• Up Coming Issue >
  • Up-Coming Conference
  • Conference Papers
  • Indexing
  • Peer-Review
  • Publication Ethics
  • Contact
  • FAQ
  • Terms&Conditions
  • Site Map
  • bh

     

    VOLUME 6 ISSUE 6 November - December 2015

    ISSN 0975 - 9646

    1. Review of Shape and Texture Feature Extraction Techniques for Fruits
    Pages : 4851-4854
    Drashti Jasani, Paras Patel, Snehal Patel, Bindiya Ahir, Khushbu Patel, Mitali Dixit
    Abstract | PDFPDF
    2. Application of Data Mining Techniques in Higher Education (With Special Reference to Improving
    the Quality)

    Pages :4855-4859
    Amit Agnihitri, Bharat Mishra
    Abstract | PDFPDF
    3. Encoding N-party Man-In-Middle Attack for Diffie–Hellman Algorithm in a Client-Server Paradigm
    Pages : 4860-4865
    Sulochana Devi, Ritu Makani
    Abstract | PDFPDF
    4. Improving Performance in Keyword Search by Supporting Search as-you-type
    Pages : 4866-4873
    Datta M. Ningole, Vijay B. Patil
    Abstract | PDFPDF
    5. Energy Efficiency in Wireless Sensor Networks Using Packet Splitting Technique
    Pages : 4874-4877
    J. Anton Bose
    Abstract | PDFPDF
    6. Algorithm for Ranking Consumer Reviews on E-commerce Websites
    Pages : 4878-4881
    Rajat Sharma, Gautam Nagpal, Amit Kanwar
    Abstract | PDFPDF
    7. Effect of Image Quality Improvement on the Leaf Image Classification Accuracy
    Pages : 4882-4887
    Arun Kumar, Vinod Patidar, Deepak Khazanchi, Poonam Saini
    Abstract | PDFPDF
    8. A Review on Multi-Agent Data Mining Systems
    Pages :4888-4893
    Siddhant Patil, Sayali Karnik , Vinaya Sawant
    Abstract | PDFPDF
    9. A Wireless Scheme to Establish a Communication between One Disable with Multiple Disables: A
    Survey

    Pages : 4894-4897
    Vaishnavi Kokate, Chandratre Ruchika, Khairnar Himanshu, Kamble Archana
    Abstract | PDFPDF
    10. Cloud –Based Energy Efficient Offloading Transcoding Service Policy
    Pages :4898-4900
    Vaishali Y. Baviskar, Snehal Mandlik, Supriya Patil,Pallavi Sinha,Pooja Gopale
    Abstract | PDFPDF
    11. Quadrants Dynamic Histogram Equlization Based Contrast Enhancement with Median Filtering
    Pages :4901-4903
    Roshni Reghunathan K, Jayasree M
    Abstract | PDFPDF
    12. Survey of Detection of Sinkhole Attack in Wireless Sensor Network
    Pages :4904-4909
    Kesav Unnithan S L, Lakshmi Devi C , Sreekuttan Unnithan C
    Abstract | PDFPDF
    13. IEAACK-Secure Detection System for Packet- Dropping attack in MANETs
    Pages :4910-4913
    Preeti Sharanvijay. Chikkshetty, Abhijit. V. Mophare
    Abstract | PDFPDF
    14. Easy V-Mail A Simplified Mailing Application
    Pages :4914-4916
    Apoorva D. Shetty, Juhi D. Gala, Hiloni S. Punatar, Kriti Srivastava
    Abstract | PDFPDF
    15. Secured Data Transmission in Sensor Devices Using Minimal Keys
    Pages :4917-4920
    Satish Dekka, Nandagiri R. G. K. Prasad
    Abstract | PDFPDF
    16. Design and Implementation of Pseudo Random Number Generator in FPGA & CMOS VLSI
    Pages :4921-4924
    Chandra Sekhar.K, Unitha.Pailu, Aradada.Sirisha
    Abstract | PDFPDF
    17. A Solutions Provided to Secured Your Online Banking Frauds
    Pages :4925-4928
    Komal Saxena , Dr. Anurag Awasthi
    Abstract | PDFPDF
    18. Alternating Current Coefficients in DCT Based Image Fusion with Saturation Weighting
    Pages :4929-4935
    Harkamal Preet Kaur, Sunny Dhawan
    Abstract | PDFPDF
    19. Precheck Algorithm with Success Rate Table in Handshake for Detecting and Removing Gray and
    Black Hole Attack in MANET

