1. |
Dynamic Monitoring of Moving Objects: A Novel
Model to Improve Efficiency, Privacy and Accuracy
of the Framework
Pages : 946-950
Bathula Sowjanya, Kolikipogu Ramakrishna, K.Sailaja
Abstract | PDF |
2. |
The STUDY on KNOWLEDGE DISCOVERY from
WEB DATA
Pages : 951-954
Yogish H K ,Dr. G T Raju,Deepa Yogish
Abstract | PDF |
3. |
An Effective Determination of Initial Centroids in
K-Means Clustering Using Kernel PCA
Pages : 955-959
M.Sakthi and Dr. Antony Selvadoss Thanamani
Abstract | PDF |
4. |
Wave Atoms Decomposition based Eye Iris
Image Compression
Pages : 960-964
Satya P Kumar Somayajula,Sai Charan Dhatrika,Deepika Puvvula
Abstract | PDF |
5. |
Fusion of Web Structure Mining and Web Usage
Mining
Pages : 965-967
Suresh Babu, P. Sathish, J. Ashok
Abstract | PDF |
6. |
Feasibility study on component based software
architecture for large scale software systems
Pages : 968-972
P. G. Chaitanya , K.V.Ramesh
Abstract | PDF |
7. |
Analyzing XML Parsers Performance for Android
Platform
Pages : 973-976
M V Uttam Tej ,Dhanaraj Cheelu, M.Rajasekhara Babu, P Venkata Krishna
Abstract | PDF |
8. |
Automated Functional Testing Using IBM
Rational Robot
Pages : 977-981
A.Chakrapani, K.V.Ramesh
Abstract | PDF |
9. |
Detection of Attacks in an Intrusion Detection
System
Pages : 982-986
Sapna S. Kaushik,P.R.Deshmukh
Abstract | PDF |
10. |
Combined Security Model Tool for Adhoc Networks
Pages : 987-991
Kishore Kumar Maturi , Ratnaraju Mukiri , Srinivasa Rao P , Basheera Shaik
Abstract | PDF |
11. |
Web Intelligence: Analysis of Unstructured Database
of Documents Using KnowItAll
Pages : 992-994
Shweta Gupta, Kovid Agarwal, Shamla Mantri
Abstract | PDF |
12. |
Application of Web Mining with XML Data using
XQuery
Pages : 995-1000
Roop Ranjan,Ritu Yadav ,Jaya Verma
Abstract | PDF |
13. |
A Design of Centralized Meeting Scheduler
with Distance Metrics
Pages : 1001-1006
M. Sugumaran
Abstract | PDF |
14. |
A Cross Layered Architecture and Its Proposed
Security Mechanism to Lessen Attacks
Vulnerability in Mobile Ad Hoc Networks
Pages : 1007-1011
K.P.Manikandan,R.Satyaprasad, K.Rajasekhararao
Abstract | PDF |
15. |
Framework of M-Commerce using ID-Based
Cryptography
Pages : 1012-1017
Sridhar.K ,M.Sandeep ,D.Sagar
Abstract | PDF |
16. |
Image Retrieval with the use of Color and Texture
Feature
Pages : 1018-1021
Gauri Deshpande, Megha Borse
Abstract | PDF |
17. |
Load Balancing In Structured Peer to Peer Systems
Pages : 1022-1025
Sumit A. Hirve, Suhas H. Patil,
Abstract | PDF |
18. |
Data Mining : A prediction of performer or
underperformer using classification
Pages : 1026-1030
Umesh Kumar P andey S. Pal
Abstract | PDF |
19. |
Applying Hidden Markov Model to Protein Sequence
Alignment
Pages: 1031-1035
Er. Neeshu Sharma, Dinesh Kumar, Reet Kamal Kaur
Abstract | PDF |
20. |
Handwritten Gurumukhi Character Recognition
Using Zoning Density and Background
Directional Distribution Features
Pages: 1036-1041
Kartar Singh Siddharth, Renu Dhir, Rajneesh Rani
Abstract | PDF |
21. |
A Survey on Model Based Test Case Prioritization
Pages : 1042-1047
Sanjukta Mohanty, Arup Abhinna Acharya, Durga Prasad Mohapatra
Abstract | PDF |
