bh

 

VOLUME 6 ISSUE 6 November - December 2015

ISSN 0975 - 9646

1. Review of Shape and Texture Feature Extraction Techniques for Fruits
Pages : 4851-4854
Drashti Jasani, Paras Patel, Snehal Patel, Bindiya Ahir, Khushbu Patel, Mitali Dixit
Abstract | PDFPDF
2. Application of Data Mining Techniques in Higher Education (With Special Reference to Improving
the Quality)

Pages :4855-4859
Amit Agnihitri, Bharat Mishra
Abstract | PDFPDF
3. Encoding N-party Man-In-Middle Attack for Diffie–Hellman Algorithm in a Client-Server Paradigm
Pages : 4860-4865
Sulochana Devi, Ritu Makani
Abstract | PDFPDF
4. Improving Performance in Keyword Search by Supporting Search as-you-type
Pages : 4866-4873
Datta M. Ningole, Vijay B. Patil
Abstract | PDFPDF
5. Energy Efficiency in Wireless Sensor Networks Using Packet Splitting Technique
Pages : 4874-4877
J. Anton Bose
Abstract | PDFPDF
6. Algorithm for Ranking Consumer Reviews on E-commerce Websites
Pages : 4878-4881
Rajat Sharma, Gautam Nagpal, Amit Kanwar
Abstract | PDFPDF
7. Effect of Image Quality Improvement on the Leaf Image Classification Accuracy
Pages : 4882-4887
Arun Kumar, Vinod Patidar, Deepak Khazanchi, Poonam Saini
Abstract | PDFPDF
8. A Review on Multi-Agent Data Mining Systems
Pages :4888-4893
Siddhant Patil, Sayali Karnik , Vinaya Sawant
Abstract | PDFPDF
9. A Wireless Scheme to Establish a Communication between One Disable with Multiple Disables: A
Survey

Pages : 4894-4897
Vaishnavi Kokate, Chandratre Ruchika, Khairnar Himanshu, Kamble Archana
Abstract | PDFPDF
10. Cloud –Based Energy Efficient Offloading Transcoding Service Policy
Pages :4898-4900
Vaishali Y. Baviskar, Snehal Mandlik, Supriya Patil,Pallavi Sinha,Pooja Gopale
Abstract | PDFPDF
11. Quadrants Dynamic Histogram Equlization Based Contrast Enhancement with Median Filtering
Pages :4901-4903
Roshni Reghunathan K, Jayasree M
Abstract | PDFPDF
12. Survey of Detection of Sinkhole Attack in Wireless Sensor Network
Pages :4904-4909
Kesav Unnithan S L, Lakshmi Devi C , Sreekuttan Unnithan C
Abstract | PDFPDF
13. IEAACK-Secure Detection System for Packet- Dropping attack in MANETs
Pages :4910-4913
Preeti Sharanvijay. Chikkshetty, Abhijit. V. Mophare
Abstract | PDFPDF
14. Easy V-Mail A Simplified Mailing Application
Pages :4914-4916
Apoorva D. Shetty, Juhi D. Gala, Hiloni S. Punatar, Kriti Srivastava
Abstract | PDFPDF
15. Secured Data Transmission in Sensor Devices Using Minimal Keys
Pages :4917-4920
Satish Dekka, Nandagiri R. G. K. Prasad
Abstract | PDFPDF
16. Design and Implementation of Pseudo Random Number Generator in FPGA & CMOS VLSI
Pages :4921-4924
Chandra Sekhar.K, Unitha.Pailu, Aradada.Sirisha
Abstract | PDFPDF
17. A Solutions Provided to Secured Your Online Banking Frauds
Pages :4925-4928
Komal Saxena , Dr. Anurag Awasthi
Abstract | PDFPDF
18. Alternating Current Coefficients in DCT Based Image Fusion with Saturation Weighting
Pages :4929-4935
Harkamal Preet Kaur, Sunny Dhawan
Abstract | PDFPDF
19. Precheck Algorithm with Success Rate Table in Handshake for Detecting and Removing Gray and
Black Hole Attack in MANET

