VOLUME 6 ISSUE 4 July - August 2015

ISSN 0975 - 9646

1. A Survey on Data Security of Cloud Storage Services
Pages : 3252-3255
Gunjal Yogita S.
Abstract | PDFPDF
2. LERP: A Secure Location Based Efficient Routing Protocol
Pages :3256-3260
Rajan Gandhi , Prof Prasanna Joeg
Abstract | PDFPDF
3. An Iterative Random PSO to minimize Total-flowtime in Flowshop Scheduling
Pages : 3261-3265
M. M. Ghumare, L. A. Bawoor, Dr. S. U. Sapkal
Abstract | PDFPDF
4. Web Mining- Concepts and Application
Pages : 3266-3268
S.Vidya, K.Banumathy
Abstract | PDFPDF
5. No Science No Humans, No New Technologies No changes "Big Data a Great Revolution
Pages : 3269-3274
S.Sangeetha, A.K Sreeja
Abstract | PDFPDF
6. Impact of Frequencies on IEEE 802.15.4 WPANs for Wireless Sensor Networks
Pages : 3275-3279
Sukhvinder S Bamber, Gurprem Singh
Abstract | PDFPDF
7. Finger Vein Detection using Repeated Line Tracking, Even Gabor and Multilinear Discriminant Analysis (MDA)
Pages : 3280-3284
Manpreet Kaur, Geetanjali Babbar
Abstract | PDFPDF
8. A Survey on Designing a Framework for Detection and Capturing of Network Attacks in Cloud

Pages : 3285-3287
Mukul Pande, Prof. Sulabha. V. Patil
Abstract | PDFPDF
9. Construction of Software Model Graph and Analysing Object-Oriented Program(C#) Using Abstract Syntax Tree Method
Pages : 3288-3293
Appala Srinuvasu Muttipati, Poosapati Padmaja
Abstract | PDFPDF
10. Comparative Study of Pre-processing Techniques for Classifying Streaming Data
Pages : 3294-3297
Ketan Desale, Roshani Ade
Abstract | PDFPDF
11. A Modified Agent Based AODV Routing Protocol for MANET’s
Pages : 3298-3301
Prakirti Raghuvanshi, Suman Pandey
Abstract | PDFPDF
12. Implementing Pyramid Structure for Generating Efficient Personnelized Recommendations
Pages : 3302-3306
Minakshi Pachpatil, Anjana N.Ghule
Abstract | PDFPDF
13. Simulated Annealing (SA) based Load Balancing Strategy for Cloud Computing
Pages : 3307-3312
Brototi Mondal, Avishek Choudhury
Abstract | PDFPDF
14. Detection of Vampire Attack in Wireless Sensor Networks
Pages : 3313-3317
Deepmala Verma, Gajendra Singh, Kailash Patidar
Abstract | PDFPDF
15. How Use of Technological Devices is related to Students Category: A Review
Pages : 3318-3322
Satinder Kaur, Simmi Bagga
Abstract | PDFPDF
16. Efficient CAD system based on GLCM& derived feature for diagnosing Breast Cancer
Pages : 3323-3327
Rabi Narayan Panda, Mirza Ashad Baig, Dr. Bijay Ketan Panigrahi, Dr. Manas Ranjan Patro
Abstract | PDFPDF
17. Driver Behavior Analysis and Prediction Models: A Survey
Pages : 3328-3333
Mamidi Kiran Kumar, V. Kamakshi Prasad
Abstract | PDFPDF
18. A Review and Evaluations of Real Time Shortest Path according to current traffic on road
Pages : 3334-3337
Disha Gupta, U. Datta
Abstract | PDFPDF
19. Evaluation of Document Clustering Approach based on Particle Swarm Optimization Method for
Twitter Dataset

Pages : 3338-3341
Baljeet Kaur, Sheetal Kundra, Harish Kundra
Abstract | PDFPDF
20. Secure and Efficient Confidential Data Using Multiple Authorities in DTN
Pages : 3342-3344
Ayinavalli Venkata Ramana, Pavithra Urjana
Abstract | PDFPDF
21. Intrusion Detection System on KDDCup99 Dataset: A Survey
Pages : 3345-3348
Sonali Rathore, Amit Saxena, Manish Manoria
Abstract | PDFPDF
22. Optimal Neural Network Based Classifier Using Optical Character Recognition Engine for Tamil

