IF

 

bh

 

VOLUME 7 ISSUE 4 July - August 2016

ISSN 0975 - 9646

1. Secure Password Transfer Using Randomized Grids
Pages :1655-1659
Aranta Rokade, Sandesh Gupta, Supriya Rokade, Vidhi Sanghavi
Abstract | PDFPDF
2. Comparative Study of Web Services Using Evolutionary Algorithms
Pages :1660-1663
Priyanka Saxena, U. Datta
Abstract | PDFPDF
3. Extensible Multi Agent System for Heterogeneous Database Unification Using Parallel Task and Segmentation Algorithm
Pages : 1664-1669
A.Ramar, M.Elamparuthi
Abstract | PDFPDF
4. Estimate Optimum Architecture of SOM Neural Network and Its Weigh Adjustment Using Particle Swarm Optimization
Pages : 1670-1673
Aradhana Mishra, Pradeep Kumar Mishra
Abstract | PDFPDF
5. Physiological Parameters Used To Monitor Asthma
Pages :1674-1677
Nidhi Banga, Neelam Rup Prakash
Abstract | PDFPDF
6. A Survey on Web Authentication Methods for Web Applications
Pages :1678-1680
Ch.Jhansi Rani, SK.Shammi Munnisa
Abstract | PDFPDF
7. A Proposed Security Framework for Enhancing User Privacy on Android Platform
Pages :1681-1683
Ritu Talreja, Dilip Motwani
Abstract | PDFPDF
8. A Comprehensive Survey on Variants in Artificial Bee Colony (ABC)
Pages :1684-1689
S. Neelima, N. Satyanarayana, P. Krishna Murthy
Abstract | PDFPDF
9. Dashboard using Data Analytics and Statistical Modeling
Pages :1690-1695
Sunad M, Aditya Naik, Mrinal Panda, Swarnim Suman,Radhika K R
Abstract | PDFPDF
10. Community Based Routing in Delay Tolerant Mobile Social Networks
Pages :1696-1700
M.Kapilakaviya, G.Thilipkumar
Abstract | PDFPDF
11. An Analysis of Mutation Operator in Mutation Testing
Pages :1701-1704
Bajirao Baban Kondbhar, Prof. Dr. Emmanuel M
Abstract | PDFPDF
12. Introduction to Interaction Overview Diagram as a Model
Pages :1705-1710
Sumender Roy, Dr Samuel Vara Prasada Raju
Abstract | PDFPDF
13. Multi-Protocol Label Switching Traffic Engineering-Link Protection
Pages :1711-1714
Balaji Tedla, Dr.K.Suresh Babu
Abstract | PDFPDF
14. Effectiveness of Different Similarity Measures for Text Classification and Clustering
Pages :1715-1720
Komal Maher, Madhuri S. Joshi
Abstract | PDFPDF
15. Opinion Mining: A Research in Agriculture
Pages :1721-1722
Nayan. S. Patel, Dr. Dipti. B. Shah
Abstract | PDFPDF
16. Preprocessing on Digital Image using Histogram Equalization: An Experiment Study on MRI Brain Image
Pages :1723-1727
Musthofa Sunaryo, Mochammad Hariadi
Abstract | PDFPDF
17. General Meta Model of Software Quality
Pages :1728-1734
Adil KHAMMAL, Youness BOUKOUCHI, Mohamed Amine HANINE, Abdelaziz MARZAK
Abstract | PDFPDF
18. Prediction of Fake Profiles on Facebook using Supervised Machine Learning Techniques-A Theoretical Model.
Pages :1735-1738
Suheel Yousuf Wani, Mudasir M Kirmani, Syed Imamul Ansarulla
Abstract | PDFPDF
19. Captcha as a Graphical Password with Multilayered Enhanced Security by Clique Point Technique
Pages :1739-1742
Monica Auti, Prof. Sachin Patil
Abstract | PDFPDF
20. Performance Metrics for Eigen and Fisher Feature Based Face Recognition Algorithms
Pages :1743-1752
Harihara Santosh Dadi, Gopala Krishna Mohan Pillutla
Abstract | PDFPDF
21. The Integrated and Efficient Implementation based on Self Destructing Data System for Active
Storage Summarization