    Pages :4936-4940
    K. R. Viswa Jhananie, Dr. C. Chandrasekar
    Abstract | PDFPDF
    20. Efficient Topic Evolution Discovery in a Corpus using Semantic Similarity and Citation Graph
    Pages :4941-4951
    Vijay Subramanya, Saiprashanth Kote, Santosh Kumar, P. Santhi Thilagam
    Abstract | PDFPDF
    21. Security Issues Associated With Big Data in Cloud Computing
    Pages :4952-4956
    K.Shanmugapriya, M.Murugeswari, K.Suriya
    Abstract | PDFPDF
    22. Proposed E-payment System using Biometrics
    Pages :4957-4960
    Vishal Vishwas Jadhav, Rahul Ratnakar Patil, Rohit Chandrashekar Jadhav,Adwait Niranjan Magikar
    Abstract | PDFPDF
    23. Avoidance of Power Draining in Mobile Ad-HOC Network over Vampire Attack
    Pages :4961-4964
    Anamika Garg, Mayank K Sharma
    Abstract | PDFPDF
    24. Image Capturing using Blink Detection
    Pages :4965-4968
    Keval Lakhani, Aunsh Chaudhari, Kena Kothari, Harish Narula
    Abstract | PDFPDF
    25. Web Structure Mining using Link Analysis Algorithms
    Pages :4969-4973
    Ronak Jain, Aditya Chavan, Sindhu Nair
    Abstract | PDFPDF
    26. Data Archival using Hadoop Distributed File System
    Pages :4974-4976
    Kajal J. Jewani, Deepika Singh T, Neil George, Parth Mehta , Harsh Basantani
    Abstract | PDFPDF
    27. Profit and Penalty Based Real Time Scheduler for EMS
    Pages :4977-4981
    Vaishali Shinde, R.B.Naik, Kshama Kulkarni
    Abstract | PDFPDF
    28. Scheduling Resources in Cloud using Threshold Values at Host and Data Center level
    Pages :4982-4986
    Yatendra Sahu, Neha Agrawal
    Abstract | PDFPDF
    29. A Comprehensive Study of Multicast based Routing Protocols in Wired Networks(LAN)
    Pages :4987-4991
    Alok Sahu, Dr. Bharat Mishra
    Abstract | PDFPDF
    30. Opinion Extraction and Classification of Real Time E-commerce Websites Reviews
    Pages :4992-4996
    Randa Benkhelifa, Fatima Zohra Laallam
    Abstract | PDFPDF
    31. A Privacy Policy for Continuous Query Processing through Location Based Services
    Pages :4997-5003
    K.B.Anusha, M.Sweta Harini
    Abstract | PDFPDF
    32. Slicing Aspect-oriented program Hierarchically
    Pages :5004-5013
    S. R. Mohanty, P. K. Behera, D. P. Mohapatra
    Abstract | PDFPDF
    33. A Novel Method for Homogeneous Region Based Image Segmentation Technique for Remotely
    Sensed Images

    Pages :5014-5021
    Hema Jagadish, J. Prakash
    Abstract | PDFPDF
    34. P VS NP PROBLEM
    Pages :5022-5025
    Shivam Sharma
    Abstract | PDFPDF
    35. A Systematic Way to Cloud Server Optimization Using Orthogonal Recursive Bisection Technique
    for Cloud Migration

    Pages :5026-5032
    Kamalpreet Kaur and Vanita Rani
    Abstract | PDFPDF
    36. Vertical Handoff Decision Algorithm to Reduce Unnecessary Handoff for Heterogeneous Wireless
    Networks

    Pages :5033-5036
    Mrunali Pramod Kulkarni, Veerbhadra S.Bale
    Abstract | PDFPDF
    37. An Improved Unsupervised Cluster based Hubness Technique for Outlier Detection in High
    dimensional data

