VOLUME 6 ISSUE 3 May - June 2015

ISSN 0975 - 9646

1. Captcha as Graphical Passwords
Pages : 1975-1985
Kalyani S Kumar
Abstract | PDFPDF
2. An Innovative Approach to Diabetes Diagnosis
Pages :1986-1989
G.Nageswara Rao, V.Swetha, M.Rithvik
Abstract | PDFPDF
3. Development of Android Mobile Application for Cloud Video Streaming using Mobile Cloud Computing
Pages : 1990-1993
Narsu Patil, Nitesh Patil, Anil Bagal, Mayuri Desai, Anita Bhosale
Abstract | PDFPDF
4. Review on Block Based Transformation Image Encryption Techniques
Pages : 1994-1995
Himani Patwa and Akhilesh Deep Arya
Abstract | PDFPDF
5. Adaption of Customer Relationship Management and Data mining tools in the Data intensive Cloud
Computing Environment

Pages : 1996-2002
Sanjib Kumar Routray, Sasmita Mishra
Abstract | PDFPDF
6. Parallel and Improved PageRank Algorithm for GPU-CPU Collaborative Environment
Pages :2003-2005
Prasann Choudhari , Eikshith Baikampadi, Paresh Patil , Sanket Gadekar
Abstract | PDFPDF
7. An Efficient RSA Based Technique for the Encryption and Decryption
Pages :2006-2009
Sharad Morolia, Manoj Dhawan
Abstract | PDFPDF
8. A Comprehensive Survey on Fanet : Challenges and Advancements
Pages : 2010-2013
Shashank Kumar Singh
Abstract | PDFPDF
9. Database search Orchestrator for cloud database
Pages : 2014-2017
Shweta Agrawal, Raj Kamal
Abstract | PDFPDF
10. Eliminating Redundancy in File System Using Data Compression and Secured File Sharing
Pages :2018-2022
Raakesh, Varun Raj G, Krishna R, L.Maria Michael Visuwasam
Abstract | PDFPDF
11. Improving the life cycle of Genetic Programming using Feature Selection with Multiobjective
Fitness Function

Pages : 2023-2026
Rupali Koushal , Manoj Dhawan
Abstract | PDFPDF
12. Secure and Economical Information Transmission for Cluster-Based Wireless Sensor Networks
Pages : 2027-2030
Bhimashankar K. Dhurape , Swati S. Joshi
Abstract | PDFPDF
13. EEG signal classification using Modified Fuzzy Clustering algorithm
Pages :2031-2034
Priyanka Jaiswal, Rupali Koushal
Abstract | PDFPDF
14. A Survey on Techniques and Fundamentals of Internet Access in VANET-INTERNET Integration Scenarios
Pages : 2035-2039
Ujwala L. Mane, Aparna A. Junnarkar
Abstract | PDFPDF
15. A Modified Classification Based Technique for More Accurate Classification & Prediction of the

Pages : 2040-2042
Neha Agrawal, Priyanka Vijayvargiya
Abstract | PDFPDF
16. A Survey on Various Image Enhancement Algorithms for Naturalness Preservation
Pages : 2043-2045
Divya K A, Roshna K I
Abstract | PDFPDF
17. Survey on Clustering Algorithms of Wireless Sensor Network
Pages : 2046-2049
Mohini Kumrawat, Manoj Dhawan
Abstract | PDFPDF
18. Optimal Code Compiling in C
Pages : 2050-2057
Nitika Gupta, Nistha Seth, Prabhat Verma
Abstract | PDFPDF
19. Automatic Generation of Owl for Domain Based Applications
Pages : 2058-2060
Neha Dalwadi
Abstract | PDFPDF
20. An Image Indexing and Retrieval Method Using Local Tetra Pattern for Content-Based Image
Retrieval (CBIR)

Pages : 2061-2064
Shraddha D. Jumade, Prof. Sheetal S. Dhande
Abstract | PDFPDF
21. A Literature Survey on Digital Image Processing Techniques in Character Recognition of Indian