Pages :1753-1756
Kriti Jain, Anand Rajavat
Abstract | PDFPDF
22. An Alternative Approach to Image Steganography and its Evaluation
Pages :1757-1759
Aakanksha Agarwal,Aditya N. Bhatt and Yogin B. Bhatt
Abstract | PDFPDF
23. Wavelet Based Approach to Solve Eigenmodes in A Rectangular Waveguide
Pages :1760-1762
Manisha Khulbe, H. Parthsarthy
Abstract | PDFPDF
24. Document Recommendation Using Keyword Extraction for Meeting Analysis
Pages :1763-1766
Kumodini V. Tate, Bhushan R. Nandwalkar
Abstract | PDFPDF
25. Design and Implementation of Boosting Classification Algorithm for Sentiment Analysis on Newspaper Articles
Pages :1767-1770
Prabhjot Kaur, Rupinder Kaur Gurm
Abstract | PDFPDF
26. Web Based Expert System to Detect and Diagnose the Leaf Diseases of Cereals in Punjabi Language
Pages :1771-1773
Rajvir kaur#, Salam Din
Abstract | PDFPDF
27. Improvement Estimate Wind Turbine Power Generation Using Machine Learning Techniques
Pages :1774-1778
Swarna Jain, Anil Pimpalapure
Abstract | PDFPDF
28. A Survey on Android Malwares and their Detection Mechanisms
Pages :1779-1782
Nancy, Dr. Deepak Sharma
Abstract | PDFPDF
29. Implementation and Analysis of IPS˗AODV for Emergency scenario in MANET
Pages :1783-1787
Kanika, Dr. Vineet Sharma
Abstract | PDFPDF
30. Handwritten English Character Recognition using HMM, Baum-Welch and Genetic Algorithm
Pages :1788-1794
Atmaprakash Singh, Ravindra Nath, Santosh Kumar
Abstract | PDFPDF
31. Color, Texture and Shape Hybrid Features Based Image Retrieval System
Pages :1795-1800
Deepa Dubey, Vivek Suryawanshi
Abstract | PDFPDF
32. Detection Model for CSRF and Broken Authentication and Session Management Attack
Pages :1801-1804
Virginia Mary Nadar, Madhumita Chatterjee, Leena Jacob
Abstract | PDFPDF
33. Rule Based Phonetic Search for Slavic Surnames
Pages :1805-1808
Janki B. Pardeshi, B .R. Nandwalkar
Abstract | PDFPDF
34. An Improved Technique for Gait Recognition Based On PAL and PAL Entropy Image
Pages :1809-1812
Deepti Gautam, Nirendra Kumar
Abstract | PDFPDF
35. Secure Data Aggregation forEnhancingQoS in H-WSN
Pages :1813-1817
Shubhangi Gaikwad, S. V. Todkari
Abstract | PDFPDF
36. An Efficient Framework to Handle DoS Attack by Using Software Puzzle and Decision Tree
Pages :1818-1821
Jyoti Shende, S. Todkari
Abstract | PDFPDF
37. Reduction and Classification of Feature of Cyber Attack Data: Brief Review
Pages :1822-1825
Himanshu Shroti, Kaptan Singh
Abstract | PDFPDF
38. Effective Pattern Identification Approach for Text Mining
Pages :1826-1830
Vaishali Pansare
Abstract | PDFPDF
39. Location Based Opinion Mining of Real Time Twitter Data
Pages :1831-1835
Gargi Mishra, Shivani Varshney
Abstract | PDFPDF
40. A Data Placing Policy Established on Genetic Algorithm in Cloud Computing
Pages :1836-1846
Y.Neeraja, G.Divya Zion, U.Supriya
Abstract | PDFPDF
41. BALANCING LOAD USING GENETIC CRITERIA IN CLOUD COMPUTING
Pages :1847-1856
S. Kowser Sultana, G. Divya Zion, U. Supriya
Abstract | PDFPDF
42. Scheduling the family jobs using Genetic algorithm for Big Data Clouds
Pages :1857-1867
