1. |
Comparative Study of Automated Testing Tools: Quick Test Pro and Load Runner
Pages : 4562 - 4567
Shaveta,Sachin kumar,Nitika,Snehlata
Abstract | PDF |
2 |
Achieving fast recovery in IP networks by MULTIPLE ROUTING CONFIGURATION
Pages : 4568 - 4570
Rajnee Kumari, Sitanath Biswas, Subrat S. Pattnaik
Abstract | PDF |
3 |
Modern Power Semiconductor Devices (A Review)
Pages : 4571 - 4574
Meenakshi Mataray A.P
Abstract | PDF |
4 |
Public Key Cryptography by Centralized Offline Server in Mission-Critical Networks
Pages : 4575 - 4579
K. Naresh Kumar, Dr. S. Srinivasu,K.P.R KrishnaChaitanya
Abstract | PDF |
5 |
Explore 10 Different Types of Software Development Process Models
Pages : 4580 - 4584
S.Thulasee Krishna ,Dr. S.Sreekanth,Perumal,K.Rajesh Kumar Reddy
Abstract | PDF |
6 |
Robust Techniques based Hybrid Models in Classification Experiments
Pages : 4585 - 4589
Karnakar Gulla, Ashok kumar Aithagani , Satyanarayana Vollala,Srinivas Pilli
Abstract | PDF |
7 |
Multiplexing in the peer-to-peer Live Streaming
Pages : 4590 - 4595
T.Ashalatha, Ch.Naveen Kumar Reddy, G.Vishnu Murthy,Ch.Venkata Rajam
Abstract | PDF |
8 |
DNA representation based on ladder like structure property of DNA sequence double Helix
Pages : 4596 - 4598
Archana Verma, R.K.Singh
Abstract | PDF |
9. |
An Approach to Find Out at which Maintainability Metric, Software Maintenance Cost is Less Pages : 4599 - 4602 C.V.S.R Syavasya
Abstract | PDF |
10. |
Cross Lingual Query Dependent Snippet Generation
Pages : 4603 - 4609
Pinaki Bhaskar, Sivaji Bandyopadhyay
Abstract | PDF |
11. |
Answer Extraction of Comparative and
Evaluative Question in Tourism Domain
Pages : 4610 - 4616
Pinaki Bhaskar, Bidhan Chandra Pal, Sivaji Bandyopadhyay
Abstract | PDF |
12. |
Impact Analysis Through Regression Test Selection
Pages : 4617 - 4624
S. Sushumna, K. Rakesh, G. HimaBindu
Abstract | PDF |
13. |
Resource Allocation Method using Scheduling methods for Parallel Data Processing in CloudPages : 4625 - 4628
Sowmya Koneru, V N Rajesh Uddandi, Satheesh Kavuri
Abstract | PDF |
14. |
Online Intrusion Alert Aggregation Using DGDSM Approach
Pages : 4629 - 4632
J.Poongodi, C.Vimalarani, Dr.S.Karthik
Abstract | PDF |
15. |
Congestion control in wireless sensor networks: Existing Applicable Techniques for Weather Sensor Networks
Pages : 4633 - 4636
Meenu Chawla, Sunil Mandave
Abstract | PDF |
16. |
An Approach Based On Artificial Neural Network for Data Deduplication
Pages : 4637 - 4644
M.Padmanaban, T.Bhuvaneswari
Abstract | PDF |
17. |
Extended Ad hoc On demand Distance Vector Multipath Routing (EAODVMR) protocol for Mobile Ad hoc NETwork(MANET)
Pages : 4645 - 4652
Dr.M.Sadish sendil, V. Balajishanmugam
Abstract | PDF |
18. |
Experimental Analysis and Demonstration of the NS2 Implementation of Dynamic Buffer Sizing Strategies for 802.11 Based Wireless Networks
Pages : 4653 - 4657
Santosh Hosamani, G.S.Nagaraja
Abstract | PDF |
19. |
Ensuring Security in Resource Centers of Cloud
Environment by Using Trusted Pools
Pages : 4658 - 4661
K.P.R KrishnaChaitanya, Dr. S. Srinivasu, K. Naresh Kumar
