1. |
Prioritization of Test Cases using Branch Coverage
with Multiple criteria for Regression Testing
Pages : 972-974
Navleen Kaur, Manish Mahajan
Abstract | PDF |
2. |
Mobility Management Approaches for Mobile IP
Networks
Pages : 975-977
V Anji Reddy, Swetha Tanavarapu,Harish Sampatharao,Vasavi Potipireddi, Shyam Pallanti
Abstract | PDF |
3. |
Reviewing and Reducing Hidden Cost by
Proposing CSIPP-using DMT
Pages : 978-981
R. K. Seth and R. Chuchra
Abstract | PDF |
4. |
Integrity Verification in Multi-Cloud Storage Using
Cooperative Provable Data Possession
Pages : 982-985
Megha Patil , Prof. G.R.Rao
Abstract | PDF |
5. |
A Novel Approach: Proactive Password Checking
based on User Profiling
Pages : 986-990
Monika Pathak,Sukhdev Singh
Abstract | PDF |
6. |
Reliable Communication Using Topology Control
in Mobile Ad-hoc Network
Pages :991-993
Sunil Deokule , Nivedita Malvadkar,Rupali Nimbalkar
Abstract | PDF |
7. |
A Survey on Location Based Routing Protocols in
Mobile Ad-hoc Networks
Pages : 994-997
Abhishek Gupta , Samidha D Sharma
Abstract | PDF |
8. |
A Survey on Congestion Control in MANET
Pages : 998-1001
Geetika Maheshwari, Mahesh Gour,Umesh Kumar Chourasia
Abstract | PDF |
9. |
OCRP in Dynamic Resource Allocation Using
Virtual Machines for Cloud Computing
Environment
Pages : 1002-1007
M.C. Babu, S.Umamageswari
Abstract | PDF |
10. |
Optical Character Recognition for English and Tamil Script
Pages : 1008-1010
Kanimozhi.V.M, Muthumani.I
Abstract | PDF |
11. |
Color and Shape Feature Extraction and Matching in
Pill Identification Systems
Pages : 1011-1015
Dr.E.Annasaro, A.Hema
Abstract | PDF |
12. |
An Efficient Actionable 3D Subspace Clustering
Based on Optimal Centroids
Pages : 1016-1019
V.Atchaya, C.Prakash
Abstract | PDF |
13. |
Secure Enhance Protocol for Vehicular Ad-hoc
Networks
Pages :1020-1022
Manish Kumar Soni, Ashish Vashistha
Abstract | PDF |
14. |
A survey on Reducing Features to Improve Bug
Prediction by Using Cos-triage Algorithm
Pages : 1023-1025
Veena Jadhav, Prof. Vandana Gaikwad
Abstract | PDF |
15. |
Survey on Opinion Mining and Summarization of
User Reviews on Web
Pages : 1026-1030
Vijay B. Raut, D.D. Londhe
Abstract | PDF |
16. |
De Noising of Images With Moment Invariants
Pages : 1031-1034
Apoorva Mondal, Nishi Yadav
Abstract | PDF |
17. |
Improving Network Lifetime and Reducing Energy
Consumption in Wireless Sensor Networks
Pages : 1035-1038
D.Suresh, K.Selvakumar
Abstract | PDF |
18. |
Enhancing the Features of Mobile Social Mass Media on Cloud Storage
Pages : 1039-1041
MA.Mohammed AnsarAli , M.Ramesh, S.SathishKumar
Abstract | PDF |
19. |
Detection of Routing Misbehavior Nodes Using Improved 2-ACK in MANET’S
(Simulation through NS-2)
Pages : 1042-1044
P.Samba Siva Rao,.Aswini Meher,T.Kusuma, Y.Vasudha
Abstract | PDF |
20. |
Auditing Windows 7 Registry Keys to track the
traces left out in copying files from system to
external USB Device
Pages : 1045-1052
Abhijeet Ramani, Somesh Kumar Dewangan
Abstract | PDF |
21. |
An Enhanced Approach to Use SSL for End To
End Security
Pages : 1053-1057
Swati Gupta, Saru Dhir
Abstract | PDF |
22. |
Survey on the RIP, OSPF, EIGRP Routing Protocols
Pages : 1058-1065
V.Vetriselvan, Pravin R.Patil, M.Mahendran
Abstract | PDF |
23. |
A Survey of the Existing Security Issues in Cloud
Computing
Pages : 1066-1068
Parul Chachra
Abstract | PDF |
24. |
Survey and Analysis of Technique For Quality
Image Retrieval On Web
Pages : 1069-1072
Sanjyot S.Desale, Y.C.Kulkarni
Abstract | PDF |
25. |
Cued Click Points: Graphical Password
Authentication Technique for Security
Pages : 1073-1075
Shendage Swapnil Sunil, Dhainje Prakash, Yevale Ramesh Shivaji
Abstract | PDF |
26. |
Comparative Analysis of Clustering by using
Optimization Algorithms
Pages : 1076-1081
Poonam Kataria, Navpreet Rupal , Rahul Sharma
Abstract | PDF |
27. |
An Efficient Algorithm for Update Scheduling in
Streaming Data Warehouses
Pages : 1082-1085
Bolla Saikiran, Kolla Morarjee
Abstract | PDF |
28. |
Ensuring Better QoS through Call Admission
Control in Wireless Network
Pages : 1086-1089
Abhishek M. Goswami. Shreyas Patel
Abstract | PDF |
29. |
Operating System Virtualization for Ubiquitous
Computing
Pages : 1090-1094
Vikram S. Vairagade, Prof.Chanchal V. Dahat, Anjali V. Bhatkar
Abstract | PDF |
30. |
A New Model for Multiparty Collaborative Distributed
Mining using Bloom Filter
Pages : 1095-1098
Deepak Joshy, Ms.PrinceMary
Abstract | PDF |
31. |
Efficient Routing Algorithm for Wireless Networks
based on Bandwidth and Clock Rate
Pages : 1099-1102
Anto Premkumar, Shijo James, Saranya. R
Abstract | PDF |
32. |
Data Extraction and Alignment using Natural
Language Processing
Pages : 1103-1105
M.S Vinu, L.Dhanam, Dr.Sudha Mohanram
Abstract | PDF |
33. |
Stimulated Particle Swarm Optimization Routing
Protocol – A Review
Pages : 1106-1111
M.Ganesan, PravinR.Patil, M.Dhilsath Fathima, M.S.Saravanan
Abstract | PDF |
34. |
Impact of Different Methodologies in Software
Development Process
Pages : 1112-1116
Preeti Rai, Saru Dhir
Abstract | PDF |
35. |
Rotation Invariable Method for Currency Coin
Detection
Pages : 1117-1119
Sonali A Mahajan, Chitra M. Gaikwad
Abstract | PDF |
36. |
Article Removed
Pages : xxxx, xxxx
xxxx, xxxx, xxxx
Abstract | PDF |
37. |
Video Streaming Over Multihop Wireless
Networks –Issues and Techniques
Pages : 1128-1130
Nimisha Joy, Preetha K G
Abstract | PDF |
38. |
Live Devices: Insider Threat to Resources
Pages : 1131-1134
Malik Junaid Gul , Pakeeza Samin, Dr. Rabia Riaz
Abstract | PDF |
39. |
Comparision and Development of Algorithm for
Different 3G GSM Network Sites
Pages : 1135-1138
Abhilasha Sharma ,Dr. Naveen Choudhary, Dr. Dharm Singh
Abstract | PDF |
40. |
A Novel Method to Identify Audio Descriptors,
Useful in Gender Identification from North Indian
Classical Music Vocal
Pages : 1139-1143
Saurabh H. Deshmukh, Dr. S.G. Bhirud
Abstract | PDF |
41. |
Overview of Stemming Algorithms for Indian and
Non-Indian Languages
Pages : 1144-1146
Dalwadi Bijal, Suthar Sanket
Abstract | PDF |
42. |
Extended Hill Cipher Decryption by Using
Transposed Interweaved Shifting
Pages : 1147-1151
Divya Rathi, Parmanand Astya
Abstract | PDF |
43. |
An Enhanced Intrusion Detection System for
MANETS using Hybrid Key Cryptography
Pages : 1152-1154
B.Suruthi, N.V.Rajeesh kumar
Abstract | PDF |
44. |
An Empirical Investigation on Thematic Accuracy
of Landuse/Landcover Classification Using Fused
Images
Pages : 1155-1161