T. Uma Devi, G. Divya Zion, U. Supriya
Abstract | PDFPDF
43. Implementation of Advanced Encryption Standard Algorithm
Pages :1868-1871
H. B. Pethe, Dr. S. R. Pande
Abstract | PDFPDF
44. Review of Offloading Approaches in Mobile Cloud Computing
Pages :1872-1874
Ishali Jain, Rekha Bhatia
Abstract | PDFPDF
45. An Efficient and Privacy Preserving in Multi- Keyword Ranked Search over Encrypted Cloud Data
Pages :1875-1879
Jaikishan A Tindwani#1, Prof. Aruna K Gupta
Abstract | PDFPDF
46. Protected Authorized Deduplication on Cloud Using Hybrid Cloud Approach
Pages :1880-1885
Dr.V.Goutham, G.Shivakrishna, M.Prathyusha
Abstract | PDFPDF
47. A Literature Survey on Web Image Re-Ranking
Pages :1886-1888
Prof. Prakash Gadeka, Jayshri Kokare, Prof. Subhash Pingale
Abstract | PDFPDF
48. Ranking Technically Influential Users on Web Blogs
Pages :1889-1893
Amruta K. Jadhav, Sharvari Tamane
Abstract | PDFPDF
49. Leach Protocol in Wireless Sensor Network: A Survey
Pages :1894-1896
Reshma I. Tandel
Abstract | PDFPDF
50. Load Balancing with Secure and Privacy Preserving by NTRU Implementation for Customer-Side Networks
Pages :1897-1901
Nitesh Wamanrao Dangare, Prof. S.D. Satav
Abstract | PDFPDF
51. Enhancing Fire Detection for Indoor and outdoor locations via video surveillance
Pages :1902-1906
Rohini Ravindra Jadhav, Prof. P.D. Lambhate
Abstract | PDFPDF
52. Enhanced Elman Neural Network and Its Applications in Agriculture
Pages :1907-1910
Shyamsundar Narayan Patil, Priti Subramanium
Abstract | PDFPDF
53. Data Leakage Detection with K-Anonymity Algorithm
Pages :1911-1915
Wakhare Yashwant R, B. M. Patil
Abstract | PDFPDF
54. Learning System Development Using Ontology and Learning Objects
Pages :1916-1917
Tanaji Jadhav, Harshit Gupta, Chinmay Kshirsagar
Abstract | PDFPDF
55. In-line Deduplication for Cloud storage to Reduce Fragmentation by using Historical Knowledge
Pages :1918-1921
Reshma A. Fegade, Prof. R. D. Bharati
Abstract | PDFPDF
56. An Effective Computation Offloading from Mobile Devices to Cloud
Pages :1922-1927
Jaya Ashok Suradkar, Prof. R. D. Bharati
Abstract | PDFPDF
57. Scalable and Efficient Keyword-based Semantic Search over Encrypted Multi-Cloud Data
Pages :1928-1931
Shraddha Ingale, Prof. Dr. B. D. Phulpagar
Abstract | PDFPDF
58. A Novel Method for Making Cut-Copy-Paste Operations Using Clipboard
Pages :1932-1935
Mayur M Patil, Akkamahadevi R Hanni, Priyadarshini M Patil
Abstract | PDFPDF
59. Deep Web Mining and its Application in Business Intelligence
Pages :1936-1939
RAKESH KUMAR BALODA, PRAVEEN KANTH
Abstract | PDFPDF
60. Public Auditing on Shared Data in the Cloud Using Ring Signature Mechanism
Pages :1940-1946
Gayatri D Patwardhan, Prof.B. W. Balkhande
Abstract | PDFPDF
61. Face Recognition
Pages :1947-1951
Ajay Kumar, Navdeep Kaur
Abstract | PDFPDF
62. Assessing Body Volume Index Using Neural Networks
Pages :1952-1954
C.Vishnu Prasad and Dr.D.Gladis
Abstract | PDFPDF
63. Prediction, Sentimental Analysis and Visualization of Static and Dynamic football data using Hadoop
in a Multi-Node system

