IF

bh

 

VOLUME 7 ISSUE 2 March - April 2016

ISSN 0975 - 9646

1. A Distributed Learning System
Pages :465-466
Ritisha Thakar, Pratibha Pal, Bhavya Bangera, Prof. Anshika Gupta
Abstract | PDFPDF
2. Classification of Mammogram Using Wave Atom Transform and Support Vector Machine Classifier
Pages :467-470
A.Rajesh and Dr. Mohan Ellappan
Abstract | PDFPDF
3. A Literature Survey on Keyword Query Processing in Web Search Engines
Pages : 471-473
Kalyani Wagaj, Prof.Subhash Pingale
Abstract | PDFPDF
4. Application of Wireless Sensor Network at Home
Pages : 474-475
Geeta Gupta, Mohit Rathore, Binoda Nand Prasad, Vikas Gupta
Abstract | PDFPDF
5. A Survey on Ontology Building Methodologies and Tools for Indian Languages
Pages :476-479
Pooja Jidge, Prof. Sharvari Govilkar
Abstract | PDFPDF
6. A Survey on Text Categorization Techniques for Indian Regional Languages
Pages :480-483
Pooja Bolaj, Sharvari Govilkar
Abstract | PDFPDF
7. Deep Learning: The Holy Grail of Artificial Intelligence?
Pages :484-485
Dachapally Prudhviraj
Abstract | PDFPDF
8. A Novel Approach for Data Leakage Detection Using Steganography
Pages :486-489
P.P.Dandavate, Prof.S.S.Dhotre
Abstract | PDFPDF
9. Adaptive Sorting Using Machine Learning
Pages :490-493
Somshubra Majumdar, Ishaan Jain, Kunal Kukreja, Professor Kiran Bhowmick
Abstract | PDFPDF
10. A Multilevel Priority Packet Scheduling Scheme for Wireless Sensor Network (WSN)
Pages :494-497
Achyutha Prasad N, Dr. Siddaraju
Abstract | PDFPDF
11. Efficient Role-based self-organization Algorithm for Creation of Network in MANETs
Pages :498-502
Dinesh A. Kulkarni, Suhas H. Patil
Abstract | PDFPDF
12. Comparision and Assesment of Evolutionary and Parallel Genetic Algorithms for a Cryptarithmetic
Problem

Pages :503-506
Dr. J P Patra, Nayan Shivhare, Shraddha Verma
Abstract | PDFPDF
13. Profile Similarity Technique for Detection of Duplicate Profiles in Online Social Network
Pages :507-512
Dr. M. Nandhini, Bikram Bikash Das
Abstract | PDFPDF
14. Replica Detection and Eliminating XML Duplicates in Hierarchical Data
Pages :513-516
R.Rajkumar, M.Gayathri, S.Kanchana, Dr.S.Rajkumar
Abstract | PDFPDF
15. Alternatives to CAPTCHA
Pages :517-518
Siddharth Syal
Abstract | PDFPDF
16. Image Processing Approach for Grading And Identification Of Diseases On Pomegranate Fruit: An Overview
Pages :519-522
D. S. Gaikwad , K. J. Karande
Abstract | PDFPDF
17. Development of E-Scholarship System
Pages :523-530
Mohammed Abdullahi Jibrin, Muhammad Ndagie Musa, Shittu Tahir
Abstract | PDFPDF
18. New technique for Web page Information Categorization using Unsupervised Clustering
Pages :531-536
Neeraj Mehta, Avinash Rathore
Abstract | PDFPDF
19. Management of User Revocation with Public Auditing for Shared Data in the Cloud
Pages :537-539
ANJU T G, SIVADASAN E T
Abstract | PDFPDF
20. A Multimodal Approach to Biometric Recognition
Pages :540-545
Richie M. Varghese
Abstract | PDFPDF
21. Use of Elliptic Curve Cryptography for Integrity and Authentication
Pages :546-548
Swati Sucharita Barik, Smruti Sephalika Barik
Abstract | PDFPDF
22. Securing the Virtual Machines in Cloud Environment Using Hypervisor-based Technology
Pages :549-552
Gaurav Mhatre, Harshali Mhatre
