1. |
Object Detection by an Autonomous Robot through Data Fusion
Pages : 4951 - 4955
Tapan Kumar Nayak, Sanjit Kumar Dash, Himansu Sekhar Sasmal, Srikanta Patanaik
Abstract | PDF |
2 |
Authenticated Transmission using Quantum Security
Pages : 4956 - 4960
V. Kishore, M. Ramakrishna, M.A.Baseer
Abstract | PDF |
3 |
Joint effect of Learning and Testing Effort in SRGM
with Fault Dependent Correction Delay
Pages : 4961 - 4967
Shaik Mohammad Rafi , Dr.K Nageswara Rao , Dr. S . Pallam Setty , Dr. Shaheda Akthar
Abstract | PDF |
4 |
FIR Filter Design Using Rounding Technique
Pages : 4968 - 4970
Sangita Solanki, Devendra Singh Mondloi
Abstract | PDF |
5 |
Network Intrusion Detection Using Improved Decision Tree Algorithm
Pages : 4971 - 4975
K.V.R. Swamy, K.S. Vijaya Lakshmi
Abstract | PDF |
6 |
Users Recommended Tag Prediction and Visualization for Dynamic Delicious Tag Data
Pages : 4976 - 4980
Jameson Ganta, G. Krishna Kishore
Abstract | PDF |
7 |
A Novel Approach for SQL Injection Prevention Using Hashing & Encryption (SQL-ENCP)
Pages : 4981 - 4987
Mayank Namdev, Fehreen Hasan, Gaurav Shrivastav
Abstract | PDF |
8 |
Simplifying Complex Tasks: Cloud Computing
Pages : 4988 - 4996
V. KISHORE, G.G.G.BHAVANI, M.RAMAKRISHNA
Abstract | PDF |
9 |
OPTIMIZED DESIGN of ALU for LOW POWER DISSIPATION
Pages : 4997 - 4999
Hare kishan, Ravinder kumar
Abstract | PDF |
10 |
Performance Analysis of Node-Disjoint Multipath Routing for Mobile Ad-hoc Networks based on QoS
Pages : 5000 - 5004
Jay Kumar Jain, Devendra Kumar Jain, Anuradha Gupta
Abstract | PDF |
11 |
Securing E-Mail System of Web Data Base Using Cloud Computing
Pages : 5005 - 5008
Tejaswi.K, Sridevi.M, Vishnu Murthy.G
Abstract | PDF |
12 |
Optimizing Scheduling Policies and Analyzing
Delay in Multi-Hop Wireless Networks
Pages : 5009 - 5013
P.Pavan kumar Reddy, Manohar Gosul
Abstract | PDF |
13 |
A Review of Expert Systems in Animal
Health Care
Pages : 5014 - 5018
A. B. Patil, Dr. R. V. Kulkarni
Abstract | PDF |
14 |
Intrusion detection: an Energy efficient approach
and Data loss estimation in Heterogeneous WSN
Pages : 5019 - 5024
Mahipal Reddy.G
,Ananda Raj.S.P,Ramana.V,Poornima.S
Abstract | PDF |
15 |
Back Propagation Neural Network based Gait
Recognition
Pages : 5025 - 5030
G. Venkata Narasimhulu Dr. S. A. K. Jilani
Abstract | PDF |
16 |
Web Applications Access Control Single Sign On
Pages : 5031 - 5035
Anitha Chepuru, Dr.K.Venugopal Rao, Amardeep Matta
Abstract | PDF |
17 |
Novel Algorithms Based on Legendre Neural
Network for Nonlinear Active Noise Control with
Nonlinear Secondary Path
Pages : 5036 - 5039
Kunal Kumar Das and Jitendriya Kumar Satapathy
Abstract | PDF |
18 |
Proposed Multi-Layers Intrusion Detection System
(MLIDS) Model
Pages : 5040 - 5042
Gargi Agrawal, Megha Kamble
Abstract | PDF |
18 |
Proposed Multi-Layers Intrusion Detection System
(MLIDS) Model
Pages : 5040 - 5042
Gargi Agrawal, Megha Kamble
Abstract | PDF |
19 |
A Novel Approach for Multi-Cloud Storage security
in Cloud Computing
Pages : 5043-5045
G. Rakesh Reddy, Dr. M.B. Raju, Dr. B. Ramana Naik
Abstract | PDF |
20 |
Money to ATM – Fake Currency Detection
Pages : 5046-5050
K. Satish , Y.K.Viswanadham, I Leela Priya
Abstract | PDF |
21 |
A Novel Graphical Password Scheme Resistant To
Peeping Attack
Pages : 5051-5054
T.Srinivasa Ravi Kiran, Dr.K.V.Samabasiva Rao, M.Kameswara Rao
Abstract | PDF |
22 |
Need to Change focus from Link Failures to
Backbone Failures in WMN
Pages : 5055-5058
Jyoti Gupta, JiwanJyoti Senapati
Abstract | PDF |
23 |
Exalt Network Lifetime for Wireless Sensor
Network with Purn Delay
Pages : 5059-5061
Jangala Vineela, A.Srinivas Reddy
Abstract | PDF |
24 |
Proficient and Privacy-Attentive Framework for
