 92-94
Manisha A. Bhange, Prof. H. A. Hingoliwala
Abstract | PDFPDF
22. Prominence of Spatial Database in Geographical Information Systems
Pages : 95-98
T.Aruna Sri
Abstract | PDFPDF
23. Preserving Privacy of Public Clouds through Access Control Mechanisms: A Review
Pages : 99-100
S Aparna, Devi Dath
Abstract | PDFPDF
24. A Review on Different Routing Protocols in MANETS
Pages : 101-104
Navjot Kaur, Dr. Tanupreet Singh
Abstract | PDFPDF
25. Enchanced of Network Security Using Simplified Encryption Standard (SES)
Pages : 105-111
K. Bommi Mayuri, E.Rajalakshmi
Abstract | PDFPDF
26. Scheduling of Parallel Applications Using Map Reduce On Cloud: A Literature Survey
Pages : 112-115
A.Sree Lakshmi, Dr.M.BalRaju, Dr.N.Subhash Chandra
Abstract | PDFPDF
27. Review Paper on Technologies used for Interactive Image Segmentation
Pages : 116-120
Vrushali Mendhule, Gaurav Soni, Rajesh Nigam
Abstract | PDFPDF
28. Feature Selection Technique Applied with Many Data Mining Based Model
Pages : 121-126
Pratibha Soni, Prabhakar Sharma
Abstract | PDFPDF
29. Big Data Processing Using Hadoop MapReduce Programming Model
Pages : 127-132
Anumol Johnson, Havinash P.H, Vince Paul, Sankaranarayanan P.N
Abstract | PDFPDF
30. A Review on Image Enhancement using Artificial Neural Network and Fuzzy Logic
Pages : 133-136
Shweta K. Narnaware, Roshni Khedgaonkar
Abstract | PDFPDF
31. Review of Perceptual Resemblance of Local Plastic Surgery Facial Images using Near Sets
Pages : 137-140
Prachi V.Wagde, Roshni Khedgaonkar
Abstract | PDFPDF
32. Enactment of Medium and Small Scale Enterprise ETL(MaSSEETL)-an Open Source Tool
Pages : 141-147
Rupali Gill, Jaiteg Singh
Abstract | PDFPDF
33. CAPCHA as Graphical Password
Pages : 148-151
Magniya Davis, Divya R, Vince Paul, Sankaranarayanan P N
Abstract | PDFPDF
34. Video Copy Detection Using F-Sift and Graph Based Video Sequence Matching
Pages : 152-158
Anju P S, Soumya Varma, Vince Paul, Sankaranarayanan P N
Abstract | PDFPDF
35. Integration of Wireless Sensor Networks and Mobile Cloud- a Survey
Pages :159-163
Sukanya C.M, Priya K.V, Vince Paul, Sankaranarayanan P.N
Abstract | PDFPDF
36. Different Digital Watermarking Techniques for Secure Data Transmission
Pages : 164-167
Evline.J.Alappatt, JsamyDavies, Vince Paul, Sankaranarayanan P.N
Abstract | PDFPDF
37. Software Development Life Cycle Models- Comparison, Consequences
Pages : 168-171
Vanshika Rastogi
Abstract | PDFPDF
38. Brain Tumor Detection and Classification Using Histogram Thresholding and ANN
Pages : 172-175
Swathi P S, Deepa Devassy, Vince Paul, Sankaranarayanan P N
Abstract | PDFPDF
39. A New Scalable Hybrid Routing Protocol for VANETs
Pages : 176-180
Soumya Xavier, Anto Jacob, Vince Paul, Sankaranarayanan P.N
Abstract | PDFPDF
40. Heuristic Approach for Document Clustering in Forensic Analysis
Pages : 181-184
Tushar Thopte, Yogesh Indani, Murlidhar Jangale,Sharad Gaikwad
Abstract | PDFPDF
41. A Survey : Spectral Clustering Applications and its Enhancements
Pages : 185-189
S.V.Suryanarayana, Dr.G.Venkateswara Rao, Dr. G.Veereswara Swamy
Abstract | PDFPDF