Jeya Kumari N , Purushothaman B M, Suresh Babu S
Abstract | PDF |
45. |
Nymble:The Blocking System
Pages : 1162-1164
Akshay Sangrolkar, Yogesh Sawant , Akshay Shirole, N.V.Puri
Abstract | PDF |
46. |
Plant Disease Detection Techniques Using Canny
Edge Detection & Color Histogram in Image Processing
Pages : 1165-1168
Shital Bankar, Ajita Dube,Pranali Kadam, Prof. Sunil Deokule
Abstract | PDF |
47. |
A Comprehensive Review of Image Compression
Techniques
Pages : 1169-1172
Kitty Arora, Manshi Shukla
Abstract | PDF |
48. |
Cloud-Based Multimedia Storage System with QoS
Provision
Pages : 1173-1176
Swati Vani, Bhagyashri Bhosale, Ganesh Shinde, Rajni Shinde, Prof.Manoj Pawar
Abstract | PDF |
49. |
Enhanced Packet Scheduling Scheme with
Quality of Service support for WiMAX Networks
Pages : 1177-1180
D.M.S.Madhuri , M.L.N.Divya, G.Sravani, R.V.S.N.Raju
Abstract | PDF |
50. |
Forest Conservation Monitoring using E-Forest
Clearance for Developmental Projects in the Perspective of E-Governance
Pages : 1181-1184
Rajesh Kumar Pathak
Abstract | PDF |
51. |
Multi-factor Authentication in Banking Sector
Pages : 1185-1189
Tushar Bhivgade , Mithilesh Bhusari , Ajay Kuthe , Bhavna Jiddewar ,Prof. Pooja Dubey
Abstract | PDF |
52. |
An Efficient Ripple Carry Adder Based Low
Complexity Turbo Decoder
Pages : 1190-1195
Chandrapriya.G, Karthigailakshmi.S
Abstract | PDF |
53. |
A Novel Image Enhancement Technique for
Ancient Images using Optimal Histogram
Equalization and Fuzzy Enhancement Technique
Pages : 1196-1199
P. Naga Srinivasu
Abstract | PDF |
54. |
Identification of Misbehaviour Activities in Mobile
Adhoc Networks
Pages : 1200-1203
Indhumathi.J, Prem Jacob.T
Abstract | PDF |
55. |
A Study on different Image Encryption
Algorithms
Pages : 1204-1206
Suriya kala.L, Dr. R. Thangaraj
Abstract | PDF |
56. |
International Vulnerability Database Alliance as an
Effective Vulnerability Disclosure Technique
Pages : 1207-1209
Tina Sebastian, Abey Abraham
Abstract | PDF |
57. |
Unauthorized Terror Attack Tracking Using
Web Usage Mining
Pages : 1210-1212
Ramesh Yevale, Mayuri Dhage, Tejali Nalawade,.Trupti Kaule
Abstract | PDF |
58. |
Study on Landuse Pattern to Evaluate Groundwater
Potential Zone for Bengaluru Urban Area Using
RS &GIS Techniques
Pages : 1213-1218
Jeyapprabha.R, Revathy S.S, S.Sureshbabu
Abstract | PDF |
59. |
A Task Oriented View of Web Software
Visualization and Architecture
Pages : 1219-1222
Laxmareddy.A, M.Ganesan, DR.E.Kannan, M.Dhilsath Fathima, M.S.Saravanan
Abstract | PDF |
60. |
Convergence of 5G Technology by Using
Distributed System
Pages : 1223-1226
Aman Deep Varshney, Shivani Dubey
Abstract | PDF |
61. |
Improved Shortest Path Method to Select the Best
Path from Multi-Path Web Service Composition
Graph
Pages : 1227-1231
Dr. S. Justin Samuel, M.Gnana Sagaya Sharmila
Abstract | PDF |
62. |
Performing Enhancement and Providing Minutiae
Matching Score in LQFI
Pages : 1232-1236
A. M.Jayalakshmi, B. P. Robert , C.G. Thiripura Sundari
Abstract | PDF |
63. |
An Improved Memetic Search in Artificial Bee
Colony Algorithm
Pages : 1237-1247
Sandeep Kumar , Vivek Kumar Sharma , Rajani Kumari
Abstract | PDF |
64. |
ZigBee based Budget Distribution and
Management
Pages : 1248-1250
Sateesh Gudla, K. Kamal Kumar , K.V.S.V.Prasad, D.V.S.Gayathri ,G.Santhi
Abstract | PDF |
65. |
Wifi Positioning System Using WLAN Signal
Strengths by Block
Pages : 1251-1254
Prashant Agarwal, Monisha Singh, Sudhir Kumar Sharma
Abstract | PDF |
66. |
Sandbox- An Application Tool for Hadoop Pages : 1255-1258
Gaurav Vaswani , Ajay Chotrani , Hitesh Rajpal
Abstract | PDF |
67. |
Burst Error Characterization for Wireless Ad-Hoc
Network and Impact of Packet Interleaving
Pages : 1259-1264
Devaraju. R, Puttamadappa. C
Abstract | PDF |
68. |
Look Over on Mining Sequential Patterns in
Evolving Data Stream
Pages : 1265-1268
Harsha Nair, Neeba E A
Abstract | PDF |
69. |
An Overview on Data Mining
Pages : 1269-1272
Vishal, Dr Saurabh Gupta
Abstract | PDF |
70. |
Review of QoS Based Service Populating for
Cloud based Mobile Apps
Pages : 1273-1276
Prachi B.Gaikwad, Prof. S.M.Rokade
Abstract | PDF |
71. |
Double Layer Security in the Swarm
Intelligence P2P Network
Pages : 1277-1282
K.Ramalakshmi, P.K.Sasikumar
Abstract | PDF |
72. |
Analysing Security and Software Requirements
using Multi-Layered Iterative Model
Pages : 1283-1287
Sonia, Archana Singhal, Jyoti Balwani
Abstract | PDF |
73. |
A Survey on Detection and Prevention Techniques
for Gray-Hole Attack in MANET
Pages : 1288-1290
Mahesh Kumar Kumawat, Jitendra Singh Yadav
Abstract | PDF |
74. |
Neuro-Genetic Hybrid Approach for Rainfall
Forecasting
Pages : 1291-1295
Abhishek Saxena, Neeta Verma , K.C.Tripathi
Abstract | PDF |
75. |
Electricity Distribution System using Geospatial Technology
– A Case Study for Hosur Town, Krishnagiri District
Pages : 1296-1300
Kanmani B, Suresh Babu S
Abstract | PDF |
76. |
An Efficient and Secure System for Detecting
Malicious Nodes in Mobile Ad hoc Networks
Pages : 1301-1306
Sruthi. E , Pradeep. S
Abstract | PDF |
77. |
Study and Review of the Biomedical Signals With
Respect To Different Methodologies
Pages : 1307-1309
Zainab Mizwan, Hemant kasturiwale
Abstract | PDF |
78. |
RS and GIS Based Coastal Wetland Inventory for
Udupi District, Karnataka
Pages : 1310-1314
S. Aishwariya, M. S. Vinaya , S. Suresh Babu
Abstract | PDF |
79. |
Implementation of Enhanced Security on
Vehicular Cloud Computing
Pages : 1315-1318
RajbhojSupriya K., Pankaj R. Chandre
Abstract | PDF |
80. |
Enhancing Data Security by Adapting Network
Security and Cryptographic Paradigms
Pages : 1319-1321
Pushpa B R
Abstract | PDF |
81. |
Rule Based POS Tagger for Marathi Text
Pages : 1322-1326
Pallavi Bagul, Archana Mishra, Prachi Mahajan, Medinee Kulkarni, Gauri Dhopavkar
Abstract | PDF |
82. |
Advanced Online Banking Authentication System
Using One Time Passwords Embedded in Q-R Code
Pages : 1327-1329
Abhishek Gandhi, Bhagwat Salunke, Snehal Ithape, Varsha Gawade, Prof.Swapnil Chaudhari
Abstract | PDF |
83. |
Finding Optimal Vehicular Route Based On GPS
Pages : 1330-1332
A.Renugambal , V.Adilakshmi Kameswari
Abstract | PDF |
84. |
Employing a Reconfigurable Virtual Networking
Approach by using NICE Mechanism
Pages : 1333-1337
A.JensilinMary.M.E , E.SathishKumar , S.NavinChander , R.Naveenkumar , A.Prasanth
Abstract | PDF |
85. |
Auto-Healing Of Wireless Mesh Network
Pages :1338-1341
Kolhe Mahesh D., Gujar Siddhchakra R., Jadhav Amit A., Hase Manoj S.
