1. |
Watchdog Three-Tier Technique to Secure Wireless Sensor
Network
Pages : 751-754
Pramod D Mane , Prof. D.H.Kulkarni
Abstract | PDF
|
2. |
Survey on Security Issues and Problems in Cloud
Computing Virtual Machines
Pages : 755-760
Shwetha S
Abstract | PDF |
3. |
RFID Detect Credit Card Skimmers Using Neural Networks
Pages : 761-765
R. Dhanapal, P. Gayathri
Abstract | PDF |
4. |
Survey on Web Page Noise Cleaning for Web Mining
Pages : 766-770
S. S. Bhamare, Dr. B. V. Pawar
Abstract | PDF |
5. |
Negative Selection Method for Virus Detection in a Cloud
Pages : 771-774
Agnika Sahu, Prabhat Ranjan Maharana
Abstract | PDF |
6. |
Object Recognition Using Texture Based Analysis
Pages : 775-782
Mansi Saraswat, Anil Kumar Goswami, Aastha Tiwari
Abstract | PDF |
7. |
A Comprehensive Study of Phishing Attacks
Pages : 783-786
M. Nazreen Banu, S. Munawara Banu
Abstract | PDF |
8. |
Implementation of Personalized User Model Based on Ontology: A Review Study
Pages : 787-790
Shamkala Waghmare, Prof. R. K. Krishna
Abstract | PDF |
9. |
Sequential Mining of Multimedia Images by
using SPADE Algorithm
Pages : 791-795
Harsh mathur
Abstract | PDF |
10. |
Coverage Of Total Target Field To Form WSN
Using Delaunay Triangulation
Pages : 796-799
S.Surekha, M.KalyanRam
Abstract | PDF |
11. |
Robust Topology, Self-Scheduling Approach Based
on Remaining Energy for WSN
Pages : 800-803
Ranjeet Kagade ,Prof.Mrs.R.A.Satao
Abstract | PDF |
12. |
On the Applications of Cellular Automata and
Artificial Life
Pages : 804-807
Harsh Bhasin, Nandeesh Gupta
Abstract | PDF |
13. |
Interfirewall Optimization across Administrative
Domains for Enabling Privacy Preserving and
Security
Pages : 808-812
Aruna Devi.R, PON Arivanandham
Abstract | PDF |
14. |
Comparative Analysis of Hierarchical Routing in
Wireless Sensor Networks
Pages : 813-817
Ankita Bindlish, Anish Soni
Abstract | PDF |
15. |
A study on Comparative Performance of SVM
Classifier Models with Kernel Functions in
Prediction of Hypertension
Pages : 818-821
Rahul Samant, Srikantha Rao
Abstract | PDF |
16. |
Preserving Anonymity in Mixnet using AES
Encryption Algorithm
Pages : 822-825
M. Uma Devi, R.Srinivas, K.N.Bhargavi
Abstract | PDF |
17. |
Steganography– Information Hiding in Source
Code Langauge
Pages : 826-829
Veenu Arora, Raninder dhillon
Abstract | PDF |
18. |
Abnormality Detection in Digital Mammogram
Pages : 830-834
S Narasimha Murthy, Arun Kumar M N , H.S. Sheshadri
Abstract | PDF |
19. |
Survey on Image Resolution Techniques for
Satellite Images
Pages : 835-838
P.Suganya, N.Mohanapriya, A.Vanitha
Abstract | PDF |
20. |
Gender Classification Technique Based on Facial
Features using Neural Network
Pages : 839-843
Anushri Jaswante Dr. Asif Ullah Khan Dr. Bhupesh Gour
Abstract | PDF |
21. |
Image Segmentation using Morphological Operations for Automatic Region Growing
Pages : 844-847
Ritu Sharma, Rajesh Sharma
Abstract | PDF |
22. |
A Recent Approach to Organise Structured Data in
Mobile Environment
Pages : 848-852
R.Jegadeesan, Dr.N.Sankar Ram, R.Janakiraman
Abstract | PDF |