Pages :4936-4940
K. R. Viswa Jhananie, Dr. C. Chandrasekar
Abstract | PDFPDF
20. Efficient Topic Evolution Discovery in a Corpus using Semantic Similarity and Citation Graph
Pages :4941-4951
Vijay Subramanya, Saiprashanth Kote, Santosh Kumar, P. Santhi Thilagam
Abstract | PDFPDF
21. Security Issues Associated With Big Data in Cloud Computing
Pages :4952-4956
K.Shanmugapriya, M.Murugeswari, K.Suriya
Abstract | PDFPDF
22. Proposed E-payment System using Biometrics
Pages :4957-4960
Vishal Vishwas Jadhav, Rahul Ratnakar Patil, Rohit Chandrashekar Jadhav,Adwait Niranjan Magikar
Abstract | PDFPDF
23. Avoidance of Power Draining in Mobile Ad-HOC Network over Vampire Attack
Pages :4961-4964
Anamika Garg, Mayank K Sharma
Abstract | PDFPDF
24. Image Capturing using Blink Detection
Pages :4965-4968
Keval Lakhani, Aunsh Chaudhari, Kena Kothari, Harish Narula
Abstract | PDFPDF
25. Web Structure Mining using Link Analysis Algorithms
Pages :4969-4973
Ronak Jain, Aditya Chavan, Sindhu Nair
Abstract | PDFPDF
26. Data Archival using Hadoop Distributed File System
Pages :4974-4976
Kajal J. Jewani, Deepika Singh T, Neil George, Parth Mehta , Harsh Basantani
Abstract | PDFPDF
27. Profit and Penalty Based Real Time Scheduler for EMS
Pages :4977-4981
Vaishali Shinde, R.B.Naik, Kshama Kulkarni
Abstract | PDFPDF
28. Scheduling Resources in Cloud using Threshold Values at Host and Data Center level
Pages :4982-4986
Yatendra Sahu, Neha Agrawal
Abstract | PDFPDF
29. A Comprehensive Study of Multicast based Routing Protocols in Wired Networks(LAN)
Pages :4987-4991
Alok Sahu, Dr. Bharat Mishra
Abstract | PDFPDF
30. Opinion Extraction and Classification of Real Time E-commerce Websites Reviews
Pages :4992-4996
Randa Benkhelifa, Fatima Zohra Laallam
Abstract | PDFPDF
31. A Privacy Policy for Continuous Query Processing through Location Based Services
Pages :4997-5003
K.B.Anusha, M.Sweta Harini
Abstract | PDFPDF
32. Slicing Aspect-oriented program Hierarchically
Pages :5004-5013
S. R. Mohanty, P. K. Behera, D. P. Mohapatra
Abstract | PDFPDF
33. A Novel Method for Homogeneous Region Based Image Segmentation Technique for Remotely
Sensed Images

Pages :5014-5021
Hema Jagadish, J. Prakash
Abstract | PDFPDF
34. P VS NP PROBLEM
Pages :5022-5025
Shivam Sharma
Abstract | PDFPDF
35. A Systematic Way to Cloud Server Optimization Using Orthogonal Recursive Bisection Technique
for Cloud Migration

Pages :5026-5032
Kamalpreet Kaur and Vanita Rani
Abstract | PDFPDF
36. Vertical Handoff Decision Algorithm to Reduce Unnecessary Handoff for Heterogeneous Wireless
Networks

Pages :5033-5036
Mrunali Pramod Kulkarni, Veerbhadra S.Bale
Abstract | PDFPDF
37. An Improved Unsupervised Cluster based Hubness Technique for Outlier Detection in High
dimensional data

