• Up Coming Issue >
  • Up-Coming Conference
  • Conference Papers
  • Indexing
  • Peer-Review
  • Publication Ethics
  • Contact
  • FAQ
  • Terms&Conditions
  • Site Map
  • bh

     

    VOLUME 5 ISSUE 3 May - June 2014

    ISSN 0975 - 9646

    1. Towards Secure Cloud Infrastructure with Cloud Validation
    Pages : 2676-2683
    Sathiya Moorthy S and Chandrasekar C
    Abstract | PDFPDF
    2. An Illustrative Analysis of Mathematical Morphology Operations for MRI Brain Images
    Pages : 2684-2688
    N.Senthilkumaran, J.Thimmiaraja
    Abstract | PDFPDF
    3. Face Recognition under Pose Variations
    Pages : 2689-2693
    Jagdish P. Sarode and Alwin D. Anuse
    Abstract | PDFPDF
    4. Compact Structure of Felonious Crime Sets Using FP-Tree Comparable Algorithms Analysis
    Pages : 2694-2699
    Apexa Joshi, Dr. Suresh M. B.
    Abstract | PDFPDF
    5. Cloud Based Managed File Transfer Services
    Pages : 2700-2702
    Pranav Kulkarni, Sahil Jain, Vinay Kumar
    Abstract | PDFPDF
    6. TBDS- A New Data Security Algorithm in Cloud Computing
    Pages :2703-2706
    R. K. Seth and Rimmy Chuchra and Simran
    Abstract | PDFPDF
    7. Page Ranking Algorithm Based on Counts of Link Hits (PRCLH): An Implementation
    Pages : 2707-2712
    Zaved Akhtar, Saoud Sarwar
    Abstract | PDFPDF
    8. Formal Specification of UML Use Case Diagram - A CASL based approach
    Pages : 2713-2717
    Bhaswati Mondal, Barun Das, Prasenjit Banerjee
    Abstract | PDFPDF
    9. Enhancing Security and Concurrency in Distributed Database with 6 Bit Encryption Algorithm
    Pages : 2718-2722
    Gurkamal Bhullar, Navneet Kaur
    Abstract | PDFPDF
    10. Performance Analysis in Ad-Hoc Network
    Pages : 2723-2728
    Princy Tyagi
    Abstract | PDFPDF
    11. A Comprehensive Survey on Efficient Routing Protocols And Simulation Tools For VANET
    Pages : 2729-2737
    M.Siva Sangari, Dr.K.Baskaran
    Abstract | PDFPDF
    12. Energy-Efficient and Secure Routing In Wireless Sensor Networks
    Pages : 2738-2741
    Asha Devi. A, RameshKumar. M
    Abstract | PDFPDF
    13. Estimating Software Development Effort using UML Use Case Point (UCP) Method with a Modified set of Environmental Factors
    Pages :2742-2744
    Pragya Jha1, Preetam Pratap Jena, Rajani Kanta Malu
    Abstract | PDFPDF
    14. TCP Based Storage Outsourcing with Secure Accessibility in Mobile Cloud Computing
    Pages :2745-2748
    Monika Waghmare, Prof T.A.Chavan
    Abstract | PDFPDF
    15. An Efficient Iris Recognition System using Dualtree Complex Wavelet Transform
    Pages :2749-2754
    Neelam T. Rakate, Prof. U. A. Patil
    Abstract | PDFPDF
    16. Review on Node-Disjoint Multipath Routing Based on AOMDV Protocol for MANETS
    Pages :2755-2757
    Er.Rubia Singla, Er.Jasvir Singh
    Abstract | PDFPDF
    17. Reliable Communication in Event Processing Systems
    Pages :2758-2761
    Kannadasan.R, Sandeep Kumar.J, Venu Kumar.B
    Abstract | PDFPDF
    18. Channel Modelling and Optimization of Wireless Body Area Network (WBAN)
    Pages :2762-2766
    Sindhu R Pai , Kavitha C
    Abstract | PDFPDF
    19. Performance of Clustering Algorithms on Home Interview Survey Data Employed for Travel Demand Estimation
    Pages :2767-2771
    Anand Sesham , Padmanabham P, Goverdhan A, Sai Hanuman A
    Abstract | PDFPDF
    20. A Novel Fuzzy Controller for Dynamic Cloud Applications
    Pages :2772-2775
    R. Nandhiniprabha, G. Sudhakar
    Abstract | PDFPDF
    21. Analyzing Performance of Zone Routing Protocol by Varying Node Density and Transmission Range
    Pages :2776-2782
    Vishal Polara, Pooja Bhatt
    Abstract | PDFPDF
    22. A Survey on IDS Techniques to Detect Misbehavior Nodes in Mobile Ad-hoc Network
    Pages :2783-2787
    Sarika Patil, Deepali Borade
    Abstract | PDFPDF
    23. Data Hiding in Audio by Reserving Room in Advance of Encryption
    Pages :2788-2792
    B.Kavitha, Mrs.Brindha Rajakumari
    Abstract | PDFPDF
    24. Review on Network on Chip Router Design
    Pages :2793-2795
    Vikrant A. Bute, Devendra S. Chaudhari
    Abstract | PDFPDF
    25. CIPHER-Text Policy Attribute Based Access to Cloud
    Pages :2796-2799
    Venkateshprasad.Kalluri, D.Haritha
    Abstract | PDFPDF
    26. A Signature-Based Indexing Method for Efficient Content-Based Retrieval of Relative Temporal
    Patterns

    Pages :2800-2802
    A.Vineela, P. Penchala Prasad Y.Janardhan Reddy
    Abstract | PDFPDF
    27. Emergency Management System Using Android Application
    Pages :2803-2805
    Rehka Jadhav, Jwalant Patel, Darshan Jain, Suyash Phadhtare
    Abstract | PDFPDF
    28. Clustering-Classification Based Prediction of Stock Market Future Prediction
    Pages :2806-2809
    Abhishek Gupta, Dr. Samidha D. Sharma
    Abstract | PDFPDF
    29. Secure Cloud Storage with File Assured Deletion
    Pages :2810-2815
    Gousiya Begum, M. Shravya
    Abstract | PDFPDF
    30. A Review - Prevention and Detection of Black Hole Attack in AODV based on MANET
    Pages :2816-2818
    Bhoomika Patel, Khushboo Trivedi
    Abstract | PDFPDF
    31. A Denoising Framework with a ROR Mechanism Using FCM Clustering Algorithm and NLM
    Pages :2819-2823
    M. Nandhini, Dr.T.Nalini
    Abstract | PDFPDF
    32. Capital Letter Recognition in Non Cursive Handwritten Documents
    Pages :2824-2827
    Samudra Gupt Maurya, Ritika Chugh, Rohit Kumar, P V Manoj
    Abstract | PDFPDF
    33. Remote Vehicle Tracking & Driver Health Monitoring System Using GSM Modem & Google Maps
    Pages :2828-2832
    Madhuri Unde, Bharat Borkar
    Abstract | PDFPDF
    34. TCET Connect - Social Networking Site for College
    Pages :2833-2836
    Anil Vasoya, Aditya Yadav, Samkit Sheth, Vivek Mishra
    Abstract | PDFPDF
    35. Two Stage Block-Wise Fingerprint Enhancement Using Discrete Wavelet Transform
    Pages :2837-2840
    J.P.Bidishaw, Dr.T.Nalini
    Abstract | PDFPDF
    36. Software Development Effort Estimation Using Fuzzy Logic: A Review
    Pages :2841-2845
    Shifali, Naveen Bilandi
    Abstract | PDFPDF
    37. Intrusion Protection against SQL Injection And Cross Site Scripting Attacks Using a Reverse Proxy
    Pages :2846-2850
    Tanmay S. Mule , Aakash S. Mahajan, Sangharatna Kamble, Omkar Khatavkar
    Abstract | PDFPDF
    38. A Security Architecture of Cloud Computing for Business applications
    Pages :2851-2854
    Sreeja S , Chithra P,Jesna Jose
    Abstract | PDFPDF
    39. Survey on Different Process Models Used In Software Development
    Pages :2855-2860
    Anu P Salim. , Chithra P. , Sreeja S.
    Abstract | PDFPDF
    40. A Survey on Task Distribution Approach for Mobile Cloud Computing Application
    Pages :2861-2864
    Vishal Tiwari, Prof L.H.Patil
    Abstract | PDFPDF
    41. Acceleration of LSB Algorithm in GPU
    Pages :2865-2867
    Darshan R, Prabu R, Divya M
    Abstract | PDFPDF
    42. Effective Distributed Accountability for Data Shearing In cloud
    Pages :2868-2870
    Rahul H. Bhole, Ganesh K. Pakle
    Abstract | PDFPDF
    43. Feature Selection Using Genetic Algorithm with Mutual Information
    Pages :2871-2874
    S. Sivakumar, Dr.C.Chandrasekar
    Abstract | PDFPDF
    44. Mathematical Interpretation of the Maturity Levels in the Ticket Based Information Technology
    Service Management Model

