1. |
SEMANTIC WEB and COMPARATIVE ANALYSIS of INFERENCE ENGINES
Pages : 3843-3847
Neha Dalwadi, Bhaumik Nagar, Ashwin Makwana
Abstract | PDF |
2 |
GSM Based LAN Monitoring System
Pages : 3848-3851
Amol Poman,Mahesh Gundras, Prashant Pujari
Abstract | PDF |
3 |
Bandwidth Recycling in WiMAX Networks
Pages : 3852-3855
Deepak H.L, Shantharam Nayak
Abstract | PDF |
4. |
A Remote Smart Card Authentication Protocol Using Elliptic Curves
Pages :3856-3866
Ranbir Soram, Rajeev Chatterjee, Durga Prasad Roy, Rupesh Patidar
Abstract | PDF |
5. |
Intrusion Detection Techniques in Mobile Ad hoc Networks
Pages : 3867-3870
G.L.Anand Bab1, G.Sekhar Redd2, Swathi Agarwal
Abstract | PDF |
6. |
Design and Implementation of Graphical User Interface for Relational Database Management System
Pages : 3871-3874
Manoj E. Patil,Ravi N. Mulchandani,Ravikumar R. Ahuja
Abstract | PDF |
7.
|
Detection and Verification of Program Behaviour- A Graph Grammer Approach
Pages : 3875-3878
M.Sivalakshmi, T.M.Devi, K.AyyappaRaja
Abstract | PDF |
8. |
Network Performance investigation in Presence of Multiple Vital Node and IDS in MANET
Pages :3879-3883
Ghanshyam Prasad Dubey, Amit Sinhal , Neetesh Gupta
Abstract | PDF |
9. |
Study and Analysis of Reliable MAC Protocols for Wireless Sensor Networks
Pages : 3884-3887
Umesh Kumar Singh, Kailash Chandra Phuleriya,LokeshLaddhani
Abstract | PDF |
10. |
Evaluation of Stopping Criterion in Contour Tracing Algorithms
Pages : 3888-3894
P.Rajashekar Reddy, V.Amarnadh, Mekala Bhaskar
Abstract | PDF |
11. |
Combined Intra-Inter transaction based approach for mining Association among the Sectors in Indian Stock Market
Pages : 3895-3899
Ranjeetsingh B.Parihar , Rajesh V. Argiddi,Sulabha S.Apte
Abstract | PDF |
12. |
Proposing Efficient Neural Network Training Model for Kidney STone Diagnosis
Pages : 3900-3904
Abhishek, Gour Sundar Mitra Thakur,Dolly Gupta
Abstract | PDF |
13. |
A Novel Method for Secured Communication by Merging Steganography with Encryption Technique
Pages : 3905-3909
Deepa S, Umarani R
Abstract | PDF |
14. |
Using Propagation Techniques to Enhance Cache Consistency in Wireless Ad-hoc Networks
Pages : 3910-3916
J.Arumai Ruban, D.Selvam, L.Dinesh
Abstract | PDF |
15. |
Touchpad: A versatile input device
Pages : 3917-3920
Vishal Rathod, Sumeet Chavan, Akshay Londhe, Ashish Kawade, Prajakta Ugale.
Abstract | PDF |
16. |
Monitoring & Security by Mobile Snapshot Spy
Pages : 3921-3923
Pravin Kamble, Kirti Panmand, Kishor Gaikwad, Nitesh Goyal
Abstract | PDF |
17. |
CAN Bus Analyzer for Industrial Applications
Pages : 3924-3928
Gadireddy Srikanth Kumar
Abstract | PDF |
18. |
Blending of Face Segments
Pages : 3929-3933
Akshay Kajekar, Shreyash Patel, Sweta Chauhan, Prashasti Kanikar
Abstract | PDF |
19. |
Detection of Gallbladder Stone Using Learning Vector Quantization Neural Network
Pages : 3934-3937
Dolly Gupta, Gour Sundar Mitra Thakur, Abhishek
Abstract | PDF |
20. |
Improved Broadcast Algorithm For Wireless Mesh Networks
Pages : 3938-3941
Saranya.S, T.MOhanRaj, M.Bhanumanthi
Abstract | PDF |
21. |
An Optimize Decision Tree Algorithm Based on Variable Precision Rough Set Theory Using Degree of β-dependency and Significance of Attributes
Pages : 3942-3947
Rajkumar Sharma, Pranita Jain,Shailendra K.Shrivastava
Abstract | PDF |
22. |
Content Based Image Retrieval for Brain Scan Images
Pages : 3948-3951
Priyanka Chaurasia, Richa Singh, Qaim Mehdi Rizvi.
