1. |
Data mining techniques for Fraud Detection
Pages : 1-4
Anita B. Desai, Dr. Ravindra Deshmukh
Abstract | PDF |
2. |
Overview of Fingerprint Image Enhacement & Minutia Extraction
Pages : 5-9
Indira Chakravarthy , VVSSS.Balaram, B.Eswara Reddy
Abstract | PDF
|
3. |
Alert Areas of Cloud Security
Pages : 10-13
Shuchita Bhargava, Rahul M. Samant
Abstract | PDF
|
4. |
Protection of Data Base Security Via Collabrative Inference Detection
Pages : 14-16
Ajay Sharma, Alok Kumar Shukla, Dharmendra Kumar
Abstract | PDF
|
5. |
Image Processing Edge Detection Technique used for Traffic Control Problem
Pages : 17-20
P.Srinivas, Y.L. Malathilatha,Dr. M.V.N.K Prasad
Abstract | PDF
|
6. |
Domain Name System: The Backbone of today’s World of
Internet
Pages : 21-23
Gopi Nath Sahani, Jitender Kumar, Manoj Kumar
Abstract | PDF
|
7. |
Smart Cane for Visually Impaired People
Pages : 24-28
J.Ramprabu, Gowthaman.T
Abstract | PDF
|
8. |
Co-Operative Distributed Intrusion Detection in Wireless Ad-hoc Network
Pages : 29-33
Vinaysagar Anchuri, Basmay C. Simmi, E. Ramya Sri
Abstract | PDF
|
9. |
Intelligent Approach toward Anti-Phishing using Two Factor Authentication
Pages : 34-36
Hardik Desai, Deepak Gupta, Noopur Pandey
Abstract | PDF
|
10. |
Diagnosis of Lung Cancer Prediction System Using Data Mining Classification Techniques
Pages : 39-45
V.Krishnaiah, Dr.G.Narsimha, Dr.N.Subhash Chandra
Abstract | PDF
|
11. |
Effectiveness of Requirement Prioritization Using Analytical Hierarchy Process (AHP) and Planning Game (PG): A Comparative Study
Pages : 46-49
Shadab Siddiqui, Dr.Mohd. Rizwan Beg, Shahin Fatima
Abstract | PDF |
12. |
Improving Software Quality Using FMEA and FTA Defect Prevention Techniques in Design Phase
Pages : 50-54
Shahin Fatima, Dr.Mohd. Rizwan Beg, Shadab Siddiqui
Abstract | PDF
|
13. |
Proposed Energy Saving Scheme for Wireless Ad-hoc Sensor Network
Pages : 55-57
Deepika Jain , Sitendra Tamrakar
Abstract | PDF
|
14. |
New Approach for Data Encryption using Two Way Crossover
Pages : 58-60
Deepak Nagde, Raviraj Patel, Dharmendra Kelde
Abstract | PDF
|
15. |
New Image Encryption Technique Based On Combination of Block Displacement and Block Cipher Technique
Pages : 61-65
Keerti Kushwah, Sini Shibu
Abstract | PDF
|
16. |
TECHNIQUES FOR EFFICIENT KEYWORD SEARCH IN CLOUD COMPUTING
Pages : 66-68
P.NIRANJAN REDDY 1* , Y.SWETHA 2
Abstract | PDF
|
17. |
INFORMATION FORENSIC APPLICATION USING SOFT COMPUTING TECHNIQUES
Pages : 69-72
Dharmendra Kelde, Deepak Nagde, Raviraj Patel, Pavan Pawar
Abstract | PDF
|
18. |
Extreme Programming Verification using Unified Process
Pages : 73-76
G. Sivanageswara Rao, Ch.V.Phani Krishna , Dr. K.Rajasekhar rao
Abstract | PDF
|
19. |
INTRUSION DETECTION SYSTEM - TYPES AND PREVENTION
Pages : 77-82
B.SANTOS KUMAR
,
T.CHANDRA SEKHARA PHANI RAJU,
N.SUDHAKAR
Abstract | PDF
|
20. |
Real Time Eye Recognition
Pages : 83-86
Hansaraj S. Wankhede, S. A. Chhabria, Dr. R. V. Dharaskar
Abstract | PDF
|
21. |
A Novel Optimization Technique for Determination
of Parametric Queries
Pages : 87-90
Arepu Yuvakishore & Kumar Vasantha
Abstract | PDF
|
22. |
Spell Checker for OCR
Pages : 91-97
Yogomaya Mohapatra, Ashis Kumar Mishra, Anil Kumar Mishra
Abstract | PDF
|
23. |
Simulation Studies on Zigbee Communication for