    Pages :2875-2881
    Jayant Biswas, Snigdha Srivastava, Gaurav Prakash
    Abstract | PDFPDF
    45. Detection of Geo-Spatial Targets in High Resolution Remote Sensing Images
    Pages :2882-2885
    Thirumalini.S, Varunkumar.M, Vani sri
    Abstract | PDFPDF
    46. Image Based Encryption Techniques: A Review
    Pages :2886-2889
    Aman Jain, Namita Tiwari, Madhu Shandilya
    Abstract | PDFPDF
    47. Random walker Segmentation based Cancer Detection technique
    Pages :2890-2894
    Ruchi Thakur, Prof. Piyush Singh, Prof. Gourav Shrivastava
    Abstract | PDFPDF
    48. A Genetic Programming Approach for Record Deduplication
    Pages :2895-2898
    R.Parimala devi , Dr. V.Thigarasu
    Abstract | PDFPDF
    49. Service Level Agreement Assurance in Cloud Computing: A Trust Issue
    Pages :2899-2906
    S.B.Dash, H.Saini , T.C.Panda, A. Mishra
    Abstract | PDFPDF
    50. Development of an Algorithm for Stock Market Trading
    Pages :2907-2909
    Dr.Ajit More and CA Aseema Dake Kulkarni
    Abstract | PDFPDF
    51. ARM Based Smart Power Saving System for Home Automation
    Pages :2910-2913
    Madhu M S, Gangadhar M, Sanjaya G C
    Abstract | PDFPDF
    52. Encryption Based Steganography- Modern Approach for Information Security
    Pages :2914-2917
    Mohammad Sajid Khan, Sarvesh Singh Rai
    Abstract | PDFPDF
    53. Designing Various CPU Scheduling Techniques using SCILAB
    Pages :2918-2923
    Mona Saini
    Abstract | PDFPDF
    54. Security in Composite Mobile Services and Load Balancing
    Pages :2924-2927
    Vishi Narayan, R.Krishnakripa, Rohit Mishra, Sagar Rathore, Trishna Panse
    Abstract | PDFPDF
    55. Moving from E-Government to Semantic E-Government
    Pages :2928-2932
    Dr. Parul Verma
    Abstract | PDFPDF
    56. Introducing Multiparty Authorization And String Search In A Parental Controlled Social Network
    Pages :2933-2936
    Anu P Salim, Reeba R
    Abstract | PDFPDF
    57. Authentication Using Minutiae Based Fingerprint Matching Scheme for Smart Phones
    Pages :2937-2939
    Irene Getzi S
    Abstract | PDFPDF
    58. Improvement in Performance of the VoIP Over WLAN
    Pages :2940-2941
    Laxmi Poonia, Sunita Gupta, Manoj Gupta
    Abstract | PDFPDF
    59. Semi-Distributed Cloud Computing System with Load Balancing Algorithm
    Pages :2942-2947
    Payal A.Pawade, Prof. V. T. Gaikwad
    Abstract | PDFPDF
    60. A Quick Survey on Data Stream Mining
    Pages :2948-2950
    Poonam Debnath , Santoshkumar Chobe
    Abstract | PDFPDF
    61. Vampire Attacks Deploying Resources in Wireless Sensor Networks
    Pages :2951-2953
    P.Rajipriyadharshini,V.Venkatakrishnan,S.Suganya,A.Masanam
    Abstract | PDFPDF
    62. An Efficient Approach for Number Plate Extraction from Vehicles Image under Image Processing
    Pages :2954-2959
    Sarbjit Kaur, Sukhvir Kaur
    Abstract | PDFPDF
    63. Time Based (TB) Application model for Mobile Cloud computing
    Pages :2960-2962
    Siddiqui Mohammad Saad, Prof. S.C.Nandedkar
    Abstract | PDFPDF
    64. Study of Existing Method of Finding Aliases and Improve Method of Finding Aliases from Web
    Pages :2963-2973
    Ravi H. Gedam, Prof. T.Yengantiwar, Prof. P.Velavan
    Abstract | PDFPDF
    65. Current Refuge Trends using Classical and Quantum Cryptography
    Pages :2974-2977
    Rohit Kumar, Ritika Chugh, Samudra Gupt Maurya, P.V. Manoj
    Abstract | PDFPDF
    66. Multi-View Face Recognition Using Local Binary Pattern
    Pages :2978-2981
    H.Girisha , B.Sreepathi , K.Karibasappa
    Abstract | PDFPDF
    67. Comparative Study of Motion Estimation Techniques in Video
    Pages :2982-2989
    S Sangeeta Mishra, Chittaranjan Pradhan, Alka Singh
    Abstract | PDFPDF
    68. Automatic Generation of Platforms in Cloud Computing
    Pages :2990-2994
    Mathews Abraham, Kuttyamma A.J
    Abstract | PDFPDF
    69. A review on Security in Distributed Information Sharing
    Pages :2995-3000
    Swati Upadhyay, Prof J P Maurya
    Abstract | PDFPDF
    70. Automated Car Parking System Commanded by Android Application
    Pages :3001-3004
    Prof. D. J. Bonde , Rohit S. Shende, Ketan S. Gaikwad, Akshay S. Kedari,Amol U. Bhokre
    Abstract | PDFPDF
    71. Bandwidth and Transmit Power Allocation for QoS Support in Wireless Networks
    Pages :3005-3010
    Shiji.S, S.Subasree
    Abstract | PDFPDF
    72. Interpreting Stakeholder Roles in ERP Implementation Projects: a Case Study
    Pages :3011-3018
    Smiju Sudevan, Prof.M.Bhasi, Prof.K.V.Pramod
    Abstract | PDFPDF
    73. To Prepare a Forecasting Proxy Server to Improve Hits Using SVM.
    Pages :3019-3024
    Suvarna Temgire, Poonam Gupta
    Abstract | PDFPDF
    74. Survey on Image Segmentation Techniques and Color Models
    Pages :3025-3030
    Savita Agrawal, Deepak Kumar Xaxa
    Abstract | PDFPDF
    75. A Survey Report on Requirement Traceability of Service Oriented Architecture
    Pages :3031-3033
    Saini Subhadarshini, Abhishek Ray
    Abstract | PDFPDF
    76. Optimization of Large Data in Cloud computing using Replication Methods
    Pages :3034-3038
    Vijaya -Kumar-C , Dr. G.A. Ramachandhra
    Abstract | PDFPDF
    77. Survey and Analysis on Advance Technique of Wireless Sensor Network Technology
    Pages :3039-3041
    Sanket S.Desale , Prof Mr.S.P.Medhane
    Abstract | PDFPDF
    78. Challenges to Big Data Security and Privacy
    Pages :3042-3043
    Manju Kaushik, Aditi Jain
    Abstract | PDFPDF
    79. Efficient File Transmission and Load Balancing using Multicast over Dynamic Bandwidth Weighted Links
    Pages :3044-3046
    Onkar Habbu, Jayant Golhar, Chinmay Nalawade, Sunil Mane
    Abstract | PDFPDF
    80. A Review of Security Mechanisms for Detection of Malicious Transactions in Database
    Pages :3047-3051
    Varada Bharat Srinivas, Dr.Syed Umar
    Abstract | PDFPDF
    81. DBMS as a Cloud Service
    Pages :3052-3054
    Yatharth Bhatnagar, Sarwesh Sethiya, Siddharth Jain
    Abstract | PDFPDF
    82. Performance Enhancement in Collaborative Filtering Technique by Removing Shilling Effect
    Pages :3055-3057
    Pooja, Max Bhatia
    Abstract | PDFPDF
    83. Secure Computation in Cloud Environment
    Pages :3058-3061
    Fazail Amin
    Abstract | PDFPDF
    84. Geographical Topologies of Routing Protocols in Vehicular Ad hoc Networks – A Survey
    Pages :3062-3065
    Aashish Kumar,Mack Tyagi
    Abstract | PDFPDF
    85. Eliminating the Noise from Web Pages using Page Replacement Algorithm
    Pages :3066-3068
    Rajni Sharma, Max Bhatia
    Abstract | PDFPDF
    86. Uncertain Data Mining using Decision Tree and Bagging Technique
    Pages :3069-3073
    Manasi M. Phadatare, Sushma S. Nandgaonkar
    Abstract | PDFPDF
    87. Comparison of Various Clustering Algorithms
    Pages :3074-3076
    Garima Sehgal, Dr. Kanwal Garg
    Abstract | PDFPDF
    88. Energy Conservation in Wireless Sensor Networks Using Top-Down Approach with Regular Sleep and Wake Periods
    Pages :3077-3080
    Balaji M. Kore, Prof. S. K. Pathan
    Abstract | PDFPDF
    89. Identifying Customer Interest in Real Estate Using Data Mining Techniques
    Pages :3081 - 3084
    Vishal Venkat Raman, Swapnil Vijay, Sharmila Banu K
    Abstract | PDFPDF
    90. Impact of PageRank and its Variation On Convergence and Ranking
    Pages :3085 - 3088
    Harjeet Kaur and Dr. Kanwal Garg
    Abstract | PDFPDF
    91. Web Security using Transparent Image Captcha (TIC)
    Pages :3089 - 3092
    Ved Prakash Singh, Preet Pal, Pushpendra Kumar Pateriya
    Abstract | PDFPDF
    92. Mining Distributed Frequent Itemset with Hadoop
    Pages :3093 - 3097
    Poonam Modgi, Prof. Dinesh Vaghela
    Abstract | PDFPDF
    93. Real Time Sentiment Analysis of Twitter Data Using Hadoop
    Pages :3098 - 3100
    Sunil B. Mane, Yashwant Sawant, Saif Kazi, Vaibhav Shinde
    Abstract | PDFPDF
    94. Avalanche Effect of AES Algorithm
    Pages :3101 - 3103
    Jayant P. Bhoge, Dr. Prashant N. Chatur
    Abstract | PDFPDF
    95. Anomaly Extraction In Backbone Network Using Association Rules
    Pages :3104 - 3106
    Pratiksha R. Naik, Shruti S. Kedari, Snehal G. Pawale
    Abstract | PDFPDF
    96. Review of VANET Mobility Models with New Cluster Based Routing Protocol
    Pages :3107 - 3111
    Nisha V. Jadhav
    Abstract | PDFPDF
    97. Performance Improvement of Web Caching Page Replacement Algorithms
    Pages :3112 - 3115
    Deepak Sachan, Dhawaleshwar Rao Ch
    Abstract | PDFPDF
    98. Analyze and Design of Green Computing in Health Care Center
    Pages :3116 - 3118
    Sudhakar Murugesan, Seenuvasan Arumugam
    Abstract | PDFPDF
    99. Testing Approaches to Generate Automated Unit Test Cases
    Pages :3119 - 3121
    Parul Sharma, Neha Bajpai
    Abstract | PDFPDF
    100. A Survey: Classification of E-mail Data Using Semi Supervised Learning
    Pages :3122 - 3125
    Hiral Dilipbhai Padhiyar, Prof. Purvi Rekh
    Abstract | PDFPDF
    101. Fine Grained Data Access Control in Cloud Computing
    Pages :3126 - 3131
    A.Parameshwari, B.Rasina Begum
    Abstract | PDFPDF
    102. A Hybrid DCT and DWT Color Image Watermarking in RGB Color Space
    Pages :3132 - 3138
    Jaya Jeswani, Tanuja Sarode
    Abstract | PDFPDF
    103. Review on Performance Improvement of TCP with TCP New Reno & Improved Westwood
    Pages :3139 - 3141
    Er.Karuna Mittal, Er.Jasvir Singh
    Abstract | PDFPDF
    104. Implementation of Artificial Intelligence for Best Moves using Chessboard
    Pages :3142 - 3144
    Priya Hajari ,Raakhee Iyer , Ashish Patil
    Abstract | PDFPDF
    105. Performance and Analysis of Routing Protocols with TCP Traffic in Mobile Ad Hoc Network
    Pages :3145 - 3148
    Sandeep Sandhu, Anirudh Menon, Parikshit Sinha, Nirav Afinwale
    Abstract | PDFPDF
    106. Genetic Based Prioritization Regression Testing
    Pages :3149 - 3151
    Quience Gulati, Arun Prakash Agarwal
    Abstract | PDFPDF
    107. Strategies of an Efficient Algorithm PARM to Generate Association Rules Mining Technique
    Based on Spatial Data