42. Quantifying Response Mechanism for Effectiveness of Hybrid Virus Propagation through BT and SMS Channel-A Review
Pages : 190-193
Harsha Kubade, Deepali Khatwar
Abstract | PDFPDF
43. Survey of Scalable String Similarity Joins
Pages : 194-197
Khalid F. Alfatmi, Archana S. Vaidya
Abstract | PDFPDF
44. A Novel methodology for Searching Dimension Incomplete Database
Pages : 201-204
Kalbhor Swati, Gupta Shyam
Abstract | PDFPDF
45. Web Usage mining for Predicting User Access Behaviour
Pages : 181-184
Amit Dipchandji Kasliwal, Dr. Girish S. Katkar
Abstract | PDFPDF
46. A Methodology for the Usage of Side Data in Content Mining
Pages : 205-212
Vishal Vitthal Bandgar, Priyanka S. Muttur, Amol Ulhas Kuntham, G.A.Fattepurkar
Abstract | PDFPDF
47. Survey on Supervised Classification using Self Organising Maps
Pages : 213-217
Nupur Choudhury, Rupesh Mandal
Abstract | PDFPDF
48. Survey on – Self Adaptive Focused Crawler
Pages : 218-220
Pallavi Wadibhasme, Prof. Nitin Shivale
Abstract | PDFPDF
49. An Evolutionary and Empirical Review on Cloud Computing in Mobile Applications
Pages : 221-223
Rajeshwar Vayyavur
Abstract | PDFPDF
50. Implementation of RSA RC5 Algorithm in Cloud
Pages : 224-227
Pallavi Pandey, Priyanka Dhasal, Rakesh Pandit
Abstract | PDFPDF
51. Fingerprint Compression based on Sparse Representation: A Review
Pages : 228-231
Naja M I, Afzal A L
Abstract | PDFPDF
52. MANCAF: A Framework for Building Collaborative Applications in Mobile Ad Hoc Networks
Pages : 232-236
Hardik S. Mehta, Dr. Dhaval R. Kathiriya
Abstract | PDFPDF
53. Steganography Method Hiding Data in Video
Pages : 237-239
Roshani Patidar, Kamlesh Patidar
Abstract | PDFPDF
54. Object Scanning based Road Obstacles Detection using Weighted Sum Method-A Review
Pages : 240-242
Neha Chalana, Lovnish Bansal
Abstract | PDFPDF
55. Content Based Image Retrieval: Integration of Neural Networks Using Speed-Up Robust Feature and SVM
Pages : 243-248
Sukhmanjeet Kaur, Prince Verma
Abstract | PDFPDF
56. Hybrid Approach for Image Classification using SVM Classifier and SURF Descriptor
Pages : 249-251
Parul Prashar, Harish Kundra
Abstract | PDFPDF
57. Non-Dominated Sorting Genetic Algorithm-II – A Succinct Survey
Pages : 252-255
Ankita Golchha, Shahana Gajala Qureshi
Abstract | PDFPDF
58. Enhanced NSGA-II Algorithm for Solving Multiobjective Optimization Problems Using PBX Crossover and POM Mutation.
Pages : 256-261
Ankita Golchha, Shahana Gajala Qureshi
Abstract | PDFPDF
59. Prediction with V&V and Fault-Tolerance Strategies for Mandelbugs
Pages : 262-264
Pooja Maltare,Vishal Sharma
Abstract | PDFPDF
60. Efficient String Matching Using Bit Parallelism
Pages : 265-269
Kapil Kumar Soni, Rohit Vyas, Dr. Vivek Sharma
Abstract | PDFPDF
61. Drowsy Driver Identification Using Eye Blink detection
Pages : 270-274
Raees Ahmad, Prof. J.N. Borole
Abstract | PDFPDF
62. Recommendation System for Music File
Pages : 275-277
Tuhina Sultana, Nikita Sharma, Sunil Aher, Nikhil Pate and Mayura Kinikar
Abstract | PDFPDF
63. Information Hiding using Image Embedding in QR Codes for Color Images: A Review
Pages : 278-283
Akshara Gaikwad, K.R.Singh
Abstract | PDFPDF
