• Up Coming Issue >
  • Up-Coming Conference
  • Conference Papers
  • Indexing
  • Peer-Review
  • Publication Ethics
  • Contact
  • FAQ
  • Terms&Conditions
  • Site Map
  • bh

     

    VOLUME 5 ISSUE 2 March - April 2014

    ISSN 0975 - 9646

    1. Prioritization of Test Cases using Branch Coverage with Multiple criteria for Regression Testing
    Pages : 972-974
    Navleen Kaur, Manish Mahajan
    Abstract | PDFPDF
    2. Mobility Management Approaches for Mobile IP Networks
    Pages : 975-977
    V Anji Reddy, Swetha Tanavarapu,Harish Sampatharao,Vasavi Potipireddi, Shyam Pallanti
    Abstract | PDFPDF
    3. Reviewing and Reducing Hidden Cost by Proposing CSIPP-using DMT
    Pages : 978-981
    R. K. Seth and R. Chuchra
    Abstract | PDFPDF
    4. Integrity Verification in Multi-Cloud Storage Using Cooperative Provable Data Possession
    Pages : 982-985
    Megha Patil , Prof. G.R.Rao
    Abstract | PDFPDF
    5. A Novel Approach: Proactive Password Checking based on User Profiling
    Pages : 986-990
    Monika Pathak,Sukhdev Singh
    Abstract | PDFPDF
    6. Reliable Communication Using Topology Control in Mobile Ad-hoc Network
    Pages :991-993
    Sunil Deokule , Nivedita Malvadkar,Rupali Nimbalkar
    Abstract | PDFPDF
    7. A Survey on Location Based Routing Protocols in Mobile Ad-hoc Networks
    Pages : 994-997
    Abhishek Gupta , Samidha D Sharma
    Abstract | PDFPDF
    8. A Survey on Congestion Control in MANET
    Pages : 998-1001
    Geetika Maheshwari, Mahesh Gour,Umesh Kumar Chourasia
    Abstract | PDFPDF
    9. OCRP in Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Environment
    Pages : 1002-1007
    M.C. Babu, S.Umamageswari
    Abstract | PDFPDF
    10. Optical Character Recognition for English and Tamil Script
    Pages : 1008-1010
    Kanimozhi.V.M, Muthumani.I
    Abstract | PDFPDF
    11. Color and Shape Feature Extraction and Matching in Pill Identification Systems
    Pages : 1011-1015
    Dr.E.Annasaro, A.Hema
    Abstract | PDFPDF
    12. An Efficient Actionable 3D Subspace Clustering Based on Optimal Centroids
    Pages : 1016-1019
    V.Atchaya, C.Prakash
    Abstract | PDFPDF
    13. Secure Enhance Protocol for Vehicular Ad-hoc Networks
    Pages :1020-1022
    Manish Kumar Soni, Ashish Vashistha
    Abstract | PDFPDF
    14. A survey on Reducing Features to Improve Bug Prediction by Using Cos-triage Algorithm
    Pages : 1023-1025
    Veena Jadhav, Prof. Vandana Gaikwad
    Abstract | PDFPDF
    15. Survey on Opinion Mining and Summarization of User Reviews on Web
    Pages : 1026-1030
    Vijay B. Raut, D.D. Londhe
    Abstract | PDFPDF
    16. De Noising of Images With Moment Invariants
    Pages : 1031-1034
    Apoorva Mondal, Nishi Yadav
    Abstract | PDFPDF
    17. Improving Network Lifetime and Reducing Energy Consumption in Wireless Sensor Networks
    Pages : 1035-1038
    D.Suresh, K.Selvakumar
    Abstract | PDFPDF
    18. Enhancing the Features of Mobile Social Mass Media on Cloud Storage
    Pages : 1039-1041
    MA.Mohammed AnsarAli , M.Ramesh, S.SathishKumar
    Abstract | PDFPDF
    19. Detection of Routing Misbehavior Nodes Using Improved 2-ACK in MANET’S (Simulation through NS-2)
    Pages : 1042-1044
    P.Samba Siva Rao,.Aswini Meher,T.Kusuma, Y.Vasudha
    Abstract | PDFPDF
    20. Auditing Windows 7 Registry Keys to track the traces left out in copying files from system to external USB Device
    Pages : 1045-1052
    Abhijeet Ramani, Somesh Kumar Dewangan
    Abstract | PDFPDF
    21. An Enhanced Approach to Use SSL for End To End Security
    Pages : 1053-1057
    Swati Gupta, Saru Dhir
    Abstract | PDFPDF
    22. Survey on the RIP, OSPF, EIGRP Routing Protocols
    Pages : 1058-1065
    V.Vetriselvan, Pravin R.Patil, M.Mahendran
    Abstract | PDFPDF
    23. A Survey of the Existing Security Issues in Cloud Computing
    Pages : 1066-1068
    Parul Chachra
    Abstract | PDFPDF
    24. Survey and Analysis of Technique For Quality Image Retrieval On Web
    Pages : 1069-1072
    Sanjyot S.Desale, Y.C.Kulkarni
    Abstract | PDFPDF
    25. Cued Click Points: Graphical Password Authentication Technique for Security
    Pages : 1073-1075
    Shendage Swapnil Sunil, Dhainje Prakash, Yevale Ramesh Shivaji
    Abstract | PDFPDF
    26. Comparative Analysis of Clustering by using Optimization Algorithms
    Pages : 1076-1081
    Poonam Kataria, Navpreet Rupal , Rahul Sharma
    Abstract | PDFPDF
    27. An Efficient Algorithm for Update Scheduling in Streaming Data Warehouses
    Pages : 1082-1085
    Bolla Saikiran, Kolla Morarjee
    Abstract | PDFPDF
    28. Ensuring Better QoS through Call Admission Control in Wireless Network
    Pages : 1086-1089
    Abhishek M. Goswami. Shreyas Patel
    Abstract | PDFPDF
    29. Operating System Virtualization for Ubiquitous Computing
    Pages : 1090-1094
    Vikram S. Vairagade, Prof.Chanchal V. Dahat, Anjali V. Bhatkar
    Abstract | PDFPDF
    30. A New Model for Multiparty Collaborative Distributed Mining using Bloom Filter
    Pages : 1095-1098
    Deepak Joshy, Ms.PrinceMary
    Abstract | PDFPDF
    31. Efficient Routing Algorithm for Wireless Networks based on Bandwidth and Clock Rate
    Pages : 1099-1102
    Anto Premkumar, Shijo James, Saranya. R
    Abstract | PDFPDF
    32. Data Extraction and Alignment using Natural Language Processing
    Pages : 1103-1105
    M.S Vinu, L.Dhanam, Dr.Sudha Mohanram
    Abstract | PDFPDF
    33. Stimulated Particle Swarm Optimization Routing Protocol – A Review
    Pages : 1106-1111
    M.Ganesan, PravinR.Patil, M.Dhilsath Fathima, M.S.Saravanan
    Abstract | PDFPDF
    34. Impact of Different Methodologies in Software Development Process
    Pages : 1112-1116
    Preeti Rai, Saru Dhir
    Abstract | PDFPDF
    35. Rotation Invariable Method for Currency Coin Detection
    Pages : 1117-1119
    Sonali A Mahajan, Chitra M. Gaikwad
    Abstract | PDFPDF
    36. Article Removed
    Pages : xxxx, xxxx
    xxxx, xxxx, xxxx
    Abstract | PDFPDF
    37. Video Streaming Over Multihop Wireless Networks –Issues and Techniques
    Pages : 1128-1130
    Nimisha Joy, Preetha K G
    Abstract | PDFPDF
    38. Live Devices: Insider Threat to Resources
    Pages : 1131-1134
    Malik Junaid Gul , Pakeeza Samin, Dr. Rabia Riaz
    Abstract | PDFPDF
    39. Comparision and Development of Algorithm for Different 3G GSM Network Sites
    Pages : 1135-1138
    Abhilasha Sharma ,Dr. Naveen Choudhary, Dr. Dharm Singh
    Abstract | PDFPDF
    40. A Novel Method to Identify Audio Descriptors, Useful in Gender Identification from North Indian Classical Music Vocal
    Pages : 1139-1143
    Saurabh H. Deshmukh, Dr. S.G. Bhirud
    Abstract | PDFPDF
    41. Overview of Stemming Algorithms for Indian and Non-Indian Languages
    Pages : 1144-1146
    Dalwadi Bijal, Suthar Sanket
    Abstract | PDFPDF
    42. Extended Hill Cipher Decryption by Using Transposed Interweaved Shifting
    Pages : 1147-1151
    Divya Rathi, Parmanand Astya
    Abstract | PDFPDF
    43. An Enhanced Intrusion Detection System for MANETS using Hybrid Key Cryptography
    Pages : 1152-1154
    B.Suruthi, N.V.Rajeesh kumar
    Abstract | PDFPDF