Abstract | PDF |
23. |
Knowledge Discovery in Datamining Using Soft Computing
Pages :3952-3957
K.Suresh,Ch.Jnaneswari,G.Lakshmi Kranthi, K.Bindu
Abstract | PDF |
24. |
SCADA Based Monitoring and Controlling Using ZIGBEE
Pages : 3958-3961
Sachin Shinde, Rohit Jethmalani, Pankaj Sawant,Adnan Ansari
Abstract | PDF |
25. |
A Novel Approach for Spoofing Media Access
Control Address
Pages :3962-3969
G. Ram Sekhar, Dwarampudi Rajasekhar Reddy, R. Srinivas
Abstract | PDF |
26. |
Digital Fountain in Data Distribution over Non Ad hoc Network
Pages :3970-3974
Prakhar Srivastava, Shivam Rao, Vinay Kumar Nirmal
Abstract | PDF |
27. |
An Empirical Study: Musical Influence on Face
Using the Local Binary Pattern (LBP) Approach
Pages :3975-3979
AshishA.Bardekar ,V.M.Deshmukh
Abstract | PDF |
28. |
Article Removed
Pages :xxxx-xxxx
xxxx,xxxx
Abstract | PDF |
29. |
A Prototype for Secure Web Access Model
using Multimodal Biometric System based on
Fingerprint and Face Recognition
Pages :3985-3988
D. Gayathri, R. Uma Rani
Abstract | PDF |
30. |
Speech Recognition System; Challenges and
Techniques
Pages :3989-3992
Parneet Kaur, Parminder Singh, Vidushi Garg
Abstract | PDF |
31. |
Performance Comparison of FFT and DWT based
OFDM and Selection of Mother Wavelet for
OFDM
Pages :3993-3997
Rohit Bodhe, Shirish Joshi, Satish Narkhede
Abstract | PDF |
32. |
A Review of Fuzzy Computations
Pages : 3998-4001
S. A. Magdum , Dr R. V. Kulkarni
Abstract | PDF |
33. |
A Novel Dimension Reduction Technique based
on Correlation Coefficient
Pages : 4002-4004
Vinay Soni, Ritesh Joshi
Abstract | PDF |
34. |
On some classes of Z-bent functions
Pages :4005 - 4009
Anand Joshi, R. K. Sharma
Abstract | PDF |
35. |
Illumination Invariant Face Recognition System
Pages :4010 - 4014
Haresh D. Chande, Zankhana H. Shah
Abstract | PDF |
36. |
Fuzzy Principal Component Analysis based Gait
Recognition
Pages : 4015 - 4020
G. Venkata Narasimhulu, Dr. S. A. K. Jilani
Abstract | PDF |
37. |
A Unique Approach to Develop a Band Gap Reference Voltage Chip
Pages : 4021 - 4023
S. Rama Devi, D. Rama Devi
Abstract | PDF |
38. |
Impact of Training Function Based Neural
Network on Reusable Software Modules
Pages :4024 - 4027
Anupama Kaur
Abstract | PDF |
39. |
The Network and Security Analysis for Wireless
Sensor Network : A Survey
Pages :4028 - 4037
Alok Ranjan Prusty
Abstract | PDF |
40. |
Parallel Lempel-Ziv-Welch (PLZW) Technique for
Data Compression
Pages :4038 - 4040
Manas Kumar Mishra, Tapas Kumar Mishra, Alok Kumar Pani
Abstract | PDF |
41. |
Use of Data Mining & Neural Network in
Commercial Application
Pages :4041 - 4049
Vinodini Katiyaar, Ina Kapoor Sharma
Abstract | PDF |
42. |
Design of Slot Loaded Stacked Wideband Microstrip
Patch Antenna for Wireless Communications
Pages :4050-4052
Deepak Shukla, Ram Singh Kushwaha, Archna Sharma, D.K.Srivastava
Abstract | PDF |
43. |
Efficient QPSK Burst Demodulator for
Onboard Application
Pages :4053-4058
Deepak Mishra , K S Dasgupta and S.Jit
Abstract | PDF |
44. |
Receiver Designing and Channel Estimation
Pages :4059-4063
Deepti Tyagi and Neeraj Prakash Shrivastava
Abstract | PDF |
45. |
A Review on Image Mining Frameworks and
Techniques
Pages :4064-4066
T. Y. Gajjar, N. C. Chauhan
Abstract | PDF |
46. |
Modified Expanding Ring Search Algorithm for
Ad-hoc Networks
Pages :4067-4070
Shweta Mishra, Jyoti Singh, Arti Dixit, Shiva Prakash
Abstract | PDF |
47. |
Incremental Mining of Association Rules: A Survey
Pages :4071-4074
Siddharth Shah ,N. C. Chauhan,S. D. Bhanderi
Abstract | PDF |
48. |
Assessing the Guilt Probability in Intentional
Data Leakage
Pages :4075-4078
Yadav Gitanjali B., Bhaskar P. C., Dr. Kamat R. K.
