VOLUME 6 ISSUE 5 September - October 2015

ISSN 0975 - 9646

1. Removal of Hair Particles from Skin Disease Images Using Pixel Based Approach
Pages : 4154-4158
Dr. Poulami Das, Ms. Mayurika Gangopadhyay
Abstract | PDFPDF
2. Predictive Music Shuffling Algorithm
Pages :4159-4162
Prateek Singh, Aditya Batheja, Abhijit Chowdhury
Abstract | PDFPDF
3. Effective Searching of Annotations in Web for Composite Text using SVM
Pages : 4163-4167
Pallavi Dutta, Amit Saxena, Dr. Manish Manoria
Abstract | PDFPDF
4. Average Half Face Feature Detection – An Implementation of Viola Jones
Pages : 4168-4170
Sourabh Arora, Shikha Chawla
Abstract | PDFPDF
5. A Brief Study on Defining Templates to Avoid XSS Vulnerabilities Using Auto Escape Templates
for Web Applications

Pages : 4171-4173
Ch Rajesh, K S V K Srikanth, I S L Sarwani, G Sankara Rao
Abstract | PDFPDF
6. Privacy Preserving Data Mining Using Sanitizing Algorithm
Pages : 4174-4179
R.Hemalatha, M.Elamparithi
Abstract | PDFPDF
7. Detection and Localization of Heart Sound Using Adaptive Learning Technique
Pages : 4180-4185
Sarbjit kaur, Jatinder Kaur
Abstract | PDFPDF
8. Environment Independent Speech Recognition System using MFCC (Mel-frequency cepstral coefficient)
Pages :4186-4190
Kamalpreet kaur, Jatinder Kaur
Abstract | PDFPDF
9. A Study on the Use of Concept Maps in Web Based Learning
Pages : 4191-4200
Anal Acharya, Devadatta Sinha
Abstract | PDFPDF
10. Secure Data Retrieval Using CP-ABE for Decentralized Disruption Tolerant Military Networks
Pages : 4201-4205
C. Rajeshwar Reddy, N.V. Sailaja
Abstract | PDFPDF
11. An Analysis of Multipliers in a New Binary System
Pages : 4206-4211
R.K. Dubey & Anamika Pathak
Abstract | PDFPDF
12. Cloud Adoption Model in Logistics Solutions: Selection Module
Pages : 4212-4215
Shivani Dubey and Sunayana Jain
Abstract | PDFPDF
13. Securing Node Communication in MANET using Certificate Revocation
Pages : 4216-4219
D. Vikram Raj Reddy, M. Gangappa
Abstract | PDFPDF
14. Designing a Framework for Web Testing using Object-oriented Testing Approach
Pages :4220-4227
Nimish Kumar, Reena Dadhich, Aditya Shastri
Abstract | PDFPDF
15. Query Optimization Strategies in Distributed Databases
Pages : 4228-4234
Shyam Padia, Sushant Khulge, Akhilesh Gupta, Parth Khadilikar
Abstract | PDFPDF
16. Improving the Test Quality of Safety Critical Software by using Combined KPSO Mutation Method
Pages : 4235-4240
Dr.S.Preetha, Gangarajam
Abstract | PDFPDF
17. Detecting Cross-Project Clones Using Frequent Pattern Mining
Pages : 4241-4244
Ronica Raj , Vishakha Vinod
Abstract | PDFPDF
18. A Bi-level Security Mechanism with Encryption and User Authentication through Hardware Token
for Cloud Computing Based Web Application

Pages : 4245-4247
Shrinivas Kathale, Shraddha Phansalkar
Abstract | PDFPDF
19. A Novel Approach to Design Confidentiality Encryption Algorithm
Pages : 4248-4250
Shalinee Singh Baghel, Amit Saxen, Manish Manoria
Abstract | PDFPDF
20. Higher Order-Nonlinearities on Two Classes of Boolean Functions
Pages :4251-4256
Manish Garg
Abstract | PDFPDF
21. A Novel approach for Novelty Detection of Web Documents
Pages : 4257-4262
Manvi Breja
Abstract | PDFPDF
22. Finding Bug by using Data Reduced Techniques