Abstract | PDFPDF
23. Ridge Distance Averaging Based Matching for Interoperability of Fingerprint Sensors
Pages :553-561
M. Selvakumar, D. Nedumaran
Abstract | PDFPDF
24. A Study on Vision Based Sign Language Translation
Pages :562-565
Ashmi Chheda, Janvi Beed, Siddhi Barbhaya, Prof. Bhakti Palkar
Abstract | PDFPDF
25. SQL Injection Prevention by Blocking Internet Protocol Address after Analysing Error Message of
Database Server

Pages :566-569
Sanjay Mishra, Subodh Mishra, Vivek Sharma
Abstract | PDFPDF
26. Modified Animal Migration Optimization Algorithm for Numerical Function Optimization
Pages :570-574
AmrataSaraswat, Dushyant Singh
Abstract | PDFPDF
27. A Survey on Steganography Techniques & Genetic Algorithm based Steganography in Image Masking
Pages :575-576
Farheen Fatima, Shashwat Shukla, Brahma Hazela
Abstract | PDFPDF
28. Directory Structure and File Allocation Methods
Pages :577-582
Mandeep Kaur, Sofia Singh, Rupinder Kaur
Abstract | PDFPDF
29. Resolving Mobile Communique App Using Classification of Data Mining Technique
Pages :583-587
M.Mohamed Suhail, K.SyedKousarNiasi,
Abstract | PDFPDF
30. Survey on Cryptographic Schemes for Security in Cloud Data Storage
Pages :588-592
Mounesh, Pandurang.D.R, Basavaprabhu, Sagar V, Shyamala G
Abstract | PDFPDF
31. Cloud Computing Environment-Legal Obstacles
Pages :593-597
Sumeet V. Vinchurkar, Ajay A. Jaiswal
Abstract | PDFPDF
32. Performance of various Clustering Algorithm Used in Wireless Sensor Network
Pages :598-603
Ananya Saxena, Dr. Deepshikha Agarwal
Abstract | PDFPDF
33. ASMF: Attribute Signature Management Framework for Digital Document Security and Integrity
Pages :604-609
Deepika Pawar, Prof. Mahendra K. Verma
Abstract | PDFPDF
34. Smart Dustbins for Smart Cities
Pages :610-611
Bikramjit Singh, Manpreet Kaur
Abstract | PDFPDF
35. Facial Expression Detection
Pages :612-615
Nabeelaa Hanjgika, Dhara T Kurian
Abstract | PDFPDF
36. An Efficient Face Recognition & Tracking using Hybrid Filtering & Eigen Faces
Pages :616-619
MD Sarfaraz Jalil, Joy Bhattacharya
Abstract | PDFPDF
37. Survey on Trust Models in Peer to Peer File Sharing Systems
Pages :620-622
Aswani Ashok, Jayakumar T V
Abstract | PDFPDF
38. Prediction of Mobile Ad Click Using Supervised Classification Algorithms
Pages :623-625
M. Sree Vani
Abstract | PDFPDF
39. An Improved Reversible Data Hiding Scheme Using AMBTC Compression (IRSAC)
Pages :626-630
Pranjal Shrivastava, Sandeep Pratap Singh
Abstract | PDFPDF
40. Cloud based Magixphone and Web gaming Platform
Pages :631-633
Aditi Kore, Komal Lunkad, Pranjali Ingole, Sonia Gupta
Abstract | PDFPDF
41. Secured and Scalable Data Sharing by Authenticated User Using Key Aggregate Cryptosystem Technique
Pages :634-636
Shreya Kulkarni, Punam Channa, Chandani Madavi, Prof. D. A. Kulkarni
Abstract | PDFPDF
42. Speeding up of Search Engine by Detection and Control of Duplicate Documents on the Web
Pages :637-642
Rekha V R, Resmy V R
Abstract | PDFPDF
43. Applying Parallel Genetic and Considering Proximity for Resource Allocation in Cloud
Pages :643-646
Romil Chauhan, Yash Jain, Harsh Agarwal, Aruna Gawde
Abstract | PDFPDF
44. Assessment of Component Generality using Fuzzy Approach to Optimize Software Development Cost