64. A Technical Analysis of Image Stitching Algorithm
Pages : 284-288
Pranoti Kale, K.R.Singh
Abstract | PDFPDF
65. Recent Developments in Indian Sign Language Recognition: An Analysis
Pages : 289-293
Daleesha M Viswanathan, Sumam Mary Idicula
Abstract | PDFPDF
66. A Novel and Light Weight Defence Mechanism for Securing Wireless Networks
Pages : 294-297
Prajnya Priyadarsini Satapathy, Debi Prasad Mishra, Deepesh Kumar Singh
Abstract | PDFPDF
67. Handwritten Marathi Vowels Recognition using Correlation Coefficient
Pages : 298-301
Parshuram M. Kambale, Balasaheb J. Kshirsagar
Abstract | PDFPDF
68. Effect of Varying Embedding Energy and Energy wise Sorting on Watermarking using Wavelet
Transforms of Orthogonal Transforms DCT, Walsh and Haar

Pages : 302-313
Dr. H. B. Kekre, Dr. Tanuja Sarode, Shachi Natu
Abstract | PDFPDF
69. Mining for Faintly Labeled Web Facial Images By Using Face Annotation
Pages : 314-316
Pranjal N. Chopade, Sonali M. Rahinj, Gauri G. Shelar , R.B.Kagade
Abstract | PDFPDF
70. Energy and Power Aware Stable Routing Strategy for Ad hoc Wireless Networks based on DSR
Pages : 317-321
Nirav Bhatt, Dr. Dhaval Kathiriya
Abstract | PDFPDF
71. Enhanced Clustering Technique to Improve the Network Lifetime for Wireless Sensor Network
Pages : 322-325
J.Surekha, T.Tamizharasi
Abstract | PDFPDF
72. A Survey on Software Project Planning and Control Using Case Tools
Pages : 326-331
NadanaSundaram P V, Dr.K.Iyakutti
Abstract | PDFPDF
73. Article Removed
Pages : xxx-xxx
xxx, xxx
Abstract | PDFPDF
74. Modular System for Mitigating Flood Attacks
Pages : 345-349
Devisha Srivastava
Abstract | PDFPDF
75. Overview of Modern Cryptography
Pages : 350-353
M.Kundalakesi, Sharmathi.R, Akshaya.R
Abstract | PDFPDF
76. Web Usage Mining Using Apriori and FP Growth Alogrithm
Pages : 354-357
Aanum Shaikh
Abstract | PDFPDF
77. Secure and Efficient Data Transfer for Hierarchical Based Wireless Sensor Network
Pages : 358-360
Akshada Deokar, Deepali Borade, B.A.Tidke
Abstract | PDFPDF
78. Designing Secured Incremental Backup System for Cloud
Pages : 361-364
Shyamsunder Ingle , Rajesh Kulkarni
Abstract | PDFPDF
79. The Data Recovery File System for Hadoop Cluster -Review Paper
Pages : 365-367
V. S. Karwande, Dr. S. S.Lomte, Prof. R. A. Auti
Abstract | PDFPDF
80. Context Aware Service Information Extraction from Bigdata
Pages : 368-373
G.Suvarna, S. Murali Krishna
Abstract | PDFPDF
81. Recognition of Face Using Neural Network
Pages : 374-376
Nisha Vasudeva , Vivek kumar Sharma , Vikas Mishra
Abstract | PDFPDF
82. A Comparative Analysis & Survey of various Feature Extraction Techniques
Pages : 377-379
Kapil Kumar Pachouri, Atul Barve
Abstract | PDFPDF
83. Performance Analysis and Optimization of Supervised Learning Techniques for Medical Diagnosis Using Open Source Tools
Pages : 380-383
Vidyullatha Pellakuri, Deepthi Gurram, Dr.D. Rajeswara Rao, Dr.M.R.Narasinga Rao
Abstract | PDFPDF
84. Basic Tree Terminologies, their Representation and Applications
Pages : 384-387
Ramesh M. Patelia, Shilpan D. Vyas, Parina S. Vyas, Nayan Patel
Abstract | PDFPDF
85. Annotation Based Web Databases Search Technique
Pages : 388-391