    Pages :3152 - 3158
    Pallavi Rathod, Prof. S. S. Dhande
    Abstract | PDFPDF
    108. Analysis of Multibase Scalar Point Multiplication Scheme in ECC
    Pages :3159 - 3164
    Kirti Chawla, Om Pal Yadav
    Abstract | PDFPDF
    109. Indexing and Advanced Relevance Ranking Score Preserving for Multi-Keyword Search over
    Encrypted Cloud Data

    Pages :3165 - 3169
    Amol D. Sawant and Prof. M.D Ingle
    Abstract | PDFPDF
    110. Lightweight Implementation of Public Key Infrastructure for Wireless Sensor Network μPKI
    Pages :3170 - 3175
    Dipayan Kumar Ghosh, Namita Ghosh
    Abstract | PDFPDF
    111. Survey on Soft Computing based Call Admission Control in Wireless Networks
    Pages :3176 - 3180
    Mahesh G, Yeshwanth S, Manikantan U V
    Abstract | PDFPDF
    112. Immense Review on Clustering Approaches
    Pages :3181 - 3185
    Deepali N. Gunjate, Prof. B. R. Kanawade
    Abstract | PDFPDF
    113. Performance Evaluation of Feasible Placement Model in AODV for Mobile Ad Hoc Networks
    Pages :3186 - 3189
    K. Narasimha Raju, S.P.Setty
    Abstract | PDFPDF
    114. Rapid Decentralized Network Intrusion Defense System on Multiple Virtual Machines
    Pages :3190 - 3195
    M.Judith Lucia and T.Thirunavukarasu
    Abstract | PDFPDF
    115. Formulate Competent Decision Making in Data Mart using Fuzzy Optimization Technique
    Pages :3196 - 3202
    A. Prema, A.Pethalakshmi
    Abstract | PDFPDF
    116. An Entropy-based Adaptive Genetic Algorithm Approach on Data Mining for Classification
    Problems