Pages :5037-5043
R.Lakshmi Devi, Dr.R.Amalraj
Abstract | PDFPDF
38. Crowd Analysis and Density Estimation Using Surveillance Cameras
Pages :5044-5047
Nachiket Kulkarni , Abhijeet Rana, Aboli Patre
Abstract | PDFPDF
39. Web Mining for Web Personalization
Pages :5048-5053
Prof. Jharana Paikaray, Prof.Santosh Kumar Rath, Prof.Smaranika Mohapatra
Abstract | PDFPDF
40. High-Quality Location Based Wireless Sensor Networks
Pages :5054-5058
Lakshmanarao Battula, Dr.P.Vamsikrishna Raja
Abstract | PDFPDF
41. Database Intrusion Detection and Protection System Using Log Mining and Forensic Analysis
Pages :5059-5061
Shubhangi S. Suryawanshi, Tousif Mulani, Suraj Zanjurne, Kaustubh Inarkar, Ashutosh Jambhulkar
Abstract | PDFPDF
42. Data Security through Video Embedding
Pages :5062-5067
Arushi Shah, Nidhi Kapadia, Ashwinee Mehta, Mrs Kriti Srivastava
Abstract | PDFPDF
43. A Framework for Detection of Video Spam on YouTube
Pages :5068-5072
Niyanta Ashar, Hitarthi Bhatt, Shraddha Mehta, Prof. (Mrs.) Chetashri Bhadane
Abstract | PDFPDF
44. A Survey of Web Usage Mining Techniques
Pages :5073-5076
Parth Suthar, Prof. Bhavesh Oza
Abstract | PDFPDF
45. Advanced Authentication System Using Graphical Password
Pages :5077-5079
Wanjari Nilima, Aher Vaishnavi, Pagare Sharmila, Kulkarni Hema
Abstract | PDFPDF
46. Multimodal Biometric System in Secure e- Transaction in Smart Phone
Pages :5080-5084
Amit Kumar, Kailash Patidar, Nagendra sharma, Manoj Kumar Yadav
Abstract | PDFPDF
47. Schemes against Pollution Attack in Network Coding: A Survey
Pages :5085-5089
Neha V. Mamidwar, Ms. Deepali Gothawal
Abstract | PDFPDF
48. Implementation of Efficient Provable Data Possession
Pages :5090-5092
Dhanashri Bamane, Prof. Vinayak Pottigar, Prof. Subhash Pingale
Abstract | PDFPDF
49. Indication for Collision Occurrence of Trains Using ARM7
Pages :5093-5096
Dr. K. R. R. Mohan Rao, Jayasri. Mekala, T. Mounika
Abstract | PDFPDF
50. Automatic e-mails Classification Using genetic Algorithm
Pages :5097-5103
Mandeep Choudhary , V. S. Dhaka
Abstract | PDFPDF
51. A Survey on Improved Router Design
Pages :5104-5106
Shwetha K S, Shobha M S, Nandini Byahatti
Abstract | PDFPDF
52. Amazon Review Classification and Sentiment Analysis
Pages :5107-5110
Aashutosh Bhatt, Ankit Patel, Harsh Chheda, Kiran Gawande
Abstract | PDFPDF
53. Survey on Technical Farming
Pages :5111-5113
Disha Deotale, Kranti Sanap, Sandip Panchal, Ravindra Wagh, Prashant Badade
Abstract | PDFPDF
54. Proficient Enhancement of Accuracy for Movie Rating Recommendation System via Algorithmic
Approaches

Pages :5114-5117
G.P Karpagam, S.Balaji
Abstract | PDFPDF
55. Printed Text Assimilator for Visually Impaired : A Survey
Pages :5118-5120
Bharati Ainapure, Nitin Sankpal, Pranav Ranadive, Rohan Shiroor, Satish Vairagar
Abstract | PDFPDF
56. Stable MPR Selection in OLSR for Mobile Ad-Hoc Networks
Pages :5121-5125
Mohit, Suraj Pal
Abstract | PDFPDF
57. PPDM and Data Mining Technique Ensures Privacy and Security for Medical Text and Image
Feature Extraction in E-Health Care System