Pages :647-654
Dr. Parul Gandhi
Abstract | PDFPDF
45. Flexible Content Based Video Surveillance System for crime Prevention based on moving object
detection

Pages :655-660
Snehal Anwekar, Isha Walimbe, Priyanka Suryagan,Alisha Gujarathi, Kalpana Thakre
Abstract | PDFPDF
46. Survey: Opinion Spam Detection Approaches and Techniques
Pages :661-664
P.N.V.S.Pavan Kumar, A.Suresh Babu , N.Kasiviswanath
Abstract | PDFPDF
47. Crop Recommendation and Fertilizer Purchase System
Pages :665-667
Mansi Shinde, Kimaya Ekbote, Sonali Ghorpade,Sanket Pawar, Shubhada Mone
Abstract | PDFPDF
48. A Review Paper on Energy Efficient Hierarchical Protocols in Wireless Sensor Networks
Pages :623-625
Zia Ur Rahman, Parul Yadav
Abstract | PDFPDF
49. Cyber Security Tools
Pages :672-674
Gunjan.Hardasmalani, Rashmi.Bajaj, Harsha.Sachdev
Abstract | PDFPDF
50. Comparative Analysis of IPV4 and IPV6
Pages :675-678
Samson Isaac
Abstract | PDFPDF
51. Big Data Security Analytics
Pages :679-681
K. Radhika, G. Vijaya
Abstract | PDFPDF
52. Hierarchical Cluster Based Energy Efficient Routing Protocol for Wireless Sensor Networks: A Survey
Pages :682-687
Puneet Gurbani, Hansa Acharya, Prof. Anurag Jain
Abstract | PDFPDF
53. Energy Efficient Data Gathering by Mobility Sink in Wireless Sensor Networks
Pages :688-691
R.Jayaprasanth, Kiran.R.Alex, K.Ashok Kumar
Abstract | PDFPDF
54. Performance Evaluation of Rule Enforced Information Flow Control System With Tagged Service Data For CSPs
Pages :692-699
Kirtibala Mali, Prof. Anurag Jain
Abstract | PDFPDF
55. Performance Analysis of AODV and AOMDV and Compare to the MAODV Routing Protocol for MANET Scenario
Pages :700-702
Megha Joshi, Praveen Kumar Goutam
Abstract | PDFPDF
56. Randomized Honey Bee Load Balancing Algorithm in Cloud Computing System
Pages :703-707
Monika Rathore, Sarvesh Rai, Navdeep Saluja
Abstract | PDFPDF
57. An Efficient method of Web Document Clustering with Semantic Representation of Documents
Pages :708-710
Raja Varma Pamba, Dr Elizabeth Sherly
Abstract | PDFPDF
58. Remote Access of Android Smart Phone
Pages :711-714
Onkar Mule, Nihal Shaikh, Pratik Shinde, Amit Wagaskar, Prof. Sneha Ramteke
Abstract | PDFPDF
59. The second-order nonlinearity of a class of Boolean functions
Pages :715-720
Manish Garg
Abstract | PDFPDF
60. Noise Reduction in MRI Images using Contourlet Transform and Threshold Shrinkages Techniques
Pages :723-728
Jannath Firthouse.P, Shajun Nisha.S, Dr.M.Mohammed Sathik
Abstract | PDFPDF
61. Secured Sharing of Medical Data on Hybrid Cloud Environment
Pages :729-733
M.Nandhini, K.A.Muthukumar
Abstract | PDFPDF
62. Selective De-noising of Sparse-Coloured Images
Pages :734-737
Arjun Chaudhuri
Abstract | PDFPDF
63. An Experimental Study of Performance Comparison for Various Parallel Sorting Algorithms
Pages :738-740
Jagdeep Singh, Alka Singh, Garima Singh
Abstract | PDFPDF
64. A Review of Load Balancing Technique of Cloud Computing Using Swarm Intelligence
Pages :741-744
Abhishek Kumar Tiwari, Sreeja Nair
Abstract | PDFPDF
65. Distributed Content Aggregation& Content Change Detection using Bloom Filters
Pages :745-748
Sornalingam Nadaraj
Abstract | PDFPDF