Pages :1955-1959
Shalom Mathews , Rohan Naik, Keziah Elsa John
Abstract | PDFPDF
64. An Algorithm to Transpose Zero- One Matrix
Pages :1960-1961
Sanil Shanker KP
Abstract | PDFPDF
65. A Review on Reactive & Proactive Routing Protocols and Security Breaches and Remedies in MANETs
Pages :1962-1965
Mohammed Aziz Ahmed, Mohammed Sirajuddin, Nazia Kouser
Abstract | PDFPDF
66. Secure Mobile Adhoc Network using AES and RSA
Pages :1966-1969
Anshul Jain, Sumeet Dhillion, Yogendra Kumar Jain
Abstract | PDFPDF
67. Android Malware Detection using Decision Trees and Network Traffic
Pages :1970-1974
Nancy, Dr. Deepak Sharma
Abstract | PDFPDF
68. An Approach to classify Acute Myelogenous Leukemia Using LBP Based Features
Pages :1975-1978
Neena George, Lisha Mathai
Abstract | PDFPDF
69. An Approach to Cluster Web Pages for Personalization of Web Search
Pages :1979-1985
Amol Rajmane, Pradeep Patil
Abstract | PDFPDF
70. A Survey on Erasure Coding Techniques for Cloud Storage System
Pages :1986-1997
Kiran P. Pawar, R. M. Jogdand
Abstract | PDFPDF
71. Data Mining With Incremental Mapreduce
Pages :1998-2001
Trupti Maruti Shinde, Prof. Santosh V.Chobe
Abstract | PDFPDF
72. Ontology Based Data Extraction for Mining Services in Crawler
Pages :2002-2005
Surekha Rikame, Prof.S.V. Chobe
Abstract | PDFPDF
73. Test Suite Generation of t- way CIT with constraints for Web Based Application
Pages :2006-2010
B. Vani, Dr. R. Deepalakshmi
Abstract | PDFPDF
74. Extracting Content Structure from Web Pages by Applying Vision based Approach
Pages :2011-2016
Prof.K.S.Kadam, Prof.A.B.majgave, Prof.Y.M.Kamble
Abstract | PDFPDF
75. An Ontology-Based Enhance Term Prediction Algorithm and Union of Divers D-Matrix
Pages :2017-2020
Seema Jadhav, Prof.Santosh Chobe
Abstract | PDFPDF
76. Detecting Facial Wrinkles based on Gabor Filter using Geometric Constraints
Pages :2021-2025
Ashwini Jalindar Mawale, Archana Chaugule
Abstract | PDFPDF
77. Balancing Load Using Genetic Criteria in Cloud Computing
Pages :2026-2034
S. Kowser Sultana, G. Divya Zion, U. Supriya
Abstract | PDFPDF
78. Evaluation of Sensitive Data Security in Android
Pages :2035-2040
Ch.Naveen Kumar Reddy, C.Ramakrishna
Abstract | PDFPDF
79. Secure Image Transmission using Color Transformations and Difference Expansion Data Embedding Technique
Pages :2041-2045
Pooja Shelar, Archana Chaugule
Abstract | PDFPDF
80. A Simulation Set-Up for Delivery of User Data Groups through Multimedia Broadcast Multicast Service
Pages :2046-2051
Debasis Mukherjee
Abstract | PDFPDF
81. Handling Multi Objectives of with Multi Objective Dynamic Particle Swarm Optimization
Pages :2052-2058
Richa Agnihotri, Dr. Shikha Agrawal, Dr. Rajeev Pandey
Abstract | PDFPDF
82. Request Distribution Strategies in Cluster Based Network Servers
Pages :2059-2062
V.Hema, Dr. K.Kungumaraj
Abstract | PDFPDF
83. Website Personalization based on Link Analysis, Navigational Patterns and Web Content
Pages :2063-2067