Pages : 4263-4265
Amruta Gadekar, Pranjali Taralkar, Nikita Waghmare, Rahul Dapke
Abstract | PDFPDF
23. E-mail Spam Filtering Using Genetic Algorithm: A Deeper Analysis
Pages : 4266-4270
Mandeep Chowdhary , V. S. Dhaka
Abstract | PDFPDF
24. Topology Control and Hop-by-hop Authentication in MANETs with Cooperative Communications
Pages : 4271-4278
Srichandradeep. C, Dr. B. Raveendra Babu
Abstract | PDFPDF
25. A Neural Network Based Efficient Technique for Handwritten Digit Recognition System
Pages : 4279-4280
Pooja Agrawal, Dr. Anand Rajavat
Abstract | PDFPDF
26. Generation of N-party Man-In-Middle Attack for Diffie–Hellman Key Exchange Protocol: A Review
Pages : 4281-4285
Sulochana Devi, Ritu Makani
Abstract | PDFPDF
27. Fault Tolerant Instantaneous Utilization Factor Schedulability of Real Time Tasks
Pages : 4286-4291
Kshama Kulkarni, Radhakrishna Naik, Vaishali Shinde
Abstract | PDFPDF
28. Dynamic Query Evaluation using Proximity Ranking
Pages : 4292-4295
K. Padmaja, B. Prashant
Abstract | PDFPDF
29. Automatic Speech Recognition of Marathi isolated words using Neural Network
Pages : 4296-4298
Kishori R. Ghule, Ratnadeep R. Deshmukh
Abstract | PDFPDF
30. A Novel 4X4 LSB Pixel Substitution Approach for Image Steganography
Pages : 4299-4303
Venkata Giriprasad Ronanki, K Kavitha
Abstract | PDFPDF
31. Knowledge Representation using Fuzzy Ontologies – A Review
Pages : 4304-4308
Nilavu Devadoss, Sivakumar Ramakrishnan
Abstract | PDFPDF
32. A Personalized Recommendation on the Basis of Item Based Algorithm
Pages : 4309-4312
Kishori R. Ghule, Ratnadeep R. Deshmukh
Abstract | PDFPDF
33. Detecting Malfunctioning Nodes in Mobile Ad hoc Networks by using EAACK
Pages : 4313-4317
Dilip Kumar Thumu, R.Vasavi, A. Kousar Nikhath
Abstract | PDFPDF
34. Effective Resource Management for Virtualized Data centers
Pages : 4318-4320
G.Ramakrishna, Dr.A.Mallareddy
Abstract | PDFPDF
35. Approaches of Information and Communication Technologies (ICT) for Building Smart Cities – A Review
Pages : 4321-4326
S. Navitha
Abstract | PDFPDF
36. Content Base Image Retrieval using Combination of Colour, Shape and Texture Features: A Meta-

Pages : 4327-4330
Bhagyashri Amrutka, Lokesh Singh
Abstract | PDFPDF
37. Social Interaction and Self-Organizing Map
Pages : 4331-4338
Arijit Jha
Abstract | PDFPDF
38. A Visual Cryptographic Scheme To Secure Image Shares Using Digital Watermarking
Pages : 4339-4343
Malvika Gupta, Deepti Chauhan
Abstract | PDFPDF
39. Network Management for New Era
Pages : 4344-4349
Dr. R. Prabakaran, J.Palanivel
Abstract | PDFPDF
40. Enhancing the Privacy and Implementation of Access Control Mechanism by Anonymization
Pages : 4350-4352
Barkha Kasab, Prof. Vinayak Pottigar, Prof. Swapnaja Ubale
Abstract | PDFPDF
41. Customizing Moodle to Facilitate Integration with Other Platforms
Pages : 4353-4356
Madhupriya R
Abstract | PDFPDF
42. Dynamic Resource Scheduling In Cloud Computing Using Genetic Algorithm: A Survey
Pages : 4357-4360
Manjunatha Swamy C, Anil Kumar B H, Kiran B
Abstract | PDFPDF
43. Battery Optimization of Android OS
Pages : 4361-4363
Alex Chirayath, Alfred Gonsalves, Chinmayi Kulkarni, Mahendra Mehra
Abstract | PDFPDF
44. Clustering Amelioration and Optimization with Swarm Intelligence for Color Image Segmentation