Abstract | PDF |
49. |
Design an Monitoring System of Aquaculture
with Multi-Environmental Factors Using
ARM7
Pages :4079-4083
Bodepudi SrinivasaRao, U.Jyothi Kameswari
Abstract | PDF |
50. |
Security Provision in Publicly Auditable Secure Cloud
Data Storage Services Using SHA-1 Algorithm
Pages :4084-4088
Akkala.Saibabu, T.Satyanarayana Murthy
Abstract | PDF |
51. |
Continuous Energy-Efficient Link Assessment in
Sensor Networks
Pages :4089-4092
Ramineni Saichand, B.Suvarna
Abstract | PDF |
52. |
Article Removed
Pages :xxxx-xxxx
xxxxxxxxxx
Abstract | PDF |
53. |
Cluster Diagnostics and Verification Tool for
Effective and Scalable Web Log Analysis
Pages :4097-4100
Shakti Kundu
Abstract | PDF |
54. |
Virtualization of Multi Server Environment
Results in Enhanced Communication and
Fortification of Transport Layer Security Protocol
Pages :4101-4108
Kuljeet Kaur ,Dr. G.Geetha
Abstract | PDF |
55. |
A Novel Architecture Providing Scalable Quality of
Service - Adaptive Services
Pages :4109-4112
HarishBabu.Kalidasu , Bhagyalakshmi.Basuvula ,Haripriya.P
Abstract | PDF |
56. |
Comparative Analysis of Throughput and Dropped
rate for Location-Aided Routing Protocol
Pages :4113-4118
Neelima Parsendia, Amit Sinhal
Abstract | PDF |
57. |
Performance Evaluation of K-Means and
Heirarichal Clustering in Terms of Accuracy and
Running Time
Pages :4119-4121
Nidhi Singh,.Divakar Singh
Abstract | PDF |
58. |
Geometric Routing Protocol based on Genetic
Algorithm for Delay Minimization in MANETs
Pages :4122-4126
Sonam Jain, Sandeep Sahu
Abstract | PDF |
59. |
Design of Leakage Power Reduced Static RAM
using LECTOR
Pages :4127-4130
B. Dilip, P. Surya Prasad
Abstract | PDF |
60. |
A Low Power and High Speed Design for VLSI
Logic Circuits Using Multi-Threshold Voltage
CMOS Technology
Pages :4131-4133
Phani kumar M, N. Shanmukha Rao
Abstract | PDF |
61. |
An Optimized Design for Parallel MAC based on
Radix-4 MBA
Pages :4134-4138
R.M.N.M.Varaprasad , M.Satyanarayana
Abstract | PDF |
62. |
A Low Power Area Efficient Design for 1-bit Full
Adder Cell
Pages :4139-4142
Manoj Kumar R and Krishna Murthy M
Abstract | PDF |
63. |
Article removed
Pages :xxxx - xxxx
xxxx
Abstract | PDF |
64. |
ESD Protected on -Chip Crystal Oscillator
Pages : 4147 - 4150
K. Gowthami, P.U.K. Prabha
Abstract | PDF |
65. |
An Efficient Image Matching algorithm
Pages : 4151 - 4152
Rajesh Kumar,Anurag Singh Tomar
Abstract | PDF |
66. |
Study of the Different Types of Coupling Present
in the Software Code
Pages : 4153 - 4156
Harjot Singh Virdi, Balraj Singh
Abstract | PDF |
67. |
Design of an Automated System to Represent Web
Requirements Engineering
Pages : 4157 - 4160
Harjot Singh Virdi, Balraj Singh
Abstract | PDF |
68. |
Evaluation of Mobile nodes over Different Density
Models using MANET Routing Protocols
Pages : 4161 - 4165
Shikha Jat, Brajesh Patel
Abstract | PDF |
69. |
Behaviour of Routing Protocols of Mobile Adhoc
Netwok with Increasing Number of Groups using
Group Mobility Model
Pages : 4166 - 4170
Deepak Agrawal, Brajesh Patel
Abstract | PDF |
