1. |
Analysis of Optimization Techniques for
Feed Forward Neural Networks Based Image
Compression
Pages : 3291-3294
Neha Relhan, Manoj Jain
Abstract | PDF |
2. |
Security Issues and Solutions In Wireless Sensor Networks
Pages : 3295-3304
Varsha Sahni, Jaspreet Kaur, Sonia Sharma
Abstract | PDF |
3. |
Routing Protocols and Energy efficient protocols for data
aggregation in Wireless Sensor Network: A Survey
Pages : 3305-3312
Meenakshi Dhull, Soni Chaurasia
Abstract | PDF |
4. |
APPLICATION OF DHT PROTOCOL IN IP CLOAKING
Pages : 3313-3317
Anju Vijayrania, Abdul Rahman
Abstract | PDF |
5. |
Information Security on Quick Response code
Pages : 3318-3320
S.Hemalatha, P.C.SenthilMahesh, and Dr.Paul Rodrigues
Abstract | PDF |
6. |
Performance of Semi-Blind Reference Watermarking Scheme Using DWT-SVD for Copyright Protection
Pages : 3321-3327
Saryanarayana Murty.P, Laxmi.V, Rajesh Kumar.P
Abstract | PDF |
7. |
Evaluation of Behavioral Security in Cloud Computing
Pages : 3328 - 3333
Ch.Naveen Kumar Reddy, G.Vishnu Murthy
Abstract | PDF |
8. |
Performance evaluation of clustering algorithms on trajectories data
Pages : 3334 - 3336
Sweta Kumari, Varsha Singh
Abstract | PDF |
9. |
Learning objects- an object oriented analysis, design model and research review
Pages : 3337 - 3340
S. Vasanthi, M.K. Jayanthi
Abstract | PDF |
10. |
Exchange of Peer To Peer Identity Reputation Using Cryptology conventions
Pages : 3341 - 3347
S.Venkateswarlu and Md khaja zikriya
Abstract | PDF |
11. |
Secret Key Generation and Eavesdropping detection using Quantum Cryptography
Pages : 3348 - 3354
Neha Chhabra
Abstract | PDF |
12. |
Mobile-PC Suite: Using Mobile Phone as Remote to Control PC Operations
Pages : 3355 - 3359
R.S.S.Vishnu Priya, P.Panini Sai, K.Ruth Ramya, N.Chandra Sekhar, K.Venkata Prasad, P.D.Nageswara Rao
Abstract | PDF |
13. |
Performance Evaluation of Globus Grid Environment Using Avi to Flash Video Encoding
Pages : 3360 - 3364
Gurjit Singh Sra, Dinesh Kumar
Abstract | PDF |
14. |
College InfoBank: A system for efficient visualization and analysis of College Data
Pages : 3365 - 3370
G.Anuradha , Saylee Chitre, Juilee Chitre, Kristel Alphonso
Abstract | PDF |
15. |
Image Repossession Based on Content Analysis Focused by Color, Texture and Pseudo-Zernike Moments features of an Image
Pages : 3371 - 3377
M.Nagaraju,I.Lakshmi Narayana, S.Pramod Kumar
Abstract | PDF |
16. |
Novel Dissimilarity Algorithm for Content Based Image Retrieval
Pages : 3378 - 3381
Suresh Kumar. D, Venkateswarlu.B, Mohan Rao. C.P.V.N.J
Abstract | PDF |
17. |
Analyzing the Performance of GTS Allocation
Using Markov Model in IEEE 802.15.4
Pages : 3382-3387
Alladi Ramesh, P.Sumithabhashini
Abstract | PDF |
18. |
Efficient Multiple Ant Colony Algorithm for
Job Scheduling In Grid Environment
Pages : 3388-3393
S.Umarani, L.M.Nithya, A.Shanmugam
Abstract | PDF |
19. |
String Matching Methodologies: A Comparative Analysis
Pages : 3394 - 3397
Akhtar Rasool,Amrita Tiwari, Gunjan Singla,Nilay Khare
Abstract | PDF |