    Pages :5037-5043
    R.Lakshmi Devi, Dr.R.Amalraj
    Abstract | PDFPDF
    38. Crowd Analysis and Density Estimation Using Surveillance Cameras
    Pages :5044-5047
    Nachiket Kulkarni , Abhijeet Rana, Aboli Patre
    Abstract | PDFPDF
    39. Web Mining for Web Personalization
    Pages :5048-5053
    Prof. Jharana Paikaray, Prof.Santosh Kumar Rath, Prof.Smaranika Mohapatra
    Abstract | PDFPDF
    40. High-Quality Location Based Wireless Sensor Networks
    Pages :5054-5058
    Lakshmanarao Battula, Dr.P.Vamsikrishna Raja
    Abstract | PDFPDF
    41. Database Intrusion Detection and Protection System Using Log Mining and Forensic Analysis
    Pages :5059-5061
    Shubhangi S. Suryawanshi, Tousif Mulani, Suraj Zanjurne, Kaustubh Inarkar, Ashutosh Jambhulkar
    Abstract | PDFPDF
    42. Data Security through Video Embedding
    Pages :5062-5067
    Arushi Shah, Nidhi Kapadia, Ashwinee Mehta, Mrs Kriti Srivastava
    Abstract | PDFPDF
    43. A Framework for Detection of Video Spam on YouTube
    Pages :5068-5072
    Niyanta Ashar, Hitarthi Bhatt, Shraddha Mehta, Prof. (Mrs.) Chetashri Bhadane
    Abstract | PDFPDF
    44. A Survey of Web Usage Mining Techniques
    Pages :5073-5076
    Parth Suthar, Prof. Bhavesh Oza
    Abstract | PDFPDF
    45. Advanced Authentication System Using Graphical Password
    Pages :5077-5079
    Wanjari Nilima, Aher Vaishnavi, Pagare Sharmila, Kulkarni Hema
    Abstract | PDFPDF
    46. Multimodal Biometric System in Secure e- Transaction in Smart Phone
    Pages :5080-5084
    Amit Kumar, Kailash Patidar, Nagendra sharma, Manoj Kumar Yadav
    Abstract | PDFPDF
    47. Schemes against Pollution Attack in Network Coding: A Survey
    Pages :5085-5089
    Neha V. Mamidwar, Ms. Deepali Gothawal
    Abstract | PDFPDF
    48. Implementation of Efficient Provable Data Possession
    Pages :5090-5092
    Dhanashri Bamane, Prof. Vinayak Pottigar, Prof. Subhash Pingale
    Abstract | PDFPDF
    49. Indication for Collision Occurrence of Trains Using ARM7
    Pages :5093-5096
    Dr. K. R. R. Mohan Rao, Jayasri. Mekala, T. Mounika
    Abstract | PDFPDF
    50. Automatic e-mails Classification Using genetic Algorithm
    Pages :5097-5103
    Mandeep Choudhary , V. S. Dhaka
    Abstract | PDFPDF
    51. A Survey on Improved Router Design
    Pages :5104-5106
    Shwetha K S, Shobha M S, Nandini Byahatti
    Abstract | PDFPDF
    52. Amazon Review Classification and Sentiment Analysis
    Pages :5107-5110
    Aashutosh Bhatt, Ankit Patel, Harsh Chheda, Kiran Gawande
    Abstract | PDFPDF
    53. Survey on Technical Farming
    Pages :5111-5113
    Disha Deotale, Kranti Sanap, Sandip Panchal, Ravindra Wagh, Prashant Badade
    Abstract | PDFPDF
    54. Proficient Enhancement of Accuracy for Movie Rating Recommendation System via Algorithmic
    Approaches

    Pages :5114-5117
    G.P Karpagam, S.Balaji
    Abstract | PDFPDF
    55. Printed Text Assimilator for Visually Impaired : A Survey
    Pages :5118-5120
    Bharati Ainapure, Nitin Sankpal, Pranav Ranadive, Rohan Shiroor, Satish Vairagar
    Abstract | PDFPDF
    56. Stable MPR Selection in OLSR for Mobile Ad-Hoc Networks
    Pages :5121-5125
    Mohit, Suraj Pal
    Abstract | PDFPDF
    57. PPDM and Data Mining Technique Ensures Privacy and Security for Medical Text and Image
    Feature Extraction in E-Health Care System