Boraste Jagruti Balkrishna, Swati.K.Bhavsar
Abstract | PDFPDF
86. Robust Watermarking Using Secret Key Encryption by Embedding Noise in JPEG Image
Pages : 392-394
Abstract | PDFPDF
87. Android Based Wireless PC Controller
Pages : 395-398
Mahesh Deshmukh , Damini Jawale , Shruti Joshi, P.S. Kulkarni
Abstract | PDFPDF
88. Trustworthy and Energy-Saving Measures in Wireless Sensor Networks by using Multipath Routing
Pages : 399-403
Arun Kumar. S
Abstract | PDFPDF
89. Simple and Efficient Secret Sharing Schemes for Sharing Data and Image
Pages : 404-409
Binu V P, Sreekumar A
Abstract | PDFPDF
90. Efficient Voting system with (2,2) Secret Sharing Based Authentication
Pages : 410-412
Ashwini Walake, Pallavi Chavan
Abstract | PDFPDF
91. A Survey of Personalized Recommendation System with User Interest in Social Network
Pages : 413-415
Anil Rathod, Indiramma M
Abstract | PDFPDF
92. Verifications of Network Protocol Implementations - A Review
Pages : 416-418
Saleema D, Bejoy Abraham
Abstract | PDFPDF
93. A Survey on Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud
Pages : 419-422
Gauri Thorat, S.R.Todmal
Abstract | PDFPDF
94. Performance Analysis of New Conversion Tool from Relational Datasets to XML Datasets on Selected Websites
Pages :423-430
B. Hemanth Kumar, M. Surendra Prasad Babu
Abstract | PDFPDF
95. A Review on Semantic Web Mining
Pages : 431-433
Amruta Arun Joshi, Vrishali A. Chakkarwar
Abstract | PDFPDF
96. Efficient Keyword Query Routing for Search Engines
Pages : 434-437
Pawar Prajakta Bhagwat, Niranjan L. Bhale
Abstract | PDFPDF
97. Synthesis of Speech & Speaker Recognition Using Data Driven Approach
Pages : 438-442
Leela Kumari , Rahul Guha , Geetika Gera
Abstract | PDFPDF
98. Big Data Processing Using Hadoop
Pages : 443-445
R.A.Fadnavis, Samrudhi Tabhane
Abstract | PDFPDF
99. A Nobel Approach of Providing Confidentiality over Text Data with High PSNR Value
Pages : 446-450
Harsh Deepak Shrivastava, Sushil Tiwari, Sriram Yadav
Abstract | PDFPDF
100. MDT-Auction: A New Approach for Decision Making to map the best cloud provider to best cloud user
Pages : 451-454
Ninad Shinde, J. Ratnaraj Kumar
Abstract | PDFPDF
101. Study of Data Mining in Higher Education-A Review
Pages : 455-458
Khushbu N.Shah, Misika R. Patel, Neha V. Trivedi, Priyanka N. Gadariya, Richa H. Shah, Ms. Nehal Adhvaryu
Abstract | PDFPDF
102. Data Replication & Caching in Data Grid :A Review
Pages : 459-462
Rajshri S. Patil, Prof.L.K.Gautam
Abstract | PDFPDF
103. Ranking Through Vector Machine-Domain Specific Search
Pages : 463-466
C. Palguna Reddy, D. Kasi Viswanath
Abstract | PDFPDF
104. Load Degree Calculation for the Public Cloud based on Cloud Partitioning Model using Turnaround Time
Pages : 467-469
Priti Singh, Pankaj Sharma
Abstract | PDFPDF
105. Applications of Elliptic Curve Cryptography
Pages : 470-472
Chetan S. Pagar, Manisha M. Naoghare, Yogita S. Pagar
Abstract | PDFPDF
106. An Epistemological Text Mining Method by Generating D-Matrix for Unstructured Text
Pages : 473-475
Ninad Shinde, J. Ratnaraj Kumar
Abstract | PDFPDF
107. Reviewing Information Systems Usage and Performance Models