22. |
Filter versus Wrapper Feature Subset Selection in
Large Dimensionality Micro array: A Review
Pages : 1048-1053
Binita Kumari, Tripti Swarnkar
Abstract | PDF |
23. |
A Novel Approach for Test CAse Prioritization using Priority Level Technique
Pages : 1054-1060
Arup Abhinna Acharya, Goutam Budha, Namita Panda
Abstract | PDF |
24. |
Implementation of User’s Browse Log Monitoring
Tool for Effective Web Usage Mining
Pages : 1061-1064
Asha Khilrani,Shishir K. Shandilya
Abstract | PDF |
25. |
Mining Frequent Patterns Using Queues In Large
Databases
Pages : 1065-1067
Divya Bhatnagar, Neeru Adlakha, K. R. Pardasani
Abstract | PDF |
26. |
A Simulation Study between the Random
Based Synthetic Entity Mobility Models in
Ad Hoc Networks
Pages : 1068-1074
D.Srinivasa Rao
, T. Susan Salomi, G. Sriram
Abstract | PDF |
27. |
Dual Band E-Shape Micro strip Patch Antenna on
RT DUROID 5880 Substrate for Pervasive Wireless
Communication
Pages : 1075-1081
Neenansha Jain, Prof Rajesh Nema, Anubhuti Khare, Puran Gour
Abstract | PDF |
28. |
Fast Face Detection Using Graphics Processor
Pages : 1082-1086
Kailash Devrari, K.Vinay Kumar
Abstract | PDF |
29. |
Evolution of 4G-Research Directions Towards Fourth
Generation Wireless Communication
Pages: 1087-1095
B.Vasavi,Mounika Marepalli, Leepika Gudur
Abstract | PDF |
30. |
Solving Traveling Salesman Problem Using Hierarchical Clustering and Genetic Algorithm
Pages: 1096-1098
S N S Kalyan Bharadwaj.B, Krishna Kishore.G, Srinivasa Rao.V
Abstract | PDF |
31. |
An Efficient Routing Approach and Improvement Of
AODV Protocol In Mobile Ad-Hoc Networks
Pages : 1009-1104
Tejomayee Nath & Suneeta Mohanty
Abstract | PDF |
32. |
Comparative study of FIR and IIR filters for the
removal of Baseline noises from ECG signal
Pages : 1105-1108
Seema rani, Amanpreet Kaur, J S Ubhi
Abstract | PDF |
33. |
Lossless Visible Watermarking for Video
Pages : 1109-1113
Saraswathi M
Abstract | PDF |
34. |
Tank Water Level Monitoring System using
GSM Network
Pages : 1114-1120
Ayob Johari, Mohd Helmy Abd Wahab, Nur Suryani Abdul Latif, M. Erdi Ayob, M. Izwan Ayob, M. Afif Ayob,
Mohd Norzali Haji Mohd
Abstract | PDF |
35. |
Rule based programming with Drools
Pages : 1121-1126
Narendra Kumar, Dipti D Patil, Vijay M. Wadhai
Abstract | PDF |
36. |
Mobile User’s Location Management using Bloom
Filter
Pages : 1127-1130
Pragyan Acharya, Sudhansu Sekhar Singh
Abstract | PDF |
37. |
Flooding Based DDoS Attacks and Their Influence
on Web Services
Pages :1131-1136
Sunil Kumar,Mandeep Singh,Monika Sachdeva, and Krishan Kumar
Abstract | PDF |
38. |
Web Components as a measure for estimating
Effort and Size of Web Applications
Pages : 1137-1143
Sworoop Suhanjan Das, Kumar Devadutta, Santosh Kumar Swain, Sanjay Kumar
Abstract | PDF |
39. |
A Model for Web Page Usage Mining Based on
Segmentation
Pages : 1144-1148
K.S.Kuppusamy, G.Aghila
Abstract | PDF |
40. |
Clonal Selection Method for Virus Detection in a
Cloud
Pages : 1149-1153
Agnika Sahu, Tanmaya Swain, Tapaswini Samant
Abstract | PDF |
41. |
Media Access Control Protocol for Mobile
Sensor Network- Modelling
Using OMNeT++ -MiXiM Network
Simulator.