Pages : 2065-2069
Dr. Jangala. Sasi Kiran, N. Vijaya Kumar , N. Sashi Prabha , M. Kavya
Abstract | PDFPDF
22. OPEN FLOW :Innovating campus network
Pages : 2070-2075
Prithvi krishna D, Shrihari M R, AnkithaGowda
Abstract | PDFPDF
23. A Study on Use of Big Data in Cloud Computing Environment
Pages : 2076-2078
Venkatesh H, Shrivatsa D Perur, Nivedita Jalihal
Abstract | PDFPDF
24. A Portable and Secure Healthcare Maintenance System
Pages : 2079-2083
K.Sravani, B.Bindusha Reddy, R.R.V.N.V.Kumari, G.Vijay Kumar
Abstract | PDFPDF
25. An Improved Method for Detection of Satire from User-Generated Content
Pages : 2084-2088
Syed Taha Owais,Tabrez Nafis, Seema Khanna
Abstract | PDFPDF
26. Cloud Business Process Management & Data Security
Pages : 2089-2093
Honey Tilwani
Abstract | PDFPDF
27. Reliable Cloud Using elliptical Curve Deffie Hellman and Elliptical Curve Digital Signature
Pages : 2094-2096
Akash Shrivastava, Nitya M Nerli
Abstract | PDFPDF
28. Modified RSA Algorithm for (Wi-Fi) Security Protocol
Pages : 2097-2098
T.Venkata Satya Vivek, D.Anandam , Ganta Anil,B.Sreenivasulu, V.Lakshma Reddy, M Rao Batchnaboyina
Abstract | PDFPDF
29. Load Balancing in Content Delivery Network Using Distributed Control Law
Pages : 2099-2105
Chetana B. Bhagat, Dilip K. Budhwant
Abstract | PDFPDF
30. Protecting the Finger Print Template by Fusion of Ridges and Texture
Pages : 2106-2110
Vidyasree.P, Dr.G.VenkataRamiReddy
Abstract | PDFPDF
31. Constrained Curve Drawing with C1 Continuous Rational Quadratic Curve
Pages : 2111-2114
Ashu Pal, Harshvardhan Mathur
Abstract | PDFPDF
32. Image Segmentation Based Face Recognition Using Enhanced SPCA-KNN Method
Pages : 2115-2120
J.Savitha, Dr.A.V.Senthil Kumar
Abstract | PDFPDF
33. An Intelligent System For Forecasting Electric Load And Price
Pages : 2121-2126
Sushmita Tiwari, Vaishali singh, Rajiv Kumar
Abstract | PDFPDF
34. Identifying and Extracting Data from Clipboard
Pages : 2127-2129
Ganesh N. Nadargi, Zakir M. Shaikh
Abstract | PDFPDF
35. A Review on Various RFID Based Automated Highway Toll Collection Systems
Pages : 2130-2133
Venkatesh Suvarna and Jeet Patalia
Abstract | PDFPDF
36. Tool for Extraction of Functional Requirements from Legacy Code
Pages :2134-2138
Pooja Khanna
Abstract | PDFPDF
37. Faster and Efficient Method for Robust Exemplar Based Inpainting Using Block Processing
Pages : 2139-2141
Yogesh Laxman Tonape, Vinayak Pottigar, Swapanaja Ubale
Abstract | PDFPDF
38. An Indirect Encryption using Compression with Random bit stuffing
Pages : 2142-2144
Dr. M. Ramesh, Dr. B. Hemanth Kumar, Prof. M. Surendra Prasad Babu
Abstract | PDFPDF
39. Database Evaluation Considering the Decisive Factors for Obtaining an Optimistic Value to Predict the Diagnose
Pages : 2145-2149
M.Purnachandra Rao, N.Padmini Krishna, N.Jagannadh Varma, P.Rohini, V.Sri Divya
Abstract | PDFPDF
40. Privacy Conflicts for Collaborative Data Sharing in Online Social Network
Pages : 2150-2153
Sandip S. Shirgave, Prof. Subhash V. Pingale, Dr. K. J. Karande
Abstract | PDFPDF
41. Implementing Capability Maturity Model for Higher Education as Education ERP Solution
Pages : 2154-2158
Pinak Pani Chakrabarty
Abstract | PDFPDF
42. A Comparative Study on Web Crawling for searching Hidden Web
Pages : 2159-2163
Beena Mahar, C K Jha
Abstract | PDFPDF
43. NTP Based Smart Energy Meter
Pages : 2164-2167
Chetana Dapse
Abstract | PDFPDF
44. A Fuzzy Effective Approach to Perform Image Fusion on Medical Images
Pages : 2168-2171
Shilpa, Nishant Jakhar, Prabhneet Kaur
Abstract | PDFPDF
45. Detecting of Materialize Topical Trend Topic from Social Networks
Pages : 2172-2174
Tamilmani.G, Rajathi. K, Ponnaruvi. P
Abstract | PDFPDF
46. An Innovative Data Security Techniques Using Cryptography and Steganographic Techniques
Pages : 2175-2182
Richa Dubey, Apurva Saxena, Sunita Gond
Abstract | PDFPDF
47. Comparative Study of Data Dissemination Algorithms based on Cluster Forming Parameters in Vehicular Ad-hoc Network
Pages : 2183-2186
Arvind Kumar, Sudesh Rani
Abstract | PDFPDF
48. Scalable Transactions for Web Applications in the Cloud using Customized CloudTPS
Pages : 2187-2191
Shashikant Mahadu Bankar
Abstract | PDFPDF
49. User Authentication Using Multimodal Biometrics
Pages : 2192-2200
Prashant Kumar Jain, Shailja Shukla, S.S. Thakur
Abstract | PDFPDF
50. An Active Approach based on Independent Component Analysis for Digital Image Forensics
Pages : 2201-2203
Anil Dada Warbhe, R. V. Dharaskar
Abstract | PDFPDF
51. Partial Image Encryption Using Block Shuffling and Affine Transform
Pages : 2204-2207
Rakhi, Rekha Pandit
Abstract | PDFPDF
52. Survey on Various Quantum Key Distribution Algorithms
Pages : 2208-2209
Vivek Singh, Bhawna Chauhan
Abstract | PDFPDF
53. Manufacturing Backend
Pages : 2210-2214
Anusha Hiremath , Apoorva Dhavale , K V Roopa , Keertee Savadi, Aruna S. Nayak
Abstract | PDFPDF
54. A Survey on Different Routing Protocols in Wireless Sensor Network
Pages :2215-2220
Nidhi Sharma
Abstract | PDFPDF
55. An SVM-Fuzzy Expert System Design For Diabetes Risk Classification
Pages :2221-2226
Thirumalaimuthu Thirumalaiappan Ramanathan , Dharmendra Sharma
Abstract | PDFPDF
56. Estimating the optimal number of servers for an emergency department of a private hospital, via
mathematical programming.

Pages : 2227-2231
Zeinab yousef Mahmoud
Abstract | PDFPDF
57. RFID Based Ticketing System For Local Trains
Pages : 2232-2234
K. T. Patil, Dipti Mehendale,Vidya S., Aldar Leena Govilkar, S.K.Narayankhedkar
Abstract | PDFPDF
58. An Automatic Approach Towards Coloring Videos Using Monochrome Texture Descriptor & Parallel