Pages : 476-484
Francis B. Osang , Nchise Abinwi, Clive Tsuma
Abstract | PDFPDF
108. Bio-Inspired Scheduling of High Performance Computing Applications in Cloud: A Review
Pages : 485-487
Delsy Jyothi, Anoop S
Abstract | PDFPDF
109. An Automated Sequence Model Testing (ASMT) For Improved Test Case Generation Using Cloud

Pages : 488-494
Priya Purohit, Yunus Khan
Abstract | PDFPDF
110. A Critical Analysis of Some Symmetric Key Block Cipher Algorithms
Pages : 495-499
Sunil Mankotia and Manu Sood
Abstract | PDFPDF
111. Load Balanced Data Aggregation Methods for Virtual Backbone in Wireless Sensor Networks
Pages :500-502
Miss.Vrishali Popat Wagaj , Prof.Vinayak V.Pottigar, Prof.Prakash R.Gadekar
Abstract | PDFPDF
112. Model-Based Data Collection in Wireless Sensor Networks
Pages : 503-509
Geeta Gupta, Vinod Khandelwal, Vikas Gupta
Abstract | PDFPDF
113. Crime Area Detection and Criminal Data Record
Pages : 510-513
Aanchal Dabhere, Aniruddha Kulkarni, Ketaki Kumbharkar , Vrushali Chhajed,Sneha Tirth
Abstract | PDFPDF
114. Hybrid Method for Image Segmentation
Pages : 514-518
Barkha Bhansali, Sonam Tiwari, Savita Agrawal
Abstract | PDFPDF
115. Review of Graph Algorithms on GPU using CUDA Architecture
Pages : 519-521
Trupti R. Desale
Abstract | PDFPDF
116. Big Data Analytics: Hadoop-Map Reduce& NoSQL Databases
Pages : 522-527
Abinav Pothuganti
Abstract | PDFPDF
117. Admitive Data Aggregation in WSN
Pages : 528-530
Gaurav Tiwari and Archana Khandekar
Abstract | PDFPDF
118. An Evaluation of IP-Based Fast Rerouting Techniques
Pages : 531-533
Bhanu Vardhan, D. Satyanarayana, Uma Sista
Abstract | PDFPDF
119. Finger Sleeve: A Wearable Navigation Device
Pages : 534-538
Hemant Bhaskar Surale
Abstract | PDFPDF
120. Criminal Detection Using Eigenfaces Approach on Android Device
Pages : 539-541
Viraj, Pradip More, Pankaj Thombre , Shweta Malvi
Abstract | PDFPDF
121. Operating System Used in Cloud Computing
Pages : 542-544
Noopur Bardhan, Pooja Singh
Abstract | PDFPDF
122. Efficient Backingup Data for Migrating Cloud to Cloud
Pages : 545-549
PS.Vijayabaskaran, U.Prabu, R.Sriram
Abstract | PDFPDF
123. Combination of Neuro Fuzzy Techniques Give Better Performance over Individual Techniques of
Soft Computing

Pages : 550-553
Shweta Katke, Madhavi Pawar, Trupti Kadam , Sudhanshu Gonge
Abstract | PDFPDF
124. Load Balancing In Multistage Packet Switches
Pages : 554-557
Jadhav Mahadeo , Dhage Anand , Navgire Narsingh, Patil Rohini ., Prof. Sirdeshpande S. A.
Abstract | PDFPDF
125. Fault Routing Node Detection Using DUAL in Wireless Sensor Networks
Pages : 558-563
B.Vijay Kumar, G. Hemanth Kumar Yadav
Abstract | PDFPDF
126. A Novel Fuzzy Image Enhancement using S-Shaped Membership Function
Pages : 564-569
Pushpa Devi Patel, Prof. Vijay Kumar Trivedi, Dr. Sadhna Mishra
Abstract | PDFPDF
127. Protecting Frequent Patterns using Distributed Security on M-Clouds
Pages : 570-576
K.H.Shabbeer Basha, E .Madhusudhana Reddy
Abstract | PDFPDF
128. Automated Identification of Substituted Words in Text
Pages : 577-579
Amit Kulkarni, Mayur Patil, Nitish Mali, Rajesh Kharche Prof. Mrs. G.S.Navale.