Pages : 3349-3356
Dr.N Venkateswaran, Dr.PS Jagadeesh Kumar
Abstract | PDFPDF
23. Filtering Of Abusive Messages Posted By User on OSN
Pages : 3357-3360
Tata A S K Ishwarya, Dr. H Venkateswara Reddy
Abstract | PDFPDF
24. SVM Based Effective Malware Detection System
Pages : 3361-3365
Smita Ranveer, Swapnaja Hiray
Abstract | PDFPDF
25. IRIS Recognition Using High Level Features
Pages : 3366-3369
C Suresh kumar, Jagadisha N
Abstract | PDFPDF
26. Software Reliability Models: Time between failures and Accuracy estimation
Pages : 3370-3373
Dalbir Kaur, Monika Sharma
Abstract | PDFPDF
27. Performance Analysis of Automated Sequence Model Testing (ASMT) using Cloud Integration
Pages : 3374-3379
Priya Purohit, Mahesh Malviya, Yunus Khan
Abstract | PDFPDF
28. Enhanced Security for Mobile WiMAX through Secured Initial Ranging Process
Pages : 3380-3384
D. Roselin Selvarani, and Dr. T. N. Ravi
Abstract | PDFPDF
Pages : 3385-3387
Manpreet Kaur, Vijay Kumar
Abstract | PDFPDF
30. SELinux Integration into Linux Kernel
Pages : 3388-3391
Vinay Karajagi , Meenakshi Garg
Abstract | PDFPDF
31. A Review of SaaS Profit Maximization in Cloud Computing
Pages : 3392-3395
Richa, Hari Singh
Abstract | PDFPDF
32. A Review of Model Based Slicing
Pages : 3396-3399
Tamanna, Dr. Sukhvir Singh
Abstract | PDFPDF
33. A Qualitative Survey on Position Based Unicast Routing Protocols in Vehicular Ad hoc Networks (VANETs)
Pages : 3400-3404
Sarvesh Kr. Soni, B.P Chaurasia
Abstract | PDFPDF
34. Inherent Error Analysis of Slope Variable with IDW Method
Pages : 3405-3409
Dr.Neeraj Bhargava, Dr. Ritu Bhargava, Prakash Singh Tanwar
Abstract | PDFPDF
35. Framework on Capturing User Search Intention Based on Duplicate Image Detection
Pages : 3410-3413
Ankita K. Jagtap, B. A. Tidke
Abstract | PDFPDF
36. Securing Classified Information: A Six-Step Approach to Data Classification
Pages : 3414-3418
Siti Hazwah Abd Karim, Dr. Zahri Yunos, Mohd Shamir Hashim, Rahayu Azlina Ahmad
Abstract | PDFPDF
37. Recommender System Using Clustering Based On Collaborative Filtering Approach
Pages : 3419-3423
Jyoti Pandey, M. R. Patil
Abstract | PDFPDF
38. A Survey on Nadi Pareeksha for Early Detection of Several Diseases& Computational Models using Nadi Patterns
Pages : 3424-3425
Dhanalaxmi .Gaddam
Abstract | PDFPDF
39. An Efficient & Detailed Digital Image Feature Extraction Method Using K-NN Algorithm and Image Tags
Pages : 3426-3433
Gaurav Mandloi, Prof. Kshitij Pathak
Abstract | PDFPDF
40. Drashti- An Android Reading Aid
Pages : 3434-3437
Vikram Shirol, Abhijit M, Savitri A, Pooja R, Amrutha K
Abstract | PDFPDF
41. User- and Query- Dependent Ranking for Searching Technical Papers
Pages : 3438-3442
Manish R. Jansari, Prof. P. M. Chawan
Abstract | PDFPDF
42. A Review: RSA Algorithm for blurred image and restoration in different blur techniques
Pages : 3443-3446
Kirti Bhadauria, U. Dutta
Abstract | PDFPDF
43. Multi Scale Wavelet Fusion Based Vocal Singer Matching
Pages : 3447-3451
Meenu, Monika Aggarwal
Abstract | PDFPDF
44. Development of a Scalable System for Stealthy P2P Botnet Detection
Pages : 3452-3456
Navya Balla, P.V. Siva Kumar
Abstract | PDFPDF
45. K-Means based General Self-Organized Tree- Based Energy Balancing Routing Protocol for
Wireless Sensor Networks