    Pages :3203 - 3209
    Dipayan Kumar Ghosh, Namita Ghosh
    Abstract | PDFPDF
    117. Advance Image Classification System
    Pages :3210 - 3214
    N.N.Khalsa, Parag.P.Gudadhe, Dr. V. T. Ingole
    Abstract | PDFPDF
    118. A Review Report on Security Threats on Database
    Pages :3215 - 3219
    Shivnandan Singh, Rakesh Kumar Rai
    Abstract | PDFPDF
    119. An Algorithmic Approach for the Detection of Malicious Nodes in a Cluster Based Adhoc
    Wireless Networks

    Pages :3220 - 3223
    Bhakti Thakre, S.V.Sonekar
    Abstract | PDFPDF
    120. Survey on Feature Extraction methods in Object Recognition
    Pages :3224 - 3226
    Shilpa Bane, Prof. D.R. Pawar
    Abstract | PDFPDF
    121. A Survey on Bitemporal Data Warehousing System and Data Warehouse Design Techniques
    Pages :3227 - 3231
    P.N.V.S.Pavan Kumar, K.Bala Chowdappa, S.Subba Lakshmi
    Abstract | PDFPDF
    122. Web Cache Page Replacement by Using LRU and LFU Algorithms with Hit Ratio: A Case Unification
    Pages :3232 - 3235
    Kapil Arora, Dhawaleswar Rao Ch
    Abstract | PDFPDF
    123. Semantical and Syntactical Analysis of NLP
    Pages :3236 - 3238
    Mallamma V. Reddy, Hanumanthappa M.
    Abstract | PDFPDF
    124. An Approach for Efficient and Secure Retrieval of Encrypted Cloud Data Based On Top-K Multikeywords
    Pages :3239 - 3241
    Suman M, B. Chempavathy
    Abstract | PDFPDF
    125. Issues and Challenges in Using Social Media
    Pages :3242 - 3245
    J. Pratik Infanto, Prof. D. Venkata Subramaniam, Prof. S.P Chokkalingam
    Abstract | PDFPDF
    126. Review On: An Efficient Technique of Noising and De-Noising Medical Images Using
    Neuro– FUZZY and LDA

    Pages :3246 - 3249
    Amritpal Kaur, Dr. Pankaj Kumar Verma
    Abstract | PDFPDF
    127. Honeydoop - A System for Creating Virtual Honeypots Using Hadoop
    Pages :3250 -3253
    Sumaiyya Z. Khan , Prof. D.M.Dakhane , Prof. R.L.Pardhi
    Abstract | PDFPDF
    128. Prevention Of Black hole Attack using AODV Routing Protocol in MANET
    Pages :3254 - 3258
    Nirali Modi, Vinit Kumar Gupta
    Abstract | PDFPDF
    129. Secure Image Encryption and Decryption in Full Motion Video
    Pages :3259 - 3261
    S Raghunath Reddy, K Srikanth ,T Swathi
    Abstract | PDFPDF
    130. Aspect Based Sentiment Analysis to Extract Meticulous Opinion Value
    Pages :3262 - 3266
    Deepali Virmani, Vikrant Malhotra, Ridhi Tyagi
    Abstract | PDFPDF
    131. Energy Efficient Route Selection in MANET
    Pages :3267 - 3273
    Namita Agrawal, Nitin Choubey, Prashant Mishra
    Abstract | PDFPDF
    132. A Survey on Clustered Feature Selection Algorithms for High Dimensional Data
    Pages :3274 - 3280
    Khedkar S.A., Bainwad A. M., Chitnis P. O.
    Abstract | PDFPDF
    133. Review On: Human Identification Using GAIT Recognition Technique with PAL and PAL
    Entropy and NN