Abstract | PDFPDF
129. Modeling and Simulation of a Wireless Body Area Network for Monitoring Sick Patient Remotely
Pages : 580-585
Anas Bouayad, Nour El Houda Chaoui, Mohammed El Ghazi, Moulhim El Bekkali
Abstract | PDFPDF
130. Hadoop Cluster on Linode Using Ambari for Improving Task Assignment Scheme Running in the Clouds
Pages : 586-589
Minthu Ram Chiary, R. Anand
Abstract | PDFPDF
131. Unique Decision Making Process For Seamless Communication After Disaster
Pages : 590-593
R.Adline Freeda, R.N Sharmila
Abstract | PDFPDF
132. Survey on Efficient Framework for Aggregate Key Management in Cloud
Pages : 594-596
Shrikant D. Jadhav, Jaising Jadhav, Vaishali Khaire, Pratiksha Giakwad, Sandeep Gore
Abstract | PDFPDF
133. Security Analysis Using IDs Based on Mobile Agents and Data Mining Algorithms
Pages : 597-602
Chaimae Saadi, Habiba Chaoui Mejhed, Hassan Erguig
Abstract | PDFPDF
134. Survey: Routing Protocols in Cognitive Radio Mesh Networks
Pages : 603-608
T. Pavan Kumar, E. Suresh babu, B. Venkata Ramana, B. Sai Shashank
Abstract | PDFPDF
135. Ant Colony Optimization Based Routing to Improve QoS in MANETs
Pages : 609-613
Swapna Priya Jaladi
Abstract | PDFPDF
136. Survey on Real Time Broadcast Authentication Schemes for Command and Control Messages
Pages : 614-618
Sonia Thomas, Elisabeth Thomas
Abstract | PDFPDF
137. FixDec: Fixed Spherical n Points Density-Based Clustering Technique for Cloth Simulation
Pages : 619-625
Nur Saadah Mohd Shapri, Riza Sulaiman, Abdullah Bade
Abstract | PDFPDF
138. Article Removed
Pages : xxx-xxx
Abstract | PDFPDF
139. Objective of Keystroke Dynamics for Identifying Emotional State
Pages : 632-636
Shivshankar Rajput and Priyanka Vijayavargiya
Abstract | PDFPDF
140. An Intelligent Heart Disease Prediction System Using K-Means Clustering and Naïve Bayes Algorithm
Pages : 637-639
Rucha Shinde, Sandhya Arjun, Priyanka Patil, Prof. Jaishree Waghmare
Abstract | PDFPDF
141. Outsourced Security Policy Updates Through Role Hierarchies for Security and Isolation in Cloud

Pages : 640-646
Aditi Vyas, Prof. Hemant Kumar Pathak
Abstract | PDFPDF
142. A New Approach for Improving Computer Inspections by Using Fuzzy Methods for Forensic Data Analysis
Pages : 647-651
P. Jyothi, Dr S. Murali Krishna
Abstract | PDFPDF
143. Ensuring Distributed Accountability for Data Sharing in Cloud Using AES and SHA
Pages : 652-657
Vikas Vitthal Lonare, Prof.J.N.Nandimath
Abstract | PDFPDF
144. A Review of Trust Model in Delay Tolerant Network
Pages : 658-660
Ashwini Borkar
Abstract | PDFPDF
145. Fuzzy Logic Based Texture, Queries for Image Retrieval System: An Analysis
Pages : 661-663
Avdhesh Kumar Tiwari, Akash Awasthi
Abstract | PDFPDF
146. A Comparitive Study of: Quality Assessment of Object Oriented Software at Design Level
Pages : 664-666
Aarti Rathour, Akash Awasthi,Shubhendra Singh
Abstract | PDFPDF
147. Article Removed
Pages : 667-670
Abstract | PDFPDF
148. A Proposal to Enhance A-KNN Clustering Method
Pages : 671-673
Kamaljeet Kaur, Satwinder Singh
Abstract | PDFPDF
149. Analysis of Hybrid GPSR and Location Based Routing Protocol in VANET
Pages : 674-677
Neha, Isha
Abstract | PDFPDF
150. Analysis of Enhanced Request Response Detection Algorithm for Denial of Service attack in VANET: A Review
Pages : 678-681
Deepali., Isha
Abstract | PDFPDF
151. A Study on Intrusion Detection in Mobile Ad Hoc Networks
Pages : 682-684
R.Amutha, M.Savithri
Abstract | PDFPDF
152. A Study and literature Review on Image Steganography
Pages :685-688
Parmar Ajit Kumar Maganbhai, Prof. Krishna Chouhan
Abstract | PDFPDF
153. Simulation of Urban Area through Opus : Open Platform for Urban Simulation
Pages : 689-693
Nilesh Shingne, Deepa Ramteke, Sagarkumar Meshram
Abstract | PDFPDF
154. A Hybrid Technique for Medical Image Denoising using NN, Bilateral filter and LDA
Pages : 694-698
Rupinder Pal Singh, Varsha Varma, Pooja Chaudhary
Abstract | PDFPDF
155. Combinatorial approach for Text Classification Algorithm
Pages : 699-702
Namekar Shirish Manohar, Deipali V. Gore
Abstract | PDFPDF
156. A Survey on Techniques to Extract High- Quality Data from the Database
Pages : 703-705
MD.Khasim Pasha, C.Malathy
Abstract | PDFPDF
157. The Design of N bit Quantization Sigma-Delta Analog to Digital Converter
Pages : 706-709
J. Snehalatha
Abstract | PDFPDF
158. E-Government in Developed Countries, The Case of Turkey
Pages : 710-714
Recep Benzer
Abstract | PDFPDF
159. Generation of Electricity by Solar Using Programmable System on Chip
Pages : 715-718
Deshmukh P.R., Kolkure V.S.