Pages : 3457-3464
Pardeep Kaur, Vinay Bhardwaj
Abstract | PDFPDF
46. Design Applications ProSIARS as Media Support for Optimize the Simulation Based Learning
Pages : 3465-3468
Slamet Sudaryanto N, Maryani S, Sudaryanto
Abstract | PDFPDF
47. Survey on Pedestrian Detection, Classification and Tracking
Pages : 3469-3474
Rudra Gouda, Jyothi S Nayak
Abstract | PDFPDF
48. Analysis of Low Phase Noise and Low Power CMOS VCO – A Review
Pages : 3475-3478
Shweta Chadha, Risha Sharma
Abstract | PDFPDF
49. Implementation of H.264/MPEG-4 AVC for Compound Image Compression Using Histogram based Block Classification Scheme
Pages : 3479-3488
Dr.PS Jagadeesh kumar, Arif Aziz, Sudipta Sahana, Prasanth Thapliyal
Abstract | PDFPDF
50. POS: Pattern Oriented Scheme for Data Leakage Detection in Content Delivery Networks
Pages : 3489-3495
Rajeswari Mandadi, B.Chandra Mouli, P.Nirupama
Abstract | PDFPDF
51. Genetic Tuning of Fuzzy Inference System for Furnace Temperature Controller
Pages : 3496-3500
Rachana R. Mudholkar, Umesh V. Somnatti
Abstract | PDFPDF
52. Fault Node Prediction Model in Wireless Sensor Networks Using Improved Generic Algorithm
Pages : 3501-3503
Venkata Surya Sarat Kumar Lakamana, S.Jhansi Rani
Abstract | PDFPDF
53. Investigating the Impact of Malicious Node on the Performance of AODV Routing Protocol in

Pages : 3504-3506
P.V.Venkateswara Rao, S. Pallam Shetty
Abstract | PDFPDF
54. A Study of Different Data Encryption Algorithms at Security Level: A Literature Review
Pages : 3475-3478
Alongbar Daimary , Prof. (Dr.) L. P. Saikia
Abstract | PDFPDF
55. Matrix Clock Synchronization in the Distributed Computing Environment
Pages : 3510-3513
Avaneesh Singh, Neelendra Badal
Abstract | PDFPDF
56. Captcha based Password Authentication - A New Security Scheme
Pages : 3514-3522
Monika Chilluru, B. Ravindra Naick, P. Nirupama
Abstract | PDFPDF
57. Fake Review and Brand Spam Detection using J48 Classifier
Pages : 3523-3526
Sushant Kokate, Bharat Tidke
Abstract | PDFPDF
58. A Survey Paper on Wireless Access Protocol
Pages : 3527-3534
Vikash Yadav, Monika Verma, Nisha
Abstract | PDFPDF
59. A Segmentation Based Sequential Pattern Matching for Efficient Video Copy Detection
Pages : 3535-3540
Sanket Shinde, Girija Chiddarwar
Abstract | PDFPDF
60. Analyzing Different Performance Metrics on TCP Varients over Mobile Ad-Hoc Networks
Pages : 3541-3547
Payal Sharma
Abstract | PDFPDF
61. Finding Template Mails from Spam Corpus Using Genetic Algorithm and K-Means Algorithm
Pages : 3548-3551
Liny Varghese, Supriya M.H, K. Poulose Jacob
Abstract | PDFPDF
62. Proposed Methodology of a Hybrid Approach using Particle Swarm Optimization with Linear Crossover to solve Continuous Optimization Problem
Pages : 3552-3555
Dolly Verma, Rashmi Shrivas
Abstract | PDFPDF
63. Novel Intrusion Detection in MANETs based on Trust
Pages :3556-3560
Devendra Singh, S. S. Bedi
Abstract | PDFPDF
64. Detection of Malware on Android based on Application Features
Pages : 3561-3564
Gunjan Kapse, Aruna Gupta
Abstract | PDFPDF
65. Privacy Model for Anonymizing Sensitive Data in Social Network
Pages : 3565-3570
N.Sowndhariya, T.C.R.Jeyarathika, P.Suganya, P.Saranya
Abstract | PDFPDF
66. Communication Amoung Agents Using SACA Architecture
Pages : 3571-3576
Ashwini K, Dr M V Vijayakumar
Abstract | PDFPDF
67. Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
Pages : 3577-3580
T.Vijayalakshmi, N.Suresh
Abstract | PDFPDF
68. Performance Augmentation Of Mobile Devices Using Cloud Computing
Pages : 3581-3587
Monica Gajbhe, Dr. S. R. Sakhare
Abstract | PDFPDF
69. Handling multiple failures in IP Backbone network using LOLS along with AOMDV for detecting and
avoiding wormhole attack