Abstract | PDF |
86. |
A Survey on Web based Interactive Information
Retrieval
Pages : 1342-1345
Ratna Kumari Challa, B.Linga Murthy, K.Srinivasarao
Abstract | PDF |
87. |
Ranking With Cluster-Based Non-Segregated
Approach to Multi-Document Categorization
Pages : 1346-1348
T.Sathish kumar, V.Sharmila
Abstract | PDF |
88. |
An Efficient Approach to Block DDoS Attacks
Using Adaptive Selective Verification Protocol
Pages : 1349-1351
Gopinath.V, Anand.C
Abstract | PDF |
89. |
Visualization in Argument Based Recommender
System
Pages : 1352-1357
Preeti, Ankit Rajpal, Purnima Khurana
Abstract | PDF |
90. |
Feature Extraction Based Dynamic
Recommendation for Analogous Users
Pages : 1358-1362
Raj Bharath.R, Thanigaivel.K, Alfahath.A, Prasanth.T
Abstract | PDF |
91. |
Human Robotics Interaction (HRI) based Analysis
– using DMT
Pages : 1363-1367
Rimmy Chuchra and R. K. Seth
Abstract | PDF |
92. |
A Survey on Automatic Annotation and
Annotation Based Image Retrieval
Pages : 1368-1371
Himali Chaudhari , Prof D.D.Patil
Abstract | PDF |
93. |
Automatic Vehicle Classification System for
Monitoring Highways
Pages : 1372-1374
R.Mohan,K.Divakar, M.Kumaresan ,R.Rajan
Abstract | PDF |
94. |
Privacy Preservation of Social Network Data
against Structural Attack using K-Auto restructure
Pages : 1375-1381
V.Gnanasekar, S.Jayanthi
Abstract | PDF |
95. |
An Extensive Survey of Bat Species Identification
based on Acoustics
Pages : 1382-1386
Gladrene Sheena Basil, Jayapriya K
Abstract | PDF |
96. |
Job Scheduling in Grid Computing using User
Deadline
Pages : 1387-1392
S.Gokul Dev, R.Lalith Kumar
Abstract | PDF |
97. |
Fast Algorithm for Finding the Value-Added
Utility Frequent Itemsets Using Apriori Algorithm
Pages : 1393-1397
G.Arumugam, V.K.Vijayakumar
Abstract | PDF |
98. |
Feature Selection Algorithm with Discretization
and PSO Search Methods for Continuous Attributes
Pages : 1398-1402
Madhu.G, Rajinikanth.T.V, Govardhan.A
Abstract | PDF |
99. |
DEUDS: Data Extraction Using DOM Tree and
Selectors
Pages : 1403-1410
Vinayak B. Kadam , Ganesh K. Pakle
Abstract | PDF |
100. |
Teaching Computer Architecture Using Simulation
Tools
Pages : 1411-1413
Shine V.J, Sathish P.K
Abstract | PDF |
101. |
Intensification of Unreliable Radiant Images by
using Instinctive Sustained Algorithms
Pages : 1414-1417
R.Arvind,C.M.Gowtham, M.Karthi,T.N.Prabhu
Abstract | PDF |
102. |
Defensive Surreptitious Method Attacks by Live
Detection and Adoptable Learning System
Pages : 1418-1422
Keerthi P.S, S.Venkatesan, C.Kanimozhi, V.Neerathilingam, C.Diviya
Abstract | PDF |
103. |
Cache-Aside Approach For Cloud Design Pattern
Pages : 1423-1426
Narendra Babu Pamula, K Jairam, B Rajesh
Abstract | PDF |
104. |
Mapping the Groundwater Potential Zone for
Bengaluru Urban District
Pages : 1427-1431
Nandishkumar.L, Karthick.M, Arul Prakash.A, Lokpal Bharani Dharaa.D, Revathy S.S, S.Sureshbabu
Abstract | PDF |
105. |
Delay Optimization in VANET Using Ant Colony
Optimization and Wimax
Pages : 1432-1435
Manjot Singh Pandher , Amaninder Singh Grewal , Simrat Pal Kaur
Abstract | PDF |
106. |
Improve Server Utilization and Achieving Green
Computing in Cloud
Pages : 1436-1439
M.Rajeswari, M.Savuri Raja, M.Suganthy
Abstract | PDF |
107. |
Dynamic Clustering in Wireless Sensor Network
using Neural Network
Pages : 1440-1442
Amaninder Singh Grewal , Manjot Singh Pandhe , Simrat Pal Kaur
Abstract | PDF |
108. |
A Novel Approach for Data Acquisition and
Handover Scheme in VANET
Pages : 1403-1410
Shanmuga Priya.S, Erana Veerappa Dinesh.S
Abstract | PDF |
109. |
A New Approach for Identifying Manipulated
Online Reviews using Decision Tree
Pages : 1447-1450
Rajashree S. Jadhav , Prof. Deipali V. Gore
Abstract | PDF |
110. |
Distance Education Technologies: Using
E-learning System and Cloud Computing
Pages : 1451-1454
Sudhir Kumar Sharma, Nidhi Goyal, Monisha Singh
Abstract | PDF |
111. |
Cloud Billing Model: A Review
Pages : 1455-1458
Danamma M.Bulla, Dr.V R.Udupi
Abstract | PDF |
112. |
Component Based Software Reusability and
Framing Standards for Components to be Reused
Pages : 1459-1462
Anshul Kalia, Sumesh Sood
Abstract | PDF |
113. |
Improved Intrusion Detection System using C4.5
Decision Tree and Support Vector Machine
Pages : 1463-1467
Vaishali Kosamkar, Sangita S Chaudhari
Abstract | PDF |
114. |
Energy Efficient Network Reconfiguration Algorithm
Based on Cooperation for Wireless Ad hoc Network
Pages : 1468-1474
Sachin Kumar Soni, Gajendra Singh
Abstract | PDF |
115. |
A Review Of Literature On Word Sense
Disambiguation
Pages : 1475-1477
Ravi Mante, Mahesh Kshirsagar, Dr. Prashant Chatur
Abstract | PDF |
116. |
Article Removed
Pages : xxxx-xxxx
xxxx, xxxx, xxxx
Abstract | PDF |
117. |
An Enhanced Approach to Handle Missing Values
in Heterogeneous Datasets
Pages : 1483-1485
Sandhya.GN, Saravanan.P
Abstract | PDF |
118. |
Incremental MVS based Clustering Method for
Similarity Measurement
Pages : 1486-1491
Vinay C. Warad, B Baron Sam
Abstract | PDF |
119. |
Survey on Intrusion Detection Mechanisms for
MANETS
Pages : 1492-1494
Shwetha M,Mamatha A
Abstract | PDF |
120. |
Brief Study of Positive and Negative Sides of
Bluetooth Earpiece
Pages : 1495-1498
Nikita Sharma
Abstract | PDF |
121. |
Creating Adaptive Interface by Mining Web Log
Pages : 1499-1502
Harsheen Kaur,Kailash Bahl
Abstract | PDF |
122. |
e-F.I.R. Lodging System: A Step for Proper
Maintenance of Law and Order
Pages : 1503-1505
Ashok, Pardeep Kumar, Dr. Harish Rohil
Abstract | PDF |
123. |
Algorithm Based Security Infrastructure in Online
Fraud Detection
Pages : 1506-1508
Rupal Harishchandra Jadhav, Swapnali Sharad Hinge, Shahabaj Sanaullah Shaikh, Swapnil Subhash Kanade,
Prof. K.S.Wagh
Abstract | PDF |
124. |
Enhanced Image Compression Algorithm for
Image Processing Applications
Pages : 1509-1515
B. Kranthi, Dr. B. Ananda Krishna, Dr. M. Kamaraju, B. Rajasekhar
Abstract | PDF |
125. |
A Novel Dynamic Data Collection Paradigm for
Wireless Sensor Networks (WSNs) by Mobile Users
Pages : 1516-1521 Zara Sumaiya, Rekha Patil
Abstract | PDF |
126. |
Video Compression Using JPEG2000
Pages : 1522-1525
N.Bharath, V.Prakash, G.Dinesh, V.Dillibabu, S.Kumarasamy
Abstract | PDF |
127. |
HLA Based Third Party Auditing For Secure
Cloud Storage
Pages : 1526-1532
Chandinee Saraswathy K. , Keerthi D. , Padma G.
Abstract | PDF |
128. |
Family Card Security System Using Biometric
Device
Pages : 1533-1535
R.Prasanth, V.Balamurugan, S.Roubavaan, E.Suresh, Dr. N.Purushothaman
Abstract | PDF |
129. |
Simulation of Misbehaving Nodes in AODV
Routing
Pages : 1536-1539
Shweta Rohilla, Pankaj Sharma
Abstract | PDF |
130. |
Prevention of battery life depletion from Wireles
Ad-Hoc Sensor Networks using Signal Strength
Pages : 1540-1544
C. Suganthini, S. Saranya, V.S. Sowmiya
Abstract | PDF |
131. |
Performance Analysis of Energy Efficient Routing
for Mobile Ad-hoc Networks
Pages : 1545-1551
K.Prabu, Dr. A.Subramani
Abstract | PDF |
132. |
Retrieve Records from Web Database Using Data
Alignment
Pages : 1552-1554
V.Kalyan Deepak, N.V.Rajeesh Kumar
Abstract | PDF |
133. |
Meta Paged Flash Translation Layer
Pages : 1555-1559
Shinde Pratibha, Srinivas
Abstract | PDF |
134. |
Privacy Preserving Data Mining Using
Association Rule With Condensation Approach
Pages : 1560-1563
Supriya S. Borhade, Bipin B.Shinde
Abstract | PDF |
135. |
Unwanted Activity Detection System in Wireless
Network
Pages :1564-1569
Sneha A. Deshmukh , Monika Rajput
Abstract | PDF |
136. |
Survey on Anti-forensics Operations in Image
Forensics
Pages : 1570-1573
Pranita D. Pandit , Monika Rajput
Abstract | PDF |
137. |
Increasing the Production Rate by Automation Systems in Fields
Pages : 1574-1576
Murari DevaKannan Kamalesh, Garlapati.A.V.P.Gowtham , Mani Gandan
Abstract | PDF |
138. |
Performance Analysis of VoMAN using Routing
Protocols to Improve QoS of VoIP flows
Pages : 1577-1580
V.Savithri, Dr.A.Marimuthu
Abstract | PDF |
139. |
Privacy Preserving in Horizontal Aggregation
Using Homomorphic Encryption
Pages : 1581-1583
Patil Amrut A, D. M. Thakore
Abstract | PDF |