20. |
EmotiFONT
Pages : 3398-3400
Rishabh Sonthalia, Juilee Chitre, Saylee Chitre
Abstract | PDF |
21. |
Digital teaching using E-Learning
Pages : 3401-3405
Preetee Karmore, Apurva Kuchankar, Shivani Kalambe, Ankush patil,Chetan Dakhare, Pratik Channawar
Abstract | PDF |
22. |
Survey Paper On Analysis Of Various Recommendation Algorithms
Pages : 3406-3408
Dolly Sigroha, Chhavi Rana
Abstract | PDF |
23. |
Collaborative Scheme to Detect Stealth Nodes in
Mobile Adhoc Networks
Pages :3409-3412
Burra Naga Durga Srinivas, M.V.S.S. Nagendranath
Abstract | PDF |
24. |
Enhanced Query Optimization Using R Tree
Variants in a Map Reduce Framework for
Storing Spatial Data
Pages :3413-3418
Vaishnavi S , Subhashini K , Sangeetha K , Nalayini C.M
Abstract | PDF |
25. |
A Review on Security Mechanism of Bluetooth
Communication
Pages :3419-3422
Trishna Panse, Vivek Kapoor
Abstract | PDF |
26. |
An Analysis towards the Development of
Electronic Bilingual Dictionary
(Manipuri-English) -A Report
Pages :3423-3426
Sagolsem Poireiton Meitei, Shantikumar Ningombam, Prof. Bipul Syam Purkayastha
Abstract | PDF |
27. |
Improved Decision Tree Induction Algorithm
with Feature Selection, Cross Validation, Model
Complexity and Reduced Error Pruning
Pages :3427-3431
A. S. Galathiya, A. P. Ganatra and C. K. Bhensdadia
Abstract | PDF |
28. |
Speckle Noise Reduction in Satellite Images
Using Spatially Adaptive Wavelet Thresholding
Pages :3432-3435
M.Vijay, L.Saranya Devi
Abstract | PDF |
29. |
A New Approach to Schedule Precedence
Constraint Tasks in Real Time Systems
Pages :3436-3443
Radhakrishna Naik R.R.Manthalkar Yogiraj P. Korde
Abstract | PDF |
30. |
A Cryptographic Approach to Securely
Share Genomic Sequences
Pages :3444-3447
G. Rajendra Kumar, V.Navya, M.Swetha, V.Sindhusha, T. Murali Kalyan
Abstract | PDF |
31. |
Analyzing a Mobile Framework for
Location Based Tracking
Pages :3448-3451
Shaveta Bhatia, SabaHilal
Abstract | PDF |
32. |
Interference-Aware Robust Topology Design in
Multi-Channel Wireless Mesh Networks
Pages :3452-3455
Geeta Y.Midha, R.K.Krishna
Abstract | PDF |
33. |
Concatenated Differential Space-Time Block Codes
and Four Dimensional 8-PSK Trellis Coded
Modulation for Wireless MIMO system with
Rayleigh fading Noise
Pages :3456-3459
Emna Ben Slimane, Slaheddine Jarboui, Imen Lamouchi and Ammar Bouallègue
Abstract | PDF |
34.. |
Survey Paper on Recommendation System
Pages :3460-3462
Mukta kohar,Chhavi Rana
Abstract | PDF |
35. |
Contrast Enhancement for Fog Degraded
Video Sequences Using BPDFHE
Pages :3463-3468
C.Ramya, Dr.S.Subha Rani
Abstract | PDF |
36. |
Congestion Minimization By Using MFMP
Routing Algorithm
Pages :3469-3472
T.B.Sivakumar, M.Gughan Raja, B.Palanichelvam
Abstract | PDF |
37. |
Event Detection in Videos Using Data Mining
Techniques
Pages :3473-3475
P.Thirumurugan, S.Hasan Hussain
Abstract | PDF |
38. |
Minimizing Malicious Eavesdropping Ability in
Wireless Mesh Networks using SKeMS
Pages :3476-3478
Haarika Kandavalli, M.V.S.S NagendraNath