    Pages :3281 - 3285
    Preetpal Kaur, Gagangeet Singh Aujla
    Abstract | PDFPDF
    134. Mass Users Behaviour Prediction in Social Media: A Survey
    Pages :3286 - 3288
    Kanchan U. Jadhav, Prof. Nalini A. Mhetre
    Abstract | PDFPDF
    135. A Review on Image Segmentation Clustering Algorithms
    Pages :3289 - 3293
    Devarshi Naik , Pinal Shah
    Abstract | PDFPDF
    136. Generation of Electricity from Fans
    Pages :3294 - 3297
    MD Saquib Gadkari, Khemchand Kolte, Mrunal Jasani, Akash Vichare, Beatrice.S
    Abstract | PDFPDF
    137. Signature Verification for Automated Cheque Authentication System Based on Shape Contexts
    Pages :3297 - 3300
    Sangeeta Girish Narkhede, Prof. Dinesh D. Patil
    Abstract | PDFPDF
    138. Text Rank: A Novel Concept for Extraction Based Text Summarization
    Pages :3301 - 3304
    Dipti.D.Pawar, M.S.Bewoor, S.H.Patil
    Abstract | PDFPDF
    139. A View on Cloud Computing in the Banking Sector
    Pages :3305 - 3308
    K .Sudhakar, G.Vinay Kumar, L.Sudha Rani
    Abstract | PDFPDF
    140. Efficient Data Packet Transmission in MANET Using Enhanced Hybrid Cryptographic Technique
    Pages :3309 - 3311
    R. Vedhavarshini , T. Anand
    Abstract | PDFPDF
    141. Result Paper on Public Auditing by using KERBEROS to Secure Cloud Storage
    Pages :3312 - 3317
    Ved M. Kshirsagar, Prof. V.S.Gulhane
    Abstract | PDFPDF
    142. Object-Oriented Design Metrics to Predict Fault Proneness of Software Applications
    Pages :3318-3321
    Jeenam Chawla, Arun Agarwal
    Abstract | PDFPDF
    143. Article Removed
    Pages :3322-3326
    xxxx, xxxx
    Abstract | PDFPDF
    144. A Multimodal SVM Approach for Fused Biometric Recognition
    Pages :3327-3330
    Geethu S Kumar,C Jyothirmati Devi
    Abstract | PDFPDF
    145. FPGA Implementation of Fast Arithmetic Unit Based on QSD
    Pages :3331-3334
    Shrikesh A. Dakhane, A. M. Shah
    Abstract | PDFPDF
    146. Survey on Document Clustering Approach for Forensics Analysis
    Pages :3335-3338
    Bhagyashree Umale, Prof.Nilav M
    Abstract | PDFPDF
    147. A Review paper for Detection of Overlapping Communities in Complex Networks
    Pages :3339-3341
    Vinay, Sumit, Jai Parkash
    Abstract | PDFPDF
    148. Survey on Privacy Preserving Data Mining
    Pages :3342-3343
    Krishna Pratap Rao,Adesh Chaudhary, Prashant Johri
    Abstract | PDFPDF
    149. Preserving Privacy and Data Security in Database
    Pages :3344-3346
    Adesh Chaudhary , Krishna Pratap Rao , Prashant Johri
    Abstract | PDFPDF
    150. Data Partitioning Technique to Improve Cloud Data Storage Security
    Pages :3347-3350
    Swapnil V.Khedkar , A.D.Gawande
    Abstract | PDFPDF
    151. Performance Evaluation of Mobile Ad- hoc Networks Routing Protocol AODV, DSR & DSDV in Different Mobility Models with Varying Speed of Nodes
    Pages :3351-3354
    Prateek Chudhary, Viomesh Singh
    Abstract | PDFPDF
    152. Authentication Session Password Scheme Using Texts And Color
    Pages :3355-3358
    Suwarna Jungari, Vrushali Bhujbal, Shital Sonawane, Supriya Bhujbal, Prof. Shital Salve
    Abstract | PDFPDF
    153. A Survey on Optimization Techniques for Content Downloading in Vehicular Networks
    Pages :3359-3362
    Rooban M. Kadwe, Pragati Patil, Yogesh Bhute
    Abstract | PDFPDF
    154. How to Possible Virtual Education by Haptic Technology
    Pages :3363-3366
    Uttama Suryavanshi
    Abstract | PDFPDF
    155. Survey on Mobile Adhoc Networks
    Pages :3367-3369
    Nanditha N, Sreedevi N
    Abstract | PDFPDF
    156. Combined Linear And Nonlinear Image Enhancement
    Pages :3370-3372
    Saurabh Bhatia, V.K.Govindan
    Abstract | PDFPDF
    157. Bayesian Approach to Prediction of Protein Secondary Structure
    Pages :3373-3375
    Asmita A. Yendralwar, Swapnali L.Waghmare , Rajlaxmi M. Biyani, Satish S. Kumbhar
    Abstract | PDFPDF
    158. Program Recognition System for C A Novel Take on Use of Plans and Clichés for Program Understanding
    Pages :3376-3380
    Manasi Deshmukh , Rohan Ingale , Rajat Doshi , Priyanka Sathe
    Abstract | PDFPDF
    159. Evaluation on Malware Analysis
    Pages :3381-3383
    Monika Agrawal, Heena Singh, Nidhi Gour, Ajay Kumar
    Abstract | PDFPDF
    160. Automatic Machine Learning Forgery Detection Based On SVM Classifier
    Pages :3384-3388
    S.L.Jothilakshmi, V.G.Ranjith
    Abstract | PDFPDF
    161. Ethical Hacking Techniques with Penetration Testing
    Pages :3389-3393
    K.Bala Chowdappa , S.Subba Lakshmi , P.N.V.S.Pavan Kumar
    Abstract | PDFPDF
    162. Optimization of Image Registration for Medical Image Analysis
    Pages :3394-3398
    PN Maddaiah , PN Pournami , VK Govindan
    Abstract | PDFPDF
    163. An Improvement for HEER Protocol in Wireless Sensor Network
    Pages :3399-3402
    Sakshi Sharma , Malti Rani
    Abstract | PDFPDF
    164. QPSK Modulator on FPGA using 64 Values ROM
    Pages :3403-3406
    Prashant D. Thombare, Ameed. M. Shah
    Abstract | PDFPDF
    165. Localization of License Plate using Characteristics of Alphanumeric Characters
    Pages :3407-3409
    Pushpendra Singh Chouhan, V. K. Govindan
    Abstract | PDFPDF
    166. Survey on Certificate Revocation Scheme for Mobile Ad Hoc Networks
    Pages :3410-3415
    Ann Grace Attokaren, Mujeebudheen Khan A. I
    Abstract | PDFPDF
    167. Article Removed
    Pages :xxx-xxx
    xxx, xxx
    Abstract | PDFPDF
    168. A Literature Survey on Energy Efficient MAC Protocols for WSN
    Pages :3421-3424
    Rohan Parmar, Dr. R. C. Poonia
    Abstract | PDFPDF
    169. A Digital Multiband Orthogonal Frequency Division Multiplexing baseband design