Pages : 4364-4370
Kiranpreet, Prince Verma
Abstract | PDFPDF
45. Lung Cancer Survival Modelling using AdaptiveNeuro-fuzzy Inference System
Pages : 4371-4374
Plachikkad.A. Rehana Bhadhrika, Sri Kunjam Nageswara Rao
Abstract | PDFPDF
46. Artificial Neural Network Based Decision on Parameter Values in AODV to Enhance the Performance of Mobile Ad Hoc Networks
Pages : 4375-4377
K.Narasimha Raju, Dr.S.P.Setty
Abstract | PDFPDF
47. A Survey of Cloud Based Mobile Secure Data Storage Application
Pages : 4378-4380
Swati Sharma, Ravindra Sharma
Abstract | PDFPDF
48. Cotton Crop Discrimination Using Landsat-8 Data
Pages : 4381-4384
Sandip A. Kharat, Vijaya B. Musande
Abstract | PDFPDF
49. Prediction of Psychological Disorder using ANN
Pages : 4385-4389
Purva D. Kekatpure, Prof. Rekha S. Sugandhi
Abstract | PDFPDF
50. Real-Time Health Monitoring System for Remote Places
Pages : 4390-4391
Nithi Pillai,Madhura Kakade,Shreyas Bhimale,Mahesh Bagde
Abstract | PDFPDF
51. Automated Intelligent Surveillance using Human Behavior Analysis in Shopping Malls
Pages : 4392-4396
P.kamala, Ranjini RS, Manjula.P
Abstract | PDFPDF
52. Detecting Attacks in Wireless Sensor Network through Bloom Filtering
Pages : 4397-4399
Rupali Adhau, Ashwini Ambekar, Abhishek Drakshe, Rajat Thorave
Abstract | PDFPDF
53. Exploring the Power of Cloud Computing Over Grid Computing
Pages : 4400-4403
Anil Barnwal, Satyakam Pugla, Rajesh Jangade
Abstract | PDFPDF
54. Detection and Prevention of Black Hole Attack with Modified DRI Table in Mobile Network
Pages : 4404-4408
Aakanksha Choubey, Neelam Peters
Abstract | PDFPDF
55. String Transformation Using Top K Pruning Algorithm
Pages : 4409-4411
Swapnali S. Maske, Prashant Jawalkar
Abstract | PDFPDF
56. From Moore’s Law to Amdahl’s Law: The Pursuitof Computer Performance
Pages : 4412-4416
Chakib Chraibi
Abstract | PDFPDF
57. Efficient Flooding using Zonal Concept of LAR Protocol on AODV in MANETs
Pages : 4417-4420
Vishal Gupta, Dr. Rajneesh Gujral
Abstract | PDFPDF
58. Performance And Result Analysis Of Hybrid Adaptive Random Partition Testing For Improved Bug Detection and Test Coverage
Pages : 4421-4428
Reetika Patidar,Mahesh Malviya
Abstract | PDFPDF
59. Anomaly Detection in Network using Genetic Algorithm and Support Vector Machine
Pages : 4429-4433
Prashansa Chouhan and Dr.Vineet Richhariya
Abstract | PDFPDF
60. Security on Cloud Using Mass Storage Device for Authentication
Pages : 4434-4437
SnehaNaik, Pranay Chauhan
Abstract | PDFPDF
61. A Review on Cloud Server Optimization Using Orthogonal Recursive Bisection Technique for Cloud Migration
Pages : 4438-4439
Kamalpreet Kaur and Vanita Rani
Abstract | PDFPDF
62. Application of Educational Data mining techniques in e-Learning- A Case Study
Pages : 4440-4443
S. Lakshmi Prabha Dr.A.R.Mohamed Shanavas
Abstract | PDFPDF
63. Ternary Based Web Crawler For Optimized Search Results
Pages : 4444-4449
Abhilasha Bhagat, Vanita Raut
Abstract | PDFPDF
64. Comprehensive Analysis of Dynamic Routing Protocols in Computer Networks
Pages : 4450-4455
Priya Asher
Abstract | PDFPDF
65. Analysis on Employment of Wireless Sensor Networks
Pages : 4456-4458
Sundar Kumar. S, Bharathi. B