Pages : 3588-3593
Anuja Sanjay Divekar and Pankaj Chandre
Abstract | PDFPDF
70. Trust Aware Recommender Systems: A Survey on Implicit Trust Generation Techniques
Pages : 3594-3599
Swati Gupta, Sushama Nagpal
Abstract | PDFPDF
71. Improving the privacy of web search by Restricting the Adversary by Capturing Series of Queries
Pages : 3600-3603
P.Rajani, K.Ramesh, O.Bhaskar
Abstract | PDFPDF
72. Framework for Providing Security and Energy saving Using Elliptic Curve Cryptography in Wireless Sensor Networks
Pages : 3604-3608
Venkateswarlu Sunkari, S. Kranthi Kumar, Ato Daniel Abebe
Abstract | PDFPDF
73. A Generalized Framework for Public Mobile Device Tracking System using Central Database and Location Based Services
Pages : 3609-3610
Venkatesh Suvarna
Abstract | PDFPDF
74. Customizable Content Based Filtering Method to Filter Texts and Images from Social Network User Wall
Pages : 3611-3614
Mahesh Jadhav, Subhash Pingale, Ravindra Takalikar
Abstract | PDFPDF
75. Person Identification Using Palm Image Fusion Using Hybrid Wavelet Transform with PCA and EHD
Pages : 3615-3618
Bhagyashree S. Sawant, Vaishali L. Kolhe
Abstract | PDFPDF
76. A Score and Cluster Head Based Algorithm for Finding MRC against Link Failures
Pages : 3619-3624
Samiksha Chatare, Ravi Singh Pippal
Abstract | PDFPDF
77. Information Retrieval using Pattern Deploying and Pattern Evolving Method for Text Mining
Pages : 3625-3629
Vishakha D. Bhope, Sachin N. Deshmukh
Abstract | PDFPDF
78. Thermodynamic Availability Analysis: Usage in Quantification of Resilience Modulus, Modulus of
Elasticity and Yield Stress for an Absorber Column System

Pages : 3630-3649
Sirshendu Guha and Sudip Kumar Das
Abstract | PDFPDF
79. An Efficient Multi-Dimensional Data Analysis over Parallel Computing Framework
Pages : 3650-3654
Pramod Patil, Amit Patange
Abstract | PDFPDF
80. Hyperspectral Image Classification through Watershed Segmentation
Pages : 3655-3658
Savita Sabale, Chhaya Jadhav
Abstract | PDFPDF
81. Ensuring Secure Data Communication Cloud Environment
Pages : 3659-3662
Chayashree G
Abstract | PDFPDF
82. Dual Tree Complex Wavelet Cepstral Coefficient– based Bat Classification in Kalakad Mundanthurai
Tiger Reserve.

Pages : 3663-3671
Gladrene Sheena Basil, Juliet Vanitharani, Jayapriya K , Antonysamy A
Abstract | PDFPDF
83. Separable Reversible Data Hiding Using Blowfish Algorithm
Pages : 3672-3676
Rakesh D. Desale, Yogesh S. Patil
Abstract | PDFPDF
84. Sequential Decision Task by Adaptive Reinforcement Learning Method
Pages : 3677-3681
Ankur Verma, Pramod Patil
Abstract | PDFPDF
85. Gene Expression with Pheonotype Classification and Patient Survival Prediction Algorithm
Pages : 3682-3687
T.Shanmugavadivu, Dr. T.Ravichandran
Abstract | PDFPDF
86. Digital Watermarking in Audio Using Least Significant Bit and Discrete Cosine Transform
Pages : 3688-3692
Priyanka Pattanshetti, Prof.Shabda Dongaonkar, Prof. Sharmila Karpe
Abstract | PDFPDF
87. Modelling of Weather Data Using Gaussian Linear Regression
Pages : 3693-3696
Vamsi Krishna G
Abstract | PDFPDF
88. Data Mining Application for Big Data Analysis
Pages : 3697-3700
Bharati Punjabi, Prof. Sonal Honale
Abstract | PDFPDF
89. Efficient Technique for Annonymized Microdata Preservation using Slicing
Pages : 3701-3705
Manjusha S. Mirashe, Prof. Kapil N. Hande
Abstract | PDFPDF
90. Wireless Sensor Networks (WSN)
Pages : 3706-3708
Abstract | PDFPDF
91. A Survey on Efficient and Secure data transmission for MANET
Pages : 3709-3711
Rasika Nerkar, Jagdish Pimple
Abstract | PDFPDF
92. A Note on Quantization using Cuckoo Search using Self Information: A Short Review and an
Application with Real Images