Pages : 1154-1159
Aditi .P. Khadilkar , Nitin G. Palan
Abstract | PDF |
42. |
Geographical Routing Algorithms
In
Asynchronous Wireless Sensor Network
Pages : 1160-1163
A. Vaishali S.K, B.N.G. Palan
Abstract | PDF |
43. |
A Survey on Test Case Generation from UML
Model
Pages :1164-1171
Monalisha Khandai, Arup Abhinna Acharya, Durga Prasad Mohapatra
Abstract | PDF |
44. |
Test Case Generation for Concurrent System using
UML Combinational Diagram
Pages : 1172-1181
Monalisha Khandai, Arup Abhinna Acharya, Durga Prasad Mohapatra
Abstract | PDF |
45. |
Energy Conservation Techniques in Ad hoc
Networks
Pages : 1182-1186
Mohammed Ali Hussain, M.Ravi Sankar, Vijaya Kumar Voleti,Y.Srinivasa Rao , Nalla Lovanjaneyulu
Abstract | PDF |
46. |
Generation of Test Cases Using UML Sequence Diagram in a System with Communication Deadlock
Pages : 1187-1190
DebashreePatnaik,Arup Abhinna Acharya, Durga Prasad Mohapatra
Abstract | PDF |
47. |
Pair vs Solo Programming: Students’ Perceptions
Pages : 1191-1196
Madhumita Singha Neogi , Vandana Bhattacherjee
Abstract | PDF |
48. |
Anomaly Detection On User Browsing Behaviors
Using Hidden Semi-Markov Model
Pages : 1197-1201
Gamidi Pavan babu, Jayavani.V, C.P.V.N.J. Mohan Rao
Abstract | PDF |
49. |
Modeling and Re-Employment of Differential Unit
Test Cases from System Test Cases
Pages : 1202-1221
C.P.V. N. J. Mohan Rao , Nandagiri R G K prasad, Satya P Kumar Somayajula
Abstract | PDF |
50. |
Optimization of Query Processing Time Base on
Materialized Sample View
Pages : 1222-1228
Mahip Bartere and Prashant Deshmukh
Abstract | PDF |
51. |
Node Density based Performance Analysis of Two
Reactive Routing Protocols in Mobile Ad-hoc
Networks
Pages : 1229-1234
Gurleen Kaur Walia and Charanjit Singh
Abstract | PDF |
52. |
Simulation based Performance Evaluation and
Comparison of Proactive and Reactive Routing
Protocols in Mobile Ad-hoc Networks
Pages : 1235-1239
Gurleen Kaur Walia and Charanjit Singh
Abstract | PDF |
53. |
Automated Authentication using Information Fusion
and Score Normalization in Multimodal Biometric
Systems
Pages : 1240-1243
Sasidhar Kothuru,Kailasarao. K
Abstract | PDF |
54. |
Segmentation of Handwritten Devanagari Script
Pages : 1244-1247
Saiprakash Palakollu, Renu Dhir, Rajneesh Rani
Abstract | PDF |
55. |
Human Identification using Face and Voice
Recognition
Pages : 1248-1252
Ishwar S. Jadhav, V. T. Gaikwad, Gajanan U. Patil
Abstract | PDF |
56. |
A Survey on Intrusion Network Detection System
Using Data Mining Techniques
Pages :1253-1256
A. S. Kapse, V. P. Kshirsagar, Avinash Kapse, M. B. Nagori
Abstract | PDF |
57. |
Perturbation of String Values
Pages : 1257-1259
Krishna Priya .J Geetha Mary. A
Abstract | PDF |
58. |
Implementation of Web Cache using Web Browser
Pages : 1260-1262
Harshal N. Datir, Dr. P.R. Deshmukh
Abstract | PDF |
59. |
Estimation of MIMO-OFDM Based Channel for
High Data Rate Wireless Communication
Pages : 1263-1266
Deeparani Mishra, Sikha Mishra, Mihir N. Mohanty
Abstract | PDF |
60. |
Contour-Based Character Extraction from Text
Regions of an Image
Pages : 1267-1271
V.N.Santosh Kumar.Kuppili, Dhanaraj Cheelu, M.Rajasekhara Babu,P.Venkata Krishna
Abstract | PDF |
61. |
A Review on Personalized Information
Recommendation System Using Collaborative
Filtering
Pages : 1272-1278