Abstract | PDF |
20. |
Comparative Analysis of Apriori Algorithm and
Frequent Pattern Algorithm for Frequent Pattern
Mining in Web Log Data
Pages : 4662 - 4665
Rahul Mishra, Abha choubey
Abstract | PDF |
21. |
A Novel Approach Based Wireless Intrusion
Detection System
Pages : 4666 - 4669
K.Suresh, A.Sarala Devi , Jammi Ashok
Abstract | PDF |
22. |
Software Simulation of Unequal Error Protection
Based Demodulator (Burst Mode) for Onboard
Application
Pages : 4670 - 4673
Deepak Mishra , K S Dasgupta and S.Jit
Abstract | PDF |
23. |
Bandwidth Optimization, Recycling In IEEE
802.16 Networks by Using
Call Admission Control & Scheduler
Pages : 4674 - 4680
Sk.Jahangeer basha, Ch.Prakasa rao
Abstract | PDF |
24. |
Web Page Adaptation for Large Screens
Pages : 4681 - 4683
Neetu Narwal, Saba Hilal
Abstract | PDF |
25. |
Fault Prediction OO Systems Using the
Conceptual Cohesion of Classes
Pages : 4684 - 4688
Subba Rao Polamuri, S. Rama Sree, M.Rajababu
Abstract | PDF |
26. |
Fractal Based Management of Heterogeneous
Data Streams
Pages : 4689 - 4691
M.Prosant Kumar, N.Naga Subrahmanyeswari , S. Rama Sree
Abstract | PDF |
27. |
Design and Implementation of Stegnography
Algorithm using Color Transformation
Pages : 4692-4695
Anjali Dua , Sonia Sharma
Abstract | PDF |
28. |
Detecting Image Forgeries using Discrepancies in Motion Blur
Pages : 4696-4700
Rupali M. Bora, N. M. Shahane, Umesh K. Gaikwad
Abstract | PDF |
29. |
Effective Performance Analysis of Bin –Periodic
Algorithm for Wireless Sensor –Actor Network
Pages : 4701-4703
M.E. Sanap, Rachana A.Satao
Abstract | PDF |
30. |
Web Service Quality Composition Determination
Using Genetic Algorithm in Sematic Web
Pages : 4704-4706
Nandhini.M ,Sadish Sendil.M
Abstract | PDF |
31. |
Learning Based Single-Frame Image Super-Resolution
using Contourlet Transform
Pages : 4707-4711
Sukeshkumar P.Borate, Dr. Sanjay L.Nalbalwar
Abstract | PDF |
32. |
Secure Group Key Transfer Protocol Based on Secret Sharing
Pages : 4712-4717
Vijaya lakshmi Pandranki ,N.Krishna
Abstract | PDF |
33. |
False Data Detection in Wireless Network using Dynamic Security Protocol
Pages : 4718-4722
Garaga Subba Rao, Kothapalli Ramesh
Abstract | PDF |
34. |
Detection of Intrusion using Alert Aggregation in DataStream Modelling with Constructive Basis
Pages : 4723-4730
J Swathi, Prof.P.Pradeep, P Mahesh Kumar
Abstract | PDF |
35. |
Analysis of Business Processes and Modeling Approach to Business Process Re-Engineering
Pages : 4731-4737
Chandrahauns R Chavan, Bechoo Lal
Abstract | PDF |
36. |
Improving security By Quantum Cryptography in P2P Reputation Management in Distributed Identities and Decentralized Recommendation Chains
Pages : 4738-4742
V V Murali Babu Polukonda, A Harish
Abstract | PDF |
37. |
Dynamic Behavioral Pattern Mining from
Point of Coverage Wireless Sensor Networks
Pages : 4743-4746
U. Sandhya Rani, P.Subba Rao
Abstract | PDF |
38. |
Web Security and Classification of Different
Types of Attack for Web
Pages : 4747-4750
Shubham Srivastava
Abstract | PDF |
39. |
Scenario Based Performance and Comparative Simulation Analysis of Routing Protocols of MANET