Pages : 3712-3715
Sandeep Kad, Sukhmeet Kaur
Abstract | PDFPDF
93. Recognition of spoken English phrases using visual features extraction and classification
Pages : 3716-3719
Salma Pathan, Archana Ghotkar
Abstract | PDFPDF
94. Target Tracking in Wireless Sensor Network: A Survey
Pages : 3720-3723
Kabita Hazra, B. N. Bhramar Ray
Abstract | PDFPDF
95. Face Recognition Using BBDCT and BPSO For Feature Extraction and Selection
Pages :3724-3727
Vikas Katakdound
Abstract | PDFPDF
96. Result Based on Graphical Password and Biometric Authentication for High Security
Pages : 3728-3732
Rahul Bora, Madhuri Zawar
Abstract | PDFPDF
97. Image Privacy Protection for Online Storage Using Adaptive Security Model
Pages : 3733-3735
Rupinder Kaur, Rekha Bhatia
Abstract | PDFPDF
98. Solving Task Allocation to the Worker Using Genetic Algorithm
Pages : 3736-3741
Jameer. G. Kotwal, Dr. Tanuja S. Dhope
Abstract | PDFPDF
99. Enhancing Text Classification by Stochastic Optimization method and Support Vector Machine
Pages : 3742-3745
Suresh Kumar, Dr. Shivani Goel
Abstract | PDFPDF
100. Green Computing: Driving Economic and Environmental Conditions
Pages : 3746-3748
Saurabh Patodi, Richa Sharma, Aniruddha Solanki
Abstract | PDFPDF
101. Vision Based User Authentication System for Industrial Application
Pages : 3749-3752
Piyush Anjankar, Prof.Shubhangi Borkarr
Abstract | PDFPDF
102. A Comparative Study of Un-optimized and Optimized Video Steganography
Pages : 3753-3757
Ritesh Upadhyay, Y. S. Thakur, Dr. D. K. Sakravdia
Abstract | PDFPDF
103. Energy base route established approach for expansion the network life time in Wireless Mobile
Ad-hoc Network: Survey

Pages : 3758-3762
Neha Sharma, Amit Saxena, Manish Manoria
Abstract | PDFPDF
104. Comparision in cover media under Stegnography Digital media by Hide and Seek Approach
Pages : 3763-3768
Abstract | PDFPDF
105. Web Usage Mining for Comparing User Access Behaviour using Sequential Pattern
Pages : 3769-3773
Amit Dipchandji Kasliwal, Dr. Girish S. Katkar
Abstract | PDFPDF
106. Object Tracking in Video Using Mean Shift Algorithm: A Review
Pages : 3774-3777
Aparna Shivhare and Dr. Vinita Choudhary
Abstract | PDFPDF
107. Intrusion Detection System (IDS) framework for Digital Network
Pages : 3778-3783
Ashish K. Uplenchwar,Tanuja Dhope
Abstract | PDFPDF
108. Analysis of Digital Image Sharing By Diverse Image Media
Pages : 3784-3786
Mayuri Sonkusare, Prof. Nitin Janwe
Abstract | PDFPDF
109. Nearest Duplicate Video Retrieval with Multiple Features using Temporal Correlation
Pages : 3787-3790
Shital Bhirud, Prof. P. S. Desai
Abstract | PDFPDF
110. A Survey on Various Attribute based Public Key Cryptography
Pages : 3791-3794
Pooja Dubey, Amit Saxena, Manish Manoria
Abstract | PDFPDF
111. A Secure & Verifiable Technique for Secure Communication using Elliptic Curve
Pages : 3795-3798
Pooja Dubey, Amit Saxena, Manish Manoria
Abstract | PDFPDF
112. An Enhanced-NQCA Combined Metrics Based Clustering Algorithm for MANETs
Pages : 3799-3805
Anjana Rani Sikdar, Deepak Kumar Xaxa
Abstract | PDFPDF
113. Routing Scheme for Min-Max Energy based Dropping Power Consumption in MANET
Pages : 3806-3811
Neha Sharma, Amit Saxena, Manish Manoria
Abstract | PDFPDF
114. Image Fusion Using Higher Order Singular Value Decomposition
Pages : 3812-3814
Pooja Kohok, Sachin Patil
Abstract | PDFPDF
115. A Survey on Various Image Fusion techniques
Pages : 3815-3819
Priyanka Kaurav, Richa Chouhan, Mohd. Ahmed
Abstract | PDFPDF
116. Secure Broker-less Publish/Subscribe System using ECC
Pages : 3820-3824
Onkar Kasarlewar, Prof. P. S. Desai
Abstract | PDFPDF
117. Content-Based Face Image Retrieval Using Attribute-Enhanced Sparse Codewords
Pages : 3825-3829
Bharti S. Satpute, Archana A. Chaugule
Abstract | PDFPDF
118. The Value of Big Data in Clinical Decision Making
Pages : 3830-3835
Dr. Amit Dang, Dr. Shilpa Mendon
Abstract | PDFPDF
119. A Literature Review on Security Aspects for Fault Tolerance in Networks
Pages : 3836-3843
Kavita Mishra, Prashant Vats
Abstract | PDFPDF
120. Solving N-Queen Problem by Prediction
Pages : 3844-3848
Lijo V. P., Jasmin T. Jose
Abstract | PDFPDF
121. Investigating Contemporary Software Engineering Challenges Involved in Integrating Disparate
Software Systems