Pages : 2235-2239
Gauri R. Joshi, Prof. Mayur S. Burange
Abstract | PDFPDF
59. Distributed Cache Modernizing for the Multi- Source Transmitting Protocol
Pages : 2240-2243
G.Thilipkumar, Dr. R. Balasubramanian
Abstract | PDFPDF
60. Identify and Compare discernment rules for accurate Liver Disorder detection using Apriori and FP Generation Analysis
Pages : 2244-2255
Gagandeep Kaur
Abstract | PDFPDF
61. Elicitation of Information from Online Libraries using Web Content Mining Methods and Applications
Pages : 2256-2258
Rutvija Pandya, Jayati Pandya
Abstract | PDFPDF
62. A Survey of Quality of Service routing protocols in MANETs
Pages : 2259-2262
Juned Ahmad, Samir Srivastava, PK Singh
Abstract | PDFPDF
63. Power Consumption Analysis
Pages : 2263-2266
Vivek Sadhwani, Dinesh Rohra, Manoj Valesha, Gresha Bhatia
Abstract | PDFPDF
64. Efficient Packet Forwarding Technique in LEACH Protocol in Multisink Wireless Sensor Network
Pages : 2267-2271
Nikha Sheoran ,Kaushik Ghosh
Abstract | PDFPDF
65. E-mail Spam Filtering Using Genetic Algorithm: A Deeper Analysis
Pages : 2272-2276
Mandeep Chowdhary , V. S. Dhaka
Abstract | PDFPDF
66. Vehicle License Plate Recognition System Using LoG Operator for Edge Detection and Radon Transform for Slant Correction
Pages : 2277-2281
Jaya Gupta, Prof. Supriya Agrawal
Abstract | PDFPDF
67. A Study Combined DWT-DCT Digital Image Hiding Information
Pages : 2282-2286
Jyoti Sahu, Dolley Shukla
Abstract | PDFPDF
68. Sales Prediction Using Effective Mining Techniques
Pages : 2287-2289
Nirav Shah, Mayank Solanki, Aditya Tambe, Dnyaneshwar Dhangar
Abstract | PDFPDF
69. Protecting Fingerprint Privacy Using Combined Minutiae Template Generation Algorithm
Pages : 2290-2294
Prabhakara Rao T, Gintanjali Sahu
Abstract | PDFPDF
70. Watershed: An Image Segmentation Approach
Pages : 2295-2297
Arindrajit Seal, Arunava Das, Prasad Sen
Abstract | PDFPDF
71. Generating Placement Intelligence in Higher Education Using Data Mining
Pages : 2298-2302
Praveen Rani, Dr. Rajan Vohra
Abstract | PDFPDF
72. Product Sales Prediction Based on Sentiment Analysis Using Twitter Data
Pages : 2303-2313
Dipak Gaikar, Bijith Marakarkandy
Abstract | PDFPDF
73. Offline Handwritten Character Recognition in South Indian Scripts: A Broad Visualization
Pages : 2314-2317
Sunitha Anne M. O. Chacko, Ansu Joseph, Jeena Joji Anchanattu, Sreelakshmi .S , Veena A. Kumar
Abstract | PDFPDF
74. Tourview: Sentiment Based Analysis on Tourist Domain
Pages : 2318-2320
Deepanshi Sharma, Achal Kulshreshtha, Priyanka Paygude
Abstract | PDFPDF
75. Web Usage Mining Approaches for User’s Request Prediction: A Survey
Pages : 2321-2325
Avneet Saluja, Dr. Bhupesh Gour, Lokesh Singh
Abstract | PDFPDF
76. Spam Outlier Detection in High Dimensional Data: Ensemble Subspace Clustering Approach
Pages : 2326-2329
Suresh S. Kapare, Bharat A. Tidke
Abstract | PDFPDF
77. Efficient Productivity For Recommendation Of Semantic Web Pages
Pages : 2330-2334
B.Gayatri Devi, S.Soundarajan
Abstract | PDFPDF
78. A Survey Paper on Video Steganography
Pages : 2335-2338
Kedar Nath Choudry, Aakash Wanjari
Abstract | PDFPDF
79. A Survey on Privacy Preservation Used in Data Mining Techniques
Pages : 2339-2341
Haina Mahilary
Abstract | PDFPDF
80. TRAODV: Trusted and Robust Adhoc On demand Distance Vector Routing in MANET
Pages : 2342-2346
Ravindra J. Mandale, Dadaso T. Mane
Abstract | PDFPDF
81. Auditing Based Cloud Consistency as a Service for PHR data
Pages : 2347-2348
K.Brindha, T.K.P.Rajagopal
Abstract | PDFPDF
82. A Basic Introduction to DevOps Tools
Pages : 2349-2353
Akshaya H L, Nisarga Jagadish S, Vidya J, Veena K
Abstract | PDFPDF
83. A Review of Various Linear and Non Linear Dimensionality Reduction Techniques
Pages : 2354-2360
Sumithra V.S, Subu Surendran
Abstract | PDFPDF
84. Expert Search on Web Using Association Distribution
Pages : 2361-2363
Poonam P. Rayakar, Prof. S Pratap Singh
Abstract | PDFPDF
85. Error Log Analytics using Big Data and MapReduce
Pages : 2364-2367
Laurel Thejas Souza, Girish U R
Abstract | PDFPDF
86. Thwarting Perils through Cloud Provisioning using Security Issues in Vehicular Cloud
Pages : 2368-2372
N. Nijanthan, B.Mohankumar, Dr. P. Marikkannu
Abstract | PDFPDF
87. Review of a Secure Approach to Prevent Packet Dropping and Message Tampering Attacks on

Pages : 2373-2376
Arpana Akash Morey, Jagdish W. Bakal
Abstract | PDFPDF
88. Energy Enhancement and Performance Evaluation of LAEEBA Routing Protocol in WBAN using NS-2
Pages : 2377-2383
Sheth Mahammed Ovesh I., Sarika Khandelwal
Abstract | PDFPDF
89. Design & Implementation of Traffic Violation Monitoring System
Pages : 2384-2386
Govind Prasad Arya , Durga Prasad Chauhan, Vishal Garg
Abstract | PDFPDF
90. Design & Analysis of Authentication of Moving Image Using Message Digest
Pages : 2387-2394
Vijender Kumawat, Palika Jajoo
Abstract | PDFPDF
91. Thyroid Classification using Ensemble Model with Feature Selection
Pages : 2395-2398
Suman Pandey, Anshu Tiwari , Akhilesh Kumar Shrivas and Vivek Sharma
Abstract | PDFPDF
92. A Brief Introduction to Digital Watermarking
Pages : 2399-2401
Ankita Sharma, Sarika khandelwal
Abstract | PDFPDF
93. Stateless Multicast Protocol for Ad- Hoc Networks
Pages : 2402-2405
Trupti Patil, A. A. Phatak
Abstract | PDFPDF
94. Minimum Broadcast Energy Conserving Protocol for Asymmetric WSN
Pages : 2406-2408
Anujatai Patil , A.V. Mophare
Abstract | PDFPDF
95. An Authentication of Secretely Encrypted Message Using Half-Tone Pixel Swapping From Carrier
Stego Image