140. |
A Hybrid Approach for Extractive Document
Summarization Using Machine Learning and Clustering Technique
Pages : 1584-1586
M. S. Patil , M. S. Bewoor, S. H. Patil
Abstract | PDF |
141. |
A Modified O (1) Algorithm for Real Time
Task in Operating System
Pages : 1587-1589
Rohan R. Kabugade, S. S Dhotre, S H Patil
Abstract | PDF |
142. |
Demands Apply Base Data Replication Over
Cloud Computing
Pages : 1590-1594
Musmade Anjali J., S. M. Rokade
Abstract | PDF |
143. |
Enhanced Performance Evaluation for
Broadcasting Safety Messages In VANET
Pages : 1595-1598
Varsha H, Pradeep. S
Abstract | PDF |
144. |
Enhancement of Nymble through Ontological
Approach
Pages : 1599-1602
Sateesh Gudla, Sarat Chandra Mongam, Sindhuri Boddu, Satish Mallampalli
Abstract | PDF |
145. |
Bus Locator via SMS Using Android Application
Pages : 1603-1606
Karan Punjabi, Pooja Bolaj, Pratibha Mantur, Sneha Wali
Abstract | PDF |
146. |
An Overview of Anonymous Routing ALERT
Protocol
Pages : 1607-1609
Snehlata Handrale, Prof. S. K. Pathan
Abstract | PDF |
147. |
Design Technique of Phase-Locked Loop Frequency
Synthesizer in CMOS Technology: A Review
Pages : 1610-1614
Purushottamkumar T. Singh, Devendra S. Chaudhari
Abstract | PDF |
148. |
Study & Analysis of Different Face Detection
Techniques
Pages : 1615-1618
Mayank Chauhan, Mukesh Sakle
Abstract | PDF |
149. |
Ranking Of XML Documents by Using Adaptive
Keyword Search
Pages :1619-1621
Varun Varma Sangaraju
Abstract | PDF |
150. |
Face Image Retrieval Using Facial Attributes By
K-Means
Pages :1622-1625
I.Sudha, [V.Saradha, M.Tamilselvi, D.Vennila
Abstract | PDF |
151. |
ADMIT – A simple Adaptive Data Rate Model for
Medical Image Transmission over Wireless
Network
Pages :1626-1629
Saranya S, Kavitha P
Abstract | PDF |
152. |
Tractable Form of Non-Monotonic Reasoning to
Generate Belief Set
Pages :1630-1637
Dipanjan kumar Dey
Abstract | PDF |
153. |
Comparative Evaluation of AODV, DSDV and
AOMDV based on end-to-end delay and routing
overhead using Network Simulator
Pages :1638-1641
Mitul K. Patel, Vasundhara Uchhula, Bannishikha Banerjee
Abstract | PDF |
154. |
A Review on Infrequent Weighted Itemset Mining
using Frequent Pattern Growth
Pages :1642-1647
Shipra Khare , Prof. Vivek Jain
Abstract | PDF |
155. |
GNDA: Good Neighbor Node Detection for Selfish
node Identification in Mobile Ad Hoc Networks
Pages :1648-1651
T. Suganya, R. Abirami, L. Anuprabha, J. Anupriya
Abstract | PDF |
156. |
A Dynamic Priority Based Self Scheduling of Virtual Machines for Cross-
Cloud Computing Environment
Pages :1652-1654
Srilatha.M, G.Praveen Babu
Abstract | PDF |
157. |
A Survey on HTML Structure Aware and Tree
Based Web Data Scraping Technique
Pages :1655-1658
Vinayak B. Kadam , Ganesh K. Pakle
Abstract | PDF |
158. |
Survey on Location Based Routing Protocols in
MANET
Pages :1659-1663
Vivek Nikam, Prof. G.T. Chavan
Abstract | PDF |
159. |
Use of Tobacco in India and the Influencing
Factors: An Analysis on National Family and
Health Survey Data (NFHS-III)
Pages :1664-1667
M.Mamatha,V.Nageswara Rao
Abstract | PDF |
160. |
Analysis and Comparison of Wireless Sensor
Networks Coverage Algorithms
Pages :1668-1670
Swapnil Jain, Sunita Gupta
Abstract | PDF |
161. |
An Algorithm to Optimize the Traditional Backfill Algorithm Using Priority of Jobs for Task
Scheduling Problems in Cloud Computing
Pages :1671-1674
Lal ShriVratt Singh, Jawed Ahmed, Asif Khan
Abstract | PDF |
162. |
Automatic Caption Generation for News Images
Pages :1675-1677
Priyanka Jadhav, Sayali Joag, Rohini Chaure, Sarika Koli
Abstract | PDF |
163. |
Diagnosis of Heart Disease Using Data Mining
Algorithm
Pages :1678-1680
Deepali Chandna
Abstract | PDF |
164. |
Improving Security of Cloud Environment in
Dynamic Cloud Network
Pages :1681-1684
Chetan S. Kadu, Abhay A. Jadhav, Prashant L. Mandale
Abstract | PDF |
165. |
Individualized Travel Recommendation by Mining
People Ascribes and Travel Logs Types from
Community Imparted Pictures
Pages :1685-1687
S.Saranya,S.Sivaranjani, G.Surya, A.Ramachandran
Abstract | PDF |
166. |
Knowledge Extraction Mechanism using
Vertically Partition id3 and Fuzzy based System
Pages :1688-1691
Mona Shrivastava, Nirest Sharma, Gaurav Shrivastava
Abstract | PDF |
167. |
A Review on Designing of Distributed Data
Warehouse and New Trends in Distributed Data
Warehousing
Pages :1692-1695
Shaweta
Abstract | PDF |
168. |
Hybrid Message Authentication Protocol in VANET
Pages :1696-1697
R.Rajan, S.Narendran, M.Prasanth, R.Raj kumar
Abstract | PDF |
169. |
Approaches for Automated Web Service
Discovery
Pages :1698-1700
Gajanan V. Bhole , Prof. Prakash. R. Devale
Abstract | PDF |
170. |
Content Based Image Retrieval System Use for
Similarity Analysis of Images
Pages :1701-1704
Swapnil Khobragade, ,Shobhit Nikose, Mussavir Shaikh
Abstract | PDF |
171. |
Performance Improvement Using Link
Management in Wired and Wireless Networks
Pages :1705-1708
Karthik.N, Jeyasekhar.A
Abstract | PDF |
172. |
A Review on Ontology Based Information
Retrieval in Semantic Web
Pages :1709-1713
Naveen Malik, Navdeep Kumar, Mradula Gupta
Abstract | PDF |
173. |
A Neighbor Coverage-Based Probabilistic
Rebroadcast for Reducing Routing Overhead in
Mobile
Ad Hoc Networks
Pages :1714-1717
Lahari.P, Pradeep.S
Abstract | PDF |
174. |
Contrast Enhancement of HDR images using
Linear Transformation and Kernel Padding
Pages :1718-1723
Kesharee Singh Yaduwanshi, Nitin Mishra
Abstract | PDF |
175. |
Optimization of DBSCALE Clustering Algorithm
for Weather Forecasting
Pages :1724-1728
Archana Tomar, Neetesh Gupta, Amit Sinhal
Abstract | PDF |
176. |
Coverage Optimization based on Redundant Sense
Area Ratio in Wireless Multimedia Sensor
Networks
Pages :1729-1733
T.Sridevi, R.Vinothini, N.Ramya, T.N.Prabhu
Abstract | PDF |
177. |
Secure Data Access control in Cloud Environment
Pages :1734-1737
G. Praveen Babu, B. Sushma Rao
Abstract | PDF |
178. |
A Strategy Implementing System for Secure Ad hoc
Networks
Pages :1738-1743
Nikesh Kumar Sharma, ]Aamir Mohammad, Shilpi Jain
Abstract | PDF |
179. |
Review of Various Steganalysis Techniques
Pages :1744-1747
Manveer Kaur1, Gagandeep Kaur
Abstract | PDF |
180. |
A System to Filter Unwanted Words Using
Blacklists In Social Networks
Pages :1748-1753
K.Babu , P.Charles
Abstract | PDF |
181. |
Minimizing Interference in Multihop Wireless
Networks in the Presence of Hidden Terminals
Pages :1754-1758
Sheryl Jose, R.Annie Uthra
Abstract | PDF |
182. |
Text Extraction Using Adaptive Thresholding
Pages :1759-1763
Savita Borole, Minal Thobde, Reshma Hore, Shraddha Shinde
Abstract | PDF |
183. |
A stratified sampling technique based on
correlation feature selection method for heart
disease risk prediction system
Pages :1764-1767
Lalita Sharma , Vineet Khanna
Abstract | PDF |
184. |
Context Based Performance Review of AODV and
DSDV Protocols in Adhoc community
Pages :1768-1773
B.Naresh kumar, Dr.K.Raghava Rao
Abstract | PDF |
185. |
Improved Schemes to Secure Distributed Data
Storage against Untrusted Users
Pages :1774-1777
P.Sahithi Chaitanya, M.Murali
Abstract | PDF |
186. |
Home Automation using ZigBee Protocol
Pages :1778-1780
Pankaj Jadhav ,Amit Chaudhari , Swapnil Vavale
Abstract | PDF |
187. |
Automation of Manufacturing Welding Electrode
Extruder Control Panel with PLC
Pages :1781-1784
S. Karthiga, P,Ananth, V.Deepika, K.Gunasekaran,A.Janani
Abstract | PDF |
188. |
Data Hiding Technique Using Steganography
Pages :1785-1787
Pramod Khandare, Pooja Kambale, Prajakta Narnavar , Gauri Galande.Jayshree Narnavar
Abstract | PDF |
189. |
Secure Multi-Cloud Storage Using Elastic
Scattered Storage and Scalable Auditing
Pages :1788-1795
Durairaj Moorthy, Chandrasekar C
Abstract | PDF |
190. |
A Dual Framework for Targated Online Data
Delivery Algorithms
Pages :1796-1799
Ch.Srikanth, D.Naveen Kumar, S.P. Anandaraj
Abstract | PDF |
191. |
A Comparative study of Algorithms in SEO& approach for Optimizing the search engine results using
Hybrid of Query Recommendation and Document
clustering, Genetic algorithm
Pages :1800-1802