Atul N. Pawar, Dr. Suresh K. Shirgave
Abstract | PDFPDF
84. Unsupervised Web Data Extraction Using Trinary Trees
Pages :2068-2070
Prof. N. M. Sawant, Prof. V. V. Pottigar, Miss. P. B. Lamkane
Abstract | PDFPDF
85. Medical Search Engine For More Accurate and Specific Search Results in Cancer Patients Data
Pages :2071-2074
Venkat Reddy Korupally, Subba Rao Pinnamaneni
Abstract | PDFPDF
86. Roads Paved for Reuse in Software Engineering
Pages :2075-2079
N.Krishna Chythanya, Prof. Dr.Lakshmi Rajamani
Abstract | PDFPDF
87. Secure and Effective Web Searching Experience Using Cumulative Weighted Page Rank Algorithm
Pages :2080-2083
Megha Bhawsar, Tejalal Choudhary
Abstract | PDFPDF
88. A Study on Application-Aware Local-Global Source De-duplication for Cloud Backup Services of Personal Storage
Pages :2084-2086
G.Arunajyothi
Abstract | PDFPDF
89. Efficient & Secure data Retrieval technique using CP-ABE for decentralized DTNs.
Pages :2087-2089
Prof. A.A.Rajguru, Prof. V.V.Pottigar, P.A.Patil
Abstract | PDFPDF
90. Prediction of Type 2 Diabetes using Optimized ANFIS with Genetic Algorithm and Particle Swarm Optimization
Pages :2090-2095
Alby S, Dr. B L Shivakumar
Abstract | PDFPDF
91. A Cryptosystem Based On Vigenere Cipher By Using Mulitlevel Encryption Scheme
Pages :2096-2099
Sanjeev Kumar Mandal, A.R Deepti
Abstract | PDFPDF
92. A Survey on Big Data Analytics Using Hadoop Ecosystem Tools
Pages :2100-2102
Monika Yadav, Sonal Chaudhary
Abstract | PDFPDF
93. Sustainable Development of Grampanchayat through E-Governance
Pages :2103-2107
Amit N. Sangole, S.A.Bhura
Abstract | PDFPDF
94. An Application Awareness Local Source and Global Source De-Duplication with Security in resource constraint based Cloud backup services
Pages :2108-2112
S.Meghana
Abstract | PDFPDF
95. Multicast Security Using RSA for Inter Cluster Communication with Rekeying in MANET
Pages :2113-2118
G. Sankara Rao, E. Jagadeswara Rao, K. Suneeta, H. Vanajarani
Abstract | PDFPDF
96. Performance Analysis of Attribute Signature Management Framework(ASMF) for Digital is Document Security and Integrity
Pages :2119-2124
Deepika Pawar, Prof. Mahendra K. Verma
Abstract | PDFPDF
97. Analyzing Social Media Data in Educational Sectors Using Data Mining Techniques
Pages :2125-2129
Manjunath B Talawar, Prasad.M.R, Sreenatha M, Niranjan C Kundur
Abstract | PDFPDF
98. Face Recognition System on Mobile Device based on Web Service approach
Pages :2130-2135
Angelo Galiano, Alessandro Massaro, Donato Barbuzzi, Mattia Legrottaglie, Valeria Vitti, Leonardo Pellicani, Vitangelo Birardi
Abstract | PDFPDF
99. Performance analysis of Key Frame Extraction using SIFT and SURF algorithms
Pages :2136-2139
Suhas Athani, CH Tejeshwar
Abstract | PDFPDF
100. A Novel Approach of Syntactic Similarity of Question Analogous System
Pages :2140-2144
Neha kumari, Sukhbir Kaur
Abstract | PDFPDF
   
-All rights are reserved by International Journal of Computer Science and Information Technologies-