Pages : 3849-3854
Nazeen Ansari, Dr. G.T. Thampi
Abstract | PDFPDF
122. Review on SMS Encryption using MNTRU Algorithms on Android
Pages : 3855-3858
Shobha Jha, U. Dutta
Abstract | PDFPDF
123. A Survey on Compression of an Image Using Wavelet Transform
Pages : 3859-3860
K. S. Solanki and Nitu Senani
Abstract | PDFPDF
124. Sky Computing: The Future of cloud computing
Pages : 3861-3864
Abha Tewari, Pooja Nagde, Aarti Sahitya
Abstract | PDFPDF
125. Evaluate Network Security and Measure Performance of Self Healing in 5G
Pages : 3865-3870
Haripriya N , Sangeethalakshmi G
Abstract | PDFPDF
126. A Review on: Iris Recognition
Pages : 3871-3873
Sonia Sangwan, Reena Rani
Abstract | PDFPDF
127. A Survey on Text Filtering in Online Social Networks
Pages : 3874-3876
Shilpa Radhakrishnan
Abstract | PDFPDF
128. A New Approach of Feature Extraction using Genetic Algorithm and Scale-Invariant Feature Transform
Pages :3877-3880
Meenu Sahu, Amit Saxena, Dr. Manish Manoria
Abstract | PDFPDF
129. Algorithms for Duty Cycle Control in Wireless Sensor Networks- A Survey
Pages : 3881-3884
Jyothi T
Abstract | PDFPDF
130. Cloud Computing for Digital Libraries in Universities
Pages : 3885-3889
Dev Ras Pandey, Gauri Shanker Kushwaha
Abstract | PDFPDF
131. EHUI: A Novel Algorithm for Mining High Utility Itemsets
Pages : 3890-3892
Prashant V. Barhate, Prof. S. R. Chaudhari, Prof. P. C. Gill
Abstract | PDFPDF
132. Article Removed
Pages : xxx-xxx
Abstract | PDFPDF
133. Entire Gabor Subspace Approach for Expression Recognition Using Locality Preserving Projection
Pages : 3897-3903
G.P.Hegde, M.Seetha, Nagaratna Hegde
Abstract | PDFPDF
134. An Enhancement of Images Using Recursive Adaptive Gamma Correction
Pages : 3904-3909
Gagandeep Singh, Sarbjeet Singh
Abstract | PDFPDF
135. A Study On Blocking Fake Accounts In Online Social Network
Pages : 3910-3913
T. Vidhya, Dr. R. Mala
Abstract | PDFPDF
136. Cloud Computing Paradigm and Current Trends
Pages : 3914-3918
N.Subha Malar, K.Vasantha Kokilam
Abstract | PDFPDF
137. Side Channel Security with Multiclouds
Pages : 3919-3921
S. M. Bansode
Abstract | PDFPDF
138. An Effective tool for Cloud based E-learning Architecture
Pages : 3922-3924
Dr. N.Vanjulavalli, S.Arumugam, Dr.A.Kovalan
Abstract | PDFPDF
139. A Novel Approach for the Detection of Small Cell Lung Cancer Based on Entropy and PSNR Value
Pages : 3925-3929
Georgy George, Nisha J.S
Abstract | PDFPDF
140. Odd-Even Message Bit Sequence Based Image Steganography
Pages : 3930-3932
Sandeep Singh, Jaspreet Kaur
Abstract | PDFPDF
141. Visualizing Big Data Mining: Challenges, Problems and Opportunities
Pages : 3933-3937
Rakesh Ranjan Kumar, Binita Kumari
Abstract | PDFPDF
142. Sleep Disorder Recognition using Wearable Sensor and Raspberry Pi
Pages : 3938-3942
Vinay Kumar Chandna, Sagar Narang, Yash Bansal
Abstract | PDFPDF
143. Security Enhancement Technique for Defending Wormhole Attacks in Wireless Mesh Networks
Pages : 3943-3948
Virendra Dani, Vijay Birchha
Abstract | PDFPDF
144. To Enhance A-KNN Clustering Algorithm for Improving Software Architecture
Pages : 3949-3954
Ishu, Sandeep Singh
Abstract | PDFPDF
145. Study on Customer’s attitude towards Online firms based on their Service Reputation
Pages : 3955-3960
Manjula Shanbhog, Mayank Singh, Shailendra Mishra
Abstract | PDFPDF
146. A Study on Incremental Association Rule Mining
Pages : 3961-3964
Abstract | PDFPDF
147. Survey on Security Risks in Android OS and an Introduction to Samsung KNOX
Pages : 3965-3967
Maya Krishnan
Abstract | PDFPDF
148. Frequency Partioning Based Image Fusion for CCTV
Pages : 3968-3972
Veerpal Kaur, Jaspreet Kaur
Abstract | PDFPDF
149. Sketch Based Image Retrieval System for the Web - A Survey
Pages : 3973-3979
Neetesh Prajapati, G.S.Prajapti
Abstract | PDFPDF
150. Comparative Analysis of Association Rule Mining Algorithms Based on Performance Survey
Pages : 3980-3985
Abstract | PDFPDF
151. Search Based Face Annotation Using PCA and Unsupervised Label Refinement Algorithms
Pages : 3986-3991
Shital Shinde, Archana Chaugule
Abstract | PDFPDF
152. A Proposed IP Multimedia Subsystem Security Framework for Long Term Evaluation (LTE)