Continuously Moving Objects
Pages : 5062-5064
Palukuri.Jhansy, T.Sunitha
Abstract | PDF |
25 |
IC: Intelligent Clustering, a new time efficient data
partitioning methodology
Pages : 5065-5067
Done Stojanov
Abstract | PDF |
26 |
A Novel System based on GMM to understand the
User's Web Navigation Pattern
Pages : 5068-5070
M.Bangaru Lakshmi, A.Nageswara Rao, G.Venugopal
Abstract | PDF |
27 |
Simple Overview on Cloud Computing
Pages : 5071-5073
Jeevana Jammula, Swapna Goud.N, Vishnu Murthy.G
Abstract | PDF |
28 |
Video Error Concealment using H.264/AVC
Pages : 5074-5077
Aniruddha D.Shelotkar, Vishwajit K.Barbudhe
Abstract | PDF |
29 |
Enriching Forensic Analysis process for Tampered
Data in Database
Pages : 5078-5085
Pallavi D Abhonkar, Ashok Kanthe
Abstract | PDF |
30 |
Literature Review on Expert System in Agriculture
Pages : 5086-5089
S. J. Yelapure , Dr. R. V. Kulkarni
Abstract | PDF |
31 |
Performance Comparison of transport protocols,
UDP and UDP-Lite for transmission of Different
Video Codecs over MANETs
Pages : 5090-5096
Puneet Kaur
Abstract | PDF |
32 |
A SECURE DATA HIDING TECHNIQUE IN COMPRESSED VIDEO USING A SECRET KEY
Pages : 5097 - 5100
V.Manjula, J. Rajani, K. Radhika
Abstract | PDF |
33 |
Application of Green Cloud Computing For Efficient Resource Energy Management in Data Centres
Pages : 5101-5107
Yuvapriya Ponnusamy, S Sasikumar
Abstract | PDF |
34 |
An Efficient Approach for Automatic Number Plate Recognition System Using Quick Response Codes
Pages : 5108 - 5115
Bhupendra Moharil, Vijayendra Ghadge, Chaitanya Gokhale, Pranav Tambvekar
Abstract | PDF |
35 |
Efficient Personalized Search using Ranking SVM
Pages : 5116 - 5122
V.K.Priyanka Kolluri, A.Bala Ram
Abstract | PDF |
36 |
Economic Cost Model for Software Engineering Simulation
Pages : 5123 - 5127
E.Geetha Rani,K.Swarupa Rani, D.Anusha, Dr.M.V.L.N.Raja Rao
Abstract | PDF |
37 |
Proposed Method for Image Segmentation Using Similarity Based Region Merging Techniques
Pages : 5128 - 5132
Garima Singh Rawat, Joy Bhattacharjee, Roopali Soni
Abstract | PDF
|
38 |
Robust and Secure Data Hiding in Image Using Biometric Technique
Pages : 5133 - 5136
N. Lavanya, V. Manjula, N. V. Krishna Rao
Abstract | PDF |
39 |
The Applications Survey On Bee Colony Optimization
Pages : 5137 - 5140
Hemant Nagpure#, Rohit Raja
Abstract | PDF |
40 |
A Robust Facial Recognition System Based on Skew Gaussian Distribution
Pages : 5141 - 5142
Pavanendar, P.Raja Sekhar, Y.Srinivas
Abstract | PDF |
41 |
Secured Receiver Location Privacy Based on Cyclic Chain Shift Technique in Mobile Ad Hoc Networks
Pages : 5143 - 5148
Satish Shrivastava, Nitin Agrawal, Sitendra Tamrakar
Abstract | PDF |
42 |
A Survey on Data Mining Algorithms and Future Perspective
Pages : 5149 - 5156
N.K. Sharma, Dr. R.C. Jain, Manoj Yadav
Abstract | PDF |
43 |
Ensuring and Reliable Storage in Cloud Computing
Pages : 5157 - 5163
Katukam Ganesh, Maligireddy Saidireddy, KrishnaChaitanya.Katkam
Abstract | PDF
|
44 |
Expedition for the Exploration of Apposite Knowledge
Pages : 5164 - 5168
Shabia Shabir Khan, Dr. Mushtaq Ahmed Peer
Abstract | PDF |
45 |
Accident Avoidance and Minimal Delay Time Efficient Automated Railway System
Pages : 5169 - 5171
Giridhari Krishnan
Abstract | PDF |
46 |
A Review of Expert System in Information System Audit
Pages : 5172 - 5175
A. B. Devale, Dr. R. V. Kulkarni
Abstract | PDF |
47 |
Polarity Analysis through Neutralization of Non-Polar Words and Segregation of Polar Words Using Training Data
Pages : 5176 - 5178
Ajay Siva Santosh Reddy
Abstract | PDF |
48 |
Fast Mining of Temporal Data Clustering
Pages : 5179 - 5181
D. Suresh Babu, K. Navya
Abstract | PDF |
49 |