Ashish Kumar Kushwaha , Nitin Chopde
Abstract | PDF |
192. |
Secure Cloud Computing Environment against
DDOS and EDOS Attacks
Pages :1803-1808
I. Mettildha Mary, P.V.Kavitha, Priyadharshini M, Vigneshwer S Ramana
Abstract | PDF |
193. |
Survey on Implementation of E-learning System
Using Cloud Solutions
Pages :1809-1813
Abhay S. Jadhav, Mahesh Toradmal, Ganesh K. Pakle
Abstract | PDF |
194. |
Automation in Video Security Surveillance using
Mobile Remote Control
Pages :1814-1817
Abhishek Kumar Pandey , Aditya Ashok Kulkarni ,Shruti Jitendra Shah
Abstract | PDF |
195. |
Review of Classification of Microcalcifications in
Digital Mammograms
Pages :1818-1820
Komal Chaudhari, Prof Priti Subramanium
Abstract | PDF |
196. |
ASA-Mall Management System
Pages :1821-1824
Abhishek Chaturvedi, Anindita Chakraborti, Shubhi Bartaria , Rahul Neve
Abstract | PDF |
197. |
Handling Non-Linear Attacks in Multilevel Trust
Privacy Preserving Data Mining
Pages :1825-1827
Kamaleswari S, Balachander T
Abstract | PDF |
198. |
Transitive Trust Extended Authentication Mechanism
in Wireless Sensor Networks
Pages :1828-1832
K.SaiAditya, C.Santwana, S.Magesh
Abstract | PDF |
199. |
Virtual Machine Placement in Cloud
Pages :1833-1835
Noumankhan Pathan, Balaji Shetty
Abstract | PDF |
200. |
RFID and GPS Combination Approach
Implementation in Fisher Boat Tracking System
Pages :1836-1838
Prof. Homera Durani, Prof. Nirav Bhatt , Prof. Hardik Mehta
Abstract | PDF |
201. |
Privacy and Security in the Cloud Pages :1839-1843
Navneet Gupta
Abstract | PDF |
202. |
Texture Segmention : Comparasion between
Clustering and Classification
Pages :1844-1848
Sunita Dalai, Manaswini sahu
Abstract | PDF |
203. |
Level Segmentation of Colour Images to Detect
the Specular Regions
Pages :1849-1851
Thirumoorthy T, Baskar A
Abstract | PDF |
204. |
Diminution of Packet Drop by Efficient Selection
of Network Route in MANET
Pages :1852-1855
Manish V M , J Vaijayanthimala
Abstract | PDF |
205. |
A Survey on Security and Vulnerabilities of Web
Application
Pages :1856-1860
Gopal R. Chaudhari, Prof. Madhav V. Vaidya
Abstract | PDF |
206. |
Secure Data Transmission Using Reversible Data
Hiding
Pages :1861-1863
Ashwind S , Ganesh K , Gokul R ,Ranjeeth Kumar C
Abstract | PDF |
207. |
A Framework for Mining Closed Sequential
Patterns
Pages :1864-1866
V. Purushothama Raju, G.P. Saradhi Varma
Abstract | PDF |
208. |
Hypervisor based Mitigation Technique for
Keylogger Spyware Attacks
Pages :1867-1870
C.Santwana, K. Sai Aditya, Dr. S.Magesh
Abstract | PDF |
209. |
A Novel Approach to Enhance the Performance of
Cloud Computing Using Load Balancing in File
Systems
Pages :1871-1874
Pradheep M,Anjandeep Kaur Rai ,Anup Parkash Singh
Abstract | PDF |
210. |
Article Removed
Pages :xxx-xxx
xxx,xxx
Abstract | PDF |
211. |
Mobile Cloud Computing: World’s Leading
Technology for Mobile Devices
Pages :1886-1891
Surabhi S.Golechha , Prof. R.R.Keole
Abstract | PDF |
212. |
Preliminary Review of Swarm Intelligence: A
Clever Algorithm and Data Clustering
Pages :1892-1899
NazneenTarannum S. H. Rizvi, Prof.R.R.Keole
Abstract | PDF |
213. |
Principal Lines Region of Interest Extraction
Method for Palmprint
Pages :1900-1902
S. S. Patil, A. V. Deorankar, P. N. Chatur
Abstract | PDF |
214. |
Congestion Control for TCP in Data-Center
Networks
Pages :1903-1907
Samba Siva Reddy Maripalli# , Abirami G
Abstract | PDF |
215. |
Implementation of Binary Search on a Singly
Linked List Using Dual Pointers
Pages :1908-1910
Sreemana Datta, Parichay Bhattacharjee
Abstract | PDF |
216. |
An Analysis and Defending of Mobile Malware in
the Android Devices
Pages :1911-1913
P Surendra, K.Navin
Abstract | PDF |
217. |
Preventing Packet Loss in Aggregated Streaming Data Pages :1914-1917
Pragati Gautam , C. Santhanakrishnan
Abstract | PDF |
218. |
Squid Proxy Server Cache Management using
K-means Algorithm
Pages :1918-1923
Subhash Chand and Sanjay Mathur
Abstract | PDF |
219. |
Dynamic Movement based Performance Analysis
of EDSR with Different Protocols
Pages :1924-1929
C.Mari Venkatesth, R. Kanaga Sundar,V. Jefrins, M.Ashok Kumar
Abstract | PDF |
220. |
Kerberos Authentication System using
Public key Encryption
Pages :1930-1933
Pushkar Bhadle, Sonal Gugale, Sakshi Trar, Harjot Kaur, Shital Salve
Abstract | PDF |
221. |
A Comparative Study: Various Approaches for
Cloud Data Security
Pages :1934-1937
Richa Singh, Amit Kumar Sharma
Abstract | PDF |
222. |
Ultimate Cloud (a scheme which uses all formidable technologies culminated together
to form a most secure mechanism for cloud data fortification)
Pages :1938-1942
K. Naga Sumanth, Dr. Magesh Sriramula
Abstract | PDF |
223. |
Congestion Control in Multi-Flow Environment
Using Multipath Routing Base in MANET
Pages :1943-1948
Neha Tiwari, Sini Shibu
Abstract | PDF |
224. |
An Optimized ANFIS Classifier Approach for
Screening of COPD from Chest CT Scans with Adaptive Median Filtering
Pages :1949-1957
K. Meenakshi Sundaram, C.S.Ravichandran
Abstract | PDF |
225. |
Multi-Objective Particle Swarm Optimization for
Multicast Load Balancing in Wireless Mesh
Networks
Pages :1958-1963
Mijahed Nasser Aljober, R.C.Thool
Abstract | PDF |
226. |
A Comparative Study of Performances of Various
Classification Algorithms for Predicting Salary
Classes of Employees
Pages :1964-1972
Swapnajit Chakraborti
Abstract | PDF |
227. |
A Secured and High Octane Rank Based Analysis
in Cloud Computing Environment
Pages :1973-1976
Poojitha Koneru, Dr. S.Prabakaran
Abstract | PDF |
228. |
Publishing Search Logs by Guarantee Users Privacy
Pages :1977-1980
Sridevi Sunkavalli, A.M.J.Muthukumaran
Abstract | PDF |
229. |
Proposing an Efficient Multicast Group
Management Algorithm for Ad Hoc Networks
Pages :1981-1983
Poomalar Selvan, Jeysree J
Abstract | PDF |
230. |
A Survey of Routing Protocol in MANET
Pages :1984-1988
R.RagulRavi, V.Jayanthi
Abstract | PDF |
231. |
New Secure Intrusion-Detection System for
Manet’s Using Hybrid Cryptography Techniques
Pages :1989-1994
E.Malini, T.Ravi
Abstract | PDF |
232. |
An Efficient Technique for CHARACTER
RECOGNITION Using Neural Network & Surf
Feature Extraction
Pages :1995-1997
Reetika Verma
, Rupinder Kaur
Abstract | PDF |
233. |
Effective Performance Comparative Analysis of
Pro-AODV Routing Protocol in MANET using
NS-2
Pages :1998-2003
K.Hanumanthu Naik, Dr.N.Geethanjali
Abstract | PDF |
234. |
Providing Security to Debit Cards Using Message
Authentication
Pages :2004-2007
Moshina Priyadharshini, Arokiaraj Jovith.A
Abstract | PDF |
235. |
A Secure IDS against DDOS attack in Wireless
MANET
Pages :2008-2012
Gokulakannan R , Prasath P, Aruna A, Harshavardhini U
Abstract | PDF |
236. |
Parallel face Detection and Recognition on GPU
Pages :2013-2018
Shivashankar J. Bhutekar, Arati K. Manjaramkar
Abstract | PDF |
237. |
Dynamic Referencing of Web Services via Service
Discovery and Natural Language Processing
Pages :2019-2022
Kanmani Sivagar, Krishna Chaitanya
Abstract | PDF |
238. |
Application of Data Mining – A Survey Paper
Pages :2023-2025
Aarti Sharma, Rahul Sharma,Vivek Kr. Sharma,Vishal Shrivatava
Abstract | PDF |
239. |
Visual Cryptography Scheme for Privacy
Protection
Pages :2026-2029
Nayan A. Ardak Prof. Avinash Wadhe
Abstract | PDF |
240. |
Survey on: Integrated platform for Development
Rural Agriculture in India using ICT platform
Pages :2030-2032
Tushar Hanwate, Madhav Vaidya, Ankush Sawarkar
Abstract | PDF |
241. |
A Synthesizable RTL Design of Asynchronous
FIFO Interfaced with SRAM
Pages :2033-2037
Mansi Jhamb , Sugam Kapoor
Abstract | PDF |
242. |
An Efficient Technique of Image Noising and Denoising Using Neuro- Fuzzy and SVM (Support Vector Machine)-A Survey
Pages :2038-2041
Jyoti Sharma and Rupinder Kaur
Abstract | PDF |
243. |
Accelerate Communication Authenticate Protocol
for Vehicular Adhoc Networks
Pages :2042-2045
S.Jeevidha, J.Revathi, A.Rajeswari, M.Kanimozhi, P.Gugapriya
Abstract | PDF |
244. |
Filtering Undesired Messages from Online Social
Networks: A Content Based Filtering Approach
Pages :2046-2049
Dhruv Vashistha, Sivagami.G.