Pages :5126-5129
M.S Inthumathi, P. Damodharan
Abstract | PDFPDF
58. Employee Monitoring System Using Android Smartphone
Pages :5130-5132
Rachana Sabale, Pranjal pawar, Sana Sayyed, Aishwarya Kadadekar, Pavan Kawade
Abstract | PDFPDF
59. Survey of Road Bump and Intensity Detection algorithms using Smartphone Sensors
Pages :5133-5136
Prof.B.Lanjewar, Jyoti Khedkar, Rahul Sagar, Rasika Pawar, Kunal Gosavi
Abstract | PDFPDF
60. Digital Watermarking for Secure Online Transmission
Pages :5137-5140
Anubhav Bewerwal , Kailash Patidar
Abstract | PDFPDF
61. Article Removed
Pages :5141-5144
xxx,xxx
Abstract | PDFPDF
62. A Review on Multi-keyword Context–Oriented diversification search on Map-Reduce Framework
over XML Data

Pages :5145-5147
Sneha B. Mandlik, Prof.Santosh Durugkar
Abstract | PDFPDF
63. Developing System to Filter Unwanted Texts and Images from Social Network User Wall
Pages :5148-5152
Ravindra Takalikar, Mahesh Jadhav, Subhash Pingale
Abstract | PDFPDF
64. Accessing Desktop remotely using WCF service and Cloud Computing
Pages :5153-5155
Akhilesh Shukla, Satendra Sonare
Abstract | PDFPDF
65. Improved Bees Hybrid Sensor Coverage Algorithm
Pages :5156-5158
M. Sabarivel, K. Marimuthu, A. Kaliappan
Abstract | PDFPDF
66. Novel Framework for Browser Compatibility Testing of a Web Application using Selenium
Pages :5159-5162
Prof. Anand Motwani, Amber Agrawal, Dr. P. N. Singh, Prof. Anurag Shrivastava
Abstract | PDFPDF
67. Hierarchical Structure of Geospatial Field Data Using Enhanced Rtree
Pages :5163-5165
Kumutha Priya M, Brinda B M
Abstract | PDFPDF
68. Implementing Coarse Grained Task Parallelism Using OpenMP
Pages :5166-5169
Manju Mathews, Jisha P Abraham
Abstract | PDFPDF
69. A Survey on Cross Domain Sentiment Classification Techniques
Pages :5170-5172
Kinnari Ajmera, Lynette R. D'mello
Abstract | PDFPDF
70. Product Label Reading From Handheld Objects Using Portable Camera For Visually Challenged
Persons

Pages :5173-5176
Prof. S. Babu Renga Rajan, Mrs.B. Shanmuga Sundari, Mrs. A. Haseena Beevi
Abstract | PDFPDF
71. GSM Based Smart Locker
Pages :5177-5180
Souvik Paul, Soumi Mondal
Abstract | PDFPDF
72. MultiHop Dynamic Channel Assignment to Optimize Cellular Networks Based on Dynamic
Frequency Selections

Pages :5181-5183
V.Lakshman Narayana, Y.Rajesh, T.Kishore babu
Abstract | PDFPDF
73. Performance Evaluation of Equalization Algorithms for Electrocardiogram Signal Transmission
Pages :5184-5188
Priya.L, Kandaswamy.A,Danvanth.V,Chezhiyan.NA, Hariram.J
Abstract | PDFPDF
74. Secure Communication against Vampire Attacks in WSN (Survey)
Pages :5189-5193
Laxmi Choukiker, Amit Saxena, Dr Manish Manoria
Abstract | PDFPDF
75. Efficient Backward Non Deterministic Matching (EBNDM) Algorithm
Pages :5194-5197
Sonam Jain, Vivek Kumar
Abstract | PDFPDF
76. An Improved Content Based Image Retrieval Using A Multi-Scale Saliency Model
Pages :5198-5203
Gaurav Mandloi, Prof. Abhishek Raghuvanshi
Abstract | PDFPDF
77. Grid Computing- Proposed Methods
Pages :5204-5206
Ravikant Dewangan
Abstract | PDFPDF
78. A New Approach towards Secure Password Authentication Based on CARP
Pages :5207-5211
Dr. D.Pushpa Ranjini, B. Shanmuga Sundari, S. AbdulKather, N.Deivanayaki
Abstract | PDFPDF
79. A Survey on Moving Object Detection and Tracking Methods
Pages :5212-5215
Imrankhan Pathan, Chetan Chauhan
Abstract | PDFPDF
80. Semantic Web Representation in RDFSchema: A Practical Approach
Pages :5216-5221
S.Sangeetha, V.Bhuvaneswari
Abstract | PDFPDF
81. Sentimental Analysis Using Bayesian Theorem
Pages :5222-5225
Rohit Vincent, Nisha Mariam Daniel, P Beaulah Soundarabai
Abstract | PDFPDF
82. Cloud Computing as a Tool for NGOs in India and Pakistan
Pages :5226-5237
Afreen Bhumgara, Muhammad Salman
Abstract | PDFPDF
83. A Novel Secured Data Transmission using Less Number of Keys in Sensor Nodes Used in Security
Application Networks