Pages : 4751 - 4756
Vikas Gupta, Ajay Lala, Shivendu Dubey, Ashish Chaurasia
Abstract | PDF |
40. |
Efficient Power MAC Protocol in Ad-hoc Network’s
Pages : 4757 - 4763
Rahul Mukherjee
Abstract | PDF |
41. |
Hatch-Sens: a Theoretical Bio-Inspired Model to Monitor the Hatching of Plankton Culture in the Vicinity of Wireless Sensor Network
Pages : 4764 - 4769
Poulami Majumder, Partha Pratim Ray
Abstract | PDF |
42. |
Multi-Constrained QoS Routing Issues in High-Speed Multimedia Networks
Pages : 4770 - 4773
Monika Jena, Ajay Rana
Abstract | PDF |
43. |
Replication of Authorized Data Objects in
Data Grid
Pages : 4774 -4779
D. Subhramanya Sharma, Sudha Gontu
Abstract | PDF |
44. |
Secure File Transfer by using Modular Encryption
Pages : 4780 - 4784
D. Subhramanya Sharma, D.Geetha jyothi
Abstract | PDF |
45. |
Secured Auditing of Outsourced Data using Linear Programming in Cloud
Pages : 4785 - 4789
Satheesh Kavuri, Gangadhara Rao Kancharla, Sowmya Koneru, Sandeep Kotte
Abstract | PDF |
46. |
3G/4G Network Evolution
Pages : 4790 - 4793
Krunal N. Chandewar, Amit N. Sangole, Shailesh S. Shekapure
Abstract | PDF |
47. |
Automated Detection of Diabetic Retinopathy Using Fundus Image Analysis
Pages : 4794 - 4799
Jaspreet Kaur,Dr. H.P.Sinha
Abstract | PDF |
48. |
Secret Sharing against Transmission Error for an Invisible Communication
Pages : 4780 - 4783
HarishBabu. Kalidasu , B.PrasannaKumar, Haripriya.P
Abstract | PDF |
49. |
Objective Quality Measures in Binarization
Pages : 4784 - 4788
Ambily Joseph, Jaini Sara Babu, Poorna Jayaraj, Beena K.B
Abstract | PDF |
50. |
Optimization CBIR using K-Means Clustering for Image Database
Pages : 4789 - 4793
Juli Rejito, Retantyo Wardoyo, Sri Hartati, Agus Harjoko
Abstract | PDF |
51. |
Discovering Hidden Values in Data Warehouse with Predictive Data Mining
Pages : 4794 - 4797
Duvvuri Arun Kumar, V.Vamsi Krishna, K.Suresh,Ch.Jnaneswari,G.Lakshmi Kranthi, $Anilpatro
Abstract | PDF |
52. |
Secure Mobile Agent Based IDS for MANET
Pages : 4798 - 4805
Yogendra Kumar Jain, Rajesh Kumar Ahirwar
Abstract | PDF |
53. |
Estimating the Effects of Gold Plating Using
Fuzzy Cognitive Maps
Pages : 4806 - 4808
Neha Malhotra,Manisha Bhardwaj, Rajwinder Kaur
Abstract | PDF |
54. |
Chaos-Based System for Image Encryption
Pages : 4809 - 4811
Deep Desai, Appoorv Prasad, Jackson Crasto
Abstract | PDF |
55. |
A New Blind Image Watermarking using Hermite Spline Approach
Pages : 4812 - 4817
Allam Mohan, Kampalli Ramu, Salina Adinarayana
Abstract | PDF |
56. |
A Comprehensive Review of Recent Relevance Feedback Techniques in CBIR
Pages : 4818 - 4822
Shruti Patil
Abstract | PDF |
57. |
Role of Wireless Technology for Vehicular Network
Pages : 4823 - 4828
Akshata Gandhi, B. T. Jadhav
Abstract | PDF |
58. |
3D/4D Image Registration and Fusion Techniques : A Survey
Pages : 4829 - 4839
Shajan P X, Dr.N.J.R.Muniraj, Dr.John T Abraham
Abstract | PDF |
59. |
Weak Bloom Filtering for Large-Scale Dynamic Networks
Pages : 4840 - 4842
Krishna Siva Prasad.M , Y.Adilakshmi
Abstract | PDF |
60. |