    Pages :5126-5129
    M.S Inthumathi, P. Damodharan
    Abstract | PDFPDF
    58. Employee Monitoring System Using Android Smartphone
    Pages :5130-5132
    Rachana Sabale, Pranjal pawar, Sana Sayyed, Aishwarya Kadadekar, Pavan Kawade
    Abstract | PDFPDF
    59. Survey of Road Bump and Intensity Detection algorithms using Smartphone Sensors
    Pages :5133-5136
    Prof.B.Lanjewar, Jyoti Khedkar, Rahul Sagar, Rasika Pawar, Kunal Gosavi
    Abstract | PDFPDF
    60. Digital Watermarking for Secure Online Transmission
    Pages :5137-5140
    Anubhav Bewerwal , Kailash Patidar
    Abstract | PDFPDF
    61. Article Removed
    Pages :5141-5144
    xxx,xxx
    Abstract | PDFPDF
    62. A Review on Multi-keyword Context–Oriented diversification search on Map-Reduce Framework
    over XML Data

    Pages :5145-5147
    Sneha B. Mandlik, Prof.Santosh Durugkar
    Abstract | PDFPDF
    63. Developing System to Filter Unwanted Texts and Images from Social Network User Wall
    Pages :5148-5152
    Ravindra Takalikar, Mahesh Jadhav, Subhash Pingale
    Abstract | PDFPDF
    64. Accessing Desktop remotely using WCF service and Cloud Computing
    Pages :5153-5155
    Akhilesh Shukla, Satendra Sonare
    Abstract | PDFPDF
    65. Improved Bees Hybrid Sensor Coverage Algorithm
    Pages :5156-5158
    M. Sabarivel, K. Marimuthu, A. Kaliappan
    Abstract | PDFPDF
    66. Novel Framework for Browser Compatibility Testing of a Web Application using Selenium
    Pages :5159-5162
    Prof. Anand Motwani, Amber Agrawal, Dr. P. N. Singh, Prof. Anurag Shrivastava
    Abstract | PDFPDF
    67. Hierarchical Structure of Geospatial Field Data Using Enhanced Rtree
    Pages :5163-5165
    Kumutha Priya M, Brinda B M
    Abstract | PDFPDF
    68. Implementing Coarse Grained Task Parallelism Using OpenMP
    Pages :5166-5169
    Manju Mathews, Jisha P Abraham
    Abstract | PDFPDF
    69. A Survey on Cross Domain Sentiment Classification Techniques
    Pages :5170-5172
    Kinnari Ajmera, Lynette R. D'mello
    Abstract | PDFPDF
    70. Product Label Reading From Handheld Objects Using Portable Camera For Visually Challenged
    Persons

    Pages :5173-5176
    Prof. S. Babu Renga Rajan, Mrs.B. Shanmuga Sundari, Mrs. A. Haseena Beevi
    Abstract | PDFPDF
    71. GSM Based Smart Locker
    Pages :5177-5180
    Souvik Paul, Soumi Mondal
    Abstract | PDFPDF
    72. MultiHop Dynamic Channel Assignment to Optimize Cellular Networks Based on Dynamic
    Frequency Selections

    Pages :5181-5183
    V.Lakshman Narayana, Y.Rajesh, T.Kishore babu
    Abstract | PDFPDF
    73. Performance Evaluation of Equalization Algorithms for Electrocardiogram Signal Transmission
    Pages :5184-5188
    Priya.L, Kandaswamy.A,Danvanth.V,Chezhiyan.NA, Hariram.J
    Abstract | PDFPDF
    74. Secure Communication against Vampire Attacks in WSN (Survey)
    Pages :5189-5193
    Laxmi Choukiker, Amit Saxena, Dr Manish Manoria
    Abstract | PDFPDF
    75. Efficient Backward Non Deterministic Matching (EBNDM) Algorithm
    Pages :5194-5197
    Sonam Jain, Vivek Kumar
    Abstract | PDFPDF
    76. An Improved Content Based Image Retrieval Using A Multi-Scale Saliency Model
    Pages :5198-5203
    Gaurav Mandloi, Prof. Abhishek Raghuvanshi
    Abstract | PDFPDF
    77. Grid Computing- Proposed Methods
    Pages :5204-5206
    Ravikant Dewangan
    Abstract | PDFPDF
    78. A New Approach towards Secure Password Authentication Based on CARP
    Pages :5207-5211
    Dr. D.Pushpa Ranjini, B. Shanmuga Sundari, S. AbdulKather, N.Deivanayaki
    Abstract | PDFPDF
    79. A Survey on Moving Object Detection and Tracking Methods
    Pages :5212-5215
    Imrankhan Pathan, Chetan Chauhan
    Abstract | PDFPDF
    80. Semantic Web Representation in RDFSchema: A Practical Approach
    Pages :5216-5221
    S.Sangeetha, V.Bhuvaneswari
    Abstract | PDFPDF
    81. Sentimental Analysis Using Bayesian Theorem
    Pages :5222-5225
    Rohit Vincent, Nisha Mariam Daniel, P Beaulah Soundarabai
    Abstract | PDFPDF
    82. Cloud Computing as a Tool for NGOs in India and Pakistan
    Pages :5226-5237
    Afreen Bhumgara, Muhammad Salman
    Abstract | PDFPDF
    83. A Novel Secured Data Transmission using Less Number of Keys in Sensor Nodes Used in Security
    Application Networks