Pages : 2409-2414
Sneha A. Deshmukh, P.B.Sambhare
Abstract | PDFPDF
96. Performance Analysis of DSDV, DSR Routing Protocols in Vehicular Ad-Hoc Network(Vanets)
Pages : 2415-2418
V.Anji Reddy, P.Siva Prasuna, Rittika.D.Varu, P.Nikhila, N.SriLakshmi
Abstract | PDFPDF
97. Microcontroller Based Mechanised Videographing of Text and Auto-Generation of Voice Text in Real Time
Pages : 2419-2425
P. Nagabhushan , Vimuktha Evangeleen Jathanna
Abstract | PDFPDF
98. A Review paper on Construction of Query Forms
Pages : 2426-2428
Jayashri M.Jambukar, Prof. M.B.Vaidya
Abstract | PDFPDF
99. An Efficient Approach towards Thunderstorm Detection Using Saliency Map
Pages : 2429-2434
Rasika P. Gawande, Prof. Namrata D. Ghuse
Abstract | PDFPDF
100. An Automated System for Signature Recognition and Authentication from Multishare Based Image Database
Pages : 2435-2440
Sharayu S. Sangeka, D.C.Dhanwani
Abstract | PDFPDF
101. User Anonymous Authentication Scheme for Decentralized Access Control in Clouds
Pages : 2441-2447
Pooja R. Vyawhare, Prof.Namrata D. Ghuse
Abstract | PDFPDF
102. Parallel Comparison of Text Document with Input Data Mining and VizSFP
Pages : 2448-2453
Priyanka P. Palsaniya, D. C. Dhanwani
Abstract | PDFPDF
103. Modified Cat Swarm Optimization Algorithm for Design and Optimization of IIR BS Filter
Pages : 2454-2460
Kamalpreet Kaur Dhaliwal, Jaspreet Singh Dhillon
Abstract | PDFPDF
104. Enhancing Firewall for Serving the Distributed Security Requirements for Cloud
Pages : 2461-2466
Yamini Bangur, Vijendra Mandraha
Abstract | PDFPDF
105. Detection of Child Events with the kinetic Components of a Vehicle to Avoid the Hidden Dangers-A Survey
Pages : 2467-2470
Mortha Manasa Devi
Abstract | PDFPDF
106. A Survey on Multiparty Access Control Mechanism of Online Social Networks
Pages : 2471-2474
Sandip Sharad Shirgave, Dr. K. J. Karande,Subhash V. Pingale, Prakash Gadekar, S. S. Kulkarni
Abstract | PDFPDF
107. A Survey on Protection against Power Depletion Attack in WSN
Pages : 2475-2478
Sruthin R.V., Jayasudha J. S.
Abstract | PDFPDF
108. On Replication Strategies for Data Intensive Cloud Applications
Pages : 2479-2484
Rashmi Ranjana T P, Jayalakshmi D S, Dr. Srinivasan R
Abstract | PDFPDF
109. A Review on Prediction of Collective Behavior
Pages : 2485-2487
Pranjali Deshmukh, R.M.Gawande
Abstract | PDFPDF
110. VMAIL: Voice Based Email Application
Pages :2488-2490
Rahul Anwani, Usha Santuramani, Deeksha Raina, Priya R.L
Abstract | PDFPDF
111. Analysis & Design of multiple watermarking in a Video for Authentication & Copyright Protection
Pages : 2491-2497
Yogendra Sharma, Jitender Kumar, Yogesh Rathi
Abstract | PDFPDF
112. Flower Detection and Counting Using Morphological and Segmentation Technique
Pages :2498-2501
Balvant V. Biradar, Santosh P. Shrikhande
Abstract | PDFPDF
113. Predictive Analysis of Diabetic Treatment Using Classification Algorithm
Pages :2502-2505
M.Mounika, S.D.Suganya, B.Vijayashanthi, S.KrishnaAnand
Abstract | PDFPDF
114. Crowdsourcing with Smartphones for Traffic Dissemination
Pages : 2506-2508
Asha K, Nasreen Taj M.B
Abstract | PDFPDF
115. Enhancing Bandwidth in Route Recovery – An Approach Based on Forward and Reverse Path Routing with Hop-Count
Pages : 2509-2511
Apoorva P, Kumar Sharath.B.C, Manu Bhargav.M.R
Abstract | PDFPDF
Pages : 2512-2518
Ajitabh Mahalkari, Prof. Ritu Tondon
Abstract | PDFPDF
117. Proficient acquaintance based system for citrus leaf disease recognition and categorization
Pages : 2519-2524
Abstract | PDFPDF
118. Survey of various POS tagging techniques for Indian regional languages
Pages :2525-2529
Shubhangi Rathod, Sharvari Govilkar
Abstract | PDFPDF
119. A New Approach of Fault Node Recovery in Wireless Sensor Network
Pages : 2530-2533
Vibha Paradkar, Gajendra Singh, Kailash Patidar
Abstract | PDFPDF
120. Analysis of The Fraud E-Mails using Truncated Gaussian Mixture Model and Ontological Application
Pages : 2534-2536
Sreenivasulu. V, Satya Prasad. R
Abstract | PDFPDF
121. Weight-Based-Priority Approach for Analyzing Data Using Traces and Filters
Pages :2537-2540
Mahendra S. Pandit
Abstract | PDFPDF
122. A Survey on IP Address Assignment in a Mobile Ad Hoc Network
Pages :2541-2544
Vibhoo Sachan, Samir Srivastava, P.K.Singh
Abstract | PDFPDF
123. Evolution of Mobile Wireless Technology from 0G to 5G
Pages :2545-2551
Mohammad Meraj ud in Mir , Dr. Sumit Kumar
Abstract | PDFPDF
124. Penetration Testing
Pages :2552-2553
Raghavendra Pokuri, Chanikya Merugu, Naveen Battula
Abstract | PDFPDF
125. Prediction of Cancer Diseases Using Navie Bayes Classification
Pages :2554-2556
Shruthi S, Mithun Mohan, Akshaya Aravind
Abstract | PDFPDF
126. A Research Work on English to Marathi Hybrid Translation System
Pages :2557-2560
Pramod Salunkhe, Mrunal Bewoor, Dr.Suhas Patil
Abstract | PDFPDF
127. Notion of Black Hole in Wireless Networks targeting on iMANET
Pages :2561-2565
Natasha Tomar, Amit Chaudhary
Abstract | PDFPDF
128. Private Preserving Publically Checking for Shared Data in the Cloud Using Oruta
Pages :2566-2569
Ashwini H, Mrutyunjay B, Sangamesh P, Smitha D, Veeresh Biradar
Abstract | PDFPDF
129. Object Scanning based Road Obstacles Detection using Weighted Sum Method
Pages :2570-2573
Neha Chalana, Lovnish Bansal
Abstract | PDFPDF
130. Machine Learning Approach to Detect Tuberculosis in patients with or without HIV co-infection
- A Survey