Abstract | PDF |
39. |
E-FARMING
Pages :3479-3482
Sindhu M R, Aditya Pabshettiwar, Ketan.K.Ghumatkar, Pravin.H.Budhehalkar, Paresh.V.Jaju
Abstract | PDF |
40. |
Horizontal Aggregations for Mining Relational
Databases
Pages :3483-3487
Dontu.Jagannadh, T.Gayathri, M.V.S.S Nagendranadh
Abstract | PDF |
41. |
A Dynamic Extensible Authentication Protocol for Device Authentication in Transport Layer
Pages :3488-3492
Raghavendra.K ,G. Raghu ,Sumith N
Abstract | PDF |
42 |
Fragment Based Approach to Forecast Association Rules from Indian IT Stock Transaction Data Pages :3493-3497 Rajesh V. Argiddi, Sulabha S. Apte
Abstract | PDF |
43 |
Modified EGMP for Efficient Multicasting over MANETS
Pages :3498-3502
Raavi. Pavani,M. Venkatesh,M.V.S.S. Nagendranath
Abstract | PDF |
44 |
Overall performance of Flooding Sequence Protocol in Wireless Sensor Networks
Pages :3503-3507
Sabareesan M, Srinivasan S,John Deva Prasanna D S
Abstract | PDF |
45. |
A Secure Architecture for Anonymizer Networks
Pages :3508-3511
K.Ravindranath, B.V.S.N.Chaitanya, K.Krishna Chaitanya, G.Anil Reddy, B.Harish
Abstract | PDF |
46. |
Performance Investigation and Analysis of Secured MANET Routing Protocols
Pages :3512-3516
A.Jayanand, Dr.T.Jebarajan
Abstract | PDF |
47. |
Different Medias of Steganography- An Emerging Field of Network Security
Pages :3517-3522
M. Indra Sena Reddy , M. Purushotham Reddy, K. Subba Reddy
Abstract | PDF |
48. |
A Multi-Slotted Wide Microstrip Patch Antenna for Dual Frequency
Pages :3523-3525
Ram Singh Kushwaha, D.K.Srivastava, J.P.Saini
Abstract | PDF |
49. |
A Reputation Based Scheme to Prevent Routing Misbehavior in MANETs
Pages :3526-3529
M. Sreedevi
Abstract | PDF |
50. |
Implementation of Area Efficient Memor-Based FIR Digital Filter Using LUT-Multiplier
Pages :3530-3535
K.Purnima, S.AdiLakshmi, M.Jyothi
Abstract | PDF |
51. |
Identifying the User Access Pattern in Web Log Data
Pages :3536-3539
Neetu Anand, Saba Hilal
Abstract | PDF |
52. |
Appication of Hybrid ANT Colony Optimization (HACO) Algorithm for solving Capacitated Vehicle Routing Problem (CVRP)
Pages :3540-3543
B.Ramesh Babu, Manjula Poojary, B.Renuka
Abstract | PDF |
53. |
Component Extraction of Complex Biomedical
Signals and Performance analysis
Pages :3544-3547
Hemant P. Kasturiwale, P.V.Ingole
Abstract | PDF |
54. |
Hybrid Routing Protocol
Pages :3548-3550
ShrutiVaish, Amit Kumar Gupta, Shilpi Singh, Saroj Sharma
Abstract | PDF |
55. |
Distributed Dynamic Clustering in Randomly
Deployed Wireless Sensor Networks
Pages :3551-3556
Lavanya Thunuguntla, Rajendra Prasad G
Abstract | PDF |
56. |
Distributed Algorithm for Improving Performance
through Swap Link in Wireless Networks
Pages :3557-3562
T.Kalaiselvi ,P.S.Balamurugan ,K.Sudhakar
Abstract | PDF |
57. |
Moving Towards a Robust Software Deployment
Methodology – Need to Address Change
Management
Pages :3563-3569
Madhusudan Varadaraj, Nagalingappa Goud
Abstract | PDF |
58. |
A Review of Application of Data Mining in
Earthquake Prediction