Abstract | PDFPDF
160. Design of Single mode TE mode optical Polarizer Using Silicon Oxynitide multilayed waveguide
Pages : 719-723
Sparsh Pratik, Upendra Kumar, Rajat Butola
Abstract | PDFPDF
161. The Internet of Things- Where the Web and the Physical world will meet
Pages : 724-727
Vaishali Jain, Roopali Jain
Abstract | PDFPDF
162. Best-Fit Wavelength Assignment Algorithm For Persistent Communication in Optical Networks
Pages : 728-733
P.Sathishkumar, V.Mahalingam
Abstract | PDFPDF
163. Dynamic Server Provisioning Approach with Dynamic Content Application Server on Multitier
Cluster over Heterogeneous Network

Pages : 734-736
Mahesh B. Shelke, Prof. R. A. Auti, Dr. S. S. Lomte
Abstract | PDFPDF
164. Energy Efficiency Communication Protocol With Mobility in Wireless Sensor Network: A Survey
Pages : 737-740
Manisha, Surya Prakesh Sharma
Abstract | PDFPDF
165. E-Governance in Rural India
Pages : 741-744
Nidhi Srivastava
Abstract | PDFPDF
166. Speed Alert System for GPS-enabled Smartphone’s with Android operating system
Pages : 745-748
Jameer G.Kotwal, Niraj S. Kalokhe, Amol V. Roundhal, Pravin Nakhate, Rahul D. Kembhavi
Abstract | PDFPDF
167. A Review on Byzantine Attack Detection and Prevention Using Game Theory
Pages : 749-752
Chetna Guntewar, Vaishali Sahare
Abstract | PDFPDF
168. A Personalized Method for Blacklisting Users and Implementing Filtered Walls in OSN
Pages : 753-756
Sai Sudha Gadde
Abstract | PDFPDF
169. Security Mechanism in Alumni Portal
Pages :757-761
Vikrant Pawar, Sagar Date, Suraj Iyer, Chhaya Narvekar.
Abstract | PDFPDF
170. Review of Neighbor Coverage Based Probabilistic Rebroadcast with Cryptographic Technique
Pages :762-764
Nishakumari Ashokkumar Lodha, Dipali Sakharam Patil
Abstract | PDFPDF
171. RA Study on Approximation Algorithms for Constructing Rectilinear Steiner Trees
Pages :765-769
Latha N.R.
Abstract | PDFPDF
172. Survey on different types of Security Threats on Wireless Sensor Networks
Pages :770-774
Genita Gautam, Biswaraj Sen
Abstract | PDFPDF
173. A Novel Framework for Biometric Authentication Using Segmentation of Iris Detection
Pages :775-777
Harshada S. Terkhedkar, Preeti Topannavar
Abstract | PDFPDF
174. Prioritization of Re-Executable Test Cases in Model Based Environment- A Survey
Pages :778-780
Komal Jadhav, Sharmila Shinde
Abstract | PDFPDF
175. Article Removed
Pages :xxx-xxx
Abstract | PDFPDF
176. A Review on Health Assistant: Android Application for Fitness Support using Body Sensor Network
Pages :785-787
Khairnar Asha , Shinde Karishma, Prof.Swati Khokale
Abstract | PDFPDF
177. SPRAM: Selective Pheromone Removal Based Routing Algorithm for Manet’s
Pages :788-792
Muneesh Vishnoi, Prajna Krishnan
Abstract | PDFPDF
178. Survey on Geographical Routing Protocols in Network-Centric Warfare Paradigm
Pages :793-795
Anand M
Abstract | PDFPDF
179. Securely Sharing Of Data with Others in Cloud Storage Using Public–Key Cryptosystem
Pages :796-800
R.S.Bhalerao, S.M.Rokade
Abstract | PDFPDF
180. Public Key Cryptosystem for Scalable Data Sharing In Cloud Storage
Pages :801-804
R.S.Bhalerao, S.M.Rokade
Abstract | PDFPDF
181. User Future Request Prediction
Pages :805-809
Rujuta Panvalkar, Namrata Valera, Ami Vashi, Khushali Deulkar
Abstract | PDFPDF
182. Evaluation of PCA and LDA techniques for Face recognition using ORL face database