Pages :2574-2578
Ashwini D.V.and Dr. Seema S.
Abstract | PDFPDF
131. Multi-Level Encryption Mechanism for Access Control Over Cloud Data
Pages :2579-2582
T. Kavitha B. Narendra C. Sushama S. Shiva Prakash
Abstract | PDFPDF
132. Analysis of Pattern Matching Algorithms
Pages :2583-2586
Siva Kumar Kotamraju
Abstract | PDFPDF
Pages :2587-2592
Prinkesh Sharma, Kondorpa Kumar Borchetia, Shivam Saxena
Abstract | PDFPDF
134. Detection of Brain Tumors using Learning Machine Approach and Spatial Fuzzy Segmentation
Pages :2593-2596
G. Lavanya, C. Suganthini
Abstract | PDFPDF
135. Metaheuristic Based Approach to Regression Testing
Pages :2597-2605
Shweta Mittal, Om Prakash Sangwan
Abstract | PDFPDF
136. Implementation of Location based Steganography on mobile Smartphone using Android Platform
Pages :2606-2609
Khushali Pandit, Varsha Bhosale
Abstract | PDFPDF
137. HIDES: Hierarchical based and an Energy Efficient Intrusion Detection System for Wireless Sensor Networks
Pages :2610-2615
B Kamaladharan
Abstract | PDFPDF
138. Data mining and the News Boy Model in B2B E-Commerce Supply Chain
Pages :2616-2619
Minakshi Lalit Patil
Abstract | PDFPDF
139. A Clustering Search Technique for Social Network Applications
Pages :2620-2622
Saurabh Sharma, Aravendra Kumar Sharma, Arun Kumar Sharma
Abstract | PDFPDF
140. Enhancing Data Security and Storage in Cloud Computing Environment
Pages :2623-2626
Shivali Munjal, Shelly Garg
Abstract | PDFPDF
141. Enhanced Security Layer by Using Integration of Sound Signature and Graphical Password Authentication System
Pages :2627-2629
Manasa Bhat, Vanisha P Santhmayor, Mahesh .K
Abstract | PDFPDF
142. Hybrid Security Using Digital Signature & RSA Encryption for AODV in MANET
Pages :2630-2635
Shelbala Solanki, Anand Gadwal
Abstract | PDFPDF
143. Comparitive Study of Uterine Cyst Characterisation Using Glcm and Wavelet Transform
Pages :2636-2640
Brindha D, Kandaswamy A, Subbashini S
Abstract | PDFPDF
144. A Comparative Analysis of M-GEAR and MODLEACH Energy Efficient WSN Protocols
Pages :2641-2644
Neeraj Dewli, Rashmi Saini
Abstract | PDFPDF
145. Image Matcher – Content Based Image Retrieval System Using Image Sub Blocks and Indexing
Pages :2645-2652
D. D. Pukale, Varsha H. Sakore, Nilima K. Shevate,. Nutan D. Pawar, Priyanka N. Shendage
Abstract | PDFPDF
146. Unambiguous Representation for Sliceable Rectangular Floorplans
Pages :2653-2657
Soumya Pratik Saha, Satrajit Ghosh
Abstract | PDFPDF
147. Web Log Analyzer for Semantic Web Mining
Pages :2658-2662
Fakhrun Jamal , Mamta Bansal
Abstract | PDFPDF
148. A Survey of Text Categorization and its Various Approaches
Pages :2663-2666
M. Maharasi, N. Antony Sophia
Abstract | PDFPDF
149. Level of Ubiquity of Various Software Projects
Pages :2667-2670
Anil Kumar Mishra, Diksha Nagpal
Abstract | PDFPDF
150. Data Based-Secure and Efficient Dynamic Clustering (DB-SEDC) for Data Aggregation in Wireless Sensor Network
Pages :2671-2673
Priya M R, Chinnaswamy C N, Sreenivas T H
Abstract | PDFPDF
151. Extension of Preserving Privacy Location in Social Networks
Pages :2674-2677
Ravi Konaraddi
Abstract | PDFPDF
152. Survey on Identity Based Blind Signature
Pages :2678-2681
Girish, Krupa K T, Dr. Phaneendra H D
Abstract | PDFPDF
153. A Survey on Various Word Spotting Techniques for Content Based Document Image Retrieval
Pages :2682-2686
Blessy Varghese, Sharvari Govilkar
Abstract | PDFPDF
154. A Comparative Study of Parallel Job Scheduling Algorithms in Cloud Computing
Pages :2687-2690
A.Kousalya, R.Radhakrishnan
Abstract | PDFPDF
155. An Overview of Concept Based and Advanced Text Clustering Methods
Pages :2691-2697
B.Jyothi, D.Sailaja, Y.Srinivasa Rao
Abstract | PDFPDF
156. A Genetic Algorithm Based Average Percentage of Statement Coverage Technique for Test Case Ordering
Pages :2698-2705
Atul kumar Pal, Makul Mahajan
Abstract | PDFPDF
157. Offline Resource Extractor: An Efficient Resource Extraction System
Pages :2706-2709
Abstract | PDFPDF
158. Enhancing the Semantic of the Business Repository Components for More Efficient Web Services Discovery
Pages :2710-2716
Salim BAROUDI, Mohamed BAHAJ
Abstract | PDFPDF
159. Link Initialization and Training in MAC Layer of PCIe 3.0
Pages :2717-2719
Chandana K N , Karunavathi R K
Abstract | PDFPDF
160. CAPTCHA Problems Based On AI Provide Protection against Automated Hacking Tools
Pages :2720-2723
Priyanka K.Kukade, Prof. Ms. M.S. Deshmukh
Abstract | PDFPDF
161. A Filter Base Addressing Protocol for Node Auto- Configuration in Wireless Ad Hoc Network Using
Cuckoo Filter

Pages :2724-2728
Bhushan A. Badgujar, Swati patil, Mayur Agrawal
Abstract | PDFPDF
162. Registration Plate Recognition from Still Images and Videos in Real Time Conditions
Pages :2729-2734
Glence Joseph, Dr.Tripty Singh, Andan HM, Aravind G
Abstract | PDFPDF
163. Topological Conditions for Maintaining Stabilization of Dynamic System
Pages :2735-2737
Dilip Budhwant, Bhagyashri Bhalekar
Abstract | PDFPDF
164. Driver Evaluation System Using Mobile Phone and OBD-II System
Pages :2738-2745
Sujata Khedkar, Akshaykumar Oswal, Manjari Setty, Srinivas Ravi
Abstract | PDFPDF
165. Research on Cloud Testing Based on Ontology and Multi-Agent Framework
Pages :2746-2749
Afaf Al-Neaimi
Abstract | PDFPDF
166. Cross Domain Composition of Web Service Workflows using a Provenance Ontology with an automated Re-planning
Pages :2750-2753
B.Meenakshi Sundaram, Dr. D. Manimegalai
Abstract | PDFPDF
167. A Hybrid Security Service To Achieve Strong Authentication And Cryptography For Cloud Applications
Pages :2754-2760
Vivek Dandir, Prof. Mohsin Sheikh
Abstract | PDFPDF
168. Self-Navigating Quadcopter
Pages :2761-2765
O Guneshwor Singh
Abstract | PDFPDF
169. Slope Switch Variable Value Prediction using Two Dimensional Curve Fitting for a Limited Data
Mining Set