    Pages :5238-5243
    Venkateswara Dunna, Y.Ramesh Kumar
    Abstract | PDFPDF
    84. A Study on Physiological Parameters Used To Monitor Stress in Experimentally Induced Stimuli
    Pages :5244-5246
    Neelam Rup Prakash, Jasleen Kaur
    Abstract | PDFPDF
    85. Comparative Study of Secure Email System Based on Security Mechanism
    Pages :5247-5250
    Apeksha Nemavarkar, Rajesh Kumar Chakrawarti
    Abstract | PDFPDF
    86. Secure Multi keyword Retrieval over Encrypted Cloud Data
    Pages :5251-5255
    Pradnya H. Unde, Arti Mohanpurkar
    Abstract | PDFPDF
    87. Reliable Routing in Vehicular Adhoc Network Using Maximum Reliable Threshold Construction(MRTC)
    Pages :5256-5260
    K Himantha Rao and Nagarjuna Karyemsetty
    Abstract | PDFPDF
    88. Shrewd Technique for Mining High Utility Itemset via TKU and TKO Algorithm
    Pages :5261-5264
    R.Nandhini, Dr.N.Suguna
    Abstract | PDFPDF
    89. Prediction of Popular Content from Social Media Mining
    Pages :5265-5267
    Bharat Naiknaware, Seema Kawathekar, Sachin Deshmukh
    Abstract | PDFPDF
    90. kNN-R:Building Confidential and Efficient Query Services in the Cloud Using RASP Data Perturbation
    Pages :5268-5273
    D. S. Shintre, Dr. S. M. Jagade
    Abstract | PDFPDF
    91. Survey of some Popular Android applications used in Post Disaster management Scenario
    Pages :5274-5278
    Sayantan Chanda, Sharmistha Dey, Arunava Nath, Mouli Dutta, Krischina Koley
    Abstract | PDFPDF
    92. Local vs. Distributed - An experimental comparative analysis of divergent overload control
    methods in SIP Server