70. |
Identification of Energy Consumption Packets in
MANET Routing Protocols under CBR and
Exponential Traffic Models
Pages : 4171 - 4175
Shailendra Singh Raghuwanshi,Brajesh Patel
Abstract | PDF |
71. |
Image Enhancement of Normal and Abnormal with
Edema Segmentation of Brain MR Images Using
Adaptive Wiener Filter
Pages : 4176 - 4181
A.Ramaswamy Reddy, Dr. E.V.Prasad, Dr.L.S.S.Reddy
Abstract | PDF |
72. |
Powerful Research Documentation Software
‘LaTeX’
Pages : 4182-4184
Sivagaminathan Ganesan
Abstract | PDF |
73. |
Digital Audio Watermarking for Copyright
Protection
Pages : 4185-4188
Chakradhar Kahalkar
Abstract | PDF |
74. |
Load Flaking on Continuous Monitoring of Spatial
Queries
Pages : 4189-4198
Narendra Babu.Pamula,G.Bargavi
Abstract | PDF |
75. |
Performance Evaluation of Inference Engine in
Static and Changeable Environment
Pages : 4199-4201
Ajaysinh Rathod, Bhaumik Nagar, Sachin Sharma
Abstract | PDF |
76. |
Ant Colony Optimization is the limited case of
Prim’s Algorithm
Pages : 4202-4204
Pratibha Raj, Monica Sood
Abstract | PDF |
77. |
An Adaptive Representation of RFID Data Sets
Based on Movement Graph Model
Pages : 4205-4209
M. P. Ravikanth, A. K. Rout
Abstract | PDF |
78. |
Content Based Recommendation System Using
SOM and Latent Dirichlet Allocation Model
Pages : 4210-4215
Amit Kumar Nandanwar, Geetika S. Pandey
Abstract | PDF |
79. |
Information Hiding in an Image File: Steganography
Pages : 4216-4217
Harsh Prayagi, Tushar Srivastava, Gyanendra Ojha, Sunil Chaurasia
Abstract | PDF |
80. |
A Novel Approach for an Early Test Case Generation
using Genetic Algorithm and Dominance Concept
based on Use cases
Pages : 4218-4224
Alekhya Varikuti ,Deepika Puvvula
Abstract | PDF |
81. |
QoS Based Web Service Selection using Credibility
Evaluation
Pages : 4225-4231
Deepika Puvvula, Sai Charan Dhatrika , Alekhya Varikuti
Abstract | PDF |
82. |
Classification of Text Data by Fuzzy
Self-Constructing Feature Clustering Algorithm
Pages : 4232-4236
Y. Ratna Kumari, R. Siva Ranjani
Abstract | PDF |
83. |
Article Removed
Pages : xxxx-xxxx
xxxx
Abstract | PDF |
84. |
Age identification of Facial Images using Neural Network
Pages : 4244-4247
Sneha Thakur, Ligendra Verma
Abstract | PDF |
85. |
A Preventive Anti-Phishing Technique using code word
Pages : 4248-4250
Madhuresh Mishra, Gaurav, Anurag Jain
Abstract | PDF |
86. |
Securing Information: Cryptography and Steganography
Pages : 4251-4255
Ramakrishna Mathe, Veera RaghavaRao Atukuri, Srinivasa Kumar Devireddy
Abstract | PDF |
87. |
Visual Model for Structured data Extraction Using Position Details
Pages : 4256-4260
B.Venkat Ramana, A.Damodaram
Abstract | PDF |
88. |
Behaviour Analysis of Wireless Ad-Hoc Networks under Different Transmission Rate
Pages : 4261-4264
Madhuri Agrawal, Chirag Sharma, Sheveta Vashisht
Abstract | PDF |
89. |
An advanced and area optimized L.U.T design using A.P.C. and O.M.S
Pages : 4265-4269
K.Sreelakshmi, A.Srinivasa Rao
Abstract | PDF |
90. |
A Low Power DDR SDRAM Controller Design
Pages : 4270-4274