Pages :5238-5243
Venkateswara Dunna, Y.Ramesh Kumar
Abstract | PDFPDF
84. A Study on Physiological Parameters Used To Monitor Stress in Experimentally Induced Stimuli
Pages :5244-5246
Neelam Rup Prakash, Jasleen Kaur
Abstract | PDFPDF
85. Comparative Study of Secure Email System Based on Security Mechanism
Pages :5247-5250
Apeksha Nemavarkar, Rajesh Kumar Chakrawarti
Abstract | PDFPDF
86. Secure Multi keyword Retrieval over Encrypted Cloud Data
Pages :5251-5255
Pradnya H. Unde, Arti Mohanpurkar
Abstract | PDFPDF
87. Reliable Routing in Vehicular Adhoc Network Using Maximum Reliable Threshold Construction(MRTC)
Pages :5256-5260
K Himantha Rao and Nagarjuna Karyemsetty
Abstract | PDFPDF
88. Shrewd Technique for Mining High Utility Itemset via TKU and TKO Algorithm
Pages :5261-5264
R.Nandhini, Dr.N.Suguna
Abstract | PDFPDF
89. Prediction of Popular Content from Social Media Mining
Pages :5265-5267
Bharat Naiknaware, Seema Kawathekar, Sachin Deshmukh
Abstract | PDFPDF
90. kNN-R:Building Confidential and Efficient Query Services in the Cloud Using RASP Data Perturbation
Pages :5268-5273
D. S. Shintre, Dr. S. M. Jagade
Abstract | PDFPDF
91. Survey of some Popular Android applications used in Post Disaster management Scenario
Pages :5274-5278
Sayantan Chanda, Sharmistha Dey, Arunava Nath, Mouli Dutta, Krischina Koley
Abstract | PDFPDF
92. Local vs. Distributed - An experimental comparative analysis of divergent overload control
methods in SIP Server