66. A Methodology for Incorporation of Domain Ontology in Knowledge Discovery Process for Interpretation and Improvement of Mining Results
Pages :749-754
Joachim Narzary, Dr. S. Siva Sathya, Minisrang Basumatary
Abstract | PDFPDF
67. Quantitative Analysis of Dairy Product Packaging with the Application of Data Mining Techniques
Pages :755-759
Ankita Chopra, Yukti Ahuja, Mahima Gupta
Abstract | PDFPDF
68. Web Based Placement Management System
Pages :760-763
Anjali.V, Jeyalakshmi.PR, Anbubala.R, Sri Mathura devi.G ,Ranjini.V
Abstract | PDFPDF
69. Extracting More Relevant Features from Color Image for Enhancing the Image Retrieval Using
Genetic Algorithm

Pages :764-768
Aruna Bajpai
Abstract | PDFPDF
70. Big Data Concepts and Analysis: A Survey
Pages :769-772
Ran vijay singh, Sheenu Rizvi
Abstract | PDFPDF
71. Robotic Control Using an Android Application
Pages :773-776
Saurabh Khoje, Devendra Urad, Monika Shirke, Prof. Anita Shinde
Abstract | PDFPDF
72. Object Tracking and Motion Estimation Using Particle Swarm Optimization
Pages :777-779
Yateen Kedare, Rohit Thakare, Jayesh Raghuwanshi, Vedant Deokar
Abstract | PDFPDF
73. Privacy My Decision: Control of Photo Sharing on Online Social Networks
Pages :780-782
P.Srilakshmi, S.Aaratee, S. Subbalakshmi
Abstract | PDFPDF
74. Triple Layer Security to Data in Cloud
Pages :783-785
R.Kalaivani
Abstract | PDFPDF
75. Determining an Optimal Parenthesization of a Matrix Chain Product using Dynamic Programming
Pages :786-792
Vivian Brian Lobo, Flevina D’souza, Pooja Gharat, Edwina Jacob, and Jeba Sangeetha Augestin
Abstract | PDFPDF
76. Secured Digital Image Watermarking by using a Hybrid Technique with Kalman Filtering
Pages :793-798
Samreet Kaur, Ravneet Kaur Sidhu
Abstract | PDFPDF
77. Cyber Attack Detection Techniques – Solutions
Pages :799-801
P.Vishalini, K.Swaroopa Rani, Ch.Vimala
Abstract | PDFPDF
78. Performance Analysis of SSA under the Secure Environment
Pages :802-806
Navpreet Bhathal, Sukhpreet Kaur
Abstract | PDFPDF
79. Survey on Secure Data Self-Destructing Scheme in Cloud Computing
Pages :807-808
M.Bhandari, Pooja Chaudhari, Sonal Sonawane, Bhagyashree Shetkar,. Manisha Konde
Abstract | PDFPDF
80. Diversification of User Recommendations Using Entropy Redistribution
Pages :809-810
Abhinav Pachauri
Abstract | PDFPDF
81. Improve the Efficiency of Load Balancing in Cloud Environment using DAG and Honey Bee Algorithm
Pages :811-815
Abhishek Kumar Tiwari, Sreeja Nair
Abstract | PDFPDF
82. Location Based Advertising Promotions on Mobile Device
Pages :816-819
Yogita V. Salvi, Dr.V.R.Ghorpade
Abstract | PDFPDF
83. An Improved and Optimal Prediction of Bone Disease Based On Risk Factors
Pages :820-823
M.Saranya, K.Sarojini
Abstract | PDFPDF
84. Article Removed
Pages :824-826
xxx, xxx
Abstract | PDFPDF
85. Review On: Privacy-Preserving in Wireless Networks
Pages :827-829
Vishal Mahajan, Priyakanksha Mahajan
Abstract | PDFPDF
86. A Review Paper on Solving 0-1 knapsack Problem with Genetic Algorithms
Pages :830-832
Veenu Yadav, Ms.Shikha Singh
Abstract | PDFPDF
87. Genetic Algorithm for Outlier Detection
Pages :833-835
Maria Afzal, S M Arif Ashraf
Abstract | PDFPDF
88. Content Based Video Retrieval System