P.Anup, R.Ramana Reddy
Abstract | PDF |
91. |
An Implementation of Open Core Protocol for the On-Chip Bus
Pages : 4275-4278
Ch.Suryanarayana, M.Vinodh kumar
Abstract | PDF |
92. |
Architecture for Securing Virtual Instance in Cloud
Pages : 4279-4282
Krimit Shukla, Harshal Trivedi, Parth Shah
Abstract | PDF |
93. |
Data optimization in speech recognition using Data mining concepts and ANN
Pages : 4283-4286
Navdeep Kaur, Sanjay Kumar Singh
Abstract | PDF |
94. |
Application of incoming SMS to a website, control the website to send bulk SMS
Pages : 4287-4289
Sawal Tandon
Abstract | PDF |
95. |
Effective impact of ECN with RED to control heavy
Congestion
Pages : 4290-4293
Shweta Mishra, Nidhi Jain
Abstract | PDF |
96. |
Efficient Multicast for Grid Environment Using Robber and Bit Torrent Protocol
Pages : 4294-4301
V.Matheswaran, S.Usha
Abstract | PDF |
97. |
Cloud Security with Encryption using Hybrid Algorithm and Secured Endpoints
Pages : 4302-4304
Sunita Rani, Ambrish Gangal
Abstract | PDF |
98. |
Compression Method for Handwritten Document Images in Devnagri Script
Pages : 4305-4309
Smita V. Khangar, Latesh G. Malik
Abstract | PDF |
99. |
An automated tool for web site evaluation
Pages : 4310-4313
Sukhpal Kaur
Abstract | PDF |
100. |
Low cost Parallel TCP optical Communication
Between Data Centers
Pages : 4314-4317
G. Srinivasa Rao, Ch. Krishna Prasad, G.Vijay kumar
Abstract | PDF |
101. |
The Application of Genetic Algorithm in the design of Routing Protocols in MANETs: A Survey
Pages : 4318-4321
Sonam Jain,Sandeep Sahu
Abstract | PDF |
102. |
Gabor Based Face Recognition Using EBGM and PCA
Pages : 4322-4326
Manan Tiwari
Abstract | PDF |
103. |
A TRUST BASED SCHEME TO ENCOURAGE PACKET FORWARDING IN MOBILE AD-HOC NETWORKS
Pages : 4327-4330
Deepak Kumar Dixit, Praveen Kaushik
Abstract | PDF |
104. |
Reliable Pareto Solutions for Multiple Objective Scheduling Problems
Pages : 4331-4338
Praveen Kumar Malladi, Deepika Puvvula, Anisha Nagalla
Abstract | PDF |
105. |
Achieving a Secure E-Cash System
Pages : 4339-4340
Swati Rana, Gaurav Chaudhry
Abstract | PDF |
106. |
Network Coding Based Virtual Backbone for Wireless Sensor Network
Pages : 4341-4344
Ramakant Sharma, Praveen Kaushik
Abstract | PDF |
107. |
An efficient dynamic approach for exact reconstruction for CT image application
Pages : 4345-4349
S.Asif Hussain, P.Syamala Devi, C.Hemanth
Abstract | PDF |
108. |
Energy Efficient Routing Algorithm with sleep scheduling in Wireless Sensor Network
Pages : 4350-4353
Subhash Dhar Dwivedi, Praveen Kaushik
Abstract | PDF |
109. |
A Complete Design of Advanced embedded chatter box for physically challenging persons
Pages : 4354-4358
Dharani Kumar Chowdary.M, Naresh Kumar Reddy.Beechu, G.Subrahmanya Sharma
Abstract | PDF |
110. |
Implementation of Nth Order Bandpass filter
Pages : 4359-4361
S.Shirin, CH.R.Phani Kumar
Abstract | PDF |
111. |
Proposed A Robust Trust Model for Reliable and Secure Transactions in Grid Computing
Pages : 4362-4365
Biswajit Upadhyay, Abhishek Bandyopadhyay, Avijit Bhowmick