    Pages :5279-5283
    Abdullah Akbar, S. Mahaboob Basha, Syed Abdul Sattar
    Abstract | PDFPDF
    93. An Effective Signcryption Based Authentication for Security in Cloud Computing
    Pages :5284-5288
    Richa Singh Dangi, Amit Saxena, Manish Manoria
    Abstract | PDFPDF
    94. Survey on Finding Cost & Time Effective Path For Travelling
    Pages :5289-5291
    Rachna Sable, Akshay Ravtole, Chandravadan Deshpande, Deepika Agarwal,Sayali Boralkar
    Abstract | PDFPDF
    95. Generalised Approaches for ALU Design Using Reversible Gates
    Pages :5292-5294
    Neelam Rup Prakash, Neha Pannu
    Abstract | PDFPDF
    96. Bluetooth Security Issues
    Pages :5295-5299
    Purvish Patel, Akash Merchant, Nisarg Tailo3, Chintan Trivedi
    Abstract | PDFPDF
    97. Ranking SDLC Models using BBA
    Pages :5300-5302
    Aakash Singhal, Aman Agrawal, Jatin Makkar
    Abstract | PDFPDF
    98. A Review on Geospatial Technologies for Education in Aurangabad City
    Pages :5303-5307
    Pathan Aminkhan B., Pandagale Pallavi U., Mundhe Manisha R.
    Abstract | PDFPDF
    99. Effect of Distance measures on Partitional Clustering Algorithms using Transportation Data
    Pages :5308-5312
    Sesham Anand, P Padmanabham, A Govardhan
    Abstract | PDFPDF
    100. Enhanced Security for Multi Cloud Storage using AES Algorithm
    Pages :5313-5315
    Namita N. Pathak, Prof. Meghana Nagori
    Abstract | PDFPDF
    101. Dynamic Approach for Efficient Deployment of Intelligent Tutoring Systems (ITSs)
    Pages :5316-5322
    Ruaa Ali Khamees, Dr. R Satya Prasad
    Abstract | PDFPDF
    102. A Hybrid Approach for Job Shop Scheduling Problems
    Pages :5323-5327
    Dr.R. Ramkumar
    Abstract | PDFPDF
    103. Anaphora Resolution for Hindi Language
    Pages :5328-5330
    Priyanka Ahir, Bhakti Mehta, Riddhi Desai, Zinal Patel, Elisha Patel, Nehal Adhvaryu
    Abstract | PDFPDF
    104. Sensor based Automated Irrigation System with IOT: A Technical Review
    Pages :5331-5333
    Karan Kansara, Vishal Zaveri, Shreyans Shah, Sandip Delwadkar, Kaushal Jani
    Abstract | PDFPDF
    105. Secured Remote Client Authentication using Elliptic Curve Cryptography Algorithm
    Pages :5334-5339
    Lakshmanarao Battula, Dr.P.Vamsikrishna Raja
    Abstract | PDFPDF
    106. Online Automated UML Generation
    Pages :5340-5341
    Avnish Singh Jat
    Abstract | PDFPDF
    107. Analysis of Feature Extraction Techniques for Vehicle Number Plate Detection
    Pages :5342-5346
    Swati Jagtap
    Abstract | PDFPDF
    108. Improving Webpage Visibility in Search Engines by Enhancing Keyword Density Using Improved
    On-Page Optimization Technique

    Pages :5347-5352
    Meenakshi Bansal, Deepak Sharma
    Abstract | PDFPDF
    109. ID3 and Its Applications in Generation of Decision Trees across Various Domains- Survey
    Pages :5353-5357
    L.Surya Prasanthi, R.Kiran Kumar
    Abstract | PDFPDF
    110. A Survey on Access Control and Encryption Mechanisms for Cloud Computing
    Pages :5363-5366
    B. K.Ugale, R. N. Phursule
    Abstract | PDFPDF
    111. A Survey on Sentiment Analysis on Twitter Data Using Different Techniques
    Pages :5358-5362
    Bholane Savita Dattu, Prof.Deipali V. Gore
    Abstract | PDFPDF
    112. Public Auditing and Self-Destructing Approach for Shared Data on Cloud
    Pages :5367-5371
    Amir Ali, Prof Savitri Patil
    Abstract | PDFPDF
    113. A Survey on Classification over Semantically Secure Encrypted Data
    Pages :5372-5374
    Chaitali R. Shewale
    Abstract | PDFPDF
    114. Context Based Search Engine for Personal Information Management
    Pages :5375-5378
    Sayyad F.S., Prof.P.P.Kalyankar
    Abstract | PDFPDF
    115. An approach of curing Depression by Artificial Neural Networks (ANN)
    Pages :5379-5383
    Souvik Paul, Atrayee Sanyal Chatterjee
    Abstract | PDFPDF
    116. PSD Analysis of Neural Spectrum During Transition from Awake Stage to Sleep Stage
    Pages :5384-5389
    Chintan Joshi, Dipesh Kamdar
    Abstract | PDFPDF
    117. Efficient High Utility Itemset Mining using extended UP Growth on Educational Feedback Dataset
    Pages :5390-5394
    Yamini P. Jawale, Prof. Nilesh Vani
    Abstract | PDFPDF
    118. Multi-hop Energy Efficient Routing in WSN to Maximize Network Life Time using Percolation
    Theory