Pages : 3992-3998
Samah Osama M. Kamel, Adly S. Tag El Dein, Nadia H. Hegazi , Hala M.Abd El Kader , Hany M. Harb
Abstract | PDFPDF
153. Web Enabled Employee Performance System
Pages : 3999-4002
R.Shobana & K. P. Mani Anand
Abstract | PDFPDF
154. An Extension To Securedsms: A Protocol For Sms Security
Pages : 4003-4005
Deepthi Sucheendran, Anju S, Arun. R
Abstract | PDFPDF
155. Optimal Replication Strategy Using Rough Set Theory for Dynamic Content Replication
Pages : 4006-4009
Shruthi, Dr. Santosh L Deshpande
Abstract | PDFPDF
156. Achieving efficient Geographic routing via Mobility based forwarding node selection schemes in Mobile Sensor Network
Pages : 4010-4014
Akash Amathe, Dr. Santosh Deshapande
Abstract | PDFPDF
157. Optimization of Terminal Aerodrome Forecast
Pages : 4015-4016
Aditi Sharma, Dr. Mamta Bansal
Abstract | PDFPDF
158. Prevention Of Black Hole Attack Using Improvised Watch Dog Through Data Accumulation
Pages : 4017-4019
K. R. Viswa Jhananie, Dr. C. Chandrasekar
Abstract | PDFPDF
159. Comparative Analysis of Flooding and Gossiping in Wireless Sensor Networks Using SIR
Pages : 4020-4023
Mukta Chandna, Bhawna Singla
Abstract | PDFPDF
160. Finger Vein Recognition Using computational Intelligence Techniques
Pages : 4024-4028
RamaPrabha R, Prof Dr. Vasantha Kalyani David
Abstract | PDFPDF
161. Web Mining: A Survey on Various Annotation Techniques
Pages : 4029-4032
Avnish Rajput, Amit Saxena, Manish Manoria
Abstract | PDFPDF
162. Home Security Using Cloud Service
Pages : 4033-4036
Pradnya S. Gotmare, Anjali Chachra
Abstract | PDFPDF
163. Improvised Genetic Approach for an Effective Resource Allocation in Cloud Infrastructure
Pages : 4037-4046
M. Durairaj, P. Kannan
Abstract | PDFPDF
164. A Survey on Visual Cryptography for Secret Data Sharing
Pages : 4047-4053
M. Durairaj, V. Sutharson
Abstract | PDFPDF
165. An Empirical study on Emotional Influence of Indian Classical Raag Yaman and Darbari on Face
Pages : 4054-4057
Aashish A.Bardekar
Abstract | PDFPDF
166. Analysis of Frequent Item set Mining of Electronic Evidence using FP-Growth based on Map/Reduce
Pages : 4058-4061
Pranavkumar Bhadane, R.V.Patil
Abstract | PDFPDF
167. A Web Based Fuzzy Expert System for Epistaxis Diagnosis
Pages : 4062-4068
Chanchal Sharma, Tejalal Choudhary
Abstract | PDFPDF
168. Finger Vein Image Enhancement Using RPL, Segmentation with Neural Networks
Pages : 4069-4073
Arshdeep Kaur, Abhinav Mishra
Abstract | PDFPDF