Abstract | PDFPDF
66. Comparative Study of Subspace Clustering Algorithms
Pages : 4459-4464
S.Chitra Nayagam
Abstract | PDFPDF
67. Texture Synthesis – A Comparative Study
Pages : 4465-4468
Abstract | PDFPDF
68. ATM Card and Safety Chip: Embedded in Human Preventing ATM from Hackers and Frauds
Pages : 4469-4474
Deepa Malviya
Abstract | PDFPDF
69. Mining Annotated Search Results From Web Databases
Pages : 4475-4478
Thushara K P, Varsha Philip
Abstract | PDFPDF
70. Secure Multi-Cloud data sharing using Key Aggregate Cryptosystem for scalable data sharing
Pages : 4479-4482
Suhas Bachhav, Chetan Chaudhari, Nikhilesh Shinde, Poonam Kaloge
Abstract | PDFPDF
71. OCMM Based clustering in Research as well as Reviewers & Optimal Allocation of Proposals to Experts by Ontology Matching
Pages : 4483-4489
T.Sahaya Arthi Jeno, D.Jim Solomon Raja
Abstract | PDFPDF
72. A Novel Secured Data Exchange Mechanism For sensor nodes used in military networks using minimal keys
Pages : 4490-4495
Abstract | PDFPDF
73. An Efficient Schema Free Keyword Search Approach Over Linked Data using Lucene
Indexing Algorithm

Pages : 4496-4500
Tejashree R. Shinde, Sanchika A. Bajpai
Abstract | PDFPDF
74. Performance Analysis of Reactive and Hybrid Routing Protocols in Ad Hoc Networks
Pages : 4501-4506
Pooja Mangla, Rajneesh Gujral, Manpreet Singh
Abstract | PDFPDF
75. Providing Authentication by Using Biometric Multimodal Framework for Cloud Computing
Pages : 4507-4511
R. Parimala, C. Jayakumar
Abstract | PDFPDF
76. Fusion of CT and MRI Images Based on Fuzzy Logic and Discrete Wavelet Transform
Pages : 4512-4519
Myna A N, J Prakash
Abstract | PDFPDF
77. Integrated Particle Swarm Optimization and Genetic Algorithm Based Compression for
Reduction of Blocking Artifacts

Pages : 4520-4527
Prabhjeet kaur, Parminder Singh
Abstract | PDFPDF
78. Interpretation of Tamil Script using Optical Character Recognition in Android
Pages : 4528-4530
Arun Srivatsa.R , Shriya.P , Adithya Srinivasan
Abstract | PDFPDF
79. Implementation of Classification Algorithms to Predict Mode of Delivery
Pages : 4531-4534
Alisha Kamat, Veenal Oswal, Manalee Datar
Abstract | PDFPDF
80. An Admirable Client-Side Result Evaluation of Location Queries
Pages : 4535-4537
J.Munikishore Reddy, M.Kirankumar
Abstract | PDFPDF
81. Efficient Discovery of Community and Enhanced Privacy Technique in Multidimensional Network
Pages : 4538-4541
G.Soundarya, M.Kirankumar
Abstract | PDFPDF
82. E-Government: Study of Factors significantly affects Adoption and Acceptance in State of Punjab
Pages : 4542-4548
Prof. Manjot Kaur, Dr. Amitoj Singh
Abstract | PDFPDF
83. Finger Vein Enhancement Using Segmentation and SVM
Pages : 4549-4554
Kirandeep Kaur, Shashi Bhushan
Abstract | PDFPDF
84. A Survey on Automation System by Enabling Wireless Devices and Sensors
Pages : 4555-4558
Akshay Jaitpal, Pavan Kodihal, Pratik Gothiwadekar, Sharmila A.Chopade
Abstract | PDFPDF
85. An Analysis of Robust Exemplar-Based Inpainting Algorithm Using Region Segmentation and Block Computation
Pages : 4559-4562
Yogesh Laxman Tonape, Vinayak Pottigar, Swapnaja Ubale
Abstract | PDFPDF
86. RTSP Based Video Surveillance System Using IP Camera for Human Detection in OpenCV
Pages : 4563-4567