Pages :836-838
Yojita Raut, Madhuri Shimpi, Mansvi Patil
Abstract | PDFPDF
89. Securing the Clouds using OTP Technology
Pages :839-842
Sandeep Mali, Kishor Sawant, Nilesh Thombare, Vinod Bharat
Abstract | PDFPDF
90. Towards Better Accuracy and Risk Handling In Cost Estimation Using Assessment Values
Pages :843-848
Renu Goswami, Ajay Kumar Sharma
Abstract | PDFPDF
91. Didactics in Online Learning Technical Courses: A Case Study Based on Activity Theory
Pages :849-854
Abdelali IBRIZ, Mohamed BENSLIMANE , Kamar OUAZZANI
Abstract | PDFPDF
92. Automatic Load Balancing of Applications Using Class Constrained Bin Packing Algorithm: A Review
Pages :855-857
Akshay Karale, Shradha Katte,Prashant Yadav, Chetan Godha
Abstract | PDFPDF
93. Parallel Popular Crime Pattern Mining in Multidimensional Databases
Pages :858-863
BVS. Varma, V. Valli Kumari
Abstract | PDFPDF
94. Data Access For Cloud Users Using Strong Token Authentication
Pages :864-870
Ali Asgar Hussain, Reetu Gupta
Abstract | PDFPDF
95. Autonomous Cloud Computation with Distribution Enactment and Proficient Data Veracity Process
Pages :871-874
Joshuva Baretto, Prof Mohan K
Abstract | PDFPDF
96. A Literature Survey on Efficient Software Bug Triaging Using Software Data Reduction Techniques
Pages :875-877
Prof. Subhash Pingale, Prof. R.A.Taklikar, Ankita Godse
Abstract | PDFPDF
97. Performance Measure of Hard c-means,Fuzzy c-means and Alternative c-means Algorithms
Pages :878-883
Binoda Nand Prasad, Mohit Rathore, Geeta Gupta, Tarandeep Singh
Abstract | PDFPDF
98. Service Composition Techniques for a Context- Aware Smart Hospital Ward Monitoring System
Pages :884-887
Ashok Immanuel V, Preethi R
Abstract | PDFPDF
99. I-Detector: An Intelligent Real Time Monitoring Vehicle System for Taxis
Pages :888-890
Akshay Malkampate, Apurva Maandaay, Rahul Mandora
Abstract | PDFPDF
100. Adapting Web Content Using Internet Speed for Mobile Devices
Pages :891-892
Yugandhara R. Firake, Pooja Sharma , Sayali Sinkar, Vishakha Warade
Abstract | PDFPDF
101. Time-Frequency Spectral Analysis of Single - Channel Earthquake Data for P-Wave Detection
Pages :893-895
Pooja Sarin, Prof. Poonam Dabas
Abstract | PDFPDF
102. Face Recognition Using Artificial Neural Networks
Pages :896-899
Abhjeet Sekhon and Dr. Pankaj Agarwal
Abstract | PDFPDF
103. Multipath Routing Protocol for MANET
Pages :900-902
Versha Matre, Girish Kaushal, Piyush Chouhan
Abstract | PDFPDF
104. Cache Related Pre-emption Delays in Probabilistic Real Time System
Pages :903-907
Prof. Minal V. Domke, Prof. Pritee Saktel, Prof. Ekta Gupta
Abstract | PDFPDF
105. Unmanned Ground Vehicle Using Ultrasonic Ranging module
Pages :908-909
Krutika Basinge, Sejal Nagpure, Punam Shinde, Prof.Y.K.Sharma
Abstract | PDFPDF
106. ECCS MENU: A Novel Implementation of Electronic Clearance Scheme
Pages :910-912
Charu Thaore, Gaurav Thapliyal
Abstract | PDFPDF
107. VD-kNN Query Processing over Untrusted Cloud
Pages :913-918
Utsav Raychaudhuri, Chandni Singhal, Neelima Shahi, Shital Jadhav, Vaishali Kolhe
Abstract | PDFPDF
108. Scheduling in the Queuing System with Asynchronously Varying Service Rates
Pages :919-921
Shyamsundar R, Geofrin Shirly. S
Abstract | PDFPDF