    Pages :5395-5397
    Priyanka Saxena, U. Datta
    Abstract | PDFPDF
    119. Comparative Study of Machine Learning Models in Protein Structure Prediction
    Pages :5398-5404
    Sonal Mishra, Anamika Ahirwar
    Abstract | PDFPDF
    120. Steganography in Ad Hoc Networks
    Pages :5405-5408
    Rashmi Hegde, Dr. T H Sreenivas
    Abstract | PDFPDF
    121. XML Retrieval with the help of Personalization in Search: A Review
    Pages :5409-5412
    Jayati Kale, Garima Singh Makhija
    Abstract | PDFPDF
    122. Comprehensive Study of Contemporary Image forgery Identification Techniques
    Pages :5413-5416
    Gauravkumarsingh Gaharwar, Prof. V. V. Nath, Raina Gaharwar
    Abstract | PDFPDF
    123. Study of Multi-keyword Ranked Searching and Encryption Technique over Cloud
    Pages :5417-5420
    SonamDarda, Manasi. K. Kulkarni
    Abstract | PDFPDF
    124. Fingertip Tracking and Hand Gesture Recognition by 3D Vision
    Pages :5421-5424
    De Gu
    Abstract | PDFPDF
    125. Green Cloud Computing – Power Efficiency
    Pages :5425-5428
    Rakshith K.N., Dr. T H Sreenivas
    Abstract | PDFPDF
    126. (OOCS) OpenStack Open-source Cloud Computing System
    Pages :5429-5431
    A.Dhasaradhi, S.Ramakrishna
    Abstract | PDFPDF
    127. Comparison between SSL and SSH in Network and Transport Layer
    Pages :5432-5434
    Trivedi Anjali, Shah Krishna, Zatakiya Poonam
    Abstract | PDFPDF
    128. Enhancement and Evaluation of Pattern Classifiers in NIDS: A Survey
    Pages :5435-5438
    Nikhil A. Gaikwad, Prof. Sunil M. Sangve
    Abstract | PDFPDF
    129. Local Ternary Pattern for the Recognition of Surgically Altered Face Images
    Pages :5439-5441
    Georgy George, Nisha JS
    Abstract | PDFPDF
    130. Image Steganography for Secret Transmission of Data Using Cryptography Approach for Encryption of Data
    Pages :5442-5445
    Teena Rani, Shifali Singla
    Abstract | PDFPDF
    131. Development of Multilingual Assamese Electronic Dictionary
    Pages :5446-5452
    Saiful Islam, Bipul Syam Purkayastha
    Abstract | PDFPDF
    132. Microarray Analysis and Gene Expression : A simplified Review
    Pages :5453-5458
    Saad Subair and Hussah AlEisa
    Abstract | PDFPDF
    133. A Novel Lifelog Management Scheme for Improving Health-Related Quality of Life
    Pages :5459-5464
    Myung-Kyu Yi, Taeg Keun Whangbo
    Abstract | PDFPDF
    134. Natural Language Processing using NLTK and WordNet
    Pages :5442-5445
    Alabhya Farkiya, Prashant Saini, Shubham Sinha, Sharmishta Desai
    Abstract | PDFPDF
    135. Cluster Based Secure WSN against the Blackhole and Grayhole Attack
    Pages :5470-5472
    Ojashvi Shivwanshi, Rahul Patel, Preetika Saxena
    Abstract | PDFPDF
    136. Captcha as Textual Passwords with Click Points to Protect Information
    Pages :5473-5477
    Sandeep Kumar Vengala, Goje Roopa
    Abstract | PDFPDF
    137. Methodology for Deploying a Security Framework in Mission Critical Infrastructure Based Wireless Sensor Networks
    Pages :5478-5486
    Sudipto Roy, Manisha J Nene
    Abstract | PDFPDF
    138. A Survey to Support NFRs in Agile Software Development Process
    Pages :5487-5489
    Trupti Suryawanshi, Gauri Rao
    Abstract | PDFPDF
    139. A Secure Application For Shopping in Mall using NFC
    Pages :5490-5492
    Monika S. Borkar, Piyusha. Kadam, Nikita P.Pagar, Aboli G.More, Akshada Deokar, Trupti Suryawanshi
    Abstract | PDFPDF
    140. Multiple License Plate Location Identification Using the Optical Flow Algorithm and Blob Analysis
    Pages :5493-5496
    Remya Krishnan
    Abstract | PDFPDF
    141. Comparative Study of Web Search Methods Using Ontology
