IF

 

bh

 

VOLUME 8 ISSUE 2 March - April 2017

ISSN 0975 - 9646

1. Object Detection Using Background Subtraction Tolerating Sudden Background Variations
Pages :146-148
Aruna A S, Deepthi K
Abstract | PDFPDF
2. An Empirical Study of Geographic Popularity Patterns of Motion Picture Content across Europe
Using Unsupervised Machine Learning

Pages :149-152
Pawan Dwivedi, Pentyala Srinivasa Rao
Abstract | PDFPDF
3. An Efficient Dynamic Data Replication for HDFS using Erasure Coding
Pages :153-158
Franklin John, Suji Gopinath, Elizabeth Sherly
Abstract | PDFPDF
4. Threshold Based Enhanced Segmentation Technique for Early Detection and Prediction of Lung Cancer
Pages :159-162
Sneha Kumari
Abstract | PDFPDF
5. Comparison Study of Algorithms Used for Feature Extraction in Facial Recognition
Pages :163-166
Shreyas N Raj, Prof.Vijayalakshmi Niar
Abstract | PDFPDF
6. CURVELET Based IMAGE COMPRESSION
Pages :167-169
Sree Lekshmi A N, Lekshmi Priya A N
Abstract | PDFPDF
7. An IOT Based Appliances Control for Smart Homes
Pages :170-174
Padilla Syamala, Ch. Lalitha
Abstract | PDFPDF
8. Hybrid Technique for Medical Image Segmentation to detect Brain Tumour
Pages :175-177
S.U.Ravi Kumar Chavali, Dr.I.H.Nagaraja Rao
Abstract | PDFPDF
9. Joint Activities of Market Basket Analysis and Product Facing for Business Intelligence oriented
on Global Distribution Market: examples of data mining applications

Pages :178-183
Alessandro Massaro, Angelo Galiano, Donato Barbuzzi, Leonardo Pellicani, Giuseppe Birardi, Davide
Donato Romagno, Luisa Frulli
Abstract | PDFPDF
10. Parameter Optimization using Genetic Algorithm for Classification of Multispectral Satellite Images
Pages :184-186
Mamta N. Marbate, Dr. M. M. Raghuwanshi
Abstract | PDFPDF
11. A Hybrid Particle Swarm Optimization Algorithm for Solving Optimization Problem
Pages :187-189
Pintu Pal
Abstract | PDFPDF
12. The Security SEAL : A Security Solution for SMART CITIES
Pages :190-193
Sri Harsha
Abstract | PDFPDF
13. Automatic Text Summarization with Cohesion Features
Pages :194-198
Nilesh R. Patil, Girish Kumar Patnaik
Abstract | PDFPDF
14. Distributed Intrusion Detection System Using Clustering approach And Genetic Algorithm
Pages :199-207
Snehil Dahima, Dr. Jitendra Sheetlani
Abstract | PDFPDF
15. A Survey on Computing, Communication& Identification Technologies Used For Internet of Things
Pages :208-211
Prof. Apurva B. Parandeka, Prof. Ambarish R. Bhuyar
Abstract | PDFPDF
16. Clustering with Mobile Sink in WSN
Pages :212-216
Inderjeet Singh, Pooja, Varsha
Abstract | PDFPDF
17. E-Learning: A Tool for Enhancing Teaching and Learning in Educational Institutes
Pages :217-221
Abubakar Mohammed, Sanjeev Kumar, Bashir Maina Saleh, Aishatu Shuaibu
Abstract | PDFPDF
18. Protection of Data during Data Migration
Pages :222-223
Nitin P.S.S., Prof. Sudha. T, P.S.Maheswari
Abstract | PDFPDF
19. Review on Benefits and Security Challenges of Cloud Computing
Pages :224-228
Nasarul Islam.K.V
Abstract | PDFPDF
20. A Semantic-Based Friend Recommendation System Based On Lifestyle Matching
Pages :229-231
Prof. Vijayalaxmi Kanade , Pratibha Uphade, Priti Thite, Omkar Bandal, Neeraj Datar
Abstract | PDFPDF
21. A Parallel Incremental Mining Algorithm using Modified Inverted Matrix
Pages :232-236
Siddharth Shah, Aniruddha K, Prerak Thakkar, Chinmay Joshi, Gopi Bhatt
Abstract | PDFPDF
22. Honeypot Based Intrusion Detection System with Snooping agents and Hash Tags
Pages :237-242
Vishal Joshi and Parveen Kakkar
Abstract | PDFPDF
23. Optimized Load Balancing using Linear Programming
Pages :243-246
Prof.B.C. Julme, Spruha Shevade, Pranita Shinde, Shweta Lokhande, Sneha Suryawanshi
Abstract | PDFPDF
24. Enhanced Public Auditing for Code-Based Multiserver Cloud
Pages :247-251
Chitra V Bawankule, Megha C Sadawarti, Shradha D Agnihotri
Abstract | PDFPDF
25. Web 2.0 Technology Enhancements to Support E-governance Implementation
Pages :252-255
Bindu.N
Abstract | PDFPDF
26. Modern Machine Learning Approaches For Robotic Path Planning- Analytic research and comparison
Pages :256-259
Shreyas J, Sandeep J
Abstract | PDFPDF
27. Task management of Robot using Priority Job Scheduling
Pages :260-265
Amitava Kar, Ajoy Kumar Dutta and Subir Kumar Debnath
Abstract | PDFPDF
28. Effective On-Page Optimization for Better Ranking
Pages :266-270
Dr. N. Yuvaraj, S. Gowdham, V.M. Dinesh Kumar and S. Mohammed Aslam Batcha
Abstract | PDFPDF
29. Security Analysis of Tunnel Field-Effect Transistor for Low Power Hardware
Pages :271-275
Shayan Taheri and Jiann-Shiun Yuan
Abstract | PDFPDF
30. An Improved Annotation based Summary Generation for Unstructured Data
Pages :276-284
Teena Bhawsar, Devendra singh Kaushal
Abstract | PDFPDF
31. Comparative Analysis Using Hive and Pig on Consumers Data
Pages :285-291
Pooja Jain, Prof. Jay Prakash Maurya
Abstract | PDFPDF
32. UBlood: Utilize every cell of Blood- A Proposed Mobile based Application Framework
Pages :292-294
Simmi Chawla, Tarun Dalal
Abstract | PDFPDF
33. Updating of Inter-quartile range Virtual Machine Allocation policy in cloud computing
Pages :295-297
Anurudh Kumar Upadhyay, Prof. Kailash Patidar
Abstract | PDFPDF
34. Denial of Service Attack Detection and Secure Data Transmission Using Trusted Path in MANET
Pages :298-301
Shilpa Agnihotri, Prof. Amit Saxena
Abstract | PDFPDF
35. Smart Home System using Raspberry Pi
Pages :302-305
Danesh Marolia, Abhishek Khadse, Akshay Lemos, Godson Lemos
Abstract | PDFPDF
36. A Comparative Analysis of Security Algorithms Using Cryptographic Techniques in Cloud Computing
Pages :306-310
R.Gowthami Saranya, A.Kousalya
Abstract | PDFPDF
37. A study on Defacing Ransomware: Are we aware and ready?
Pages :311-317
Naman Gupta, Vidyavati Ramteke
Abstract | PDFPDF
-All rights are reserved by International Journal of Computer Science and Information Technologies-