Pages :5279-5283
Abdullah Akbar, S. Mahaboob Basha, Syed Abdul Sattar
Abstract | PDFPDF
93. An Effective Signcryption Based Authentication for Security in Cloud Computing
Pages :5284-5288
Richa Singh Dangi, Amit Saxena, Manish Manoria
Abstract | PDFPDF
94. Survey on Finding Cost & Time Effective Path For Travelling
Pages :5289-5291
Rachna Sable, Akshay Ravtole, Chandravadan Deshpande, Deepika Agarwal,Sayali Boralkar
Abstract | PDFPDF
95. Generalised Approaches for ALU Design Using Reversible Gates
Pages :5292-5294
Neelam Rup Prakash, Neha Pannu
Abstract | PDFPDF
96. Bluetooth Security Issues
Pages :5295-5299
Purvish Patel, Akash Merchant, Nisarg Tailo3, Chintan Trivedi
Abstract | PDFPDF
97. Ranking SDLC Models using BBA
Pages :5300-5302
Aakash Singhal, Aman Agrawal, Jatin Makkar
Abstract | PDFPDF
98. A Review on Geospatial Technologies for Education in Aurangabad City
Pages :5303-5307
Pathan Aminkhan B., Pandagale Pallavi U., Mundhe Manisha R.
Abstract | PDFPDF
99. Effect of Distance measures on Partitional Clustering Algorithms using Transportation Data
Pages :5308-5312
Sesham Anand, P Padmanabham, A Govardhan
Abstract | PDFPDF
100. Enhanced Security for Multi Cloud Storage using AES Algorithm
Pages :5313-5315
Namita N. Pathak, Prof. Meghana Nagori
Abstract | PDFPDF
101. Dynamic Approach for Efficient Deployment of Intelligent Tutoring Systems (ITSs)
Pages :5316-5322
Ruaa Ali Khamees, Dr. R Satya Prasad
Abstract | PDFPDF
102. A Hybrid Approach for Job Shop Scheduling Problems
Pages :5323-5327
Dr.R. Ramkumar
Abstract | PDFPDF
103. Anaphora Resolution for Hindi Language
Pages :5328-5330
Priyanka Ahir, Bhakti Mehta, Riddhi Desai, Zinal Patel, Elisha Patel, Nehal Adhvaryu
Abstract | PDFPDF
104. Sensor based Automated Irrigation System with IOT: A Technical Review
Pages :5331-5333
Karan Kansara, Vishal Zaveri, Shreyans Shah, Sandip Delwadkar, Kaushal Jani
Abstract | PDFPDF
105. Secured Remote Client Authentication using Elliptic Curve Cryptography Algorithm
Pages :5334-5339
Lakshmanarao Battula, Dr.P.Vamsikrishna Raja
Abstract | PDFPDF
106. Online Automated UML Generation
Pages :5340-5341
Avnish Singh Jat
Abstract | PDFPDF
107. Analysis of Feature Extraction Techniques for Vehicle Number Plate Detection
Pages :5342-5346
Swati Jagtap
Abstract | PDFPDF
108. Improving Webpage Visibility in Search Engines by Enhancing Keyword Density Using Improved
On-Page Optimization Technique

Pages :5347-5352
Meenakshi Bansal, Deepak Sharma
Abstract | PDFPDF
109. ID3 and Its Applications in Generation of Decision Trees across Various Domains- Survey
Pages :5353-5357
L.Surya Prasanthi, R.Kiran Kumar
Abstract | PDFPDF
110. A Survey on Access Control and Encryption Mechanisms for Cloud Computing
Pages :5363-5366
B. K.Ugale, R. N. Phursule
Abstract | PDFPDF
111. A Survey on Sentiment Analysis on Twitter Data Using Different Techniques
Pages :5358-5362
Bholane Savita Dattu, Prof.Deipali V. Gore
Abstract | PDFPDF
112. Public Auditing and Self-Destructing Approach for Shared Data on Cloud
Pages :5367-5371
Amir Ali, Prof Savitri Patil
Abstract | PDFPDF
113. A Survey on Classification over Semantically Secure Encrypted Data
Pages :5372-5374
Chaitali R. Shewale
Abstract | PDFPDF
114. Context Based Search Engine for Personal Information Management
Pages :5375-5378
Sayyad F.S., Prof.P.P.Kalyankar
Abstract | PDFPDF
115. An approach of curing Depression by Artificial Neural Networks (ANN)
Pages :5379-5383
Souvik Paul, Atrayee Sanyal Chatterjee
Abstract | PDFPDF
116. PSD Analysis of Neural Spectrum During Transition from Awake Stage to Sleep Stage
Pages :5384-5389
Chintan Joshi, Dipesh Kamdar
Abstract | PDFPDF
117. Efficient High Utility Itemset Mining using extended UP Growth on Educational Feedback Dataset
Pages :5390-5394
Yamini P. Jawale, Prof. Nilesh Vani
Abstract | PDFPDF
118. Multi-hop Energy Efficient Routing in WSN to Maximize Network Life Time using Percolation
Theory