    Pages :3425-3428
    Sanket Sardar , Manisha Ingle
    Abstract | PDFPDF
    170. Methods to Define a Single Point in the Polygon
    Pages :3429-3430
    Arun Kumar Sharma, Sandeep Kaur Gill
    Abstract | PDFPDF
    171. Neural Network Implementation Using FPGAs
    Pages :3431-3433
    Dhirajkumar S. Jinde, Samrat S. Thorat
    Abstract | PDFPDF
    172. Sentiment Classification in Public Opinions using Multi-Domain Sentiment-Sensitive Thesaurus
    Pages :3434-3436
    Komal Paraswani , Professor P.P. Tribhuvan
    Abstract | PDFPDF
    173. Network Layer Attacks and Protection in MANETA Survey
    Pages :3437-3443
    Athira V Panicker, Jisha G
    Abstract | PDFPDF
    174. Effective Use of Prim’s Algorithm for Model Based Test case Prioritization
    Pages :3444-3447
    Shweta A. Joshi, Prof. D.S. Adiga, Prof. B.S. Tiple
    Abstract | PDFPDF
    175. A Comparative Performance Analysis of Classification Algorithms Using Weka Tool Of Data
    Mining Techniques

    Pages :3448-3453
    Suman , Mrs.Pooja Mittal
    Abstract | PDFPDF
    176. Energy Efficient Protocol for Heterogeneous Wireless Sensor Network using Ant Colony Optimization
    Pages :3454-3456
    Saburi Parvatkar, Deipali Gore
    Abstract | PDFPDF
    177. TEM Color Image Segmentation using Hill Climbing Algorithm
    Pages :3457-3459
    Garima Goyal
    Abstract | PDFPDF
    178. A New Technique to Prevent MANET against Rushing Attack
    Pages :3460-3464
    Satyam Shrivastava , Dharmendra Mangal
    Abstract | PDFPDF
    179. Efficient Algorithms for Mining Rare Itemset over Time Variant Transactional Database
    Pages :3465-3468
    Nidhi Sethi, Pradeep Sharma
    Abstract | PDFPDF
    180. Separable Reversible Data Hiding in Image Using Advanced Encryption Standard with Fake Data
    Generation

    Pages :3469-3473
    Divyani UdayKumar Singh, Kasturi Mohan Padwal, Madhura Pundlik Jadhav
    Abstract | PDFPDF
    181. Improved DBSCALE Algorithm by using Ant Colony Optimization
    Pages :3474-3477
    Reena Jindal, Dr. Samidha D.Sharma, Prof. Angad Singh
    Abstract | PDFPDF
    182. Analysing Pattern for Chromium Bug Area Classification
    Pages :3478-3482
    Trasha Gupta, Monika Gupta
    Abstract | PDFPDF
    183. An Efficient Technique of Noising and De-Noising Medical Images Using Support Vector Machine
    Pages :3483-3486
    Monika Pathania , ParulPreet Singh
    Abstract | PDFPDF
    184. Smart Wireless Sensor Network for Monitoring an Agricultural Environment
    Pages :3487-3490
    Prof. Mrs. S. S. Patil Prof. V. M. Davande Prof. J. J. Mulani
    Abstract | PDFPDF
    185. Enforced Conviction in Cryptographic Provenance Across Critical System Information
    Pages :3491-.3493
    Prof. Asha. N, Prince
    Abstract | PDFPDF
    186. Designing and Implementation of Efficient Fuzzy Logic Based Fractal Image Compression Technique in DCT Domain Using Quadtree Algorithm
    Pages :3494-3499
    Preeti Banerjee, Deepak Kumar Xaxa
    Abstract | PDFPDF
    187. Prevention of Spoofing Attacks in Wireless Sensor Networks
    Pages :3500-3502
    B.Dineshbabu , T.Thirunavukarasu
    Abstract | PDFPDF
    188. A Neighbor Knowledge with Zonal Routing Protocol to Reducing Routing Overhead in MANETs
    Pages :3503-3507
    M.Saravanan,D.Jagan
    Abstract | PDFPDF
    189. GooDoop: Local Search Engine using Hadoop
    Pages :3508-3510
    Ganesh Phadatare, Ketankumar Rathod, Vinayak Shukla, Mahesh S. Salunkhe
    Abstract | PDFPDF
    190. Dashboard Necessary in Every Field
    Pages :3511-3513
    Shilpa Malik, Pratima Sharma
    Abstract | PDFPDF
    191. Unsupervised Detection of Duplicates in User Query Results using Blocking
    Pages :3514-3520
    Dr. B. Vijaya Babu, K. Jyotsna Santoshi
    Abstract | PDFPDF
    192. Survey on Data Preprocessing Method of Web Usage Mining
    Pages :3521-3524
    Wasvand Chandrama, Prof.P.R.Devale, Prof. Ravindra Murumkar
    Abstract | PDFPDF
    193. Energy Minimization and Conformation Analysis of Molecules using Steepest Descent Method
    Pages :3525-3528
    B.J.Jaidh an, Prof. P.Srinivasa Rao, Prof. Allam Apparao
    Abstract | PDFPDF
    194. Wireless Arraigning Of Mobile Phones Using Microwaves
    Pages :3529-3533
    P.Rajeshkumar, G. Murugaboopathi
    Abstract | PDFPDF
    195. An Efficient Approach of Building a New Software Web Framework for Better Software Solutions with DAO Layer
    Pages :3534-3538
    Digambar Y. Yedage, Anand Bone
    Abstract | PDFPDF
    196. Offline Signature Verification Using Surf Feature Extraction and Neural Networks Approach
    Pages :3539-3541
    Priyanka Sharma
    Abstract | PDFPDF
    197. A Framework for Enhancing Privacy Provision in Cloud Computing
    Pages :3542-3547
    Fatima N. AL-Aswadi & Omar Batarfi
    Abstract | PDFPDF
    198. Modified RSA Public Key Cryptosystem Using Two Key Pairs
    Pages :3548-3550
    Jainul Abudin, Sanjay Kumar Keot, Geetanjali Malakar, Nita Moni Borah Mustafizur Rahman
    Abstract | PDFPDF
    199. A System for Detection of Distributed Denial of Service (DDoS) Attacks using KDD Cup Data Set
    Pages :3551-3555
    Janhavi Kaskar, Ruchit Bhatt, Rohit Shirsath
    Abstract | PDFPDF
    200. Public Key Infrastructure (PKI) using Symmetric Key Cryptography (SC) in VANETs
    Pages :3556-3561
    Sumegha Sakhreliya, Neha Pandya
    Abstract | PDFPDF
    201. Improve Heuristics for User Session Identification through Web Server Log in Web Usage Mining
    Pages :3562-3565
    Priyanka Patel, Mitixa Parmar
    Abstract | PDFPDF
    202. Review on: Image Compression with Tiling using Hybrid KEKRE and DAUBECHIES Wavelet
    Transformation