Video Transmission and Networking
Pages : 98-102
Deepak Gupta, Kavita Malav, Mukesh Nagar
Abstract | PDF
|
24. |
Divide and ConquerMethod for Clustering Mixed
Numerical and Categorical Data
Pages : 103-106
Dileep Kumar Murala
Abstract | PDF
|
25. |
Advanced Network Intrusion Detection System Based on Effective Feature Selection
Pages : 107-112
Sumathi M, Umarani R
Abstract | PDF
|
26. |
A Survey on Different Image Encryption and Decryption Techniques
Pages : 113-116
Rinki Pakshwar, Vijay Kumar Trivedi, Vineet Richhariya
Abstract | PDF
|
27. |
An Efficient password based Two-Server Authentication and Pre-shared Key Exchange System using Smart Cards
Pages : 117-120
Anamika Chouksey, Yogadhar Pandey
Abstract | PDF
|
28. |
Article Withdrawn
Pages : 121-125
xxx, xxx
Abstract | PDF
|
29. |
Indian Currency Denomination Identification Using Image Processing Technique
Pages : 126-128
Vipin Kumar Jain, Ritu Vijay
Abstract | PDF
|
30. |
Security measures for Smart Devices Through Cryptography Using Cellular Automaton
Pages : 129-133
M.Venugopal, E.G.Rajan, Sharma
Abstract | PDF
|
31. |
Real-Time Scheduler Design for Embedded System Domain
Pages : 134-138
Anil Kumar Mishra, Yogomaya Mohapatra, Ashis Kumar Mishra
Abstract | PDF
|
32. |
Privacy Preserving Data Mining
Pages : 139-141
Smita D Patel, Sanjay Tiwari
Abstract | PDF
|
33. |
An Energy Efficient Routing Approach based on AODV
Pages : 142-146
Rohit Sharma, Sangeeta Sharma
Abstract | PDF
|
34. |
Fault Recovery in Optimal Task Scheduling and Grid Service Reliability
Pages : 147-151
Ashwini Vedulla, Pramod Reddy A, Krishna Prasad B
Abstract | PDF
|
35. |
Performance Analysis for Efficient Data Collection with path Constrained Mobile sink Using SPMA Scheme in WSNs
Pages : 152-155
Sheetal Raina, N.A.Mhetre
Abstract | PDF
|
36. |
Classifying populated IP Addresses using SVM Clustering and Vertical partition id3 decision Tree
Pages : 156-158
Gagan Sharma, Yogadhar Pandey
Abstract | PDF
|
37. |
An Efficient ID3 Decision Tree for the Classification of Populated IP Address Using K-Mean Clustering
Pages : 159-162
Rajesh Kumar Sharma, Anurag Jain, Subha Dubey
Abstract | PDF
|
38. |
Brain Fingerprinting
Pages : 163-166
Upasana M. Bhilota, Dhara J. Patel
Abstract | PDF
|
39. |
Classifying Problem in Inference Engine for
Different Version Based Ontology
Pages : 167-170
Ajaysinh Rathod, Bhaumik Nagar, Sachin Sharma
Abstract | PDF
|
40. |
Survey on Different Types of Attacks and Counter
Measures in Wireless Networks
Pages : 171-174
N. Vijaya gopal, Dr.V.Srikanth, M. Mohan Chandra
Abstract | PDF
|
41. |
Effective Cloud Service Management through
Volunteer Computing
Pages : 175-177
Nirupadi Tidigol, T.P.Lokesh, Thrilochana Kumar Y.P
Abstract | PDF
|
42. |
Improving Software Quality Using FMEA and
FTA Defect Prevention Techniques in Design
Phase
Pages : 178-182
Shahin Fatima, Dr.Mohd. Rizwan Beg, Shadab Siddiqui
Abstract | PDF
|
43. |
Human Digitization: Authentication Profiles in
Digital Information Rights Management Systems
Pages : 183-187
K. M. Moorning
Abstract | PDF
|
44. |
Merging Feature Method on RGB Image and Edge
Detection Image for Wood Identification
Pages : 188-193
Gasim, Agus Harjoko, Kudang Boro Seminar, Sri Hartati
Abstract | PDF
|