    44. An Empirical Investigation on Thematic Accuracy of Landuse/Landcover Classification Using Fused Images
    Pages : 1155-1161
    Jeya Kumari N , Purushothaman B M, Suresh Babu S
    Abstract | PDFPDF
    45. Nymble:The Blocking System
    Pages : 1162-1164
    Akshay Sangrolkar, Yogesh Sawant , Akshay Shirole, N.V.Puri
    Abstract | PDFPDF
    46. Plant Disease Detection Techniques Using Canny Edge Detection & Color Histogram in Image Processing
    Pages : 1165-1168
    Shital Bankar, Ajita Dube,Pranali Kadam, Prof. Sunil Deokule
    Abstract | PDFPDF
    47. A Comprehensive Review of Image Compression Techniques
    Pages : 1169-1172
    Kitty Arora, Manshi Shukla
    Abstract | PDFPDF
    48. Cloud-Based Multimedia Storage System with QoS Provision
    Pages : 1173-1176
    Swati Vani, Bhagyashri Bhosale, Ganesh Shinde, Rajni Shinde, Prof.Manoj Pawar
    Abstract | PDFPDF
    49. Enhanced Packet Scheduling Scheme with Quality of Service support for WiMAX Networks
    Pages : 1177-1180
    D.M.S.Madhuri , M.L.N.Divya, G.Sravani, R.V.S.N.Raju
    Abstract | PDFPDF
    50. Forest Conservation Monitoring using E-Forest Clearance for Developmental Projects in the Perspective of E-Governance
    Pages : 1181-1184
    Rajesh Kumar Pathak
    Abstract | PDFPDF
    51. Multi-factor Authentication in Banking Sector
    Pages : 1185-1189
    Tushar Bhivgade , Mithilesh Bhusari , Ajay Kuthe , Bhavna Jiddewar ,Prof. Pooja Dubey
    Abstract | PDFPDF
    52. An Efficient Ripple Carry Adder Based Low Complexity Turbo Decoder
    Pages : 1190-1195
    Chandrapriya.G, Karthigailakshmi.S
    Abstract | PDFPDF
    53. A Novel Image Enhancement Technique for Ancient Images using Optimal Histogram Equalization and Fuzzy Enhancement Technique
    Pages : 1196-1199
    P. Naga Srinivasu
    Abstract | PDFPDF
    54. Identification of Misbehaviour Activities in Mobile Adhoc Networks
    Pages : 1200-1203
    Indhumathi.J, Prem Jacob.T
    Abstract | PDFPDF
    55. A Study on different Image Encryption Algorithms
    Pages : 1204-1206
    Suriya kala.L, Dr. R. Thangaraj
    Abstract | PDFPDF
    56. International Vulnerability Database Alliance as an Effective Vulnerability Disclosure Technique
    Pages : 1207-1209
    Tina Sebastian, Abey Abraham
    Abstract | PDFPDF
    57. Unauthorized Terror Attack Tracking Using Web Usage Mining
    Pages : 1210-1212
    Ramesh Yevale, Mayuri Dhage, Tejali Nalawade,.Trupti Kaule
    Abstract | PDFPDF
    58. Study on Landuse Pattern to Evaluate Groundwater Potential Zone for Bengaluru Urban Area Using RS &GIS Techniques
    Pages : 1213-1218
    Jeyapprabha.R, Revathy S.S, S.Sureshbabu
    Abstract | PDFPDF
    59. A Task Oriented View of Web Software Visualization and Architecture
    Pages : 1219-1222
    Laxmareddy.A, M.Ganesan, DR.E.Kannan, M.Dhilsath Fathima, M.S.Saravanan
    Abstract | PDFPDF
    60. Convergence of 5G Technology by Using Distributed System
    Pages : 1223-1226
    Aman Deep Varshney, Shivani Dubey
    Abstract | PDFPDF
    61. Improved Shortest Path Method to Select the Best Path from Multi-Path Web Service Composition Graph
    Pages : 1227-1231
    Dr. S. Justin Samuel, M.Gnana Sagaya Sharmila
    Abstract | PDFPDF
    62. Performing Enhancement and Providing Minutiae Matching Score in LQFI
    Pages : 1232-1236
    A. M.Jayalakshmi, B. P. Robert , C.G. Thiripura Sundari
    Abstract | PDFPDF
    63. An Improved Memetic Search in Artificial Bee Colony Algorithm
    Pages : 1237-1247
    Sandeep Kumar , Vivek Kumar Sharma , Rajani Kumari
    Abstract | PDFPDF
    64. ZigBee based Budget Distribution and Management
    Pages : 1248-1250
    Sateesh Gudla, K. Kamal Kumar , K.V.S.V.Prasad, D.V.S.Gayathri ,G.Santhi
    Abstract | PDFPDF
    65. Wifi Positioning System Using WLAN Signal Strengths by Block
    Pages : 1251-1254
    Prashant Agarwal, Monisha Singh, Sudhir Kumar Sharma
    Abstract | PDFPDF
    66. Sandbox- An Application Tool for Hadoop
    Pages : 1255-1258
    Gaurav Vaswani , Ajay Chotrani , Hitesh Rajpal
    Abstract | PDFPDF
    67. Burst Error Characterization for Wireless Ad-Hoc Network and Impact of Packet Interleaving
    Pages : 1259-1264
    Devaraju. R, Puttamadappa. C
    Abstract | PDFPDF
    68. Look Over on Mining Sequential Patterns in Evolving Data Stream
    Pages : 1265-1268
    Harsha Nair, Neeba E A
    Abstract | PDFPDF
    69. An Overview on Data Mining
    Pages : 1269-1272
    Vishal, Dr Saurabh Gupta
    Abstract | PDFPDF
    70. Review of QoS Based Service Populating for Cloud based Mobile Apps
    Pages : 1273-1276
    Prachi B.Gaikwad, Prof. S.M.Rokade
    Abstract | PDFPDF
    71. Double Layer Security in the Swarm Intelligence P2P Network
    Pages : 1277-1282
    K.Ramalakshmi, P.K.Sasikumar
    Abstract | PDFPDF
    72. Analysing Security and Software Requirements using Multi-Layered Iterative Model
    Pages : 1283-1287
    Sonia, Archana Singhal, Jyoti Balwani
    Abstract | PDFPDF
    73. A Survey on Detection and Prevention Techniques for Gray-Hole Attack in MANET
    Pages : 1288-1290
    Mahesh Kumar Kumawat, Jitendra Singh Yadav
    Abstract | PDFPDF
    74. Neuro-Genetic Hybrid Approach for Rainfall Forecasting
    Pages : 1291-1295
    Abhishek Saxena, Neeta Verma , K.C.Tripathi
    Abstract | PDFPDF
    75. Electricity Distribution System using Geospatial Technology – A Case Study for Hosur Town, Krishnagiri District
    Pages : 1296-1300
    Kanmani B, Suresh Babu S
    Abstract | PDFPDF
    76. An Efficient and Secure System for Detecting Malicious Nodes in Mobile Ad hoc Networks
    Pages : 1301-1306
    Sruthi. E , Pradeep. S
    Abstract | PDFPDF
    77. Study and Review of the Biomedical Signals With Respect To Different Methodologies
    Pages : 1307-1309
    Zainab Mizwan, Hemant kasturiwale
    Abstract | PDFPDF
    78. RS and GIS Based Coastal Wetland Inventory for Udupi District, Karnataka
    Pages : 1310-1314
    S. Aishwariya, M. S. Vinaya , S. Suresh Babu
    Abstract | PDFPDF
    79. Implementation of Enhanced Security on Vehicular Cloud Computing
    Pages : 1315-1318
    RajbhojSupriya K., Pankaj R. Chandre
    Abstract | PDFPDF
    80. Enhancing Data Security by Adapting Network Security and Cryptographic Paradigms
    Pages : 1319-1321
    Pushpa B R
    Abstract | PDFPDF
    81. Rule Based POS Tagger for Marathi Text
    Pages : 1322-1326
    Pallavi Bagul, Archana Mishra, Prachi Mahajan, Medinee Kulkarni, Gauri Dhopavkar
    Abstract | PDFPDF
    82. Advanced Online Banking Authentication System Using One Time Passwords Embedded in Q-R Code
    Pages : 1327-1329
    Abhishek Gandhi, Bhagwat Salunke, Snehal Ithape, Varsha Gawade, Prof.Swapnil Chaudhari
    Abstract | PDFPDF
    83. Finding Optimal Vehicular Route Based On GPS
    Pages : 1330-1332
    A.Renugambal , V.Adilakshmi Kameswari
    Abstract | PDFPDF
    84. Employing a Reconfigurable Virtual Networking Approach by using NICE Mechanism
    Pages : 1333-1337
    A.JensilinMary.M.E , E.SathishKumar , S.NavinChander , R.Naveenkumar , A.Prasanth
    Abstract | PDFPDF
    85. Auto-Healing Of Wireless Mesh Network
    Pages :1338-1341
    Kolhe Mahesh D., Gujar Siddhchakra R., Jadhav Amit A., Hase Manoj S.