A Review of Image Classification Techniques in Content Based Image Retrieval
Pages : 5182 - 5184
Neera Lal, Neetesh Gupta, Amit Sinhal
Abstract | PDF |
50 |
Personalized Web Information Collection Using
Knowledge-based Ontologies
Pages : 5185 - 5189
K.V. Narayana Rao, U. Jwalitha, K.D.N.V Rajesh
Abstract | PDF |
51 |
Self learning Automated ATC using AI Technique
and Entropy Approach
Pages : 5190 - 5194
Giridhari Krishnan
Abstract | PDF |
52 |
Adaptive Kalman Filter based Channel Equalizer
Pages : 5195 - 5199
Bharti Kaushal, Agya Mishra
Abstract | PDF |
53 |
Improved ID Based Key Agreement Protocol Using Timestamp
Pages : 5200 - 5205
M.D.P Kishore , Dr. K.Venkata Rao
Abstract | PDF |
54 |
Exploiting Dynamic Resource Allocation for
Query Processing in the Cloud Computing
Pages : 5206 - 5209
M.S.B.Pridviraju , K.Rekha Devi
Abstract | PDF |
55 |
Extended XML Tree Pattern Matching Using
TREEMATCH Algorithm
Pages : 5210 - 5211
Dr D.Suresh Babu, B.Shiva kiran
Abstract | PDF |
56 |
A Review of Data Cleaning Algorithms for Data
Warehouse Systems
Pages : 5212 - 5214
Rajashree Y.Patil,#, Dr. R.V.Kulkarni
Abstract | PDF |
57 |
A Comparative Study of various Computing
Processing Environments: A Review
Pages : 5215 - 5218
P.K. Suri, Sumit Mittal
Abstract | PDF |
58 |
An Approach For Intrusion Detection System In
Cloud Computing
Pages : 5219 - 5222
M.Madhavi
Abstract | PDF |
59 |
Vibe: Background detection and subtraction for image sequences in video
Pages : 5223-5226
K. Kavitha, A. Tejaswini
Abstract | PDF |
60 |
ABayesian Network and variable elimination algorithm for Reasoning under Uncertainty
Pages : 5227 - 5230
Siva Rama Krishna Prasad Jaladi, Dharmaiah Devarapalli
Abstract | PDF |
61 |
Content Based Image Retrieval System Consume Semantic Gap
Pages : 5231 - 5235
K. Vijay Kumar, Dr.R.Rajeswara Rao ,
V.Subba Ramaiah, Jhansi Rani kaka
Abstract | PDF |
62 |
Fuzzy Logic Approach to Edge Detection for Dental X-ray Image Segmentation
Pages : 5236 - 5238
Dr. N. Senthilkumaran
Abstract | PDF
|
63 |
Computer & Network Security
Pages : 5239 - 5242
Puneet Himthani , Puneet Gurbani , Shweta Tharwani , Tarun Pare
Abstract | PDF |
64 |
Avoiding Congestion Control Using Network Border Patrol
Pages : 5243 - 5246
Sudhakar Murugesan, Ganesh Gangadharan, Dr. Rajan John
Abstract | PDF |
65 |
Adaptive Square-Diamond Search(ASDS) Algorithm for Fast Block Matching Motion Estimation
Pages : 5247 - 5253
M.K. Pushpa, Dr. S. Sethu Selvi
Abstract | PDF |
66 |
On the Design of High Speed Parallel CRC Circuits using DSP Algorithams
Pages : 5254 - 5258
B.Naresh Reddy, B.Kiran Kumar, K.Mohini sirisha
Abstract | PDF |
67 |
Detection of moving object using KOF method
Pages : 5259 - 5264
B.Naresh Reddy, B.Narasimha Rao, B.Kiran Kumar
Abstract | PDF |
68 |
Secure Analysis for Interval-based Algorithms
Pages : 5265 - 5271
V.Jaya Ramakrishna , K.Nithin Babu, M.N.Satish Kumar
Abstract | PDF |
69 |
Implementation of Navigation Pattern Mining in Dot Net framework
Pages : 5272 - 5275
Aditi Shrivastava , Nitin Shukla
Abstract | PDF |
70 |
A Critique on Web Usage Mining
Pages : 5276 - 5279
K.S.R. Pavan Kumar , V.V. Sreedhar, L. Manoj Chowdary
Abstract | PDF |
71 |
An Enhanced Approach for Finding an Optimal Path in MANET using Energy Aware Reverse Reactive Routing Protocol (EA-RAODV)
Pages : 5280 - 5284
Bhabani Sankar Gouda1, Chandan Kumar Behera
Abstract | PDF |
72 |
CEBKST: The Cost Efficient Based On Keying and Secure Data Transmission for Wireless Sensor Network
Pages : 5285 - 5290
Narahari A, M. Preethi
Abstract | PDF |
73 |
A Secure File Transfer Based On Discrete Wavelet Transformation And Audio Watermarking Techniques
Pages : 5291 - 5295
Vineela Behara, Y. Ramesh
Abstract | PDF |
|
|