Pages :2766-2767
Venkatesh Suvarna
Abstract | PDFPDF
170. Displaying Crisis Informing for Auto Collision over Dichotomized Progress Demonstrate in Vehicular Ad-hoc System
Pages :2768-2771
Veena R C
Abstract | PDFPDF
171. On the Advancements in Cloud Computing Technology: An Overview
Pages :2772-2778
Majed Alhaisoni
Abstract | PDFPDF
172. Adaptive Fault Free and Secured Path Selection in Wireless Sensor Networks
Pages :2779-2781
Deepali Virmani, Pranav Gupta
Abstract | PDFPDF
173. Voting Methods For Malware Detection
Pages :2782-2786
Pranit Gaikwad, Dilip Motwani, Vinayak D.Shinde
Abstract | PDFPDF
174. Ensuring Data Security on Cloud
Pages :2787-2790
Jitendra Kumar Seth, Satish Chandra
Abstract | PDFPDF
175. Secured Data Sharing in the Cloud
Pages :2791-2793
Amrut Hunashyal, Chetak Patil, Vilas Balaganur
Abstract | PDFPDF
176. Challenges in Design and development of EEG based BCI: A Review
Pages :2794-2796
Vaishali Kadam, Dr. R. R. Deshmukh
Abstract | PDFPDF
177. An Enhanced Function Point Analysis (FPA) Method for Software Size Estimation
Pages :2797-2799
Nilesh Choursiya, Rashmi Yadav
Abstract | PDFPDF
178. Are you a Human or Robot? or Everything CAPTCHA
Pages :2800-2805
Revati Ghadge, Archana M. Naware
Abstract | PDFPDF
179. Wolf Routing to Detect Vampire Attacks in Wireless Sensor Networks
Pages :2806-2809
Besty Haris
Abstract | PDFPDF
180. BYOD:Usability
Pages :2810-2814
Abha Tewari, Pooja Nagdev,Kiran Israni
Abstract | PDFPDF
181. Assessment of Document Similarity with Clustering Using Multi View-Points
Pages :2815-2818
Sindhudarshini S, Suresh G S
Abstract | PDFPDF
182. Dynamic Environment Exploration Tool: A Blind’s Eye
Pages :2819-2822
Dushyant Kumar Singh
Abstract | PDFPDF
183. Securing Broker-less Publish/Subscribe System using Fuzzy Identity-Based Encryption
Pages :2823-2826
Maithily B, Swathi Y
Abstract | PDFPDF
184. Trustworthy Resource Sharing on Collaborative Cloud Computing
Pages :2827-2830
T. Amith Kumar, G. Priya, N.Jaisankar
Abstract | PDFPDF
185. Effective Personalization of web search based on Fuzzy Information Retrieval
Pages :2831-2837
Suruchi Chawla
Abstract | PDFPDF
186. Data Driven Data Mining Model for Biological Pathways
Pages :2838-2840
N.Sevugapandi and Dr.C.P.Chandran
Abstract | PDFPDF
187. Study and Analysis of Digital Image Enhancement
Pages :2841-2848
Sanjib Das, Niranjan Cannon
Abstract | PDFPDF
188. A Survey of News Article Clustering and Summarization
Pages :2849-2851
Purabi Choudhury
Abstract | PDFPDF
189. Emphasizing Big Data Engineering and Software Architecture on Cloud Computing
Pages :2852-2855
Mohammed Faisal,Tamil Selvi Madeswaran, Sanjay Gupta
Abstract | PDFPDF
190. Bi-Variate Gaussian Mixture Model Based Techniques for Effective Analysis of Cyber Crimes
Pages :2856-2858
V.Sreenivasulu, R. Satya Prasad
Abstract | PDFPDF
191. Collaboration in Multicloud Computing Environments: Framework and Security Issues
Pages :2859-2862
Madivalayya M Hiremath, Annapurna P Patil
Abstract | PDFPDF
192. Finger-Knuckle-Print Based Recognition System using LBP and SURF
Pages :2863-2867
Salil Kumar Verma, Maitreyee Dutta
Abstract | PDFPDF
193. Classification of Unstructured Data using Soft Computing: A Survey
Pages :2868-2870
Swati Wakode, Rakesh Mallesh, Mandar Wagh, Manisha P Mali
Abstract | PDFPDF
194. Big Data Analysis using Partition Technique
Pages :2871-2875
Prasadkumar Kale and Arti Mohanpurkar
Abstract | PDFPDF
195. Single Page Application using AngularJS
Pages :2876-2879
Madhuri A. Jadhav, Balkrishna R. Sawant, Anushree Deshmukh
Abstract | PDFPDF
196. Perspective Identification of Indian Musical Instrument Ghan and Sushir Vadya
Pages :2880-2883
Satish Ramling Sankaye, S.C. Mehrotra, U.S. Tandon
Abstract | PDFPDF
197. Automating the Payment of Toll Tax at Toll Plazas
Pages :2884-2887
Kruti Sanghvi , Prof.Amol Joglekar
Abstract | PDFPDF
198. Collaborative Filtering Approach For Big Data Applications in Social Networks
Pages :2888-2892
Abstract | PDFPDF
199. A Survey on Unsupervised Extraction of Product Information from Semi-Structured Sources
Pages :2893-2897
Abhilasha Bhagat, Vanita Raut
Abstract | PDFPDF
200. A Preventing Privacy Leakage and Discrimination Enabled Vulnerabilities in Data Publishing and Mining
Pages :2898-2901
Pujari.Sasidhar, K.R.K.Satheesh
Abstract | PDFPDF
201. Controlling Air Conditioner (Temperature and Airflow) Using Wireless Sensor Network and iSense Technology
Pages :2902-2906
Karthik SK, Maheshwari Kittur, Suraj M Halakatti and Vineetkumar Patil
Abstract | PDFPDF
202. Classification of Music based on Clave Direction using Machine Learning Techniques
Pages :2907-2909
Sabina M A
Abstract | PDFPDF
203. Application of Data Mining in Adaptive and Intelligent Tutoring Systems: A Review
Pages :2910-2917
Rajitha Koppisetty
Abstract | PDFPDF
204. A Survey Paper on Automatic Speech Recognition by Machine
Pages :2918-2922
Dinesh Kumar Dansena, Yogesh Rathore
Abstract | PDFPDF
205. Real Time Opinion Mining of Twitter Data
Pages :2923-2927
Narahari P Rao, S Nitin Srinivas and Prashanth C M
Abstract | PDFPDF
206. A Review: Data Mining Technique Used In Education Sector
Pages :2928-2930
Johina, Vikas Kamra
Abstract | PDFPDF
207. Application of Image Segmentation Techniques on Medical Reports
Pages :2931-2933
Chandni Panchasara, Amol Joglekar
Abstract | PDFPDF
208. An Approach for Data Integrity Checking and Data Recovery in Cloud Data Storage
Pages :2934-2937
Charmee V. Desai, Prof. Gordhan B. Jethava
Abstract | PDFPDF