    Abstract | PDFPDF
    86. A Survey on Web based Interactive Information Retrieval
    Pages : 1342-1345
    Ratna Kumari Challa, B.Linga Murthy, K.Srinivasarao
    Abstract | PDFPDF
    87. Ranking With Cluster-Based Non-Segregated Approach to Multi-Document Categorization
    Pages : 1346-1348
    T.Sathish kumar, V.Sharmila
    Abstract | PDFPDF
    88. An Efficient Approach to Block DDoS Attacks Using Adaptive Selective Verification Protocol
    Pages : 1349-1351
    Gopinath.V, Anand.C
    Abstract | PDFPDF
    89. Visualization in Argument Based Recommender System
    Pages : 1352-1357
    Preeti, Ankit Rajpal, Purnima Khurana
    Abstract | PDFPDF
    90. Feature Extraction Based Dynamic Recommendation for Analogous Users
    Pages : 1358-1362
    Raj Bharath.R, Thanigaivel.K, Alfahath.A, Prasanth.T
    Abstract | PDFPDF
    91. Human Robotics Interaction (HRI) based Analysis – using DMT
    Pages : 1363-1367
    Rimmy Chuchra and R. K. Seth
    Abstract | PDFPDF
    92. A Survey on Automatic Annotation and Annotation Based Image Retrieval
    Pages : 1368-1371
    Himali Chaudhari , Prof D.D.Patil
    Abstract | PDFPDF
    93. Automatic Vehicle Classification System for Monitoring Highways
    Pages : 1372-1374
    R.Mohan,K.Divakar, M.Kumaresan ,R.Rajan
    Abstract | PDFPDF
    94. Privacy Preservation of Social Network Data against Structural Attack using K-Auto restructure
    Pages : 1375-1381
    V.Gnanasekar, S.Jayanthi
    Abstract | PDFPDF
    95. An Extensive Survey of Bat Species Identification based on Acoustics
    Pages : 1382-1386
    Gladrene Sheena Basil, Jayapriya K
    Abstract | PDFPDF
    96. Job Scheduling in Grid Computing using User Deadline
    Pages : 1387-1392
    S.Gokul Dev, R.Lalith Kumar
    Abstract | PDFPDF
    97. Fast Algorithm for Finding the Value-Added Utility Frequent Itemsets Using Apriori Algorithm
    Pages : 1393-1397
    G.Arumugam, V.K.Vijayakumar
    Abstract | PDFPDF
    98. Feature Selection Algorithm with Discretization and PSO Search Methods for Continuous Attributes
    Pages : 1398-1402
    Madhu.G, Rajinikanth.T.V, Govardhan.A
    Abstract | PDFPDF
    99. DEUDS: Data Extraction Using DOM Tree and Selectors
    Pages : 1403-1410
    Vinayak B. Kadam , Ganesh K. Pakle
    Abstract | PDFPDF
    100. Teaching Computer Architecture Using Simulation Tools
    Pages : 1411-1413
    Shine V.J, Sathish P.K
    Abstract | PDFPDF
    101. Intensification of Unreliable Radiant Images by using Instinctive Sustained Algorithms
    Pages : 1414-1417
    R.Arvind,C.M.Gowtham, M.Karthi,T.N.Prabhu
    Abstract | PDFPDF
    102. Defensive Surreptitious Method Attacks by Live Detection and Adoptable Learning System
    Pages : 1418-1422
    Keerthi P.S, S.Venkatesan, C.Kanimozhi, V.Neerathilingam, C.Diviya
    Abstract | PDFPDF
    103. Cache-Aside Approach For Cloud Design Pattern
    Pages : 1423-1426
    Narendra Babu Pamula, K Jairam, B Rajesh
    Abstract | PDFPDF
    104. Mapping the Groundwater Potential Zone for Bengaluru Urban District
    Pages : 1427-1431
    Nandishkumar.L, Karthick.M, Arul Prakash.A, Lokpal Bharani Dharaa.D, Revathy S.S, S.Sureshbabu
    Abstract | PDFPDF
    105. Delay Optimization in VANET Using Ant Colony Optimization and Wimax
    Pages : 1432-1435
    Manjot Singh Pandher , Amaninder Singh Grewal , Simrat Pal Kaur
    Abstract | PDFPDF
    106. Improve Server Utilization and Achieving Green Computing in Cloud
    Pages : 1436-1439
    M.Rajeswari, M.Savuri Raja, M.Suganthy
    Abstract | PDFPDF
    107. Dynamic Clustering in Wireless Sensor Network using Neural Network
    Pages : 1440-1442
    Amaninder Singh Grewal , Manjot Singh Pandhe , Simrat Pal Kaur
    Abstract | PDFPDF
    108. A Novel Approach for Data Acquisition and Handover Scheme in VANET
    Pages : 1403-1410
    Shanmuga Priya.S, Erana Veerappa Dinesh.S
    Abstract | PDFPDF
    109. A New Approach for Identifying Manipulated Online Reviews using Decision Tree
    Pages : 1447-1450
    Rajashree S. Jadhav , Prof. Deipali V. Gore
    Abstract | PDFPDF
    110. Distance Education Technologies: Using E-learning System and Cloud Computing
    Pages : 1451-1454
    Sudhir Kumar Sharma, Nidhi Goyal, Monisha Singh
    Abstract | PDFPDF
    111. Cloud Billing Model: A Review
    Pages : 1455-1458
    Danamma M.Bulla, Dr.V R.Udupi
    Abstract | PDFPDF
    112. Component Based Software Reusability and Framing Standards for Components to be Reused
    Pages : 1459-1462
    Anshul Kalia, Sumesh Sood
    Abstract | PDFPDF
    113. Improved Intrusion Detection System using C4.5 Decision Tree and Support Vector Machine
    Pages : 1463-1467
    Vaishali Kosamkar, Sangita S Chaudhari
    Abstract | PDFPDF
    114. Energy Efficient Network Reconfiguration Algorithm Based on Cooperation for Wireless Ad hoc Network
    Pages : 1468-1474
    Sachin Kumar Soni, Gajendra Singh
    Abstract | PDFPDF
    115. A Review Of Literature On Word Sense Disambiguation
    Pages : 1475-1477
    Ravi Mante, Mahesh Kshirsagar, Dr. Prashant Chatur
    Abstract | PDFPDF
    116. Article Removed
    Pages : xxxx-xxxx
    xxxx, xxxx, xxxx
    Abstract | PDFPDF
    117. An Enhanced Approach to Handle Missing Values in Heterogeneous Datasets
    Pages : 1483-1485
    Sandhya.GN, Saravanan.P
    Abstract | PDFPDF
    118. Incremental MVS based Clustering Method for Similarity Measurement
    Pages : 1486-1491
    Vinay C. Warad, B Baron Sam
    Abstract | PDFPDF
    119. Survey on Intrusion Detection Mechanisms for MANETS
    Pages : 1492-1494
    Shwetha M,Mamatha A
    Abstract | PDFPDF
    120. Brief Study of Positive and Negative Sides of Bluetooth Earpiece
    Pages : 1495-1498
    Nikita Sharma
    Abstract | PDFPDF
    121. Creating Adaptive Interface by Mining Web Log
    Pages : 1499-1502
    Harsheen Kaur,Kailash Bahl
    Abstract | PDFPDF
    122. e-F.I.R. Lodging System: A Step for Proper Maintenance of Law and Order
    Pages : 1503-1505
    Ashok, Pardeep Kumar, Dr. Harish Rohil
    Abstract | PDFPDF
    123. Algorithm Based Security Infrastructure in Online Fraud Detection
    Pages : 1506-1508
    Rupal Harishchandra Jadhav, Swapnali Sharad Hinge, Shahabaj Sanaullah Shaikh, Swapnil Subhash Kanade, Prof. K.S.Wagh
    Abstract | PDFPDF
    124. Enhanced Image Compression Algorithm for Image Processing Applications
    Pages : 1509-1515
    B. Kranthi, Dr. B. Ananda Krishna, Dr. M. Kamaraju, B. Rajasekhar
    Abstract | PDFPDF
    125. A Novel Dynamic Data Collection Paradigm for Wireless Sensor Networks (WSNs) by Mobile Users
    Pages : 1516-1521
    Zara Sumaiya, Rekha Patil
    Abstract | PDFPDF
    126. Video Compression Using JPEG2000
    Pages : 1522-1525
    N.Bharath, V.Prakash, G.Dinesh, V.Dillibabu, S.Kumarasamy
    Abstract | PDFPDF
    127. HLA Based Third Party Auditing For Secure Cloud Storage
    Pages : 1526-1532
    Chandinee Saraswathy K. , Keerthi D. , Padma G.