    Pages :3566-3568
    Nandini Sharma, Dr. Pankaj Kumar Verma
    Abstract | PDFPDF
    203. Detection of Faulty Sensors in Wireless Sensor Networks and Avoiding the Path Failure Nodes
    Pages :3569-3574
    Pinak S. Patel, Mohammed Husain Bohara, Binita D. Chahwala
    Abstract | PDFPDF
    204. Communication and Self-Location of Wireless Sensor Network or Nodes Using Wireless System:
    Implementation of VANET

    Pages :3575-3580
    Monica R. Dhawale, Dr. S.A.Ladhake
    Abstract | PDFPDF
    205. Inverse Orchestra: An approach to find faster solution of matrix inversion through Cramer’s rule
    Pages :3581-3585
    Shweta Ag rawal , Rajkamal
    Abstract | PDFPDF
    206. Improving AODV Routing Protocol against Black Hole Attack based on MANET
    Pages :3586-3589
    Bhoomika Patel, Khushboo Trivedi
    Abstract | PDFPDF
    207. Improving Multipath AODV for Video Transmission
    Pages :3590-3594
    MayuriBaldaniya, Prof. NehaSisodiya
    Abstract | PDFPDF
    208. News Analytics and Sentiment Analysis to Predict Stock Price Trends
    Pages :3595-3604
    Spandan Ghose Chowdhury , Soham Routh , Satyajit Chakrabarti
    Abstract | PDFPDF
    209. Multilingual Handwritten Text Verification
    Pages :3605-3607
    M.Sivasankari, Dr.S.P.Victor
    Abstract | PDFPDF
    210. Handwritten Text Recognition
    Pages :3608-3610
    M.Sivasankari, Dr.S.P.Victor
    Abstract | PDFPDF
    211. Statistical Steganalysis Scheme of Using Block DCT
    Pages :3611-3615
    Papiya Chakraborty, Dr. Bikramjit Sarkar
    Abstract | PDFPDF
    212. On Campus Location Tracking Using Mobiles Phones
    Pages :3616-3618
    Anil Birajdar, Manisha Koul,Mridushi Srivastav, Pooja Nair
    Abstract | PDFPDF
    213. Blind Robust Digital Video Watermarking Scheme using Hybrid Based Approach
    Pages :3619-3625
    Nitin A. Shelke, Dr.P.N.Chatur
    Abstract | PDFPDF
    214. A Systematic Study on Agile Software Development Methodologies and Practices
    Pages :3626-3637
    Harleen K. Flora, Swati V. Chande
    Abstract | PDFPDF
    215. Palm print Authentication Using PCA Technique
    Pages :3638-3640
    Mithuna Behera and V.K. Govindan
    Abstract | PDFPDF
    216. Super Resolution Image Reconstruction using Geometric Registration
    Pages :3641-3644
    M Venkatesh, and Govindan V.K
    Abstract | PDFPDF
    217. Privacy Preserving Updates to Sliced Anonymous Data Bases
    Pages :3645-3647
    Asha Thomas, Adarsh Sunil
    Abstract | PDFPDF
    218. Review on: Enhanced Offline Signature Recognition Using Neural Network and SVM
    Pages :3648-3652
    Rapanjot Kaur, Gagangeet Singh Aujla
    Abstract | PDFPDF
    219. Implementation of Query Result Caching Using Dynamic Data Cache
    Pages :3653-3656
    M. A. Ramteke, Prof. S. S. Dhande, Prof. H. R. Vyawahare
    Abstract | PDFPDF
    220. Indian Sign Language Recognition based on Histograms of Oriented Gradient
    Pages :3657-3660
    Neha V. Tavari, Prof. A. V. Deorankar
    Abstract | PDFPDF
    221. Person Authentification by Finger Vein Images: A Review
    Pages :3661-3663
    Rajwinder Kaur, Rekha Rani
    Abstract | PDFPDF
    222. Review on: Emotion Detection
    Pages :3664-3669
    Navleen Kaur, Madhu Bahl,Harsimran Kaur
    Abstract | PDFPDF
    223. Social Profile Based Gift Recommendation System
    Pages :3670-3673
    Purnima Tomar, Prateek Arora, Aakash Goel, Dharmender Saini
    Abstract | PDFPDF
    224. To Evaluate Performance of BF, DYMO and ZRP Protocols
    Pages :3674-3676
    Er.Chaitali Malik, Dr.Rajiv Mahajan
    Abstract | PDFPDF
    225. Enhancement of Underwater Images: A Review
    Pages :3677-3678
    Aanchal Garg , Nirvair Neeru
    Abstract | PDFPDF
    226. TRApriori Classification Based Algorithm by Fuzzy Techniques to Reduced Time Complexity
    Pages :3679-3683
    Rohit Miri,Priyanka Tripathi, S.R.Tandan
    Abstract | PDFPDF
    227. A Robust Automated Process for Vehicle Number Plate Recognition
    Pages :3684-3689
    Dr. Khalid Nazim S. A., Adarsh N.
    Abstract | PDFPDF
    228. Finding Frequent Items Dynamically
    Pages :3690-3694
    Sunita Murjani, Indrajeet Rajput
    Abstract | PDFPDF
    229. Review On: Finger Vein Detection Using Repeated Line, Even Gabor and Median Filter
    Pages :3695-3698
    Komal Turka and Gurpreet Kaur
    Abstract | PDFPDF
    230. Review On: GAIT Recognition Technique using SVM and K-MEANS with Gait PAL and PAL Entropy
    Pages :3699-3702
    Anjali Kaushik and Gurpreet Kaur
    Abstract | PDFPDF
    231. Wavelet and Curvelet Transform based Image Fusion Algorithm
    Pages :3703-3707
    Shriniwas T. Budhewar
    Abstract | PDFPDF
    232. Enhancing Routing With Cross Layer Optimization in MANETs
    Pages :3708-3710
    Shruti Thacker
    Abstract | PDFPDF
    233. Implementation of Plastic Surgery Face Recognition Using Multimodal Biometric Features
    Pages :3711-3715
    Minal Mun and Prof. Anil Deorankar
    Abstract | PDFPDF
    234. Distributed File Systems: A Survey
    Pages :3716-3721
    L.Sudha Rani, K. Sudhakar , S.Vinay Kumar
    Abstract | PDFPDF
    235. Batch -Incremental Classification of Stream Data Using Storage
    Pages :3722-3725
    Ponkiya Parita, Rohit Srivastava
    Abstract | PDFPDF
    236. A Design of Low Cost Head-Mounted Display Using Android Smartphone
    Pages :3726-3728
    Hemant Surale, Prof. Sagar Shinde
    Abstract | PDFPDF
    237. Software Testing Techniques in Software Development Life Cycle
    Pages :3729-3731
    D.Meenakshi , J. Swami Naik , M.Raghavendra Reddy
    Abstract | PDFPDF
    238. Survey on Security Issues in Mobile Ad Hoc Networks
    Pages :3732-3735
    Devesh Kumar Pal, Dr. Pallavi Murghai Goel
    Abstract | PDFPDF
    239. Mining Frequent Itemsets for Improving the Effectiveness of Marketing and Sales
    Pages :3736-3738
    Pratima O. Fegade, Prof. Dinesh D. Patil
    Abstract | PDFPDF
    240. Software Component Selection techniques - A review
    Pages :3739-3742
    Loveleen Kaur, Dr. Hardeep Singh
    Abstract | PDFPDF
    241. FPGA based Image Feature Extraction Using Xilinx System Generator
    Pages :3743-3747
    Swapnil G. Kavitkar, Prashant L. Paikrao
    Abstract | PDFPDF
    242. A Study on Power efficient Techniques in various layers of Protocol stack in MANETs
    Pages :3748-3753
    Supriya Mahajan , Bhupinder Kaur , Vaibhav Pandey
    Abstract | PDFPDF
    243. Android Application for Vehicle Theft Prevention and Tracking System
    Pages :3754-3758
    Rohitaksha K , Madhu C G , Nalini B G ,Nirupama C V
    Abstract | PDFPDF
    244. High Capacity Image Steganography Method Using LZW, IWT and Modified Pixel Indicator Technique
    Pages :3759-3763
    Swati Goel, Pramod Kumar, Rekha Saraswat
    Abstract | PDFPDF
    245. Multi labelled Graph Mining with Dynamic Network
    Pages :3764-3767
    Ankita V. Raiyani, Prof. Ajaykumar T. Shah
    Abstract | PDFPDF
    246. Nearest Clustering Algorithm for Satellite Image Classification in Remote Sensing Applications
    Pages :3768-3772
    Anil K Goswami, Swati Sharma, Praveen Kumar
    Abstract | PDFPDF
    247. A Survey of Transport Protocols for Delay Tolerant Satellite Networks
    Pages :3773-3776
    Mitul K. Patel
    Abstract | PDFPDF
    248. An Efficient and Secure Multicast Key Management Scheme based on Star Topology
    Pages :3777-3783
    Neha Mittal, Vinod Kumar
    Abstract | PDFPDF
    249. Issues in Data Privacy
    Pages :3784-3786
    Akshaya.S ,Jayasre Manchari.V L ,MohamedThoufeeq.A
    Abstract | PDFPDF
    250. Performance of Kalman Filter on Filtering Colored Noise
    Pages :3787-3790
    Pratibha Singh, Kiran Jain, Shivnandan Singh
    Abstract | PDFPDF
    251. Power Efficiency in Agriculture using Wireless Sensor Network
    Pages :3791-3793
    Kamalpreet Kaur, Rohit Sethi , Amandeep Kaur
    Abstract | PDFPDF
    252. Map Reduce a Programming Model for Cloud Computing Based On Hadoop Ecosystem
    Pages :3794-3799
    Santhosh voruganti
    Abstract | PDFPDF
    253. Comparison of Forest Fire Detection Techniques Using WSNs
    Pages :3800-3802
    Amandeep Kaur, Rohit Sethi, Kamalpreet Kaur
    Abstract | PDFPDF
    254. Software Reliability and Quality Analyser with Quality Metric Analysis Along With Software Reliability Growth Model
    Pages :3803-3806
    Madhavi Mane, Manjusha Joshi, Prof. Amol Kadam, Prof. Dr. S.D. Joshi
    Abstract | PDFPDF
    255. Location Based Group Key Generation in Wireless Sensor Network
    Pages :3807-3812
    Ambika.N, G.T.Raju