209. A Novel Speech Recognition system for Punjabi language: A review
Pages :2938-2940
Harpreet Kaur
Abstract | PDFPDF
210. Zone Based and Morphological Based Feature Extraction Techniques for English Alphabets
Pages :2941-2944
Saleem Pasha, Ajay Kumar, Syed Younus Hussain, Amritansh, Mohammed Shafi Ul Umam
Abstract | PDFPDF
211. Improved Method of Single Image Dehazing based on Multi-Scale Fusion
Pages :2945-2949
Neha Padole, Akhil Khare
Abstract | PDFPDF
212. Implementation of Home Security System using GSM module and Microcontroller
Pages :2950-2953
Abhishek S. Parab, Amol Joglekar
Abstract | PDFPDF
213. Cell Phone Controlled Robot with Fire Detection Sensors
Pages :2954-2958
Lakshay Arora, Prof.Amol Joglekar
Abstract | PDFPDF
214. Use of Hidden Markov’s Model for Handwritten Kannada Character Recognition
Pages :2959-2960
Akshayparvatikar,Veena G.S
Abstract | PDFPDF
215. Denial-Of-Service Attack Detection Technique Derived From Statistical Traffic Analysis
Pages :2961-2964
Sanjivani Sumant, Prof. Sweta Kale
Abstract | PDFPDF
216. An Efficient and Compact Indexing Scheme for Large-Scale Data Store
Pages :2961-2964
Sanjivani Sumant, Prof. Sweta Kale
Abstract | PDFPDF
217. Speech Emotion Recognition by Gaussian Mixture Model
Pages :2969-2971
Reshma, Maninder, Amarbir Singh
Abstract | PDFPDF
218. Simple Application of GlusterFs: Distributed file system for Academics
Pages :2972-2974
Shyam C Deshmukh, Prof.Sudarshan S Deshmukh
Abstract | PDFPDF
219. Enhanced Minimum Utilization VM Selection Mechanism for Clouds
Pages :2975-2977
Versha Lodhi, Prof.SarveshRai, Ganesh Kumar Vishwakarma
Abstract | PDFPDF
220. Enhancement of Face Recognition Rate by Data Base Pre-processing
Pages :2978-2984
Harihara Santosh Dadi, P G Krishna Mohan
Abstract | PDFPDF
221. A New Approach to Control a Robot using Android Phone and Colour Detection Technique
Pages :2985-2989
Saurav Biswas, Umaima Rahman, Asoke Nath
Abstract | PDFPDF
222. 3D Multi Way Feedback Encryption Standard Version II (3dMWFES -II)
Pages :2990-2997
Arijit Ghosh, Prabhakar Chakraborty, Asoke Nath
Abstract | PDFPDF
223. Image Enhancement by Comparing Contrast value in Fuzzy Plane
Pages :2998-3001
Swati Tyagi, Pradeep Jain
Abstract | PDFPDF
224. A Survey on Malware Attacks on Smartphones
Pages :3002-3004
Kireet .M, Dr.Meda Sreenivasa Rao
Abstract | PDFPDF
225. A Review on Privacy Enhanced Participating Sensing Infrastructure Architecture
Pages :3005-3009
Amandeep Kaur, Simarjeet Kaur
Abstract | PDFPDF
226. Role of Distributed Systems in Data Mining
Pages :3010-3013
Mona Shah, Dr. Hiren Joshi
Abstract | PDFPDF
227. Application of Feature Extraction Technique: A Review
Pages :3014-3016
Meenu Sahu, Amit Saxena, Manish Manoria
Abstract | PDFPDF
228. Wireless Multi-Domain Network: A Study of Routing Protocols and Security Enhancements
Pages :3017-3022
Girish Tiwari and Shalini Sharma
Abstract | PDFPDF
229. Classification Rule and Exception Mining Using Nature Inspired Algorithms
Pages :3023-3030
Amarnath Pathak, Jyoti Vashistha
Abstract | PDFPDF
230. Study on Various Clustering Techniques
Pages :3031-3033
Saroj , Tripti Chaudhary
Abstract | PDFPDF
231. A Review on DES, AES and Blowfish for Image Encryption & Decryption
Pages :3034-3036
Aarti Devi, Ankush Sharma, Anamika Rangra
Abstract | PDFPDF
232. Search Based Face Annotation Using Weakly Labeled Facial Images
Pages :3037-3041
Shital Shinde, Archana Chaugule
Abstract | PDFPDF
233. Privacy Preserving Data Mining- An Overview
Pages :3042-3045
Supriya S. Borhade, Dr. S. V. Gumaste
Abstract | PDFPDF
234. Comparing and Contrasting different Approaches of Code Generator(Enum,Map-Like,If-else,Graph)
Pages :3046-3050
Vivek Tripathi, Sandeep kumar Gonnade
Abstract | PDFPDF
235. A New Hybrid Cloud Based Email Security Model Using Image Sequence Authentication, Compression and Cryptography
Pages :3051-3056
Nikita Rathi, Prateek Nahar, Vijay Kumar Verma
Abstract | PDFPDF
236. A Similitude Study on Weighted Pagerank and Enhanced Ratiorank Algorithms Using Visit of Links of a Web Page
Pages :3057-3061
V.Annapoorna, M.V.Kishore
Abstract | PDFPDF
237. An Enhanced Strategy for Efficient Content Based Video Copy Detection
Pages :3062-3066
Sanket Shinde, Girija Chiddarwar
Abstract | PDFPDF
238. A Survey of Digital Audio Watermarking Techniques
Pages :3067-3072
Sakriti Dutt
Abstract | PDFPDF
239. An Efficient Grid Partition based Classification Algorithm for Intrusion in KDDCup 99
Pages :3073-3076
Sonali Rathore, Amit Saxena, Manish Manoria
Abstract | PDFPDF
240. Access Control Model with Multi-Tier Authentication for Mobile Platforms – A Review
Pages :3077-3079
Yashika Sharma, Rekha Bhatia
Abstract | PDFPDF
241. Reducing Transmission Risk Using Diverse Image Media
Pages :3080-3084
Aparna Bhosale, Jyoti Rao
Abstract | PDFPDF
242. An Improved and Efficient Multipath Anonymous Routing in MANET
Pages :3085-3088
B Usha, Premala Patil
Abstract | PDFPDF
243. Cognitive Radio Spectrum Sharing Techniques : A Review
Pages :3089-3091
Mandeep Kaur, Amandeep Kaur
Abstract | PDFPDF
244. Explore Comparative Analysis Software Development Life Cycle Models
Pages :3092-3098
Anshu Mishra
Abstract | PDFPDF
245. Health Monitoring & Real Time Traking System of Remote Soldier
Pages :3099-3103
P. S. Kurhe, C. P. Pawar
Abstract | PDFPDF
246. Diamond Effect in Object Oriented Programming Languages
Pages :3104-3111
Rajesh Jangade, Anil Barnwal, Satyakam Pugla
Abstract | PDFPDF
247. Recommendation for Evaluating Candidates competency for a specific job – A perspective to
Competency Mapping