23. |
Efficient Resource Allocation and Tracking in
Structured P2P network: Back Trackable Finger
Table based CHORD (BTFT-CHORD) Protocol
Pages : 853-857
D.Srivihari, P.Prasanna Murali Krishna
Abstract | PDF |
24. |
Fault Tolerance Techniques in Grid Computing
Systems
Pages : 858-862
T. Altameem
Abstract | PDF |
25. |
An Effective Approach for Video Copy Detection
and Identification of Misbehaving Users
Pages : 863-867
S.Sujatha
Abstract | PDF |
26. |
A secured Transmission of Embedded Hidden
Data in Binary Images Using Resolution Variant Visual Cryptography
Pages : 868-870
Koppala K V P Sekhar, S Sateesh Kumar, Y.Ramesh Kumar
Abstract | PDF |
27. |
EDBAT: Efficient Demand Based Energy Allocation
Topology for Mobile Ad Hoc Networks
Pages : 871-874
Kureti Maheswara Rao, M.L.Ravichandra
Abstract | PDF |
28. |
A Sparse Representation Approach to Facial
Expression Recognition Based on LBP plus LFDA
Pages : 875-878
Ritesh Bora, V.A.Chakkarvar
Abstract | PDF |
29. |
An Enhanced Approach for Character Recognition
Based On Discriminative Semi-MarkovModel
Pages : 879-882
P.Ramya , S.Karthiprem, R.V.Viswanathan
Abstract | PDF |
30. |
CAPSULE
A Programming Language Code Compression
Technique
Pages : 883-885
Govind Prasad Arya, Prince Kashyap, Nilika Kumari, Mitali Hembrom
Abstract | PDF |
31. |
Visualizing Page Replacement Techniques based
on Page Frequency and Memory Access Pattern
Pages : 886-890
Ruchin Gupta, Narendra Teotia
Abstract | PDF |
32. |
Privacy Preserving Clustering Over Distributed Data
Pages : 891-894
K.A.Sireesha, R.Srinivas, K.Arunbhaskar
Abstract | PDF |
33. |
Ubiquitous Real Time ECG Monitoring System
Using Android Smartphone
Pages : 895 - 898
Satish Patil, Pallavi Kulkarni
Abstract | PDF |
34. |
An Advanced Data Transformation Algorithm for
Categorical Data Protection
Pages : 899-902
Dnyaneshwar Pandurang Naik, Anjana N. Ghule
Abstract | PDF |
35. |
Simulation Based Analysis of Target Area
Calculation and Key Pre Distribution Scheme in
WSNs using Node Deployment Knowledge
Pages : 903 - 907
M.L.G.N.Chellarao, M. Kalyan Ram
Abstract | PDF |
36. |
Skills Based Learning Environments: Semantic
Annotation with Mapping Method
Pages : 908 - 912
R.Anish
Abstract | PDF |
37. |
Effective Energy Depletion in Wireless Sensor
Network using EEDC Technique
Pages : 913 - 916
C. Chandru Vignesh, A. Christopher Paul, M.Boopathiraja
Abstract | PDF |
38. |
Utility Based Pattern Matching Approach for Data
Mining
Pages : 917 - 921
Kanchi. Suresh, Dr. Hari Krishna Pulagam
Abstract | PDF |
39. |
Application of Cloud Computing in Agricultural
Development of Rural India
Pages : 922-926
Rakesh Patel , Mili. Patel
Abstract | PDF |
40. |
Implementation of Ant Colony Optimization with
OLSR in Mobile Ad hoc Network
Pages : 927-930
Ashu Tyagi , Pankaj Sharma
Abstract | PDF |
41. |
Integration of Transport Department Check Posts with the help of
National Register (NR) of Vehicle in the Perspective of E-Governance
Pages : 931-932
Piyush Gupta, Dr saurabh Gupta
Abstract | PDF |
42. |
A Review on Fixed-Rank Representation for