Kumar Abhishek, Saurabh Kulkarni, Vipin Kumar.N Archana, P. Kumar
Abstract | PDF |
62. |
Architecting and Designing of Semantic Web Based
Application using the JENA and PROTÉGÉ
– A Comprehensive Study
Pages :1279-1282
Archana P. Kumar, Kumar Abhishek, and Vipin Kumar.N
Abstract | PDF |
63. |
An Implementation of the User-based Collaborative
Filtering Algorithm
Pages : 1283-1286
Maddali Surendra Prasad Babu, Boddu Raja Sarath Kumar
Abstract | PDF |
64. |
Access to GSM and GPRS mobile services over
unlicensed spectrum technologies through UMA
Pages : 1287-1291
Snehlata Barde , Sujata Khobragade ,Rasmiprava Singh
Abstract | PDF |
65. |
Data mining: Identify the hidden anomalous through
modified data characteristics checking algorithm and
disease modeling By Genomics
Pages : 1292-1296
PavanKumar kolla, kolla.haripriyanka
Abstract | PDF |
66. |
Architecture for the Detection of phishing in Mobile
Internet
Pages : 1297-1299
M.Archana, P.M.Durai Raj Vincent , Naveen Kumar Boggavarapu
Abstract | PDF |
67. |
A New Algorithm for Scheduling Parallel Tasks in
Utility Grids using Reserve Resources for Tasks with
Deadline
Pages : 1300-1304
Leyli Mohammad khanli, Motahareh Ahmadi
Abstract | PDF |
68. |
Sign Gesture Recognition using Combined
Features of Sum graph and HMM with Decision
tree classifier
Pages : 1305-1308
Punamchand Patidar, Neetesh Gupta
Abstract | PDF |
69. |
Performance Improvement of IEEE 802.16 / Wimax
Using Elliptic Curve Cryptography
Pages : 1309-1311
Pranita K. Gandhewar, Kapil N. Hande
Abstract | PDF |
70. |
Five Layer Security Architecture & Policies for
Grid Computing System
Pages : 1312-1314
M. K. Singh & S. Pal
Abstract | PDF |
71. |
A Survey on Performance Analysis of TCP Variants
in IEEE 802.11 Based Ad-Hoc Networks
Pages : 1315-1317
Komal Tahiliani, Anju singh, R.C.jain
Abstract | PDF |
72. |
Geographical Routing Algorithms
In
Asynchronous Wireless Sensor Network
Pages : 1318-1323
Vaishali.S.K , N.G.Palan
Abstract | PDF |
73. |
The Relationship Between Reinforcement Learning
and Hash Tables
Pages : 1324-1326
Mohammad Mehdi Hassani
Abstract | PDF |
74. |
Assessing Deviations of Empirical Measures
for Temporal Network Anomaly Detection: An
Exercise
Pages : 1327-1332
Amjan Shaik, S.V. Achuta RAo, Hymavathi. Bhadriraju, Md.Reyaz, Nazeer Shaik
Abstract | PDF |
75.. |
Deconstructing Digital-to-Analog Converters
Pages : 1333-1335
Mohammad Mehdi Hassani
Abstract | PDF |
76. |
An Image Retrieval System Using Spatial
Database: An Image Processing Context With
Software Metrics
Pages : 1336-1341
Amjan Shaik, Shaik Meeravali, G. Krishna Reddy, S.V. Achuta RAo, Mohd Mukarram Uddin
Abstract | PDF |
77. |
A Case for Neural Networks
Pages : 1342-1344
Mohammad Mehdi Hassani
Abstract | PDF |
78. |
A Suggestive Evaluation of System Test Cases in
OO Systems Through Carving and Replaying
Differential Unit Test Cases: A Metric Context
Pages : 1345-1353
Amjan Shaik, Hymavathi Bhadriraju, K.Vikram, Nazeer Shaik, S.V. Achuta Rao
Abstract | PDF |
79. |
Deconstructing 16 Bit Architectures
Pages : 1354-1357
Mohammad Mehdi Hassani
Abstract | PDF |
80. |
Scale the Active Influence Based Investigation
Using Materialized Sub Graphs
Pages : 1358-1363
Amjan Shaik, Nazeer Shaik, Amtul Mubeena, S.V. Achuta Rao, K. Vikram
Abstract | PDF |