Abstract | PDF |
245. |
Survey on Hand Gesture Recognition Approaches Pages :2050-2052
Rama B. Dan ,P. S. Mohod
Abstract | PDF |
246. |
Credit Card Fraud Detection Using Hidden
Markov Model
Pages :2053-2055
Gaurav Mhatre , Oshan Almeida , Dhiraj Mhatre ,Poonam Joshi
Abstract | PDF |
247. |
Comparison of Robust Nearest Neighbour fuzzy Rough
Classifier (RNN-FRC) with KNN and NEC Classifiers
Pages :2056-2062
Bichitrananda Behera, Sudhakar Sabat
Abstract | PDF |
248. |
Minimization of Image Retrieval Time using
Clustering
Pages :2063-2065
Mohammad Naved – Ul – Haque, Prof. Dr. S. S. SikchI
Abstract | PDF |
249. |
Monitoring the Delay and Directivity of Antennas
in Gigabit WPAN (802.15.3c)
Pages :2066-2073
Arpan Desai , Ronak Vashi , Ripal Patel ,Anish Vahora
Abstract | PDF |
250. |
PSO Based SVM for Optimizing Classification in
Remotely Sensed Images
Pages :2074-2076
Humayun Khan, Prof. Sandeep kumar, Prof. J.P.Maurya
Abstract | PDF |
251. |
Automatic Answering System for English
Language Questions
Pages :2077-2079
Abhay Mone , Ishwar Mete , Priyanka Gangarde ,Malhari Kharad
Abstract | PDF |
252. |
Efficient Data Storing and Retrieving from
University Database using Feature Selection and
Clustering Method
Pages :2080-2082
Vaidehi Ambekar, Prof. P.S.Mohod
Abstract | PDF |
253. |
Energy Efficient Cooperative Spectrum Sensing
and Sharing Strategy Selection for Cognitive
MIMO Sensor Networks
Pages :2083-2087
Nibedita Sahu , Sudhansu Sekhar Singh
Abstract | PDF |
254. |
Optical Character Recognition Implementation
Using Pattern Matching
Pages :2088-2090
Faisal Mohammad, Jyoti Anarase, Milan Shingote, Pratik Ghanwat
Abstract | PDF |
255. |
Cloud Data Mining based on Association Rule
Pages :2091-2094
CH.Sekhar, S Reshma Anjum
Abstract | PDF |
256. |
Modified PSO Based Feature Selection for
Classification of Lung CT Images
Pages :2095-2098
S. Sivakumar , Dr.C.Chandrasekar
Abstract | PDF |
257. |
Idea of handling short-lived network failures using
LOLS and loop free convergence using FCFR
Pages :2099-2102
Rama Gaikwad and S. P. Pingat
Abstract | PDF |
258. |
Survey on Security Mechanisms in Wireless Mesh
Networks
Pages :2103-2106
Priti Gupta , Suveg Moudgil
Abstract | PDF |
259. |
Performance Comparision of Single& 3-Ø Controlled and Uncontrolled Rectifier Using
Matlab-Simulink
Pages :2107-2111
Robinson P. Paul, Ghansyam B. Rathod, Milan Bareja, Pratyaksh Maru
Abstract | PDF |
260. |
A Secured Wireless XML Streaming Supporting
Twig Pattern Queries
Pages :2112-2116
K. Preethi, S. Ganesh Kumar
Abstract | PDF |
261. |
Squeezing the DNA Sequences with Pattern
Recognition Techniques in Multi-Processing
Environment
Pages :2117-2120
Panneer Arokiaraj S, Robert L
Abstract | PDF |
262. |
Incremental Data Migration in Multi-database
Systems Using ETL Algorithm
Pages :2121-2125
Rajesh Yadav, Prabhakar Patil, Uday Nevase, Kalpak Trivedi, Prof. Bharati Patil
Abstract | PDF |
263. |
Securing Big Data Hadoop: A Review of Security
Issues, Threats and Solution
Pages :2126-2131
Priya P. Sharma, Chandrakant P. Navdeti
Abstract | PDF |
264. |
Implications and Emerging Trends in Digital
Image Processing
Pages :2132-2135
Monika Pathak , Sukhdev Singh
Abstract | PDF |
265. |
A New Approach for Finding the Guilt Agent in
Dynamic Groups on Cloud Computing
Pages :2136-2143
Y. Venkateswarlu, K. Sowrya, and T. Anuradha
Abstract | PDF |
266. |
Watermarking of Datasets Using Usability Constraints
Pages :2144-2147
Anuj Shrivastav, R.Vidhya
Abstract | PDF |
267. |
A Survey on Multimodal Biometric
Pages :2148-2151
Sakshi Kalra , Anil Lamba
Abstract | PDF |
268. |
Article Removed
Pages :xxx-xxx
xxx,xxx
Abstract | PDF |
269. |
Design of New Security Protocol
Pages :2155-2156
K .Seena Naik, Dr G.A Ramachandra , M V Bramhananda Reddy
Abstract | PDF |
270. |
Mass Customization of Products
Pages :2157-2161
Disha Bavishi, Pralam Shah, Nikunj Patel, Anand Shukla, Vandana Munde
Abstract | PDF |
271. |
Survey on Metadata Management Schemes in HDFS
Pages :2162-2165
Abhinay Gupta , Raviraj Gundety, Vivek Fernando, Neeraj Iyer, Beatrice.S
Abstract | PDF |
272. |
Autism and its Classification Techniques
-A Review
Pages :2166-2170
Rachna Ahuja , Darvinder Kaur
Abstract | PDF |
273. |
Neuro-Fuzzy Methodology for Diagnosis of Autism
Pages :2171-2172
Rachna Ahuja, Darvinder Kaur
Abstract | PDF |
274. |
Efficient Implementation of Niblack Thresholding
for MRI Brain Image Segmentation
Pages :2173-2176
Senthilkumaran N, Kirubakaran C
Abstract | PDF |
275. |
Security Enhanced Communication Scheme with
Error Correction Capability and Efficient
Channel Utilization
Pages :2177-2185
Poornima.P.V, Amrutha.V
Abstract | PDF |
276. |
Sensitive Dependence on Initial Conditions, and
Chaotic Group Actions
Pages :2186-2190
Murtadha Mohammed Abdulkadhim
Abstract | PDF |
277. |
Novel Approach for Fault Detection in Wireless
Sensor Network
Pages :2191-2194
Kavita Tandon, Neelima Mallela, Nishi Yadav
Abstract | PDF |
278. |
New Approaches to Web Personalization Using
Web Mining Techniques
Pages :2195-2201
Beatric , Ryan Fernandes, Leo. J. Peo, Nikhila Kamat, Sergius Miranda
Abstract | PDF |
279. |
A Novel Approach for Secret Data Transfer using Interpolation and LSB Substitution with
Watermarking: A Survey
Pages :2202-2203
Murtadha Mohammed Abdulkadhim
Abstract | PDF |
280. |
A Survey: On Routing Protocols in Cognitive
Radio Ad Hoc Networks
Pages :2204-2206
Shikha Jain , Anshu Dhawan, Dr. C.K Jha
Abstract | PDF |
281. |
Users Task Personalizing by LBS
Pages :2207-2209
Nikhilesh Patve, Pooja Yadav, Ruchita Sinha
Abstract | PDF |
282. |
A Survey on CUDA
Pages :2210-2214
Paramjeet kaur and Nishi
Abstract | PDF |
283. |
Survey of Consumer Oriented AR
Pages :2215-2217
Siddharth Gupta , Payal Diwan ,Andrew Gaikwad ,Aaron Gonsalves ,Beatrice S.