K. Bapayya, K. Sujitha,SD. Akthar Basha
Abstract | PDFPDF
87. Security and Privacy Issues in Trusted Cloud Computing Secure Architecture
Pages : 4568-4570
Shalini Agarwal , Arun Singh Chouhan
Abstract | PDFPDF
88. Firewall Design Techniques and its Development in Linux System
Pages : 4571-4574
Vinit A. Sinha
Abstract | PDFPDF
89. A Novel Secured Data Exchange Mechanism by using Captcha images
Pages : 4575-4581
Abstract | PDFPDF
90. Performance Analysis Of Ontology Processing System Using Information Filter and Knowledge Repository for Semantic Web
Pages : 4582-4586
Sudha J Vishwakarma
Abstract | PDFPDF
91. A Survey of various routing protocols in MANETs
Pages : 4587-4592
Rajesh Yadav, Dr. Srinivasa Rao
Abstract | PDFPDF
92. Data Recovery in Cloud Environment Using Seed Block Algorithm
Pages : 4593-4598
Vedashree N, Praveen Kumar KC, Anilkumar G
Abstract | PDFPDF
93. Survey of Quality of Services to Improved Performance of Routing in MANET
Pages : 4599-4604
Dr. Vikash Kumar Singh, Devendra Singh Kushwaha, Raju Sujane, Manish Taram
Abstract | PDFPDF
94. Article Removed
Pages : 4605-4610
Abstract | PDFPDF
95. A Survey on Software Data Reduction Techniques for Effective Bug Triage
Pages : 4611-4612
Ashwini Jadhav, Komal Jadhav, Anuja Bhalerao, Amol Kharade
Abstract | PDFPDF
96. A Survey on Intrusion Detection in MANET through AODV
Pages : 4613-4615
Divya Patidar, Jigyasu Dubey
Abstract | PDFPDF
97. Biometric System- A Review
Pages : 4616-4619
Abhilash Kumar Sharma, Ashish Raghuwanshi, Vijay Kumar Sharma
Abstract | PDFPDF
98. VM Consolidation Technique for Green Cloud Computing
Pages : 4620-4624
Priyanka Nema, Sapna Choudhary, Tripti Nema
Abstract | PDFPDF
99. An Effective Method for Detecting Double JPEG Image by Using an Effective Classifier -Review
Pages : 4625-4628
Athira Abraham, Muhammed Nizar B K
Abstract | PDFPDF
100. Applications of Big data in Various Fields
Pages : 4629-4632
Kuchipudi Sravanthi, Tatireddy Subba Reddy
Abstract | PDFPDF
101. Big Data: Technologies, Trends and Applications
Pages : 4633-4639
Sudhakar Singh, Pankaj Singh, Rakhi Garg, P K Mishra
Abstract | PDFPDF
102. A Comprehensive Study on Mobile Cloud Computing (MCC) & It’s Internals
Pages : 4640-4645
Saania Sayed, Jovi D’Silva
Abstract | PDFPDF
103. Video Steganography by Intermediate Significant Bitplanes
Pages : 4646-4650
Praneetha S.R
Abstract | PDFPDF
104. A New owner ship Control System on germination of Data Stored in Cloud
Pages : 4651-4654
B.Trinadh, M.Kalyan Ram
Abstract | PDFPDF
105. SMS Encryption
Pages : 4655-4659
Rashmi P. Sarode, Neeraj Manglani
Abstract | PDFPDF
106. New Approach of Scheduling Algorithms in Linux Operating System with Goodness Function
Pages : 4660-4662
G.Keerthi, R.China Appala Naidu
Abstract | PDFPDF
107. A Survey of Data Mining Applications and Techniques
Pages : 4663-4666
Samiddha Mukherjee, Ravi Shaw, Nilanjan Haldar, Satyasaran Changdar
Abstract | PDFPDF
108. Data Mining: The Massive Data Set
Pages : 4667-4671
Saurabh Patodi, Mini Jain, Teena Negi
Abstract | PDFPDF
109. Factors Effecting the Usage of Public Transport Multinomial Logit Model
Pages : 4672-4675
Abstract | PDFPDF
110. Implementation of Energy-Efficient Resource Allocation for OFDM-Based Cognitive Radio Networks