Abstract | PDF |
112. |
Combine use of Steganography and Visual Cryptography for Secured Data hiding in Computer Forensics
Pages : 4366-4370
Ravindra Gupta, Akanksha Jain, Gajendra Singh
Abstract | PDF |
113. |
An innovative Algorithm for Flash memory
Pages : 4371-4376
M. N. Kale, A. S. Jahagirdar
Abstract | PDF |
114. |
Design and Development of M learning standard for content portability:
Overview and case study
Pages : 4377-4380
Chandni Sharma, Parmeet Kaur Grewal
Abstract | PDF |
115. |
Adaptive Algorithm for Cyber Crime Detection
Pages : 4381-4384
Manveer Kaur, Sheveta Vashisht, Kumar Saurabh
Abstract | PDF |
116. |
Hash Table Based Word Searching Algorithm
Pages :4385 - 4388
Sanket Jain, Manish Pandey
Abstract | PDF |
117. |
Handwriting Characterization of Neurodegenerative diseases
Pages : 4389 - 4391
Jammi Ashok, Alekhya Guduri, O.Nitya Sarayu
Abstract | PDF |
118. |
A Novel Approach Based Image Tracing
Pages : 4392- 4395
K.Satish Babu, Y N Supraja, S.Karunakar Reddy
Abstract | PDF |
119. |
Enhancing Functioning of WSAN for Road Surveillance
Pages : 4396 - 4399
Roma Kudale, Rachana Satao
Abstract | PDF |
120. |
Enhancing Security in Software development life cycle
Pages : 4400 - 4403
Chandana Das, Pardeep Kumar Sharma
Abstract | PDF |
121. |
Performance Evolution of Heart Sound Information Retrievel System in Multicore Environment
Pages : 4404 - 4407
Amrita Maity, P. Sivakumar, M Rajasekhara Babu, Ch. Pradeep Reddy
Abstract | PDF |
122. |
Very Low Resolution Face Recognition In Parallel Environment
Pages : 4408 - 4410
Debabrata Chowdhuri, Sendhil Kumar K.S., M Rajasekhara Babu, Ch. Pradeep Reddy
Abstract | PDF |
123. |
A Compression Algorithm for Nucleotide Data Based on Differential Direct Coding and Variable Length Look up Table (LUT)
Pages : 4411- 4416
Govind Prasad Arya, R. K. Bharti
Abstract | PDF |
124. |
Design and analysis of E-learning content in accordance with SCORM
Pages : 4417 - 4420
Shaveta Bhambi, Balwant ram
Abstract | PDF |
125. |
Design of Keyed Secure 256Bit Chaotic Hash Function
Pages : 4421 - 4426
SambasivaRaoMeduri,Srinivasareddy Ogirala
B.Tirapathi Reddy
Abstract | PDF |
126. |
Windows Registry Forensics: An Imperative Step in Tracking Data Theft via USB Devices
Pages : 4427- 4433
Tanushree Roy, Aruna Jain
Abstract | PDF |
127. |
Predictive Analytics: A Survey, Trends,Applications, Oppurtunities & Challenges
Pages : 4434- 4438
Nishchol Mishra, Sanjay Silakari
Abstract | PDF |
128. |
Wireless Telecommunications Call Records Data warehouse ETL Flows
Pages : 4439 - 4442
K.Srikanth, N.V.E.S.Murthy, J.Anitha
Abstract | PDF |
129. |
Implementation of Optimized Reconfigurable Built-In Self-Repair Scheme for RAMs In SOCs
Pages : 4443 - 4446
Venkatesh S, Laxmi Prasanna Rani M
Abstract | PDF |
130. |
Transistor Implementation of Reversible Comparator Circuit Using Low Power Technique
Pages : 4447 - 4452
Madhina Basha, V.N.Lakshmana Kumar
Abstract | PDF |
131. |
Logical Supportive Interface to Hardware Description for Analog Design Interface
Pages : 4453 - 4459