    Pages :5497-5499
    Anushree Mehta, Shreyansh Zatakia, Prof. Khushali Deulkar
    Abstract | PDFPDF
    142. Technical Review: Drip Irrigation System Using Wireless Sensor Network
    Pages :5500-5502
    Karishma Patel, Krishna Patel , Kajal Patel, Sandip Delwadkar
    Abstract | PDFPDF
    143. Frequent Pattern Mining and Customer Retention using Vertical Data Set and Boolean Matrix
    Pages :5503-5504
    S.Tejaswi, Ch.Sita Kameswari
    Abstract | PDFPDF
    144. Improved Hop-by-Hop Congestion Control Algorithm
    Pages :5505-5508
    Urvashi Handa, Padma Bonde
    Abstract | PDFPDF
    145. Adapting Property Graph Model to Overcome Modeling Challenges in Internet of Things (IoT)
    Pages :5509-5511
    Jagadeesh Hanumantegowda
    Abstract | PDFPDF
    146. Personalized Image Search Using Simple Case of One Word-Based Queries-An OverviewSensor Networks
    Pages :5512-5517
    Prof. Dipak R. Pardhi, Lalitkumar B. Borase
    Abstract | PDFPDF
    147. Article Removed
    Pages :5518-5526
    xxx,xxx
    Abstract | PDFPDF
    148. Computer Assisted Solution of Homotopy Continuation Method Algorithm for Darcy-Brinkman Forchheimer Flow through an 3D Animation Visualization
    Pages :5527-5530
    Ashoka S. B.
    Abstract | PDFPDF
    149. Large Scale Image Processing Using Distributed and Parallel Architecture
    Pages :5531-5535
    Helly M. Patel, Krunal Panchal, Prashant Chauhan, M. B. Potdar
    Abstract | PDFPDF
    150. A Review: Shadow Detection and Removal
    Pages :5536-5541
    Vijay Chondagar, Harshiv Pandya, Mehul Panchal, Rinkesh Patel, Dhaval Sevak, Kaushal Jani
    Abstract | PDFPDF
    151. Super Node Localization for Time Synchronization in UWSNs
    Pages :5542-5546
    Thota Nischala, T .Venkata Naga Jayudu
    Abstract | PDFPDF
    152. A Genetic Algorithm for Conformation Search Optimization in Molecular Docking
    Pages :5547-5551
    Sudha Ramachandra, Vinay Chavan
    Abstract | PDFPDF
    153. Mining Rare Association Rule
    Pages :5552-5557
    Arnab kumar Das
    Abstract | PDFPDF
    154. Yet Another nlogn Sorting
    Pages :5558-5560
    Arijit Bhattacharya, Satrajit Ghosh
    Abstract | PDFPDF
    155. Hidding secured information into secured image
    Pages :5561-5564
    J.Sabthami, N.Nivetha, P.Maheswari, S.Janani
    Abstract | PDFPDF
    156. An Efficient Algorithm for Sign Language Recognition
    Pages :5565-5571
    Pratibha Pandey, Vinay Jain
    Abstract | PDFPDF
    157. Caption Mining with Face Annotation Using Distributed Database
    Pages :5572-5574
    Afshan Jabeen, Raana Syeda
    Abstract | PDFPDF
    158. Performance Analysis of Novel Privacy Preserving Model for Location Based Servers in Mobile Clouds
    Pages :5575-5582
    Anjali Kalore, Prof.Megha Singh
    Abstract | PDFPDF
    159. Palmprint Recognition Using Transform Domain and Spatial Domain Techniques
    Pages :5583-5587
    Jayshri P. Patil, Chhaya Nayak
    Abstract | PDFPDF
    160. A Systematic Study and its Implementations of Wireless Sensor Networks in Real Time
    Pages :5588-5592
    P. J. Shriidhar, Dr. A. Senthil Kumar
    Abstract | PDFPDF
    161. Review on Quality-Aware Cloud Service Selection based on Hybrid Method using Cloudsim Toolkit
    Pages :5593-5594
    Prabhjot Kaur and Talwinder Kaur
    Abstract | PDFPDF
    162. A Novel Cryptographic Approach for Preventing Attacks in a Network
    Pages :5595-5598
    Pratibha Lanka, Ch. Sita Kameswari
    Abstract | PDFPDF
    163. ADWARE: A REVIEW
    Pages :5599-5604
    Seyhmus Yilmaz, Sultan Zavrak
    Abstract | PDFPDF
       
    -All rights are reserved by International Journal of Computer Science and Information Technologies-