    Abstract | PDFPDF
    128. Family Card Security System Using Biometric Device
    Pages : 1533-1535
    R.Prasanth, V.Balamurugan, S.Roubavaan, E.Suresh, Dr. N.Purushothaman
    Abstract | PDFPDF
    129. Simulation of Misbehaving Nodes in AODV Routing
    Pages : 1536-1539
    Shweta Rohilla, Pankaj Sharma
    Abstract | PDFPDF
    130. Prevention of battery life depletion from Wireles Ad-Hoc Sensor Networks using Signal Strength
    Pages : 1540-1544
    C. Suganthini, S. Saranya, V.S. Sowmiya
    Abstract | PDFPDF
    131. Performance Analysis of Energy Efficient Routing for Mobile Ad-hoc Networks
    Pages : 1545-1551
    K.Prabu, Dr. A.Subramani
    Abstract | PDFPDF
    132. Retrieve Records from Web Database Using Data Alignment
    Pages : 1552-1554
    V.Kalyan Deepak, N.V.Rajeesh Kumar
    Abstract | PDFPDF
    133. Meta Paged Flash Translation Layer
    Pages : 1555-1559
    Shinde Pratibha, Srinivas
    Abstract | PDFPDF
    134. Privacy Preserving Data Mining Using Association Rule With Condensation Approach
    Pages : 1560-1563
    Supriya S. Borhade, Bipin B.Shinde
    Abstract | PDFPDF
    135. Unwanted Activity Detection System in Wireless Network
    Pages :1564-1569
    Sneha A. Deshmukh , Monika Rajput
    Abstract | PDFPDF
    136. Survey on Anti-forensics Operations in Image Forensics
    Pages : 1570-1573
    Pranita D. Pandit , Monika Rajput
    Abstract | PDFPDF
    137. Increasing the Production Rate by Automation Systems in Fields
    Pages : 1574-1576
    Murari DevaKannan Kamalesh, Garlapati.A.V.P.Gowtham , Mani Gandan
    Abstract | PDFPDF
    138. Performance Analysis of VoMAN using Routing Protocols to Improve QoS of VoIP flows
    Pages : 1577-1580
    V.Savithri, Dr.A.Marimuthu
    Abstract | PDFPDF
    139. Privacy Preserving in Horizontal Aggregation Using Homomorphic Encryption
    Pages : 1581-1583
    Patil Amrut A, D. M. Thakore
    Abstract | PDFPDF
    140. A Hybrid Approach for Extractive Document Summarization Using Machine Learning and Clustering Technique
    Pages : 1584-1586
    M. S. Patil , M. S. Bewoor, S. H. Patil
    Abstract | PDFPDF
    141. A Modified O (1) Algorithm for Real Time Task in Operating System
    Pages : 1587-1589
    Rohan R. Kabugade, S. S Dhotre, S H Patil
    Abstract | PDFPDF
    142. Demands Apply Base Data Replication Over Cloud Computing
    Pages : 1590-1594
    Musmade Anjali J., S. M. Rokade
    Abstract | PDFPDF
    143. Enhanced Performance Evaluation for Broadcasting Safety Messages In VANET
    Pages : 1595-1598
    Varsha H, Pradeep. S
    Abstract | PDFPDF
    144. Enhancement of Nymble through Ontological Approach
    Pages : 1599-1602
    Sateesh Gudla, Sarat Chandra Mongam, Sindhuri Boddu, Satish Mallampalli
    Abstract | PDFPDF
    145. Bus Locator via SMS Using Android Application
    Pages : 1603-1606
    Karan Punjabi, Pooja Bolaj, Pratibha Mantur, Sneha Wali
    Abstract | PDFPDF
    146. An Overview of Anonymous Routing ALERT Protocol
    Pages : 1607-1609
    Snehlata Handrale, Prof. S. K. Pathan
    Abstract | PDFPDF
    147. Design Technique of Phase-Locked Loop Frequency Synthesizer in CMOS Technology: A Review
    Pages : 1610-1614
    Purushottamkumar T. Singh, Devendra S. Chaudhari
    Abstract | PDFPDF
    148. Study & Analysis of Different Face Detection Techniques
    Pages : 1615-1618
    Mayank Chauhan, Mukesh Sakle
    Abstract | PDFPDF
    149. Ranking Of XML Documents by Using Adaptive Keyword Search
    Pages :1619-1621
    Varun Varma Sangaraju
    Abstract | PDFPDF
    150. Face Image Retrieval Using Facial Attributes By K-Means
    Pages :1622-1625
    I.Sudha, [V.Saradha, M.Tamilselvi, D.Vennila
    Abstract | PDFPDF
    151. ADMIT – A simple Adaptive Data Rate Model for Medical Image Transmission over Wireless Network
    Pages :1626-1629
    Saranya S, Kavitha P
    Abstract | PDFPDF
    152. Tractable Form of Non-Monotonic Reasoning to Generate Belief Set
    Pages :1630-1637
    Dipanjan kumar Dey
    Abstract | PDFPDF
    153. Comparative Evaluation of AODV, DSDV and AOMDV based on end-to-end delay and routing overhead using Network Simulator
    Pages :1638-1641
    Mitul K. Patel, Vasundhara Uchhula, Bannishikha Banerjee
    Abstract | PDFPDF
    154. A Review on Infrequent Weighted Itemset Mining using Frequent Pattern Growth
    Pages :1642-1647
    Shipra Khare , Prof. Vivek Jain
    Abstract | PDFPDF
    155. GNDA: Good Neighbor Node Detection for Selfish node Identification in Mobile Ad Hoc Networks
    Pages :1648-1651
    T. Suganya, R. Abirami, L. Anuprabha, J. Anupriya
    Abstract | PDFPDF
    156. A Dynamic Priority Based Self Scheduling of Virtual Machines for Cross- Cloud Computing Environment
    Pages :1652-1654
    Srilatha.M, G.Praveen Babu
    Abstract | PDFPDF
    157. A Survey on HTML Structure Aware and Tree Based Web Data Scraping Technique
    Pages :1655-1658
    Vinayak B. Kadam , Ganesh K. Pakle
    Abstract | PDFPDF
    158. Survey on Location Based Routing Protocols in MANET
    Pages :1659-1663
    Vivek Nikam, Prof. G.T. Chavan
    Abstract | PDFPDF
    159. Use of Tobacco in India and the Influencing Factors: An Analysis on National Family and Health Survey Data (NFHS-III)
    Pages :1664-1667
    M.Mamatha,V.Nageswara Rao
    Abstract | PDFPDF
    160. Analysis and Comparison of Wireless Sensor Networks Coverage Algorithms
    Pages :1668-1670
    Swapnil Jain, Sunita Gupta
    Abstract | PDFPDF
    161. An Algorithm to Optimize the Traditional Backfill Algorithm Using Priority of Jobs for Task Scheduling Problems in Cloud Computing
    Pages :1671-1674
    Lal ShriVratt Singh, Jawed Ahmed, Asif Khan
    Abstract | PDFPDF
    162. Automatic Caption Generation for News Images
    Pages :1675-1677
    Priyanka Jadhav, Sayali Joag, Rohini Chaure, Sarika Koli
    Abstract | PDFPDF
    163. Diagnosis of Heart Disease Using Data Mining Algorithm
    Pages :1678-1680
    Deepali Chandna
    Abstract | PDFPDF
    164. Improving Security of Cloud Environment in Dynamic Cloud Network
    Pages :1681-1684
    Chetan S. Kadu, Abhay A. Jadhav, Prashant L. Mandale
    Abstract | PDFPDF
    165. Individualized Travel Recommendation by Mining People Ascribes and Travel Logs Types from Community Imparted Pictures
    Pages :1685-1687
    S.Saranya,S.Sivaranjani, G.Surya, A.Ramachandran
    Abstract | PDFPDF
    166. Knowledge Extraction Mechanism using Vertically Partition id3 and Fuzzy based System
    Pages :1688-1691
    Mona Shrivastava, Nirest Sharma, Gaurav Shrivastava
    Abstract | PDFPDF
    167. A Review on Designing of Distributed Data Warehouse and New Trends in Distributed Data Warehousing
    Pages :1692-1695
    Shaweta
    Abstract | PDFPDF
    168. Hybrid Message Authentication Protocol in VANET
    Pages :1696-1697
    R.Rajan, S.Narendran, M.Prasanth, R.Raj kumar
    Abstract | PDFPDF
    169. Approaches for Automated Web Service Discovery
    Pages :1698-1700
    Gajanan V. Bhole , Prof. Prakash. R. Devale
    Abstract | PDFPDF
    170. Content Based Image Retrieval System Use for Similarity Analysis of Images
    Pages :1701-1704
    Swapnil Khobragade, ,Shobhit Nikose, Mussavir Shaikh
    Abstract | PDFPDF
    171. Performance Improvement Using Link Management in Wired and Wireless Networks
    Pages :1705-1708
    Karthik.N, Jeyasekhar.A
    Abstract | PDFPDF
    172. A Review on Ontology Based Information Retrieval in Semantic Web
    Pages :1709-1713
    Naveen Malik, Navdeep Kumar, Mradula Gupta
    Abstract | PDFPDF
    173. A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Overhead in Mobile Ad Hoc Networks
    Pages :1714-1717
    Lahari.P, Pradeep.S
    Abstract | PDFPDF
    174. Contrast Enhancement of HDR images using Linear Transformation and Kernel Padding
    Pages :1718-1723
    Kesharee Singh Yaduwanshi, Nitin Mishra
    Abstract | PDFPDF
    175. Optimization of DBSCALE Clustering Algorithm for Weather Forecasting
    Pages :1724-1728
    Archana Tomar, Neetesh Gupta, Amit Sinhal
    Abstract | PDFPDF
    176. Coverage Optimization based on Redundant Sense Area Ratio in Wireless Multimedia Sensor
    Networks

    Pages :1729-1733
    T.Sridevi, R.Vinothini, N.Ramya, T.N.Prabhu
    Abstract | PDFPDF
    177. Secure Data Access control in Cloud Environment
    Pages :1734-1737
    G. Praveen Babu, B. Sushma Rao
    Abstract | PDFPDF
    178. A Strategy Implementing System for Secure Ad hoc Networks
    Pages :1738-1743
    Nikesh Kumar Sharma, ]Aamir Mohammad, Shilpi Jain
    Abstract | PDFPDF
    179. Review of Various Steganalysis Techniques
    Pages :1744-1747
    Manveer Kaur1, Gagandeep Kaur
    Abstract | PDFPDF
    180. A System to Filter Unwanted Words Using Blacklists In Social Networks
    Pages :1748-1753
    K.Babu , P.Charles
    Abstract | PDFPDF
    181. Minimizing Interference in Multihop Wireless Networks in the Presence of Hidden Terminals
    Pages :1754-1758
    Sheryl Jose, R.Annie Uthra
    Abstract | PDFPDF
    182. Text Extraction Using Adaptive Thresholding
    Pages :1759-1763
    Savita Borole, Minal Thobde, Reshma Hore, Shraddha Shinde
    Abstract | PDFPDF
    183. A stratified sampling technique based on correlation feature selection method for heart disease risk prediction system
    Pages :1764-1767
    Lalita Sharma , Vineet Khanna
    Abstract | PDFPDF
    184. Context Based Performance Review of AODV and DSDV Protocols in Adhoc community
    Pages :1768-1773
    B.Naresh kumar, Dr.K.Raghava Rao
    Abstract | PDFPDF
    185. Improved Schemes to Secure Distributed Data Storage against Untrusted Users
    Pages :1774-1777
    P.Sahithi Chaitanya, M.Murali
    Abstract | PDFPDF
    186. Home Automation using ZigBee Protocol
    Pages :1778-1780
    Pankaj Jadhav ,Amit Chaudhari , Swapnil Vavale