R.Prakash Rao, B.K.Madhavi
Abstract | PDF |
132. |
A Vision based Application for Virtual Mouse Interface Using Finger-Tip
Pages : 4460 - 4464
K S Chidanand Kumar
Abstract | PDF |
133. |
Dispatcher algorithm for effective resource utilization of server using volunteer computing: A case study
Pages : 4465 - 4468
Jayaram C V, Rampur Srinath
Abstract | PDF |
134. |
Analyzing the biosignal to make fatigue measurement as a parameter for mood detection
Pages : 4469 - 4472
Suwarna Hajare, Chhaya Dule
Abstract | PDF |
135. |
Performance Analysis of Adaptive Dynamic Load Balancing in Grid Environment using GRIDSIM
Pages : 4473 - 4479
Pawandeep Kaur, Harshpreet Singh
Abstract | PDF |
136. |
Developing Decision Trees for Handling Uncertain Data
Pages : 4480 - 4485
P. Satya Prakash, P. Jhansi Lakshmi, B.L Krishna
Abstract | PDF |
137. |
Article Removed
Pages : xxxx - xxxx
xxx, xxxx, xxx
Abstract | PDF |
138. |
Combination of Density Based and Partition Based Clustering Algorithm-DBK Means
Pages : 4491 - 4494
B.L. Krishna, P.Jhansi Lakshmi , P.Satya Prakash
Abstract | PDF |
139. |
Code Compression Algorithm for High Performance Micro Processor
Pages : 4495 - 4498
S.Sekhar dileep kumar, K.Rakesh
Abstract | PDF |
140. |
Application of Elliptic Curve Method in Cryptography: A Literature Review
Pages : 4499 - 4503
Samta Gajbhiy e,Dr. Sanjeev Karmakar, D r. Monisha Sharma,Dr. Sanjay Sharma, Dr. M K Kowar
Abstract | PDF |
141. |
Decision Theoretic in SQL to Prepare Data Sets for
Data Mining Analysis
Pages : 4504-4507
Venkata Changal Rao , T. Rajesh, Sk. Karimulla
Abstract | PDF |
142. |
A Novel Method for Divide and Convergent
Coherent Mechanism in Cloud Computing
Pages : 4508-4513
Amena Nasreen, SK.Haseena, G.Srinivasa Rao
Abstract | PDF |
143. |
Cloud Security Challenges
Pages : 4514-4515
Juhi Sharma , Kshitiz Saxena
Abstract | PDF |
144. |
Denial of Service Attacks in Wireless Mesh
Networks
Pages : 4516-4522
Monika
Abstract | PDF |
145. |
An Effectual Defense Method against Gray Hole
Attack in Wireless Sensor Networks
Pages : 4523-4528
Jaspreet Kaur, Vinod Kumar
Abstract | PDF |
146. |
An Expert System for Advising Postgraduate
Students
Pages : 4529-4532
Dr. Abdullah Al-Ghamdi, Sumaia Al-Ghuribi ,Arwa Fadel,Fatima Al-Aswadi ,Thamary AL-Ruhaili
Abstract | PDF |
147. |
Research Challenges in Extracting Personal Name
Pseudonyms from the Web
Pages : 4533-4542
Sivagaminathan Ganesan
Abstract | PDF |
148. |
Opportunities, Concerns and Challenges in the
Adoption of Cloud Storage
Pages : 4543-4548
Indu Arora, Dr. Anu Gupta
Abstract | PDF |
149. |
Uncertain Numerical Data Clustering with VORONOI
Diagram and R-Tree with Ensemble SVM
Pages : 4549-4552
D. M. Padulkar, V. Z. Attar
Abstract | PDF |
150. |
Resolving Referential Ambiguity on the Web
Using Higher Order Co-occurrences in
Anchor-Texts
Pages : 4553-4557
Rama.K, Sridevi.M, Vishnu Murthy.G
Abstract | PDF |
151.
|
Discovery of Preliminary Centroids Using Improved K- Means Clustering Algorithm
Pages : 4558-4561
N. Koteswara Rao, G. Sridhar Reddy
Abstract | PDF |