Pages : 4676-4681
Anna Kumar.G, Kishore Kumar.M, Anjani Suputri Devi.D
Abstract | PDFPDF
111. A Hierarchical Tree Based Online Web Portal
Pages : 4682-4684
Pooja Sabnani, Vivek Bajpai
Abstract | PDFPDF
112. A Competent Target Tracking Procedure in Wireless Sensor Networks
Pages : 4685-4688
Sagarika Sethy, Chinmaya Kumar Nayak, Manoranjan Pradhan, Satyabrata Das
Abstract | PDFPDF
113. Virtual Subjective Examination on Tablets
Pages : 4689-4691
Namrata Parekh, Kalpesh Dusane,Shivam Thakur, Amoli Sonawane
Abstract | PDFPDF
114. Article Removed
Pages : xxx-xxx
Abstract | PDFPDF
115. Analysis the impact of E-governance Services in Rural Areas of Mansa District-Punjab
Pages : 4696-4698
Resham Dhillon, Dr Vijay Laxmi
Abstract | PDFPDF
116. TD-ZRP: Trigger Driven Zero Remnance Proof Technique for Self Data Removal in Web Services
Pages : 4699-4704
Pooja Bhavsar, Rakesh kumar Lodhi
Abstract | PDFPDF
117. Localization of SMS on Mobile Phones
Pages : 4705-4708
Kavita Agrawal, Arvind Kumar Chaubey, V.M.Ruth
Abstract | PDFPDF
118. Supporting privacy Preserved in personalized web search Engine
Pages : 4709-4711
Mahesh Holkar, Kunal Patil, Khemraj Kakade, Ajay Pakhale
Abstract | PDFPDF
119. Secure and Fast Adaptive Mobile Video Streaming and Sharing in Wireless Mobile Network
Pages : 4712-4717
Nisha Bhaskar Patil, Amol D. Potgantwar
Abstract | PDFPDF
120. Improving Model Based Testing Using Event Consideration For Various Designs Concepts
Pages : 4718-4723
Nidhi Pare, Prof. Piyush Soni
Abstract | PDFPDF
121. MulticastOpportunisticRoutingProtocol “TOMR” Based on Trust and Link Quality Matrix for
Wireless Networks

Pages : 4724-4729
Sanafarin Salim Mulla, J.A.Shaikh
Abstract | PDFPDF
122. JPEG Steganography based on uniform embedding and Syndrome trellis codes
Pages : 4730-4735
Aasemuddin Quazi, Prof. A.K. Gulve
Abstract | PDFPDF
123. An Approach for Hybrid Cluster Based Feature Selection on High Dimensional Data
Pages : 4736-4739
P. Ramasita, S. Rama Sree
Abstract | PDFPDF
124. Parallel Implementation of Fuzzy Clustering Algorithm Based on MapReduce Computing Model of Hadoop –A Detailed Survey
Pages : 4740-4744
Jerril Mathson Mathew, Lekshmy P Chandran
Abstract | PDFPDF
125. Enhancing the Capacity of Steganography Using Reversible Texture Synthesis with Edge Adaptive and Tree-Based Parity Check (TBPC) Methods -A Detailed Survey
Pages : 4745-4747
Reenu Mariam Cherian, Sanoj R
Abstract | PDFPDF
126. Enhancing the Performance of AODV in MANETs using Fuzzy logic
Pages : 4748-4750
V.V.S.Prasanthi, Dr.S.Pallam Setty
Abstract | PDFPDF
127. Enhanced Adaptive Weighted Mean Filter With Non-Local Means To Denoise Image Corrupted By Salt And Pepper Noise
Pages : 4751-4752
Sukina K, Reshna T
Abstract | PDFPDF
128. Code Optimization using Code Purifier
Pages : 4753-4757
Neeta Malviya, Dr. Ajay Khunteta
Abstract | PDFPDF
129. Learning Liveness Detection and Classification of Iris Images: A Detailed Survey
Pages : 4758-4761
John Joy, Rekha K S
Abstract | PDFPDF
130. Embedding Audio Message in Images Using Integer Wavelet Transform-A Detailed Survey
Pages : 4762-4764
Julie Antony K, Sanoj R
Abstract | PDFPDF
131. An Analysis on Web Usage Mining For Internet Users