169. Decentralized and Vigorous Unidentified Validation Access Control System
Pages : 4074-4077
G.Anusha, R.Sathiyaraj
Abstract | PDFPDF
170. Association Rule Mining for Accident Record Data in Mines
Pages : 4078-4085
Amber Hayat, Khustar Ansari, Praveen
Abstract | PDFPDF
171. Supporting Privacy Protection In Personalized Web Searching and Browsing
Pages : 4086-4093
Manali Wadnerkar, Dr. R. R. Ingle
Abstract | PDFPDF
172. A Survey: Query Optimization
Pages : 4094-4095
Vishal Sharma, Mr. Lovenish Sharma
Abstract | PDFPDF
173. XML Based Non Redundant Distributed Question Bank Generation
Pages : 4096-4101
V.D.V.Naga Lakshmi,CH.Anupama, D.Haritha
Abstract | PDFPDF
174. Techniques to Alleviate Sybil Attack and Security Issues in Wireless Sensor Network
Pages :4102-4105
Sandeep Sindhu, Dr.Suman Sangwan
Abstract | PDFPDF
175. Countermeasures against Timing Attack on AES
Pages :4106-4109
Advait Kelapure, M. M. Chandane
Abstract | PDFPDF
176. Privacy and Security Issues in Cloud
Pages : 4110-4117
Shiv Shankar Barai, Sridhar Mocherla
Abstract | PDFPDF
177. A Secure Ad hoc Wireless Sensor Network For Vampire Attack
Pages :4118-4122
Deepmala Verma, Gajendra Singh, Kailash Patidar
Abstract | PDFPDF
178. Intrusion Detection and Prevention in Homogenous Wireless Sensor Networks
Pages : 4123-4127
Vanita B. Raut
Abstract | PDFPDF
179. Load Balancing of Virtual Machine Using Honey Bee Galvanizing Algorithm in Cloud
Pages : 4128-4132
Monika Rathore, Sarvesh Rai, Navdeep Saluja
Abstract | PDFPDF
180. Review on: Providing Arithmetic Operations on RSA using Homomorphic Technique
Pages : 4133-4135
Shiwali, Namita kakkar
Abstract | PDFPDF
181. Reliable Data Tier Architecture for Job Portal using AWS
Pages : 4136-4140
Manoj Prakash Thalagatti, Chaitra B, Mohammed Asrar Naveed
Abstract | PDFPDF
182. A Big Data Mining – A Review
Pages : 4141-4144
N.Kumar, Dr.T.Christopher
Abstract | PDFPDF
183. Comparative study of various Image De-noising Techniques
Pages : 4145-4147
Karthik, Kamalakshi Naganna
Abstract | PDFPDF
184. A Survey on Mining and Statistical Analysis of Social Website Data using Syntatic Analysis and
Hybrid Classification

Pages :4148-4150
Niranjan C Kundur, Rohitaksha K, Sreenatha M, Abhilash C B
Abstract | PDFPDF
185. Security Enhancements for Finger Print Templates on Minutiae
Pages :4151-4153
Dr G.VenkataRamiReddy, Vidyasree.P
Abstract | PDFPDF
-All rights are reserved by International Journal of Computer Science and Information Technologies-