Pages :3570-3574
G. V. Otari, Dr. R. V. Kulkarni
Abstract | PDF |
59. |
Computational Intelligence Aided Black-Hole
Detection for Secure Data Dissemination Based on
PRP Routing in WSN
Pages :3575-3581
J.Preetheswari , J.Mark Jain
Abstract | PDF |
60. |
Effect of Various Attacks on Watermarked Images
Pages :3582-3587
Nallagarla.Ramamurthy and Dr.S.Varadarajan
Abstract | PDF |
61. |
Secure Data in Wireless Sensor Network via AES
Pages :3588-3592
P.D. Khambre ,S.S.Sambhare, P.S. Chavan
Abstract | PDF |
62. |
Comparison of Mamdani Fuzzy Model and Neuro
Fuzzy Model for Air Conditioning System
Pages :3593-3596
Arshdeep Kaur, Amrit Kaur
Abstract | PDF |
63. |
Energy Conservation Techniques and Application for
Wireless Sensor Networks
Pages :3597-3602
M.Chithik Raja
Abstract | PDF |
64. |
Emotion Recognition from Speech
Pages :3603-3607
K. Sreenivasa Rao, Tummala Pavan Kumar, Kusam Anusha, Bathina Leela, Ingilela Bhavana and
Singavarapu V.S.K. Gowtham
Abstract | PDF |
65. |
Survey for Generating an Ideal Password
Authentication Scheme Which Results In Fortification
of Transport Layer Security Protocol
Pages :3608-3614
Kuljeet Kaur ,Dr. G.Geetha
Abstract | PDF |
66. |
Attacks Due to SQL Injection & Their Prevention
Method for Web-Application
Pages :3615-3618
Shubham Srivastava, Rajeev Ranjan Kumar Tripathi
Abstract | PDF |
67. |
Dynamic user profiles using fusion of Web Structure ,Web content and
Web Usage Mining
Pages :3619-3621
Gajendra S.Chandel, Ravindra Gupta, Hemant k. Dhamecha
Abstract | PDF |
68. |
Design of a browser for people with low vision
Pages :3622-3624
K.Ravindranath,A.Vamsi Krishna, B.Charan Teja, K.Sandeep, P.Karthik
Abstract | PDF |
69. |
Improved secured routing in AdhocSensor Network for Emergency Medical Care
Pages :3625-3631
Anjani Yalamanchili,DeepthiKethineni, Dukkipati Padma Bhushan
Abstract | PDF |
70. |
Database Management System and Information Retrival
Pages :3632-3637
B.KiranKumar,S.Durga Prasad, P M Manohar,KVVS SatyaPrakash,M.Chiranjeevi, K.Venkat Kiran
Abstract | PDF |
71. |
An Enhanced Data Distribution with Protection of
Agent Colluding Attacks
Pages :3638-3643
P.Brindha, P.S.Balamurugan, S.Kalai selvi
Abstract | PDF |
72. |
A Semi Fragile Image Watermarking Technique
Using Block Based SVD
Pages :3644-3647
Chitla Arathi
Abstract | PDF |
73. |
Three Dimensional Rotation Technique
Pages :3648-3649
HamzaContractor , ShoaibInamdar, RohitKandul, Anand Magar
Abstract | PDF |
74. |
Spatial Domain Lossless Image Compression
Technique by Reducing Overhead Bits and Run
Length Coding
Pages :3650-3654
Mahmud Hasan , Kamruddin Md. Nur , Tanzeem Bin Noor , Hasib Bin Shakur
Abstract | PDF |
75. |
A Detailed Study on Semantic Search Performance of Keyword and Meta Search Engines
Pages :3655-3658
Rajeev Kumar, Rajat Goel
Abstract | PDF |
76. |
Max-min Average Algorithm for Scheduling Tasks in Grid Computing Systems
Pages :3659-3663
George Amalarethinam. D.I, Vaaheedha Kfatheen .S
Abstract | PDF |
77. |
An Effective Methodology for Pattern Discovery