Supervised Learning Using Neural Network
Pages : 933-936
M. Abdul. Zahed Javeed, Shubhangi Sapkal
Abstract | PDF |
43. |
Improving Technique for GAIT RECOGNITION & Performing Feature Extraction Using Videos of
Different Forms
Pages : 937-939
Ashutosh Batta and Chirag Sharma
Abstract | PDF |
44. |
Gateway relocation by Bandwidth based
Admission Control Scheme in WiMax
Pages : 940-944
Srinivasa kalyan venigalla , Mounika Modadugu , Voonna Venkata Nagaraju , Vepuri Bhargavi
Abstract | PDF |
45. |
Face Recognition using Rectangular Feature
Pages : 945-949
Sanjay Pagare, Dr. W. U. Khan
Abstract | PDF |
46. |
Denial of Service Mitigation Method
Pages : 950-953
Madhuri H. Bhagwat, Amol P. Pande
Abstract | PDF |
47. |
A Poly-alphabetic Approach to Caesar Cipher
Algorithm
Pages : 954-959
Prachi Patni
Abstract | PDF |
48. |
Enhanced Naïve Bayes Algorithm for Intrusion
Detection in Data Mining
Pages : 960-962
Shyara Taruna R. Mrs. Saroj Hiranwal
Abstract | PDF |
49. |
Energy Efficient Node Addressing Scheme in Hierarchical
Wireless sensor Network
Pages : 963-966
Ganesh.S.Pise , Vinod. V. Kimbahune
Abstract | PDF |
50. |
Heterogeneous Spatial Data Integration Process
Using Business Intelligence Approach
Pages : 967-973
M. Mustafa, A. Aliff , M. Yazid
Abstract | PDF |
51. |
Reviewing MANETs & Configurations of
Certification Authority (CA) for node Authentication
Pages : 974-978
Dr. Shaveta Rani, Dr. Paramjeet Singh, Raman Preet
Abstract | PDF |
52. |
GPS Based Vehicle Navigation System
Using Google Maps
Pages : 979-982
Ch.ChakradharaRao, P.Pushpalatha, N.AdityaSundar
Abstract | PDF |
53. |
Vehicle Speed Control System Using GSM/GPRS
Pages : 983-987
B.Devikiruba
Abstract | PDF |
54. |
Nested Software Pattern Testing on Cloud Storages
Pages : 988-994
V.Nethaji, C.Chandrasekar
Abstract | PDF |
55. |
Impact of Data Warehousing and Data Mining in
Decision Making
Pages : 995-999
Monika Pathak, Sukhdev Singh, Sukhwinder Singh Oberoi
Abstract | PDF |
56. |
Improved Persuasive Cued Click Points for
Knowledge-Based Authentication
Pages : 1000-1003
Suresh Pagidala, C. Shoba Bindu
Abstract | PDF |
57. |
Enhanced OLSR for Defense against Node
Isolation Attack in Ad Hoc Networks
Pages : 1004-1009
Banoth Balaji , Mohammed HasanKhan , R. Prathap Kumar
Abstract | PDF |
58. |
Link/Node Failure Recovery through Backup Path
Lengths
Pages : 1010-1016
Ravula Prathap Kumar, Banothu Balaji, Dasari Yakobu, N Sai Bala Kishore
Abstract | PDF |
59. |
Parallel Fractal Coding for Color Image Compression Using Genetic Algorithm and Simulated Annealing
Pages : 1017-1022
A.R.Nadira Banu Kamal , P.Priyanga
Abstract | PDF |
60. |
Predictive Machine Learning Techniques for
Breast Cancer Detection
Pages : 1023-1028
S.Kharya , D. Dubey , and S. Soni
Abstract | PDF |
61. |
Hybrid Approach of Facial Expression
Recognition
Pages : 1029-1033
Pinky Rai , Manish Dixit
Abstract | PDF |
62. |
Detection And Prevention of Misbehaving Users in
Anonymizing Networks
Pages : 1034-1037
Anuse A.A, Prof. Rachana A. Satao
Abstract | PDF |
|
|