Pages :3112-3114
Ashwin Perti
Abstract | PDFPDF
248. Development of an Effective Online Bus Pass Generation System for Transportation Service in
Karnataka State

Pages :3115-3118
Parashuram Baraki, Sandhya Kulkarni, Spurthi Kulkarni, Arpita Goggi, Keertipriya I
Abstract | PDFPDF
249. An Overview of Pre-Processing Text Clustering Methods
Pages :3119-3124
D Sailaja, M.V.Kishore, B.Jyothi, N.R.G.K.Prasad
Abstract | PDFPDF
250. An Efficient Dynamic TESLA based Authentication Scheme for Secure network Coding
Pages :3125-3128
Aparna Jumde, Shyamsundar Gupta
Abstract | PDFPDF
251. Review of Classification of project proposal through Ontology Text Mining
Pages :3129-3134
Sunil Datir, Megha singh
Abstract | PDFPDF
252. Verification of AMBA based AXI 4 Slave Interface
Pages :3135-3137
Krithi B, Sudarshan Bhat, Yogesh Panchaksharaiah
Abstract | PDFPDF
253. Client-Side Scheduling For Video-Streaming Using Clouds
Pages :3138-3143
T Venkatesh, Santhana G, Swathi L S, Sushmashree S, Arpitha C
Abstract | PDFPDF
254. Encrypting Contacts in Mobile Cloud using Polyalphabetic Substitution
Pages :3144-3149
Ramandeep Singh Rajpal, Raghvendra Kumar
Abstract | PDFPDF
255. The development of Mobile Application for Gastronomic Tourism in ASEAN
Pages :3150-3155
Pannee Suanpang
Abstract | PDFPDF
256. Comparative evaluation and implementation of various kernel techniques for nonlinear data
classification in support vector machine

Pages :3156-3162
Vivek verma, Ram nivas giri
Abstract | PDFPDF
257. Ensuring Higher Accuracy of Intrusion Detection in Virtual Environment using Counter measure

Pages :3163-3165
Prajakta Godambe , Rohini Pise , Swachchhanda Patil , Shital Ghate
Abstract | PDFPDF
258. An Improved Privacy Policy Inference over the Socially Shared Images with Automated
Annotation Process

Pages :3166-3169
Sangeetha. J, Kavitha. R
Abstract | PDFPDF
259. A Comprehensive Survey on Data Preprocessing Methods in Web Usage Minning
Pages :3170-3174
Sujith Jayaprakash, Balamurugan E.
Abstract | PDFPDF
260. Privacy Preservation using On Demand Computational of Gain using Vertical Partition
Pages :3175-3179
Ankita Jain, Shubha Dubey, Anurag Jain
Abstract | PDFPDF
261. Synchronizing Text Documents using Semantic Similarity for Topic Mining
Pages :3180-3184
Sakshi Jain, Virendra Raghuwanshi, Anurag Jain
Abstract | PDFPDF
262. Improved Apriori Algorithm – A Comparative study using different Objective measures
Pages :3185-3191
Dr. K. Rajeswari
Abstract | PDFPDF
263. Image Encryption and Compression using HAAR and COIFLET Wavelet Transform
Pages :3192-3197
Navita Palta, Neha Sharma
Abstract | PDFPDF
264. Low Power Dynamic CMOS Full-Adder Cell
Pages :3198-3201
Vahid Foroutan and Keivan Navi
Abstract | PDFPDF
265. Classroomwiki: Collaborative learning tool along with content relevancy predictor system
Pages :3202-3205
Vijayalaxmi Hanjage, Poonam Lambhate
Abstract | PDFPDF
266. Speech Recognition using Deep Learning
Pages :3206-3209
Akhilesh Halageri , Amrita Bidappa , Arjun C ,. Madan Mukund Sarathy ,. Shabana Sultana
Abstract | PDFPDF
267. Based on Packet Delivery Performance Review for Route Discovery in Reactive Routing
Protocols (AODV, AOMDV, DSDV)

Pages :3210-3218
K S R Murthy , Dr Samuel VaraPrasad Raju
Abstract | PDFPDF
268. Test Design Automation Tool Development Using VBScript
Pages :3219-3221
Kavya Hanisha G U V
Abstract | PDFPDF
269. VSP-Virtual Smart Phone (First Step to Connect Virtual World)
Pages :3222-3227
Abstract | PDFPDF
270. A Data Mining Approach for secure Cloud using Enhanced Random Forest
Pages :3228-3231
Shikha Pathania, Rajdeep Kaur
Abstract | PDFPDF
271. MANET: Improved Secured Routing For AODV
Pages :3232-3236
Namrata Awasthi, Anurag Jain, Himanshu Yadav
Abstract | PDFPDF
272. Comparative Analysis of Backtrack Search Optimization Algorithm (BSA) with other Evolutionary Algorithms for Global Continuous Optimization
Pages :3237-3241
Shovan Mandal, Rohit Kumar Sinha, Kamal Mittal
Abstract | PDFPDF
273. An Effective Approach to Mine Frequent Sequential Pattern over Uncertain dataset
Pages :3242-3244
Kshiti S Rana, Hiren V Mer
Abstract | PDFPDF
274. A Study Of Moving Object For Color Detection
Pages :3245-3248
D.B.Bhakte, Dr.Anilkumar N.Holambe
Abstract | PDFPDF
275. Facial Expression Recognition Using Neural Network
Pages :3249-3251
Manisha, Dr Jagjit Singh, Dr Neelam R. Prakash
Abstract | PDFPDF
-All rights are reserved by International Journal of Computer Science and Information Technologies-