109. DIGITAL IMAGE PROCESSING – Sequence, Components and Pros
Pages :922-924
K.Radhika, P.Vishalini
Abstract | PDFPDF
110. Analysis of Fraud Detection Mechanism in Health Insurance Using Statistical Data Mining Techniques
Pages :925-927
Pravin R. Bagde, Manoj S. Chaudhari
Abstract | PDFPDF
111. Opportunistic Routing Protocols for Wireless Sensor Networks: A Survey
Pages :928-931
Mounika M, Chinnaswamy C N
Abstract | PDFPDF
112. A Study on Agent Based Modelling for Traffic Simulation
Pages :932-936
Priyadarsini Ghadai, L.Prachi Shree, Lelina Chhatria, RVVSV Prasad
Abstract | PDFPDF
113. Analyzing Social Media Data for Understanding Student’s Problem Based on Clustering Techniques
Pages :937-941
Shrinivas R Goud, Rahul Gaikwad
Abstract | PDFPDF
114. Parallelizing 1D Midpoint Displacement Algorithm for Terrain Generation
Pages :942-944
Yadav Mayank Subhash, Prakash Tripathi, P.S.Rao
Abstract | PDFPDF
115. Approaches to Rank Technical Blog Users : A Survey
Pages :945-950
Amruta Jadhav, Sharvari Tamane
Abstract | PDFPDF
116. ANALYSIS OF MESSAGE PASSING IN FOS: An Operating System for Clouds and Multicores
Pages :951-953
Akansha Gautam , Soma Sircar , Pankaj Gupta
Abstract | PDFPDF
117. SFITBOT
Pages :954-956
Natalina Rodrigues, Samiksha Salgaonkar, Shreya Salunke, Natasha Rego
Abstract | PDFPDF
118. Real Time Data Mining Using Cyber Physical System
Pages :957-959
Pallavi .P.Pophale , Dr.M.S.Ali
Abstract | PDFPDF
119. Prevention for Direct and Indirect Discrimination in Data Mining
Pages :960-963
Ms Nikhita B Ugale, Prof S D Deshpande
Abstract | PDFPDF
120. Enhanced SSO based Multi-Factor Authentication for Web Security
Pages :960-966
Shruti Bawaskar , Prof. Mahendra Verma
Abstract | PDFPDF
121. To Enhance Type 4 Clone Detection in Clone Testing
Pages :967-971
Swati Sharma, Priyanka Mehta
Abstract | PDFPDF
122. A Survey of Methods and Strategies in Tamil Palm Script Recognition
Pages :972-977
B. Kiruba, Mr.K.Manikandan
Abstract | PDFPDF
123. Ranking Web Forum Radical Influential Users Based On Textual Data through Sentiment Classification
Pages :978-982
J.Jovitha Fastina, Dr.Ilango Krishnamurthi
Abstract | PDFPDF
124. Encryption Algorithm for Cloud Computing
Pages :983-989
Ankita Nandgaonkar, Prof. Pallavi Kulkarni
Abstract | PDFPDF
125. Correlation Based Image Tampering Detection
Pages :990-995
Priya Singh, Shalini Sharma Goel
Abstract | PDFPDF
126. Survey for Incentive Mechanism to Reduce Problem of Free Riders in Peer To Peer Network
Pages :996-1003
Priyanka kumrawat, Kamal Borana
Abstract | PDFPDF
127. Comparative Analysis of C, FORTRAN, C# and Java Programming Languages
Pages :1004-1007
Keshav Biswa, Bishal Jamatia, Deepjyoti Choudhury, Pallabi Borah
Abstract | PDFPDF
128. Parallel Histogram Sorting in MPI
Pages :1008-1010
Abhishek Pasari, Pentyala Srinivasa Rao
Abstract | PDFPDF
129. Improvement in Estimation of Unidentified Value (Gene Expression Data) in Biotechnology
Pages :1011-1013
Baitali Nath, Bindu Agarwalla, Laxman Sahoo
Abstract | PDFPDF
130. Survey of MANET Attacks, Security Concerns and Measures
Pages :1014-1017
Shweta Jadye
Abstract | PDFPDF
   
-All rights are reserved by International Journal of Computer Science and Information Technologies-