in Web Usage Mining
Pages :3664-3667
K Sudheer Reddy, G. Partha Saradhi Varma, M. Kantha Reddy
Abstract | PDF |
78. |
A Survey:-Optimize Visual Image Search for
Semantic web
Pages :3668-3671
Jaimin Shroff , Parth D. Shah , Bhaumik Nagar
Abstract | PDF |
79. |
Using Network Security Management to solve
Boolean Satisfiability Problem
Pages :3672-3677
Mekala Bhaskar, G.VishnuMurthy, V.Amarnath
Abstract | PDF |
80. |
Energy Efficiency in IEEE 802.15.4/zigbee Sensor Networks: Cross-layer Approach
Pages :3678-3682
N.Gopal Krishna, S.Ganesan, N.Anand Ratnesh, S.Kishore Babu, B.Venkateswara Reddy, B.Naveen Kumar
Abstract | PDF |
81. |
Performance Analysis of Open Loop and Closed
Loop Power Control Schemes for LTE Uplink
Pages :3683-3688
Purnachand S, Rajendra Prasad K, Sripath Roy K, Suresh A
Abstract | PDF |
82. |
Web Security by Preventing SQL Injection Using
Encryption in Stored Procedures
Pages :3689-3692
Deevi Radha Rani, B.Siva Kumar, L.Taraka Rama Rao, V.T.Sai Jagadish, M.Pradeep
Abstract | PDF |
83. |
Contribution Based Clustering Technique for
Automatic Satellite Image Segmentation
Pages :3693-3695
Chandan Kumar Moha nty, Manish Pandey, Arun P. V.
Abstract | PDF |
84. |
An Approach of UML for an Elevator System by
Implementing Stereotypes
Pages :3696-3698
Clarence J M Tauro, N Ganesan2, Rashmi N C, Janet Agnes N C
Abstract | PDF |
85. |
Article Removed
Pages :xxxx-xxxx
xxxx
Abstract | PDF |
86. |
A Strategic Approach for Mapping e-Business Applications in to Cloud and providing Security to e-Busi-Cloud
Pages :3706-3710
Veera RaghavaRao Atukuri, VijayaKumar Nukala , R.Siva Rama Prasad
Abstract | PDF |
87. |
Forecasting for Profitable CRM using Knowledge and Time Management
Pages :3711-3713
P. Menaka, k. Thangadurai, M.Uma, M. Punithavalli
Abstract | PDF |
88. |
A Robust Tree Quantization Image Watermarking Technique Based on Qualified Significant Even Wavelet Tree (QSEWT)
Pages :3714-3718
B.Vijayakumar , V.Vijayakumar, Rajya Lakshmi
Abstract | PDF |
89. |
Virtually Integrated Multi Purpose Server
Pages :3719-3725
J. Mark Jain, J.Ferlin Getziah , A.Hameeda , N.Naveena , K.Nasren Subaitha Banu
Abstract | PDF |
90. |
An Efficient Approach to Secure VPN based on
Firewall using IPSec & IPtables
Pages :3726-3732
J. Mark Jain ,N. Ayyamari Devi , K. Jancy Rani, A.Meenakshi , S.Balaselvam
Abstract | PDF |
91. |
GA-Correlation Based Rule Generation for Expert
Systems
Pages :3733-3736
Harsh Bhasin, Supreet Singh
Abstract | PDF |
92. |
Study of Ensemble Pruning Approaches
Pages :3737-3742
Reshma Idresh Lakhani, Arpita Shah, Amit P Ganatra
Abstract | PDF |
93. |
Dynamic Intrusion Detection with Data Fusion and
Aggregation in High-Security Mobile Ad Hoc
Networks
Pages :3743-3748
T.Kumanan,.K. Duraiswamy
Abstract | PDF |
94. |
Designing and Development of a CAN Bus
Analyzer for Industrial Applications Using
ARM and PIC
Pages :3749-3753
Gadireddy Srikanth Kumar
Abstract | PDF |
95. |
A Strategic Approach for Bypassing the Intruder and Sending Data to Destination using Three – Tier Framework in Sensor Networks