    Abstract | PDFPDF
    187. Automation of Manufacturing Welding Electrode Extruder Control Panel with PLC
    Pages :1781-1784
    S. Karthiga, P,Ananth, V.Deepika, K.Gunasekaran,A.Janani
    Abstract | PDFPDF
    188. Data Hiding Technique Using Steganography
    Pages :1785-1787
    Pramod Khandare, Pooja Kambale, Prajakta Narnavar , Gauri Galande.Jayshree Narnavar
    Abstract | PDFPDF
    189. Secure Multi-Cloud Storage Using Elastic Scattered Storage and Scalable Auditing
    Pages :1788-1795
    Durairaj Moorthy, Chandrasekar C
    Abstract | PDFPDF
    190. A Dual Framework for Targated Online Data Delivery Algorithms
    Pages :1796-1799
    Ch.Srikanth, D.Naveen Kumar, S.P. Anandaraj
    Abstract | PDFPDF
    191. A Comparative study of Algorithms in SEO& approach for Optimizing the search engine results using Hybrid of Query Recommendation and Document clustering, Genetic algorithm
    Pages :1800-1802
    Ashish Kumar Kushwaha , Nitin Chopde
    Abstract | PDFPDF
    192. Secure Cloud Computing Environment against DDOS and EDOS Attacks
    Pages :1803-1808
    I. Mettildha Mary, P.V.Kavitha, Priyadharshini M, Vigneshwer S Ramana
    Abstract | PDFPDF
    193. Survey on Implementation of E-learning System Using Cloud Solutions
    Pages :1809-1813
    Abhay S. Jadhav, Mahesh Toradmal, Ganesh K. Pakle
    Abstract | PDFPDF
    194. Automation in Video Security Surveillance using Mobile Remote Control
    Pages :1814-1817
    Abhishek Kumar Pandey , Aditya Ashok Kulkarni ,Shruti Jitendra Shah
    Abstract | PDFPDF
    195. Review of Classification of Microcalcifications in Digital Mammograms
    Pages :1818-1820
    Komal Chaudhari, Prof Priti Subramanium
    Abstract | PDFPDF
    196. ASA-Mall Management System
    Pages :1821-1824
    Abhishek Chaturvedi, Anindita Chakraborti, Shubhi Bartaria , Rahul Neve
    Abstract | PDFPDF
    197. Handling Non-Linear Attacks in Multilevel Trust Privacy Preserving Data Mining
    Pages :1825-1827
    Kamaleswari S, Balachander T
    Abstract | PDFPDF
    198. Transitive Trust Extended Authentication Mechanism in Wireless Sensor Networks
    Pages :1828-1832
    K.SaiAditya, C.Santwana, S.Magesh
    Abstract | PDFPDF
    199. Virtual Machine Placement in Cloud
    Pages :1833-1835
    Noumankhan Pathan, Balaji Shetty
    Abstract | PDFPDF
    200. RFID and GPS Combination Approach Implementation in Fisher Boat Tracking System
    Pages :1836-1838
    Prof. Homera Durani, Prof. Nirav Bhatt , Prof. Hardik Mehta
    Abstract | PDFPDF
    201. Privacy and Security in the Cloud
    Pages :1839-1843
    Navneet Gupta
    Abstract | PDFPDF
    202. Texture Segmention : Comparasion between Clustering and Classification
    Pages :1844-1848
    Sunita Dalai, Manaswini sahu
    Abstract | PDFPDF
    203. Level Segmentation of Colour Images to Detect the Specular Regions
    Pages :1849-1851
    Thirumoorthy T, Baskar A
    Abstract | PDFPDF
    204. Diminution of Packet Drop by Efficient Selection of Network Route in MANET
    Pages :1852-1855
    Manish V M , J Vaijayanthimala
    Abstract | PDFPDF
    205. A Survey on Security and Vulnerabilities of Web Application
    Pages :1856-1860
    Gopal R. Chaudhari, Prof. Madhav V. Vaidya
    Abstract | PDFPDF
    206. Secure Data Transmission Using Reversible Data Hiding
    Pages :1861-1863
    Ashwind S , Ganesh K , Gokul R ,Ranjeeth Kumar C
    Abstract | PDFPDF
    207. A Framework for Mining Closed Sequential Patterns
    Pages :1864-1866
    V. Purushothama Raju, G.P. Saradhi Varma
    Abstract | PDFPDF
    208. Hypervisor based Mitigation Technique for Keylogger Spyware Attacks
    Pages :1867-1870
    C.Santwana, K. Sai Aditya, Dr. S.Magesh
    Abstract | PDFPDF
    209. A Novel Approach to Enhance the Performance of Cloud Computing Using Load Balancing in File
    Systems

    Pages :1871-1874
    Pradheep M,Anjandeep Kaur Rai ,Anup Parkash Singh
    Abstract | PDFPDF
    210. Article Removed
    Pages :xxx-xxx
    xxx,xxx
    Abstract | PDFPDF
    211. Mobile Cloud Computing: World’s Leading Technology for Mobile Devices
    Pages :1886-1891
    Surabhi S.Golechha , Prof. R.R.Keole
    Abstract | PDFPDF
    212. Preliminary Review of Swarm Intelligence: A Clever Algorithm and Data Clustering
    Pages :1892-1899
    NazneenTarannum S. H. Rizvi, Prof.R.R.Keole
    Abstract | PDFPDF
    213. Principal Lines Region of Interest Extraction Method for Palmprint
    Pages :1900-1902
    S. S. Patil, A. V. Deorankar, P. N. Chatur
    Abstract | PDFPDF
    214. Congestion Control for TCP in Data-Center Networks
    Pages :1903-1907
    Samba Siva Reddy Maripalli# , Abirami G
    Abstract | PDFPDF
    215. Implementation of Binary Search on a Singly Linked List Using Dual Pointers
    Pages :1908-1910
    Sreemana Datta, Parichay Bhattacharjee
    Abstract | PDFPDF
    216. An Analysis and Defending of Mobile Malware in the Android Devices
    Pages :1911-1913
    P Surendra, K.Navin
    Abstract | PDFPDF
    217. Preventing Packet Loss in Aggregated Streaming Data
    Pages :1914-1917
    Pragati Gautam , C. Santhanakrishnan
    Abstract | PDFPDF
    218. Squid Proxy Server Cache Management using K-means Algorithm
    Pages :1918-1923
    Subhash Chand and Sanjay Mathur
    Abstract | PDFPDF
    219. Dynamic Movement based Performance Analysis of EDSR with Different Protocols
    Pages :1924-1929
    C.Mari Venkatesth, R. Kanaga Sundar,V. Jefrins, M.Ashok Kumar
    Abstract | PDFPDF
    220. Kerberos Authentication System using Public key Encryption
    Pages :1930-1933
    Pushkar Bhadle, Sonal Gugale, Sakshi Trar, Harjot Kaur, Shital Salve
    Abstract | PDFPDF
    221. A Comparative Study: Various Approaches for Cloud Data Security
    Pages :1934-1937
    Richa Singh, Amit Kumar Sharma
    Abstract | PDFPDF
    222. Ultimate Cloud (a scheme which uses all formidable technologies culminated together
    to form a most secure mechanism for cloud data fortification)

    Pages :1938-1942
    K. Naga Sumanth, Dr. Magesh Sriramula
    Abstract | PDFPDF
    223. Congestion Control in Multi-Flow Environment Using Multipath Routing Base in MANET
    Pages :1943-1948
    Neha Tiwari, Sini Shibu
    Abstract | PDFPDF
    224. An Optimized ANFIS Classifier Approach for Screening of COPD from Chest CT Scans with Adaptive Median Filtering
    Pages :1949-1957
    K. Meenakshi Sundaram, C.S.Ravichandran
    Abstract | PDFPDF
    225. Multi-Objective Particle Swarm Optimization for Multicast Load Balancing in Wireless Mesh
    Networks

    Pages :1958-1963
    Mijahed Nasser Aljober, R.C.Thool
    Abstract | PDFPDF
    226. A Comparative Study of Performances of Various Classification Algorithms for Predicting Salary
    Classes of Employees

    Pages :1964-1972
    Swapnajit Chakraborti
    Abstract | PDFPDF
    227. A Secured and High Octane Rank Based Analysis in Cloud Computing Environment
    Pages :1973-1976
    Poojitha Koneru, Dr. S.Prabakaran
    Abstract | PDFPDF
    228. Publishing Search Logs by Guarantee Users Privacy
    Pages :1977-1980
    Sridevi Sunkavalli, A.M.J.Muthukumaran
    Abstract | PDFPDF
    229. Proposing an Efficient Multicast Group Management Algorithm for Ad Hoc Networks
    Pages :1981-1983
    Poomalar Selvan, Jeysree J
    Abstract | PDFPDF
    230. A Survey of Routing Protocol in MANET
    Pages :1984-1988
    R.RagulRavi, V.Jayanthi
    Abstract | PDFPDF
    231. New Secure Intrusion-Detection System for Manet’s Using Hybrid Cryptography Techniques
    Pages :1989-1994
    E.Malini, T.Ravi
    Abstract | PDFPDF
    232. An Efficient Technique for CHARACTER RECOGNITION Using Neural Network & Surf Feature Extraction
    Pages :1995-1997
    Reetika Verma , Rupinder Kaur
    Abstract | PDFPDF
    233. Effective Performance Comparative Analysis of Pro-AODV Routing Protocol in MANET using NS-2
    Pages :1998-2003
    K.Hanumanthu Naik, Dr.N.Geethanjali
    Abstract | PDFPDF
    234. Providing Security to Debit Cards Using Message Authentication
    Pages :2004-2007
    Moshina Priyadharshini, Arokiaraj Jovith.A
    Abstract | PDFPDF
    235. A Secure IDS against DDOS attack in Wireless MANET
    Pages :2008-2012
    Gokulakannan R , Prasath P, Aruna A, Harshavardhini U
    Abstract | PDFPDF
    236. Parallel face Detection and Recognition on GPU
    Pages :2013-2018
    Shivashankar J. Bhutekar, Arati K. Manjaramkar
    Abstract | PDFPDF
    237. Dynamic Referencing of Web Services via Service Discovery and Natural Language Processing
    Pages :2019-2022
    Kanmani Sivagar, Krishna Chaitanya
    Abstract | PDFPDF
    238. Application of Data Mining – A Survey Paper
    Pages :2023-2025
    Aarti Sharma, Rahul Sharma,Vivek Kr. Sharma,Vishal Shrivatava
    Abstract | PDFPDF
    239. Visual Cryptography Scheme for Privacy Protection
    Pages :2026-2029
    Nayan A. Ardak Prof. Avinash Wadhe
    Abstract | PDFPDF
    240. Survey on: Integrated platform for Development Rural Agriculture in India using ICT platform
    Pages :2030-2032
    Tushar Hanwate, Madhav Vaidya, Ankush Sawarkar
    Abstract | PDFPDF
    241. A Synthesizable RTL Design of Asynchronous FIFO Interfaced with SRAM
    Pages :2033-2037
    Mansi Jhamb , Sugam Kapoor
    Abstract | PDFPDF
    242. An Efficient Technique of Image Noising and Denoising Using Neuro- Fuzzy and SVM (Support Vector Machine)-A Survey
    Pages :2038-2041
    Jyoti Sharma and Rupinder Kaur
    Abstract | PDFPDF
    243. Accelerate Communication Authenticate Protocol for Vehicular Adhoc Networks
    Pages :2042-2045
    S.Jeevidha, J.Revathi, A.Rajeswari, M.Kanimozhi, P.Gugapriya
    Abstract | PDFPDF
    244. Filtering Undesired Messages from Online Social Networks: A Content Based Filtering Approach
    Pages :2046-2049
    Dhruv Vashistha, Sivagami.G.