Pages : 4765-4767
Priyanka Sharma, Sumayya Khan, Shilpa Singh,Pooja Tiwari
Abstract | PDFPDF
132. Time Efficient Neighbor Discovery Protocol for Wireless Sensor Networks with Multipacket

Pages : 4768-4769
S.Arun Showry , K.Surendra
Abstract | PDFPDF
133. A Survey for detecting Acute Lymphoblastic Leukaemia using Image Processing Techniques
Pages : 4770-4773
K.Dhana Shree, M.Saranya, G.Poorani, Dr.A.Grace Selvarani
Abstract | PDFPDF
134. Integrated Color Image Fusion Using Joint Trilateral Filter and IBLPCA
Pages : 4774-4781
Pavneet Kaur, Er. Rajesh Sharma
Abstract | PDFPDF
135. Graduate Prediction Using Ontology Approach
Pages : 4782-4784
Tirth Mehta, Tanmay Kshirsagar, Azeem Merchant, Professor Sindhu Nair
Abstract | PDFPDF
136. Use of ID3 Decision Tree Algorithm for Placement Prediction
Pages : 4785-4789
Hitarthi Bhatt, Shraddha Mehta, Lynette R. D'mello
Abstract | PDFPDF
137. Bridging the Semantic Gap
Pages : 4790-4794
Tanveer J. Siddiqui
Abstract | PDFPDF
138. Filtering and Classification Of User Based On Social Media Data Using Memetic and Naive
Bayes Methods

Pages : 4795-4798
Gauri Joshi, Samadhan Sonawane
Abstract | PDFPDF
139. Application of Deep Belief Networks for Image Compression
Pages : 4799-4803
Venkatesh Lokare, Saurabh Birari, Omkar Patil
Abstract | PDFPDF
140. An Efficient Frequent Pattern Mining using Boolean Matrix and Transaction Reduction Technique
Pages : 4804-4806
S.Tejaswi, D.Suresh Kumar, Ch.Sita Kameswari
Abstract | PDFPDF
141. An Efficient Data Sharing in Public Cloud using two way Authentication & Encryption
Pages : 4807-4811
Roshni Sharma, Amit Saxena, Dr. Manish Manoria
Abstract | PDFPDF
142. Security Enhanced Adaptive Acknowledgment Intrusion Detection System
Pages : 4812-4817
Pawar Priyanka, Hashmi S.A.
Abstract | PDFPDF
143. MapReduce Based Frequent Itemset Mining for Improved Electronic Evidence Analysis Using

Pages : 4818-4821
Mayuresh Sonawane, Navnath Borade, Manoj Jadhav, Vikas Mandal, Prof. A. S. Chandgude
Abstract | PDFPDF
144. Survey on Content Based Image Retrieval Techniques
Pages : 4822-4824
Lalit Agrowal, Prof. Anil Patidar
Abstract | PDFPDF
145. Comparative Analysis of Various Classifiers for Performance Improvement in Intrusion Detection
System by Reducing the False Positives

Pages : 4825-4828
Vivek P.Kshirsagar, Dr.Madhuri Joshi
Abstract | PDFPDF
146. Comparative Analysis of Classifiers for Brain Tumour Detection Using Metabolites from Magnetic Resonance Spectroscopy Graph
Pages : 4829-4832
Meghana Nagori, Dr. Madhuri Joshi
Abstract | PDFPDF
147. Analysis of MFCC & Multitaper MFCC Feature Extraction for Speaker Verification
Pages : 4833-4836
Rupali G Shintri, Asst.Prof S.K.Bhatia
Abstract | PDFPDF
148. Comparison of Different Web Personalization Mechanisms
Pages : 4837-4839
Enam Shah, Hitarth Shah, Khushali Deulkar
Abstract | PDFPDF
149. Providing Arithmetic Operations on RSA Using Homomorphic Technique
Pages : 4840-4846
Shiwali, Namita kakkar
Abstract | PDFPDF
150. The Forensic Process Analysis of Mobile Device
Pages : 4847-4850
Dasari Manendra Sai, Nandagiri R G K Prasad, Satish Dekka
Abstract | PDFPDF
-All rights are reserved by International Journal of Computer Science and Information Technologies-