Pages :810-813
M.Saraswathi, Dr. S. Sivakumari
Abstract | PDFPDF
183. e Store for Cloud Services
Pages :814-817
Asha N, Jabed Al Hassan
Abstract | PDFPDF
184. Data Compression Techniques for Wireless Sensor Network
Pages :818-821
Shahina Sheikh, Ms. Hemlata Dakhore
Abstract | PDFPDF
185. Enhanced Adaptive Routing With Transmission Success Probability in Wireless Mesh Networks
Pages :822-825
Swetha. D, Wilson Thomas
Abstract | PDFPDF
186. Dynamic Multi-Keyword Ranked Searchable Security Algorithm Using CRSA and B-Tree
Pages :826-832
Prasanna B T, C B Akki
Abstract | PDFPDF
187. Digital Watermarking-Revisit
Pages :833-838
Anita Chauhan
Abstract | PDFPDF
188. Efficient and Secure Scheme for Distributed Data Storage Systems
Pages :839-843
Y.Vijaya Ratna Kumari, T. Bindu Madhavi, L.Ravi Kumar
Abstract | PDFPDF
189. Localization Techniques in Wireless Sensor Networks
Pages :844-850
Shweta Singh, Ravi Shakya, Yaduvir Singh
Abstract | PDFPDF
190. MSL Based Concurrent and Efficient Priority Queue
Pages :851-857
Ranjeet Kaur, Dr. Pushpa Rani Suri
Abstract | PDFPDF
191. KNN Query Processing 0f Secured Multi Data Owner Using Voronoi Diagram
Pages :858-862
Jemi Florence, Kanya Devi J
Abstract | PDFPDF
192. Survey on Calculation of Mutual Impedance of Plannar Dipole Array Using Method of Moment
Pages :863-865
Tamajit Nag, Dr. Amlan Datta
Abstract | PDFPDF
193. An Analytical Survey of Power Consumption and Modeling in Different Areas of ICT Networks
Pages :866-870
Payel Giri, Sudhansu Sekhar Singh
Abstract | PDFPDF
194. Effective Lossless Authentication in Video for Data Embedding Application
Pages :871-874
Prof .Deepali S.Chavan
Abstract | PDFPDF
195. The Major Symptoms that Determine Video Game Addiction Case Study: Jordanian Universities Students
Pages :875-879
Rawan Abulail
Abstract | PDFPDF
196. Protecting User Privacy By Using Decentralized Key-Policy Attribute-Based Encryption
Pages :880-888
Kishor B.Badade, Dr.S.S.Lomte, R.A.Auti
Abstract | PDFPDF
197. Different Image Fusion Techniques and Parameters: A Review
Pages :889-892
Priya D. Vora, Neeta Chudasama
Abstract | PDFPDF
198. Role of Digital Signature in Network Security and Cryptography
Pages :893-895
Kishor B.Badade, Dr.S.S.Lomte, R.A.Auti
Abstract | PDFPDF
199. Classification and Adaptive Novel Class of Botnet Detection
Pages :896-899
Nijhandhan.M, Narmadha.R.P
Abstract | PDFPDF
200. Integrity Verification in Multi-Cloud Storage by Efficient Cooperative Provable Data Possession
Pages :900-903
Kishor B.Badade, Dr.S.S.Lomte, R.A.Auti
Abstract | PDFPDF
201. To Build and Develop Client Performance profiles Repeatedly
Pages :904-907
K. Khadar Valli
Abstract | PDFPDF
202. Segmenting the Contour on a Robust Way in Interactive Image Segmentation Using Region and Boundary Term
Pages :908-912
A.Raja Ravi Sekar, P.Ilanchezhian
Abstract | PDFPDF
203. Region Based Data Hiding For High Payload
Pages :913-919
Shreela Dash, Mamatarani Das, Kartik Chandra Jena
Abstract | PDFPDF
204. Security Issues in Wireless Sensor Networks – An Overview
Pages :920-924
Sujesh P. Lal, Dr. Joe prathap P M
Abstract | PDFPDF
205. An Efficient Centralized Clustering approach for Wireless Sensor Networks
Pages :925-930
M.Srinivasa Rao and K.Durga Bhavani
Abstract | PDFPDF
-All rights are reserved by International Journal of Computer Science and Information Technologies-