    Abstract | PDFPDF
    245. Survey on Hand Gesture Recognition Approaches
    Pages :2050-2052
    Rama B. Dan ,P. S. Mohod
    Abstract | PDFPDF
    246. Credit Card Fraud Detection Using Hidden Markov Model
    Pages :2053-2055
    Gaurav Mhatre , Oshan Almeida , Dhiraj Mhatre ,Poonam Joshi
    Abstract | PDFPDF
    247. Comparison of Robust Nearest Neighbour fuzzy Rough Classifier (RNN-FRC) with KNN and NEC Classifiers
    Pages :2056-2062
    Bichitrananda Behera, Sudhakar Sabat
    Abstract | PDFPDF
    248. Minimization of Image Retrieval Time using Clustering
    Pages :2063-2065
    Mohammad Naved – Ul – Haque, Prof. Dr. S. S. SikchI
    Abstract | PDFPDF
    249. Monitoring the Delay and Directivity of Antennas in Gigabit WPAN (802.15.3c)
    Pages :2066-2073
    Arpan Desai , Ronak Vashi , Ripal Patel ,Anish Vahora
    Abstract | PDFPDF
    250. PSO Based SVM for Optimizing Classification in Remotely Sensed Images
    Pages :2074-2076
    Humayun Khan, Prof. Sandeep kumar, Prof. J.P.Maurya
    Abstract | PDFPDF
    251. Automatic Answering System for English Language Questions
    Pages :2077-2079
    Abhay Mone , Ishwar Mete , Priyanka Gangarde ,Malhari Kharad
    Abstract | PDFPDF
    252. Efficient Data Storing and Retrieving from University Database using Feature Selection and Clustering Method
    Pages :2080-2082
    Vaidehi Ambekar, Prof. P.S.Mohod
    Abstract | PDFPDF
    253. Energy Efficient Cooperative Spectrum Sensing and Sharing Strategy Selection for Cognitive MIMO Sensor Networks
    Pages :2083-2087
    Nibedita Sahu , Sudhansu Sekhar Singh
    Abstract | PDFPDF
    254. Optical Character Recognition Implementation Using Pattern Matching
    Pages :2088-2090
    Faisal Mohammad, Jyoti Anarase, Milan Shingote, Pratik Ghanwat
    Abstract | PDFPDF
    255. Cloud Data Mining based on Association Rule
    Pages :2091-2094
    CH.Sekhar, S Reshma Anjum
    Abstract | PDFPDF
    256. Modified PSO Based Feature Selection for Classification of Lung CT Images
    Pages :2095-2098
    S. Sivakumar , Dr.C.Chandrasekar
    Abstract | PDFPDF
    257. Idea of handling short-lived network failures using LOLS and loop free convergence using FCFR
    Pages :2099-2102
    Rama Gaikwad and S. P. Pingat
    Abstract | PDFPDF
    258. Survey on Security Mechanisms in Wireless Mesh Networks
    Pages :2103-2106
    Priti Gupta , Suveg Moudgil
    Abstract | PDFPDF
    259. Performance Comparision of Single& 3-Ø Controlled and Uncontrolled Rectifier Using Matlab-Simulink
    Pages :2107-2111
    Robinson P. Paul, Ghansyam B. Rathod, Milan Bareja, Pratyaksh Maru
    Abstract | PDFPDF
    260. A Secured Wireless XML Streaming Supporting Twig Pattern Queries
    Pages :2112-2116
    K. Preethi, S. Ganesh Kumar
    Abstract | PDFPDF
    261. Squeezing the DNA Sequences with Pattern Recognition Techniques in Multi-Processing Environment
    Pages :2117-2120
    Panneer Arokiaraj S, Robert L
    Abstract | PDFPDF
    262. Incremental Data Migration in Multi-database Systems Using ETL Algorithm
    Pages :2121-2125
    Rajesh Yadav, Prabhakar Patil, Uday Nevase, Kalpak Trivedi, Prof. Bharati Patil
    Abstract | PDFPDF
    263. Securing Big Data Hadoop: A Review of Security Issues, Threats and Solution
    Pages :2126-2131
    Priya P. Sharma, Chandrakant P. Navdeti
    Abstract | PDFPDF
    264. Implications and Emerging Trends in Digital Image Processing
    Pages :2132-2135
    Monika Pathak , Sukhdev Singh
    Abstract | PDFPDF
    265. A New Approach for Finding the Guilt Agent in Dynamic Groups on Cloud Computing
    Pages :2136-2143
    Y. Venkateswarlu, K. Sowrya, and T. Anuradha
    Abstract | PDFPDF
    266. Watermarking of Datasets Using Usability Constraints
    Pages :2144-2147
    Anuj Shrivastav, R.Vidhya
    Abstract | PDFPDF
    267. A Survey on Multimodal Biometric
    Pages :2148-2151
    Sakshi Kalra , Anil Lamba
    Abstract | PDFPDF
    268. Article Removed
    Pages :xxx-xxx
    xxx,xxx
    Abstract | PDFPDF
    269. Design of New Security Protocol
    Pages :2155-2156
    K .Seena Naik, Dr G.A Ramachandra , M V Bramhananda Reddy
    Abstract | PDFPDF
    270. Mass Customization of Products
    Pages :2157-2161
    Disha Bavishi, Pralam Shah, Nikunj Patel, Anand Shukla, Vandana Munde
    Abstract | PDFPDF
    271. Survey on Metadata Management Schemes in HDFS
    Pages :2162-2165
    Abhinay Gupta , Raviraj Gundety, Vivek Fernando, Neeraj Iyer, Beatrice.S
    Abstract | PDFPDF
    272. Autism and its Classification Techniques -A Review
    Pages :2166-2170
    Rachna Ahuja , Darvinder Kaur
    Abstract | PDFPDF
    273. Neuro-Fuzzy Methodology for Diagnosis of Autism
    Pages :2171-2172
    Rachna Ahuja, Darvinder Kaur
    Abstract | PDFPDF
    274. Efficient Implementation of Niblack Thresholding for MRI Brain Image Segmentation
    Pages :2173-2176
    Senthilkumaran N, Kirubakaran C
    Abstract | PDFPDF
    275. Security Enhanced Communication Scheme with Error Correction Capability and Efficient Channel Utilization
    Pages :2177-2185
    Poornima.P.V, Amrutha.V
    Abstract | PDFPDF
    276. Sensitive Dependence on Initial Conditions, and Chaotic Group Actions
    Pages :2186-2190
    Murtadha Mohammed Abdulkadhim
    Abstract | PDFPDF
    277. Novel Approach for Fault Detection in Wireless Sensor Network
    Pages :2191-2194
    Kavita Tandon, Neelima Mallela, Nishi Yadav
    Abstract | PDFPDF
    278. New Approaches to Web Personalization Using Web Mining Techniques
    Pages :2195-2201
    Beatric , Ryan Fernandes, Leo. J. Peo, Nikhila Kamat, Sergius Miranda
    Abstract | PDFPDF
    279. A Novel Approach for Secret Data Transfer using Interpolation and LSB Substitution with Watermarking: A Survey
    Pages :2202-2203
    Murtadha Mohammed Abdulkadhim
    Abstract | PDFPDF
    280. A Survey: On Routing Protocols in Cognitive Radio Ad Hoc Networks
    Pages :2204-2206
    Shikha Jain , Anshu Dhawan, Dr. C.K Jha
    Abstract | PDFPDF
    281. Users Task Personalizing by LBS
    Pages :2207-2209
    Nikhilesh Patve, Pooja Yadav, Ruchita Sinha
    Abstract | PDFPDF
    282. A Survey on CUDA
    Pages :2210-2214
    Paramjeet kaur and Nishi
    Abstract | PDFPDF
    283. Survey of Consumer Oriented AR
    Pages :2215-2217
    Siddharth Gupta , Payal Diwan ,Andrew Gaikwad ,Aaron Gonsalves ,Beatrice S.