Abstract | PDF |
284. |
ABig Data Storage and Challenges Pages :2218-2223
M.H.Padgavankar, Dr.S.R.Gupta
Abstract | PDF |
285. |
A Hybrid Classifier for Classification of Rice Crop
Varieties
Pages :2224-2230
B. Mahendra Kumar, DR. Karthik S , Dr.V.K.Shunmughanaathan
Abstract | PDF |
286. |
Construction of Database Design- A Reverse
Engineering Process
Pages :2231-2234
N. Asha, M. Varun Kumar, C. Barath Kumar
Abstract | PDF |
287. |
Data Analysis and Prediction of Hepatitis Using
Support Vector Machine (SVM)
Pages :2235-2237
C. Barath Kumar, M. Varun Kumar, T. Gayathri, S. Rajesh Kumar
Abstract | PDF |
288. |
Comparative Performance Analysis of DSDV,
AOMDV and ZRP Routing Protocols in VANET
using NS2
Pages :2238-2241
Varun Singla, Nailja Wadhwa
Abstract | PDF |
289. |
Survey of Different Types of CAPTCHA
Pages :2242-2245
Ved Prakash Singh, Preet Pal
Abstract | PDF |
290. |
A Theoretical Study of Text Document Clustering
Pages :2246-2251
Yogesh Jain , Amit Kumar Nandanwar
Abstract | PDF |
291. |
CSB Sorting Algorithm
Pages :2252-2255
RinkleAswani, Anjali Arora, PallaSujitha
Abstract | PDF |
292. |
Retrieving Data through Two Way Security
Methods In Dynamic Cloud Storage Systems
Pages :2256-2258
Vamsi Krishna Kondragunta , Md. Mohsin Shariff , V.Roopesh , Dr.T.V Surya Narayana
Abstract | PDF |
293. |
To Mitigate Online Password Guessing Attack By
Implementing: P3-HA
Pages :2259-2262
P.P Wakodikar , A.S. Bhattacharya
Abstract | PDF |
294. |
Survey on Speech Recognization Techniques.
(Natural Language Processing)
Pages :2263-2267
Anushree R. Pore, Prof. Amit Sahu
Abstract | PDF |
295. |
An Effective Secured Cloud Based Log Management
System Using Homomorphic Encryption
Pages :2268-2271
A. Murugan, Tarun Kumar Kala
Abstract | PDF |
296. |
Survey on Clustering Techniques in Data Mining Pages :2272-2276
K.Kameshwaran, K.Malarvizhi
Abstract | PDF |
297. |
Text-Based Shoulder Surfing Resistant Graphical
Password Scheme
Pages :2277-2280
Manjunath G , Satheesh K , Saranyadevi C,Nithya M
Abstract | PDF |
298. |
Tracking Learning and Detection of Multiple
Objects using Static Camera
Pages :2281-2283
Abhishek Khanolkar , Dhaval Shah, Ayushi Desai
Abstract | PDF |
299. |
Restructure Effective Examining Based on User
Search Goals with Feedback Sessions
Pages :2284-2288
Baron Sam B
Abstract | PDF |
300. |
Tracking People Motion Based on Lloyd’s
Clustering Algorithm
Pages :2289-2292
R.Rajeev, S.S.Sridhar
Abstract | PDF |
301. |
PKC Based Mutual Node Authentication in
Wireless Mesh Network Using ECC Algorithm
Pages :2293-2296
Ajit P. Shiralkar, Prof. Ranjit R. Keole
Abstract | PDF |
302. |
DFT: A Novel Algorithm for Data Cleansing
Pages :2297-2301
Shweta Taneja , Ishita Ashri , Shipra Gupta , Mehak Sharma
Abstract | PDF |
303. |
Fast Efficient Artificial Neural Network for
Handwritten Digit Recognition
Pages :2302-2306
Viragkumar N. Jagtap , Shailendra K. Mishra
Abstract | PDF |
304. |
Review Paper on Bitcoin a Secured
Transaction over p2p Network
Pages :2307-2309
Unnati A. Dabre, Prof. Dr. Prashant V. Ingole
Abstract | PDF |
305. |
A Review on Privacy Preserving Data Mining:
Techniques and Research Challenges
Pages :2310-2315
Shweta Taneja, Shashank Khanna, Sugandha Tilwalia, Ankita
Abstract | PDF |
306. |
Towards Secure the Multi-Cloud using
Homomorphic Encryption Scheme
Pages :2316-2319
Suresh Babu Bodduluri, P.Savaridassan
Abstract | PDF |
307. |
Association Rule Mining: A Survey
Pages :2320-2324
Gurneet Kaur
Abstract | PDF |
308. |
Creation of Replica Path Using Maxdisjoint in
Tree Based Routing
Pages :2325-2328
Sivanthiya T,Ramyapreethi S,Geethalakshmi P,Jagadeesh Mailu Dheevambiga P
Abstract | PDF |
309. |
Classification and Analysis of High Dimensional
Datasets using Clustering and Decision tree
Pages :2329-2333
Avinash Pal, Prof. Shraddha Pandit, Prof. JayPrakash Maurya
Abstract | PDF |
310. |
ENCIPHER
A Text Encryption and Decryption Technique Using
Substitution-Transposition and Basic Arithmetic and
Logic Operation
Pages :2334-2337
Devendra Prasad, Govind Prasad Arya, Chirag Chaudhary, Vipin Kumar
Abstract | PDF |
311. |
Detection & Classification of Network Anomalies
using SVM and Decision Tree
Pages :2338-2341
Mayank Nagar, Prof. Shraddha Pandit, Prof. JayPrakash Maurya
Abstract | PDF |
312. |
Energy-Efficient Urgent Packet Forwarding
Mechanism
Pages :2342-2344
Achyut Shankar, T Manoranjitham
Abstract | PDF |
313. |
Improving the Lifetime of Wireless Sensor
Network through Energy Conservation
Pages :2345-2347
Smitasri Chattopadhyay, G.Vijayalakshmi
Abstract | PDF |
314. |
Software Fault Prediction Model for Embedded
Systems: A Novel finding
Pages :2348-2354
Pradeep Singh, Shrish Verma
Abstract | PDF |
315. |
Privacy Preservation of Published Data Using
Anonymization Technique
Pages :2355-2357
Isha K.Gayki, Arvind S.Kapse
Abstract | PDF |
316. |
Quality Analysis of Indian Basmati Rice Grains
Using Digital Image Processing- A Review
Pages :2358-2360
Sheetal Mahajan, Sukhvir Kaur
Abstract | PDF |
317. |
Classification of Real Value and Complex Value
Data using Machine Learning Concepts
Pages :2361-2364
S.Padma, B.Kanchana Devi
Abstract | PDF |
318. |
A Cost Efficient Resource Provisioning Approach
Using Virtual Machine Placement
Pages :2365-2368
S. Phani Praveen, U.Tulasi, K. Ajay Krishna Teja
Abstract | PDF |
319. |
A Cloud Computing Solution for EHR Maintenance
in PHCC
Pages :2369-2372
Y.C. Ashok Kumar, M. Tanooj Kumar
Abstract | PDF |
320. |
A Survey on Denial of Service Attacks
Pages :2373-2376
T.Gunasekhar, K.Thirupathi Rao, P.Saikiran, P.V.S Lakshmi
Abstract | PDF |
321. |
Book Search by Capturing Text from Digital Images
Using Optical Character Recognition
Pages :2377-2379
Dr S.Vasavi,Srikanth Varma.Ch,Anil kumar.Ch,Santosh.D.M,Sai Ram.S
Abstract | PDF |
322. |
eAoushad: IT-based Personalized Medico Advisory
System
Pages :2380-2383
S. Sricharan, V. Suresh, Dr. J. Rajendra Prasad, T.D.Ravi kiran,Dr R Kiran Kumar
Abstract | PDF |
323. |
Computer-Based Clinical Decision Support System
for Prediction of Heart Diseases Using Naïve Bayes
Algorithm
Pages :2384-2388
D Ratnam, P HimaBindu, V.Mallik Sai, S.P.Rama Devi, P.Raghavendra Rao
Abstract | PDF |
324. |
Flooding Antivirus to Clustered Systems
Pages :2389-2390
J.Hari Krishna, Dr G.Ramakoteswara Rao, M.Samuel John
Abstract | PDF |
325. |
Content Based Medical Image Retrieval Using
Lifting Scheme Based Discrete Wavelet Transform
Pages :2391-2396
G. Prathibha, Sk. Sajida Parveen, C. V. Rashmi, B. Chandra Mohan
Abstract | PDF |
326. |
Vehicle Image Classification using Image Fusion
at Pixel Level based on Edge Image
Pages :2397-2402
Dr.A.Sri Krishna, M.Pompapathi, N.Neelima
Abstract | PDF |
327. |
Protection for Cloud Computing Using Level-Based
Cryptography
Pages :2403-2407
Venugopal Gaddam, Srinivasulu Singaraju, M.Sundar babu, S.Sai Kumar
Abstract | PDF |
328. |
Research on HTML5 in Web Development
Pages :2408-2412 Ch Rajesh, K S V Krishna Srikanth
Abstract | PDF |
329. |
Digital Color Image Watermarking In RGB Planes
Using DWT-DCT-SVD Coefficients
Pages :2413-2417
K.Chaitanya, Dr E. Srinivasa Reddy,Dr K. Gangadhara Rao
Abstract | PDF |
330. |
Testing of Cloud Applications in the Cross-Cloud
Environment
Pages :2418-2421
SK.Jameela, Dr.K.Thirupathi Rao, V. Krishna Reddy, A.Haritha
Abstract | PDF |
331. |
What is opinion?
Who influences? and how it gets influenced?