Pages :5395-5397
Priyanka Saxena, U. Datta
Abstract | PDFPDF
119. Comparative Study of Machine Learning Models in Protein Structure Prediction
Pages :5398-5404
Sonal Mishra, Anamika Ahirwar
Abstract | PDFPDF
120. Steganography in Ad Hoc Networks
Pages :5405-5408
Rashmi Hegde, Dr. T H Sreenivas
Abstract | PDFPDF
121. XML Retrieval with the help of Personalization in Search: A Review
Pages :5409-5412
Jayati Kale, Garima Singh Makhija
Abstract | PDFPDF
122. Comprehensive Study of Contemporary Image forgery Identification Techniques
Pages :5413-5416
Gauravkumarsingh Gaharwar, Prof. V. V. Nath, Raina Gaharwar
Abstract | PDFPDF
123. Study of Multi-keyword Ranked Searching and Encryption Technique over Cloud
Pages :5417-5420
SonamDarda, Manasi. K. Kulkarni
Abstract | PDFPDF
124. Fingertip Tracking and Hand Gesture Recognition by 3D Vision
Pages :5421-5424
De Gu
Abstract | PDFPDF
125. Green Cloud Computing – Power Efficiency
Pages :5425-5428
Rakshith K.N., Dr. T H Sreenivas
Abstract | PDFPDF
126. (OOCS) OpenStack Open-source Cloud Computing System
Pages :5429-5431
A.Dhasaradhi, S.Ramakrishna
Abstract | PDFPDF
127. Comparison between SSL and SSH in Network and Transport Layer
Pages :5432-5434
Trivedi Anjali, Shah Krishna, Zatakiya Poonam
Abstract | PDFPDF
128. Enhancement and Evaluation of Pattern Classifiers in NIDS: A Survey
Pages :5435-5438
Nikhil A. Gaikwad, Prof. Sunil M. Sangve
Abstract | PDFPDF
129. Local Ternary Pattern for the Recognition of Surgically Altered Face Images
Pages :5439-5441
Georgy George, Nisha JS
Abstract | PDFPDF
130. Image Steganography for Secret Transmission of Data Using Cryptography Approach for Encryption of Data
Pages :5442-5445
Teena Rani, Shifali Singla
Abstract | PDFPDF
131. Development of Multilingual Assamese Electronic Dictionary
Pages :5446-5452
Saiful Islam, Bipul Syam Purkayastha
Abstract | PDFPDF
132. Microarray Analysis and Gene Expression : A simplified Review
Pages :5453-5458
Saad Subair and Hussah AlEisa
Abstract | PDFPDF
133. A Novel Lifelog Management Scheme for Improving Health-Related Quality of Life
Pages :5459-5464
Myung-Kyu Yi, Taeg Keun Whangbo
Abstract | PDFPDF
134. Natural Language Processing using NLTK and WordNet
Pages :5442-5445
Alabhya Farkiya, Prashant Saini, Shubham Sinha, Sharmishta Desai
Abstract | PDFPDF
135. Cluster Based Secure WSN against the Blackhole and Grayhole Attack
Pages :5470-5472
Ojashvi Shivwanshi, Rahul Patel, Preetika Saxena
Abstract | PDFPDF
136. Captcha as Textual Passwords with Click Points to Protect Information
Pages :5473-5477
Sandeep Kumar Vengala, Goje Roopa
Abstract | PDFPDF
137. Methodology for Deploying a Security Framework in Mission Critical Infrastructure Based Wireless Sensor Networks
Pages :5478-5486
Sudipto Roy, Manisha J Nene
Abstract | PDFPDF
138. A Survey to Support NFRs in Agile Software Development Process
Pages :5487-5489
Trupti Suryawanshi, Gauri Rao
Abstract | PDFPDF
139. A Secure Application For Shopping in Mall using NFC
Pages :5490-5492
Monika S. Borkar, Piyusha. Kadam, Nikita P.Pagar, Aboli G.More, Akshada Deokar, Trupti Suryawanshi
Abstract | PDFPDF
140. Multiple License Plate Location Identification Using the Optical Flow Algorithm and Blob Analysis
Pages :5493-5496
Remya Krishnan
Abstract | PDFPDF
141. Comparative Study of Web Search Methods Using Ontology