    Abstract | PDFPDF
    284. ABig Data Storage and Challenges
    Pages :2218-2223
    M.H.Padgavankar, Dr.S.R.Gupta
    Abstract | PDFPDF
    285. A Hybrid Classifier for Classification of Rice Crop Varieties
    Pages :2224-2230
    B. Mahendra Kumar, DR. Karthik S , Dr.V.K.Shunmughanaathan
    Abstract | PDFPDF
    286. Construction of Database Design- A Reverse Engineering Process
    Pages :2231-2234
    N. Asha, M. Varun Kumar, C. Barath Kumar
    Abstract | PDFPDF
    287. Data Analysis and Prediction of Hepatitis Using Support Vector Machine (SVM)
    Pages :2235-2237
    C. Barath Kumar, M. Varun Kumar, T. Gayathri, S. Rajesh Kumar
    Abstract | PDFPDF
    288. Comparative Performance Analysis of DSDV, AOMDV and ZRP Routing Protocols in VANET using NS2
    Pages :2238-2241
    Varun Singla, Nailja Wadhwa
    Abstract | PDFPDF
    289. Survey of Different Types of CAPTCHA
    Pages :2242-2245
    Ved Prakash Singh, Preet Pal
    Abstract | PDFPDF
    290. A Theoretical Study of Text Document Clustering
    Pages :2246-2251
    Yogesh Jain , Amit Kumar Nandanwar
    Abstract | PDFPDF
    291. CSB Sorting Algorithm
    Pages :2252-2255
    RinkleAswani, Anjali Arora, PallaSujitha
    Abstract | PDFPDF
    292. Retrieving Data through Two Way Security Methods In Dynamic Cloud Storage Systems
    Pages :2256-2258
    Vamsi Krishna Kondragunta , Md. Mohsin Shariff , V.Roopesh , Dr.T.V Surya Narayana
    Abstract | PDFPDF
    293. To Mitigate Online Password Guessing Attack By Implementing: P3-HA
    Pages :2259-2262
    P.P Wakodikar , A.S. Bhattacharya
    Abstract | PDFPDF
    294. Survey on Speech Recognization Techniques. (Natural Language Processing)
    Pages :2263-2267
    Anushree R. Pore, Prof. Amit Sahu
    Abstract | PDFPDF
    295. An Effective Secured Cloud Based Log Management System Using Homomorphic Encryption
    Pages :2268-2271
    A. Murugan, Tarun Kumar Kala
    Abstract | PDFPDF
    296. Survey on Clustering Techniques in Data Mining
    Pages :2272-2276
    K.Kameshwaran, K.Malarvizhi
    Abstract | PDFPDF
    297. Text-Based Shoulder Surfing Resistant Graphical Password Scheme
    Pages :2277-2280
    Manjunath G , Satheesh K , Saranyadevi C,Nithya M
    Abstract | PDFPDF
    298. Tracking Learning and Detection of Multiple Objects using Static Camera
    Pages :2281-2283
    Abhishek Khanolkar , Dhaval Shah, Ayushi Desai
    Abstract | PDFPDF
    299. Restructure Effective Examining Based on User Search Goals with Feedback Sessions
    Pages :2284-2288
    Baron Sam B
    Abstract | PDFPDF
    300. Tracking People Motion Based on Lloyd’s Clustering Algorithm
    Pages :2289-2292
    R.Rajeev, S.S.Sridhar
    Abstract | PDFPDF
    301. PKC Based Mutual Node Authentication in Wireless Mesh Network Using ECC Algorithm
    Pages :2293-2296
    Ajit P. Shiralkar, Prof. Ranjit R. Keole
    Abstract | PDFPDF
    302. DFT: A Novel Algorithm for Data Cleansing
    Pages :2297-2301
    Shweta Taneja , Ishita Ashri , Shipra Gupta , Mehak Sharma
    Abstract | PDFPDF
    303. Fast Efficient Artificial Neural Network for Handwritten Digit Recognition
    Pages :2302-2306
    Viragkumar N. Jagtap , Shailendra K. Mishra
    Abstract | PDFPDF
    304. Review Paper on Bitcoin a Secured Transaction over p2p Network
    Pages :2307-2309
    Unnati A. Dabre, Prof. Dr. Prashant V. Ingole
    Abstract | PDFPDF
    305. A Review on Privacy Preserving Data Mining: Techniques and Research Challenges
    Pages :2310-2315
    Shweta Taneja, Shashank Khanna, Sugandha Tilwalia, Ankita
    Abstract | PDFPDF
    306. Towards Secure the Multi-Cloud using Homomorphic Encryption Scheme
    Pages :2316-2319
    Suresh Babu Bodduluri, P.Savaridassan
    Abstract | PDFPDF
    307. Association Rule Mining: A Survey
    Pages :2320-2324
    Gurneet Kaur
    Abstract | PDFPDF
    308. Creation of Replica Path Using Maxdisjoint in Tree Based Routing
    Pages :2325-2328
    Sivanthiya T,Ramyapreethi S,Geethalakshmi P,Jagadeesh Mailu Dheevambiga P
    Abstract | PDFPDF
    309. Classification and Analysis of High Dimensional Datasets using Clustering and Decision tree
    Pages :2329-2333
    Avinash Pal, Prof. Shraddha Pandit, Prof. JayPrakash Maurya
    Abstract | PDFPDF
    310. ENCIPHER A Text Encryption and Decryption Technique Using Substitution-Transposition and Basic Arithmetic and Logic Operation