Pages :2422-2427
Sr.SujathaYeruva (Ph.D), Dr. Mrs. T. Devi
Abstract | PDF |
332. |
Fuzzy Art Based Image Segmentation and Statistical
Analysis
Pages :2428-2431
B.V.R.V.Prasad, M.Jogendra Kumar, Dr. B.V.Subba Rao
Abstract | PDF |
333. |
Secured Bank Authentication using Image
Processing and Visual Cryptography
Pages :2432-2437
B.Srikanth , G.Padmaja, Dr. Syed Khasim, Dr. P.V.S.Lakshmi, A.Haritha
Abstract | PDF |
334. |
Predictive Analysis on Nutritional Disorders in Rice
Plants using Regression
Pages :2438-2442
B.Srividhya, G.SudheerKumar, K.JhansiLakshmi, D.SandeepKumar, L. Ravi Kumar
Abstract | PDF |
335. |
Non Linear Classification for Emotion Detection on
Telugu Corpus
Pages :2443-2448
B.S.Yalamanchili, Anusha.K.K, Santhi.K, Sruthi.P, SwapnaMadhavi.B
Abstract | PDF |
336. |
Information Retrieval Using Subjective Analysis on
Social Blogs
Pages :2449-2452
Haritha. A , Ch. Manohar Venkat, J.S.N.S. Sneha Priya, P.V.S.Lakshmi, G.Lakshmi
Abstract | PDF |
337. |
Detecting Abnormality in Activities Performed by
People with Dementia in a Smart Environment
Pages :2453-2457
H. Karamath Ali, Dr. D. I. George Amalarethinam
Abstract | PDF |
338. |
Educational Data Mining and its role in
Educational Field
Pages :2458-2461
P. Meena Kumari, SK.Abdul Nabi and Puppal Priyanka
Abstract | PDF |
339. |
Performance Evaluation in Content Delivery
Networks Using Fluid Queue Algorithm
Pages :2462-2466
Kothuru Srinivasulu , Nalini N
Abstract | PDF |
340. |
Review On: Image Fusion Using Wavelet and
Curvelet Transform
Pages :2467-2470
Navneet kaur, Madhu Bahl,Harsimran Kaur
Abstract | PDF |
341. |
Fuzzy Relational Spectral Clustering Method
for Document Clustering
Pages :2471-2476
R.Nagaraj, Dr.V.Thiagarasu
Abstract | PDF |
342. |
Dynamic Service Composition for Evaluating
Services in Service-Oriented Architectures: A Review Analysis
Pages :2477-2480
Sarvesh, Naveen Bilandi
Abstract | PDF |
343. |
Ensemble Neural Network and K-NN
Classifiers for Intrusion Detection
Pages :2481-2485
Shalinee Chaurasia, Anurag Jain
Abstract | PDF |
344. |
A Survey on Sequential Pattern Mining Algorithms
Pages :2486-2492
Vishal S. Motegaonkar, Prof. Madhav V. Vaidya
Abstract | PDF |
345. |
Secure Smart Environment Using IOT based on RFID
Pages :2493-2496
Jebah Jaykumar, Abishlin Blessy
Abstract | PDF |
346. |
Implementation of JPEG2000 Algorithm for
Gray scale and Colour Images
Pages :2497-2500
S.Jagadeeswara rao, K.Sesha sai, S.Likitha, N.Kalidasu, S.Sridhar
Abstract | PDF |
347. |
Effect of Different Distance Measures on the
Performance of K-Means Algorithm: An Experimental Study in Matlab
Pages :2501-2506
Dibya Jyoti Bora, Dr. Anil Kumar Gupta
Abstract | PDF |
348. |
Classification of Hyper Spectral Images using the
Unsupervised Technique
Pages :2507-2510
Battula Sateesh, S.S.Sridhar
Abstract | PDF |
349. |
Offloading Application for Android Phones Using
Cloud
Pages :2511-2514
Harsh Bandhu Parnami, Mayank Arora, Deepika Khokhar
Abstract | PDF |
350. |
A Note on Authentication Accuracy with
Multiplicity of Biometric Images
Pages :2515-2517
Mohammed Aamir Ali T and Varun Kumar M
Abstract | PDF |
351. |
Time Comparison of Various Feature Extraction of
Content Based Image Retrieval
Pages :2518-2523
Srikanth Redrouthu, Annapurani.K
Abstract | PDF |
352. |
Estimating The Software Metrics Using
Automatic Testing And Integrating Testing
Pages :2524-2527
Lithu Mathew, Mr. P.M.S.S. Chandu
Abstract | PDF |
353. |
Scrutinize Evidences for Android Phones
Pages :2528-2533
Pooja Khandelwal, Divya Rishi Sahu, Deepak Singh Tomar
Abstract | PDF |
354. |
The Performance and Simulative analysis of
MANET Routing Protocols with Different
Mobility Models
Pages :2534-2539
Ashutosh Bharadwaj, Dr. Ajit Singh
Abstract | PDF |
355. |
A Review on Wireless Network Attacks
Pages :2540-2542
M. Sri Lakshmi, Dr. S. Prem Kumar, S. Ashok
Abstract | PDF |
356. |
Image Segmentation using Improved Watershed
Algorithm
Pages :2543-2545
Samina Tahir Rizvi, Mandeep Singh Sandhu, Shan E Fatima
Abstract | PDF |
357. |
Lesion Segmentation in Dermoscopic Image
Using Decision based Neuro Fuzzy Model
Pages :2546-2552
Binamrata Baral, Sandeep Gonnade, Toran Verma
Abstract | PDF |
358. |
A Survey on SQL Injection Attack, Detection
And Prevention Techniques
Pages :2553-2555
Atul M. Shegokar, Arati K. Manjaramkar
Abstract | PDF |
359. |
Data Leakage Detection
Pages :2556-2558
Chandni Bhatt, Prof.Richa Sharma
Abstract | PDF |
360. |
New Local Search Strategy in Artificial Bee
Colony Algorithm
Pages :2559-2565
Sandeep Kumar , Pawan Bhambu , Vivek Kumar Sharma
Abstract | PDF |
361. |
Analysis of Crypto Components of a Chaotic
Function to Study its Random Behavior
Pages :2566-2568
Kangkana Bora, Abdul Wadood, Mayur Hazarika, Zahid Ahmed
Abstract | PDF |
362. |
E-payment Gateway Model
Pages :2569-2573
Anuja Pande , Prof. A.B. Deshmukh , Prof.M. D. Tambakhe
Abstract | PDF |
363. |
PCI Express Interface Development and
Simulation for High Speed Data Transmission
Pages :2574-2577
Vijitha.C.V, Najla.A.P, Jayaraj.U.Kidav
Abstract | PDF |
364. |
Creating Materialized View Over Integrated
Heterogeneous Databases
Pages :2578-2581
Ankush J.Paturde, Anil V. Deorankar, P.N.Chatur
Abstract | PDF |
365. |
RFID Based Toll Collection System
Pages :2582-2585
Rakhi Kalantri, Anand Parekar, Akshay Mohite, Rohan Kankapurkar
Abstract | PDF |
366. |
Advanced Approaches for Medical Image
Compression
Pages :2586-2591
Gunpreet Kaur
Abstract | PDF |
367. |
Analysis of different Scheduling Algorithms under
Cloud Computing
Pages :2592-2595
Sunny Kumar, Shivani Khurana
Abstract | PDF |
368. |
User Authentication Using Multimodel
Finger-Print Recognition
Pages :2596-2603
Prashant Jain, Dr. Shailja Shukla, Dr. S. S. Thakur
Abstract | PDF |
369. |
An Approach towards Improving the Lifetime and
Security in Wireless Sensor Network
Pages :2604-2611
Mayuri P. Kawalkar, Dr. S.A.Ladhake
Abstract | PDF |
370. |
Design, Modeling and Simulation of Prostate
Cancer Biosensor with ssDNA biomarker and
DGFET Biosensor
Pages :2612-2620
B.N. Shobha, N.J.R. Muniraj
Abstract | PDF |
371. |
A New Lightweight EAP-PK Authentication Method
for IEEE 802.11 standard Wireless Network
Pages :2621-2626
Dhiraj M. Londe, Prof. Nitin Chopde
Abstract | PDF |
372. |
Extending the Lifetime of Wireless Sensor
Networks by Adjusting the Node Density Near the
Base Station
Pages :2627-2632
Divya Shree H.L, Chaitra R , Shakunthala B S
Abstract | PDF |
373. |
Artificial Intelligence in Hypertension Diagnosis:
A Review
Pages :2636-2642
Arpneek Kaur, Abhishek Bhardwaj
Abstract | PDF |
374. |
Linear Programming Model of Sensor Network
Pages :2582-2585
Ambika.N, G.T.Raju
Abstract | PDF |
375. |
LZW based Image Steganography using Kekre’s
Algorithm
Pages :2643-2648
Isha Kajal, Harish Rohil, Abhishek Kajal
Abstract | PDF |
376. |
Improved Web Service Self-Healing Connector
Pages :2649-2657
Khalid Kaabneh, Suha Afaneh, Heba Almalahmeh, Issam Alhadid
Abstract | PDF |
377. |
Forecasting the Reliability of Software via Neural
Networks
Pages :2658-2661
Yogita Kansal, Shailee Choudhary
Abstract | PDF |
378. |
Physics Engine: Deformation Simulation
Pages :2662-2664
Abhishek Bhandwalda, Akshay Gandhi, Mohan Ghule, Nikhil Bansode
Abstract | PDF |
379. |
Routing Attacks in Wireless Sensor Networks: A
Survey
Pages :2665-2671
Deepali Virmani, Ankita Soni, Shringarica Chandel, Manas Hemrajani
Abstract | PDF |
380. |
Mobile Money: M-payment System for India
Pages :2672-2675
Sujata P. Deshmukh, Archana M. Naware
Abstract | PDF |
|
|