Pages :3754-3756
Veera RaghavaRao Atukuri , Venkata Pavani S , Vasanthi B , Chandrika M , Naga Swetha M
Abstract | PDF |
96. |
Digital Image Watermarking for Copyright
Protection
Pages :3757-3760
Shankar Thawkar
Abstract | PDF |
97. |
Monitoring System of Aquiculture with Automatic Control System Using ARM7
Pages :3761-3764
Bodepudi SrinivasaRao, U.Jyothi Kameswari
Abstract | PDF |
98. |
Quantum Finite Automata, Quantum Pushdown Automata & Quantum Turing Machine: A Study
Pages :3765-3769
Tanistha Nayak, Tirtharaj Dash
Abstract | PDF |
99. |
Amending Protection and Efficiency in
Information Sharing
Pages :3770-3774
Vivekananda G.N., Obulesu O
Abstract | PDF |
100. |
New Aggregation Operator for Triangular Fuzzy
Numbers based on the Arithmetic Means of the Slopes of the L- and R- Membership Functions
Pages :3775-3777
Manju Pandey, Nilay Khare, Dr. S.C. Shrivastava
Abstract | PDF |
101. |
Intelligent Data Mining in Autonomous
Heterogeneous Distributed Bio Databases
Pages :3778-3781
T.Hemalatha, B.G.Gowthami, A.Divya Sri, Ch.Sindhuri, Y.SriDivya, B.BhanuVidhyaKiran
Abstract | PDF |
102. |
Mobile Ad-Hoc Wireless Network
Pages :3782-3786
Krunal N. Chandewar, H.R. Deshmukha
Abstract | PDF |
103. |
A Fast Moving Object Detection Technique
In Video Surveillance System
Pages :3787-3792
Paresh M. Tank, Darshak G. Thakore
Abstract | PDF |
104. |
Secure Color Visual Secret Sharing Scheme Using
Shifting Coefficient with No Pixel Expansion
Pages :3793-3800
John Justin M, Manimurugan S, Alagendran B
Abstract | PDF |
105. |
Improved Multilevel Feedback Queue Scheduling
Using Dynamic Time Quantum and Its Performance
Analysis
Pages :3801-3807
H.S. Behera, Reena Kumari Naik, Suchilagna Parida
Abstract | PDF |
106. |
Morphological Real Time Video Edge Detection in
Labview
Pages :3808-3811
Ravi Kumar A.V, Nataraj K.R, Rekha K.R
Abstract | PDF |
107. |
Extracting Explanation from Artificial Neural Networks
Pages :3812-3815
Koushal Kumar,Gour Sundar Mitra Thakur
Abstract | PDF |
108. |
Comparison and Analysis of Drop Tail and RED
Queuing Methodology in PIM-DM Multicasting Network
Pages :3816-3820
Ashish Kumar , Ajay K Sharma and Arun Singh
Abstract | PDF |
109. |
Performance Analysis of Homogeneous and
Heterogeneous Systems Using BitTorrent in
Compeer Networks
Pages :3821-3824
K.Thamaraiselvi, P.S.Balamurugan
Abstract | PDF |
110 |
Improvement of Noise free Color Video
Demosaicking Using Denoising and Iterative
Enhanced Demosaicking Algorithm
Pages :3825-3832
D.S.Binu Shoba , B.SankaraLakshmi, A.Jayachandran
Abstract | PDF |
111. |
Intelligent Traffic
Pages :3833-3835
Rishabh Sonthalia, Utsav Salian, Vishal Singh, Dakshata Panchal
Abstract | PDF |
112. |
A Multimedia Interactive System
Pages :3836-3838
Manjushree Mahajan, Sushma Kate,Sandhya Katkar,Parinita Chinchalikar,Jyoti Hajare
Abstract | PDF |
113. |
Simplified Coupling Metrics for Object-Oriented
Software
Pages :3839-3842
V.S.Bidve , Akhil Khare
Abstract | PDF |