    Pages :2334-2337
    Devendra Prasad, Govind Prasad Arya, Chirag Chaudhary, Vipin Kumar
    Abstract | PDFPDF
    311. Detection & Classification of Network Anomalies using SVM and Decision Tree
    Pages :2338-2341
    Mayank Nagar, Prof. Shraddha Pandit, Prof. JayPrakash Maurya
    Abstract | PDFPDF
    312. Energy-Efficient Urgent Packet Forwarding Mechanism
    Pages :2342-2344
    Achyut Shankar, T Manoranjitham
    Abstract | PDFPDF
    313. Improving the Lifetime of Wireless Sensor Network through Energy Conservation
    Pages :2345-2347
    Smitasri Chattopadhyay, G.Vijayalakshmi
    Abstract | PDFPDF
    314. Software Fault Prediction Model for Embedded Systems: A Novel finding
    Pages :2348-2354
    Pradeep Singh, Shrish Verma
    Abstract | PDFPDF
    315. Privacy Preservation of Published Data Using Anonymization Technique
    Pages :2355-2357
    Isha K.Gayki, Arvind S.Kapse
    Abstract | PDFPDF
    316. Quality Analysis of Indian Basmati Rice Grains Using Digital Image Processing- A Review
    Pages :2358-2360
    Sheetal Mahajan, Sukhvir Kaur
    Abstract | PDFPDF
    317. Classification of Real Value and Complex Value Data using Machine Learning Concepts
    Pages :2361-2364
    S.Padma, B.Kanchana Devi
    Abstract | PDFPDF
    318. A Cost Efficient Resource Provisioning Approach Using Virtual Machine Placement
    Pages :2365-2368
    S. Phani Praveen, U.Tulasi, K. Ajay Krishna Teja
    Abstract | PDFPDF
    319. A Cloud Computing Solution for EHR Maintenance in PHCC
    Pages :2369-2372
    Y.C. Ashok Kumar, M. Tanooj Kumar
    Abstract | PDFPDF
    320. A Survey on Denial of Service Attacks
    Pages :2373-2376
    T.Gunasekhar, K.Thirupathi Rao, P.Saikiran, P.V.S Lakshmi
    Abstract | PDFPDF
    321. Book Search by Capturing Text from Digital Images Using Optical Character Recognition
    Pages :2377-2379
    Dr S.Vasavi,Srikanth Varma.Ch,Anil kumar.Ch,Santosh.D.M,Sai Ram.S
    Abstract | PDFPDF
    322. eAoushad: IT-based Personalized Medico Advisory System
    Pages :2380-2383
    S. Sricharan, V. Suresh, Dr. J. Rajendra Prasad, T.D.Ravi kiran,Dr R Kiran Kumar
    Abstract | PDFPDF
    323. Computer-Based Clinical Decision Support System for Prediction of Heart Diseases Using Naïve Bayes Algorithm
    Pages :2384-2388
    D Ratnam, P HimaBindu, V.Mallik Sai, S.P.Rama Devi, P.Raghavendra Rao
    Abstract | PDFPDF
    324. Flooding Antivirus to Clustered Systems
    Pages :2389-2390
    J.Hari Krishna, Dr G.Ramakoteswara Rao, M.Samuel John
    Abstract | PDFPDF
    325. Content Based Medical Image Retrieval Using Lifting Scheme Based Discrete Wavelet Transform
    Pages :2391-2396
    G. Prathibha, Sk. Sajida Parveen, C. V. Rashmi, B. Chandra Mohan
    Abstract | PDFPDF
    326. Vehicle Image Classification using Image Fusion at Pixel Level based on Edge Image
    Pages :2397-2402
    Dr.A.Sri Krishna, M.Pompapathi, N.Neelima
    Abstract | PDFPDF
    327. Protection for Cloud Computing Using Level-Based Cryptography
    Pages :2403-2407
    Venugopal Gaddam, Srinivasulu Singaraju, M.Sundar babu, S.Sai Kumar
    Abstract | PDFPDF
    328. Research on HTML5 in Web Development
    Pages :2408-2412
    Ch Rajesh, K S V Krishna Srikanth
    Abstract | PDFPDF
    329. Digital Color Image Watermarking In RGB Planes Using DWT-DCT-SVD Coefficients
    Pages :2413-2417
    K.Chaitanya, Dr E. Srinivasa Reddy,Dr K. Gangadhara Rao
    Abstract | PDFPDF
    330. Testing of Cloud Applications in the Cross-Cloud Environment
    Pages :2418-2421
    SK.Jameela, Dr.K.Thirupathi Rao, V. Krishna Reddy, A.Haritha
    Abstract | PDFPDF
    331. What is opinion? Who influences? and how it gets influenced?
    Pages :2422-2427
    Sr.SujathaYeruva (Ph.D), Dr. Mrs. T. Devi
    Abstract | PDFPDF
    332. Fuzzy Art Based Image Segmentation and Statistical Analysis
    Pages :2428-2431
    B.V.R.V.Prasad, M.Jogendra Kumar, Dr. B.V.Subba Rao
    Abstract | PDFPDF
    333. Secured Bank Authentication using Image Processing and Visual Cryptography
    Pages :2432-2437
    B.Srikanth , G.Padmaja, Dr. Syed Khasim, Dr. P.V.S.Lakshmi, A.Haritha
    Abstract | PDFPDF
    334. Predictive Analysis on Nutritional Disorders in Rice Plants using Regression
    Pages :2438-2442
    B.Srividhya, G.SudheerKumar, K.JhansiLakshmi, D.SandeepKumar, L. Ravi Kumar
    Abstract | PDFPDF
    335. Non Linear Classification for Emotion Detection on Telugu Corpus
    Pages :2443-2448
    B.S.Yalamanchili, Anusha.K.K, Santhi.K, Sruthi.P, SwapnaMadhavi.B
    Abstract | PDFPDF
    336. Information Retrieval Using Subjective Analysis on Social Blogs
    Pages :2449-2452
    Haritha. A , Ch. Manohar Venkat, J.S.N.S. Sneha Priya, P.V.S.Lakshmi, G.Lakshmi
    Abstract | PDFPDF
    337. Detecting Abnormality in Activities Performed by People with Dementia in a Smart Environment
    Pages :2453-2457
    H. Karamath Ali, Dr. D. I. George Amalarethinam
    Abstract | PDFPDF
    338. Educational Data Mining and its role in Educational Field
    Pages :2458-2461
    P. Meena Kumari, SK.Abdul Nabi and Puppal Priyanka
    Abstract | PDFPDF
    339. Performance Evaluation in Content Delivery Networks Using Fluid Queue Algorithm
    Pages :2462-2466
    Kothuru Srinivasulu , Nalini N
    Abstract | PDFPDF
    340. Review On: Image Fusion Using Wavelet and Curvelet Transform
    Pages :2467-2470
    Navneet kaur, Madhu Bahl,Harsimran Kaur
    Abstract | PDFPDF
    341. Fuzzy Relational Spectral Clustering Method for Document Clustering
    Pages :2471-2476
    R.Nagaraj, Dr.V.Thiagarasu
    Abstract | PDFPDF
    342. Dynamic Service Composition for Evaluating Services in Service-Oriented Architectures: A Review Analysis
    Pages :2477-2480
    Sarvesh, Naveen Bilandi
    Abstract | PDFPDF
    343. Ensemble Neural Network and K-NN Classifiers for Intrusion Detection
    Pages :2481-2485
    Shalinee Chaurasia, Anurag Jain
    Abstract | PDFPDF
    344. A Survey on Sequential Pattern Mining Algorithms
    Pages :2486-2492
    Vishal S. Motegaonkar, Prof. Madhav V. Vaidya
    Abstract | PDFPDF
    345. Secure Smart Environment Using IOT based on RFID
    Pages :2493-2496
    Jebah Jaykumar, Abishlin Blessy
    Abstract | PDFPDF
    346. Implementation of JPEG2000 Algorithm for Gray scale and Colour Images
    Pages :2497-2500
    S.Jagadeeswara rao, K.Sesha sai, S.Likitha, N.Kalidasu, S.Sridhar
    Abstract | PDFPDF
    347. Effect of Different Distance Measures on the Performance of K-Means Algorithm: An Experimental Study in Matlab
    Pages :2501-2506
    Dibya Jyoti Bora, Dr. Anil Kumar Gupta
    Abstract | PDFPDF
    348. Classification of Hyper Spectral Images using the Unsupervised Technique
    Pages :2507-2510
    Battula Sateesh, S.S.Sridhar
    Abstract | PDFPDF
    349. Offloading Application for Android Phones Using Cloud
    Pages :2511-2514
    Harsh Bandhu Parnami, Mayank Arora, Deepika Khokhar
    Abstract | PDFPDF
    350. A Note on Authentication Accuracy with Multiplicity of Biometric Images
    Pages :2515-2517
    Mohammed Aamir Ali T and Varun Kumar M
    Abstract | PDFPDF
    351. Time Comparison of Various Feature Extraction of Content Based Image Retrieval
    Pages :2518-2523
    Srikanth Redrouthu, Annapurani.K
    Abstract | PDFPDF
    352. Estimating The Software Metrics Using Automatic Testing And Integrating Testing
    Pages :2524-2527
    Lithu Mathew, Mr. P.M.S.S. Chandu
    Abstract | PDFPDF
    353. Scrutinize Evidences for Android Phones
    Pages :2528-2533
    Pooja Khandelwal, Divya Rishi Sahu, Deepak Singh Tomar
    Abstract | PDFPDF
    354. The Performance and Simulative analysis of MANET Routing Protocols with Different Mobility Models
    Pages :2534-2539
    Ashutosh Bharadwaj, Dr. Ajit Singh
    Abstract | PDFPDF
    355. A Review on Wireless Network Attacks
    Pages :2540-2542
    M. Sri Lakshmi, Dr. S. Prem Kumar, S. Ashok
    Abstract | PDFPDF
    356. Image Segmentation using Improved Watershed Algorithm
    Pages :2543-2545
    Samina Tahir Rizvi, Mandeep Singh Sandhu, Shan E Fatima
    Abstract | PDFPDF
    357. Lesion Segmentation in Dermoscopic Image Using Decision based Neuro Fuzzy Model
    Pages :2546-2552
    Binamrata Baral, Sandeep Gonnade, Toran Verma
    Abstract | PDFPDF
    358. A Survey on SQL Injection Attack, Detection And Prevention Techniques
    Pages :2553-2555
    Atul M. Shegokar, Arati K. Manjaramkar
    Abstract | PDFPDF
    359. Data Leakage Detection
    Pages :2556-2558
    Chandni Bhatt, Prof.Richa Sharma
    Abstract | PDFPDF
    360. New Local Search Strategy in Artificial Bee Colony Algorithm
    Pages :2559-2565
    Sandeep Kumar , Pawan Bhambu , Vivek Kumar Sharma
    Abstract | PDFPDF
    361. Analysis of Crypto Components of a Chaotic Function to Study its Random Behavior
    Pages :2566-2568
    Kangkana Bora, Abdul Wadood, Mayur Hazarika, Zahid Ahmed
    Abstract | PDFPDF
    362. E-payment Gateway Model
    Pages :2569-2573
    Anuja Pande , Prof. A.B. Deshmukh , Prof.M. D. Tambakhe
    Abstract | PDFPDF
    363. PCI Express Interface Development and Simulation for High Speed Data Transmission
    Pages :2574-2577
    Vijitha.C.V, Najla.A.P, Jayaraj.U.Kidav
    Abstract | PDFPDF
    364. Creating Materialized View Over Integrated Heterogeneous Databases
    Pages :2578-2581
    Ankush J.Paturde, Anil V. Deorankar, P.N.Chatur
    Abstract | PDFPDF
    365. RFID Based Toll Collection System
    Pages :2582-2585
    Rakhi Kalantri, Anand Parekar, Akshay Mohite, Rohan Kankapurkar
    Abstract | PDFPDF
    366. Advanced Approaches for Medical Image Compression
    Pages :2586-2591
    Gunpreet Kaur
    Abstract | PDFPDF
    367. Analysis of different Scheduling Algorithms under Cloud Computing
    Pages :2592-2595
    Sunny Kumar, Shivani Khurana
    Abstract | PDFPDF
    368. User Authentication Using Multimodel Finger-Print Recognition
    Pages :2596-2603
    Prashant Jain, Dr. Shailja Shukla, Dr. S. S. Thakur
    Abstract | PDFPDF
    369. An Approach towards Improving the Lifetime and Security in Wireless Sensor Network
    Pages :2604-2611
    Mayuri P. Kawalkar, Dr. S.A.Ladhake
    Abstract | PDFPDF
    370. Design, Modeling and Simulation of Prostate Cancer Biosensor with ssDNA biomarker and DGFET Biosensor
    Pages :2612-2620
    B.N. Shobha, N.J.R. Muniraj
    Abstract | PDFPDF
    371. A New Lightweight EAP-PK Authentication Method for IEEE 802.11 standard Wireless Network
    Pages :2621-2626
    Dhiraj M. Londe, Prof. Nitin Chopde
    Abstract | PDFPDF
    372. Extending the Lifetime of Wireless Sensor Networks by Adjusting the Node Density Near the
    Base Station

    Pages :2627-2632
    Divya Shree H.L, Chaitra R , Shakunthala B S
    Abstract | PDFPDF
    373. Artificial Intelligence in Hypertension Diagnosis: A Review
    Pages :2636-2642
    Arpneek Kaur, Abhishek Bhardwaj
    Abstract | PDFPDF
    374. Linear Programming Model of Sensor Network
    Pages :2582-2585
    Ambika.N, G.T.Raju
    Abstract | PDFPDF
    375. LZW based Image Steganography using Kekre’s Algorithm
    Pages :2643-2648
    Isha Kajal, Harish Rohil, Abhishek Kajal
    Abstract | PDFPDF
    376. Improved Web Service Self-Healing Connector
    Pages :2649-2657
    Khalid Kaabneh, Suha Afaneh, Heba Almalahmeh, Issam Alhadid
    Abstract | PDFPDF
    377. Forecasting the Reliability of Software via Neural Networks
    Pages :2658-2661
    Yogita Kansal, Shailee Choudhary
    Abstract | PDFPDF
    378. Physics Engine: Deformation Simulation
    Pages :2662-2664
    Abhishek Bhandwalda, Akshay Gandhi, Mohan Ghule, Nikhil Bansode
    Abstract | PDFPDF
    379. Routing Attacks in Wireless Sensor Networks: A Survey
    Pages :2665-2671
    Deepali Virmani, Ankita Soni, Shringarica Chandel, Manas Hemrajani
    Abstract | PDFPDF
    380. Mobile Money: M-payment System for India
    Pages :2672-2675
    Sujata P. Deshmukh, Archana M. Naware
    Abstract | PDFPDF
       
    -All rights are reserved by International Journal of Computer Science and Information Technologies-