Pages :5497-5499
Anushree Mehta, Shreyansh Zatakia, Prof. Khushali Deulkar
Abstract | PDFPDF
142. Technical Review: Drip Irrigation System Using Wireless Sensor Network
Pages :5500-5502
Karishma Patel, Krishna Patel , Kajal Patel, Sandip Delwadkar
Abstract | PDFPDF
143. Frequent Pattern Mining and Customer Retention using Vertical Data Set and Boolean Matrix
Pages :5503-5504
S.Tejaswi, Ch.Sita Kameswari
Abstract | PDFPDF
144. Improved Hop-by-Hop Congestion Control Algorithm
Pages :5505-5508
Urvashi Handa, Padma Bonde
Abstract | PDFPDF
145. Adapting Property Graph Model to Overcome Modeling Challenges in Internet of Things (IoT)
Pages :5509-5511
Jagadeesh Hanumantegowda
Abstract | PDFPDF
146. Personalized Image Search Using Simple Case of One Word-Based Queries-An OverviewSensor Networks
Pages :5512-5517
Prof. Dipak R. Pardhi, Lalitkumar B. Borase
Abstract | PDFPDF
147. Article Removed
Pages :5518-5526
xxx,xxx
Abstract | PDFPDF
148. Computer Assisted Solution of Homotopy Continuation Method Algorithm for Darcy-Brinkman Forchheimer Flow through an 3D Animation Visualization
Pages :5527-5530
Ashoka S. B.
Abstract | PDFPDF
149. Large Scale Image Processing Using Distributed and Parallel Architecture
Pages :5531-5535
Helly M. Patel, Krunal Panchal, Prashant Chauhan, M. B. Potdar
Abstract | PDFPDF
150. A Review: Shadow Detection and Removal
Pages :5536-5541
Vijay Chondagar, Harshiv Pandya, Mehul Panchal, Rinkesh Patel, Dhaval Sevak, Kaushal Jani
Abstract | PDFPDF
151. Super Node Localization for Time Synchronization in UWSNs
Pages :5542-5546
Thota Nischala, T .Venkata Naga Jayudu
Abstract | PDFPDF
152. A Genetic Algorithm for Conformation Search Optimization in Molecular Docking
Pages :5547-5551
Sudha Ramachandra, Vinay Chavan
Abstract | PDFPDF
153. Mining Rare Association Rule
Pages :5552-5557
Arnab kumar Das
Abstract | PDFPDF
154. Yet Another nlogn Sorting
Pages :5558-5560
Arijit Bhattacharya, Satrajit Ghosh
Abstract | PDFPDF
155. Hidding secured information into secured image
Pages :5561-5564
J.Sabthami, N.Nivetha, P.Maheswari, S.Janani
Abstract | PDFPDF
156. An Efficient Algorithm for Sign Language Recognition
Pages :5565-5571
Pratibha Pandey, Vinay Jain
Abstract | PDFPDF
157. Caption Mining with Face Annotation Using Distributed Database
Pages :5572-5574
Afshan Jabeen, Raana Syeda
Abstract | PDFPDF
158. Performance Analysis of Novel Privacy Preserving Model for Location Based Servers in Mobile Clouds
Pages :5575-5582
Anjali Kalore, Prof.Megha Singh
Abstract | PDFPDF
159. Palmprint Recognition Using Transform Domain and Spatial Domain Techniques
Pages :5583-5587
Jayshri P. Patil, Chhaya Nayak
Abstract | PDFPDF
160. A Systematic Study and its Implementations of Wireless Sensor Networks in Real Time
Pages :5588-5592
P. J. Shriidhar, Dr. A. Senthil Kumar
Abstract | PDFPDF
161. Review on Quality-Aware Cloud Service Selection based on Hybrid Method using Cloudsim Toolkit
Pages :5593-5594
Prabhjot Kaur and Talwinder Kaur
Abstract | PDFPDF
162. A Novel Cryptographic Approach for Preventing Attacks in a Network
Pages :5595-5598
Pratibha Lanka, Ch. Sita Kameswari
Abstract | PDFPDF
163. ADWARE: A REVIEW
Pages :5599-5604
Seyhmus Yilmaz, Sultan Zavrak
Abstract | PDFPDF
   
-All rights are reserved by International Journal of Computer Science and Information Technologies-