Attribute Series of Software Evolution for Software Quality Assessment
Pages : 4843 - 4849
Varaprakash, Praveen Kumar Malladi, Venkata Kiran Talluri
Abstract | PDF |
61. |
Civilizing Exploitation of Communication Clouds
Pages : 4850 - 4857
Janga Santhosh, Puram Pradeep kumar, Majoju Sridhar kumar
Abstract | PDF |
62. |
A Survey of Web Usage Mining based on Fuzzy Clustering and HMM
Pages : 4858 - 4862
Neelam Sain, Prof. Sitendra Tamrakar
Abstract | PDF |
63. |
Protocol Based Attack Injection Framework to Fault Diagnosis in Server Applications
Pages : 4863 - 4867
Kalagotla satish kumar, L.R.Krishna kotapati
Abstract | PDF |
64. |
Security of Data Dynamics in Cloud Computing
Pages : 4868 - 4873
M.Yugandhar, D. Subhramanya Sharma
Abstract | PDF |
65. |
Web Usage Mining & Pre-Fetching Based on Hidden Markov Model & Fuzzy Clustering
Pages : 4874 - 4877
Neelam Sain, Prof. Sitendra Tamrakar
Abstract | PDF |
66. |
A Modified Efficient Log File Compression Mechanism for Digital Forensic in Web Environment
Pages : 4878 - 4882
Rashmi Gupta, Raj Kumar Gupta
Abstract | PDF |
67. |
Social Networking: A Quantitative Research Report into Impact, Attitudes, Behaviours and Use
Pages : 4883 - 4886
Preeta Mahapatra
Abstract | PDF |
68. |
Random Routing Algorithm for Secured Data Collection Accessed in Wireless Sensor Networks
Pages : 4887 - 4891
K.Deepthi, K.Rajani , Y.Suresh
Abstract | PDF |
69. |
Recognition of Handwritten Hindi Characters using Backpropagation Neural Network
Pages : 4892 - 4895
Gunjan Singh, Sushma Lehri
Abstract | PDF |
70. |
A Study of Cloud Privacy and Privacy Patterns
Pages : 4896 - 4899
D.Veerabhadra Rao, G.Appa Rao, Prasad Reddy P.V.G.D
Abstract | PDF |
71. |
Similarity of Fuzzy Ontology Generation for Semantic web
Pages : 4900 - 4903
G. Umamaheswara Rao,K.V. Subba Raju ,K. Srikanth
Abstract | PDF |
72. |
Fail-Proof Connectivity with Continuous Neighbor Discovery in Sensor Networks
Pages : 4904 - 4912
K Sujith Kumar, P Praveen Kumar, B Prasad
Abstract | PDF |
73. |
Analysis and Study of Host To Host Congestion
Control for TCP
Pages : 4913 - 4916
V.Akhila Reddy, D.Jamuna, L.Haritha, G.Rakesh Reddy
Abstract | PDF |
74. |
A Navel Approach to Identify Geo-Encryption
with GPS and Different
Parameters (Locations And Time)
Pages : 4917 - 4919
V. Rajeswari, V. Murali, A.V.S. Anil
Abstract | PDF |
75. |
Dynamic Clustering in Sensor Networks using
HMM and Neuro Computation
Pages : 4920 - 4926
Veena K.N., Vijaya Kumar B.P.
Abstract | PDF |
76. |
Semantic Answer Validation using
Universal Networking Language
Pages : 4927 - 4932
Partha Pakray, Utsab Barman, Sivaji Bandyopadhyay, Alexander Gelbukh
Abstract | PDF |
77. |
RDF /RDF-S Providing Framework Support to
OWL Ontologies
Pages : 4933 - 4937
Rajiv Pandey, Dr.Sanjay Dwivedi
Abstract | PDF |
78. |
Estimating the Probability of Project Completion
by SIM_DEL Estimator
Pages : 4938 - 4945
Dr. P.K.Suri, Pallavi Ranjan
Abstract | PDF |
79. |
A Min-Max Inspired Intelligent Approach to
Perform Load balancing in Wireless Network
Pages : 4946 - 4950
Harvinder Singh, Narwal Sarita
Abstract | PDF |
|
|