    Abstract | PDFPDF
    256. B-spline Non Rigid Image Registration using L-BFGS Optimizer
    Pages :3813-3816
    Barkuru Sri harsha ,PN Pournami , V K Govindan
    Abstract | PDFPDF
    257. Anomaly Detection Using Context-Based Intrusion Detection System
    Pages :3817-3822
    Rupali Garje, Shrawani Bharati, Prakriti Kar, Vaibhav Khatavkar
    Abstract | PDFPDF
    258. A Contemporary Study of Application Layer Multicast Protocols in aid of Effective Communication
    Pages :3823-3838
    M. Anitha, P. Yogesh
    Abstract | PDFPDF
    259. An Efficient Density Conscious Subspace Clustering Method using Top-down and Bottom-up Strategies
    Pages :3839-3842
    M. Suguna, Dr. S. Palaniammal
    Abstract | PDFPDF
    260. Categorize and Efficient: Top k keyword Search of Spatial-Textual data on the Road Network
    Pages :3843-3847
    Santosh.I.Halpati, D.M.Thakore
    Abstract | PDFPDF
    261. A Brief Review of an Experience Reuses Approach
    Pages :3848-3851
    Navjot Kaur, Ramandeep Kaur
    Abstract | PDFPDF
    262. Use Face as Mouse
    Pages :3852-3853
    Gauri Sonawane, Priyanka Sutar, Ankita Shelar, Shraddha Kulange
    Abstract | PDFPDF
    263. Modelling & Detaining Mobile Virus Proliferation over Smart phones
    Pages :3854-3862
    Ashwini Gour,Jagdish Pimple, Somesh Gangotri
    Abstract | PDFPDF
    264. A Survey on Distributed Denial of Services (DDOS)
    Pages :3863-3866
    Er. Sakshi kakkar , Er. Dinesh kumar
    Abstract | PDFPDF
    265. Big Data Analytics with Hadoop to analyze Targeted Attacks on Enterprise Data
    Pages :3867-3870
    Bhawna Gupta, Dr. Kiran Jyoti
    Abstract | PDFPDF
    266. Survey on Techniques for Steganography of Audio Files
    Pages :3871-3872
    Charu Arora, Nitish Anand
    Abstract | PDFPDF
    267. Mining Search Log for Privacy Definitions and Phish Safe
    Pages :3873-3877
    Janani. V.D
    Abstract | PDFPDF
    268. QR Codes and Security Concerns
    Pages :3878-3879
    Shruti Ahuja
    Abstract | PDFPDF
    269. Survey Paper on Hilbert Transform With its Applications in Signal Processing
    Pages :3880-3882
    Aditi Singh
    Abstract | PDFPDF
    270. A New Approach for Electing a Coordinator in Anonymous System
    Pages :3883-3886
    Priyanka D. Bhute
    Abstract | PDFPDF
    271. A Survey on Resource Management in Cloud Computing
    Pages :3887-3889
    Sanchari Saha, Abhilash K.V
    Abstract | PDFPDF
    272. Study of Various Congestion-control Protocols in Network
    Pages :3890-3894
    Pratima Bhujbal, Uma Nagaraj
    Abstract | PDFPDF
    273. Analysis And Design Of Circular Microstrip Patch Antenna At 5.8GHz
    Pages :3895-3898
    Keshav Gupta, Kiran Jain, Pratibha Singh
    Abstract | PDFPDF
    274. Optimization of Multirate Polyphase Decimator using MCM and Digit Serial Architecture
    Pages :3899-3906
    Rajendra M. Rewatkar, Dr. Sanjay L. Badjate
    Abstract | PDFPDF
    275. The Countering the XDoS Attack for Securing the Web Services
    Pages :3907-3911
    Amit Vinayakrao Angaitkar, Narendra Shekokar, Mahesh Maurya
    Abstract | PDFPDF
    276. Mining and Summarizing Movie Reviews in Mobile Environment
    Pages :3912-3916
    Savita Harer, Sandeep Kadam
    Abstract | PDFPDF
    277. Swarm Management in Multi Tracker P2P Network
    Pages :3917-3920
    Vishal Annadate
    Abstract | PDFPDF
    278. Taxonomy of Distributed Consensus Algorithms
    Pages :3921-3923
    Suman Kumari, Dr. Harish Rohil
    Abstract | PDFPDF
    279. Performance Analysis of Reactive & Proactive Routing Protocols for Vehicular Adhoc -Networks with Varying Speed of Nodes
    Pages :3924-3927
    Monika Patidar, Anil Patidar
    Abstract | PDFPDF
    280. Health Analysis System Using Machine Learning
    Pages :3928-3933
    Pravin Shinde, Prof.Sanjay Jadhav
    Abstract | PDFPDF
    281. Inner cluster Data Aggregation for Wireless Sensor Networks
    Pages :3934-3936
    K.B.Ashwini, G.T.Raju
    Abstract | PDFPDF
    282. Survey of Applications based on Vehicular Ad-Hoc Network (VANET) Framework
    Pages :3937-3942
    Mrunmayi S Sahasrabudhe, Dr. Meenu Chawla
    Abstract | PDFPDF
    283. Digital Inpainting on the Basis of Exemplar Based Method
    Pages :3943-3945
    Sanket Khedikar, P.N. Chatur
    Abstract | PDFPDF
    284. Triple Play Services Transmission over VDSL2 Broadband Access Network in MDU
    Pages :3946-3952
    Nasser N. Khamiss, Sara Ali Abed Al-Hussein
    Abstract | PDFPDF
    285. Near Infrared Spectroscopy Based a Portable Soil Nitrogen Detector Design
    Pages :3953-3956
    Sneha J. Bansod , Shubhada S. Thakare
    Abstract | PDFPDF
    286. Service Broker Algorithm for Cloud-Analyst
    Pages :3957-3962
    Rakesh Kumar Mishra , Sreenu Naik Bhukya
    Abstract | PDFPDF
    287. A Blind Watermarking Scheme against Local Attacks
    Pages :3963-3964
    Neethu Raveendran.K
    Abstract | PDFPDF
    288. Reviews of Load Balancing Based on Partitioning in Cloud Computing
    Pages :3965-3967
    Ms.Shilpa D.More, Mrs.Smita Chaudhari
    Abstract | PDFPDF
    289. Prevention Of Fire Accidents In Villages Using Wireless Sensor Networks
    Pages :3968-3971
    Dr. A. S. N. Chakravarthy, T. Anjikumar
    Abstract | PDFPDF
    290. Histogram Domain Adaptive Power Law Applications in Image Enhancement Technique
    Pages :3972-3978
    T. Romen Singh, Sudipta Roy, Kh. Manglem Singh
    Abstract | PDFPDF
    291. Hierarchical Clustering Algorithm LEACH -A Review
    Pages :3979-3981
    Devina Chhabra, Rajeev Vashisht
    Abstract | PDFPDF
    292. Exploiting Data Mining Technique for Rainfall Prediction
    Pages :3982-3984
    Nikhil Sethi, Dr.Kanwal Garg
    Abstract | PDFPDF
    293. Survey on Size Invariant Visual Cryptography
    Pages :3985-3990
    Biswapati Jana,Gargi Hait ,Shyamal Kumar Mondal
    Abstract | PDFPDF
    294. Review On: Gait Recognition for Human Identification using NN.
    Pages :3991-3993
    Navneet Kaur, Samandeep Singh
    Abstract | PDFPDF
    295. Implementation of Power Analysis Attack using SASEBO-W
    Pages :3994-3997
    Deevi Radha Rani, S. Venkateswarlu
    Abstract | PDFPDF
    296. An Improved Hierarchal Clustering Algorithm using Feature Reduction Techniques and Clustering Validation Indices
    Pages :3998-4003
    Nitin Soni, Prof Abha Choubey
    Abstract | PDFPDF
    297. Article Removed
    Pages :xxx-xxx
    xxx,xxx
    Abstract | PDFPDF
    298. Collapp - Real Time Online Code Collaborator
    Pages :4009-4010
    AradhyaTulsyan, Aaron Brako, Rahul Parekh,.Neepa Shah, AnujaNagare
    Abstract | PDFPDF
    299. Neural Network Based Face Recognition Using PCA
    Pages :4011-4014
    Ganesh Linge, Meenakshi Pawar
    Abstract | PDFPDF
    300. Design Of Reversible Fault Tolerent Decoder Using MOS Transistors
    Pages :4015-4018
    M.Amulya, Dr.M.V.Subramanyam
    Abstract | PDFPDF
    301. Review on SQL Injection Attacks: Detection Techniques and Protection Mechanisms
    Pages :4019-4022
    Sankaran. S , Sitharthan. S , Ramkumar. M
    Abstract | PDFPDF
    302. Energy Efficient Algorithm for Congestion Control in Wireless Sensor Networks
    Pages :4023-4027
    Ravinder singh, Sanjay Gurjar
    Abstract | PDFPDF
    303. Dynamic Cluster Configuration Algorithm in MapReduce Cloud
    Pages :4028-4033
    Rahul Prasad Kanu , Shabeera T P , S D Madhu Kumar
    Abstract | PDFPDF
    304. Classification of Agricultural Pests Using DWT and Back Propagation Neural Networks
    Pages :4034-4037
    Gaurav Kandalkar, A.V.Deorankar , P.N.Chatur
    Abstract | PDFPDF
    305. A Review - LOOP Dependence Analysis for Parallelizing Compiler
    Pages :4038-4046
    Pradip S. Devan, R. K. Kamat
    Abstract | PDFPDF
    306. A Model For Predicting Influential Users In Social Network
    Pages :4047-4053
    Sriganga B K, Ragini Krishna, and Dr. Prashanth C M
    Abstract | PDFPDF
    307. Fast Transmission to the Remote Co Operative Group: A New Key Management VPN and Security Policy Enforcement
    Pages :4054-4056
    Anil s Naik, Prakash C Pawar, Santosh C Pawar
    Abstract | PDFPDF
    308. Different Cube Computation Approaches: Survey Paper
    Pages :4057-4061
    Dhanshri S. Lad, Rasika P. Saste
    Abstract | PDFPDF
    309. Data Integrity Checking Protocol with Data Dynamics and Public Verifiability for Secure Cloud Computing
    Pages :4062-4064
    Snehal Vilas Zargad, Amruta Vijay Tambile,Shivangi Shashikant Sankoli, Rajashree Chandrakant Bhongale
    Abstract | PDFPDF
    310. Database Watermarking Using SHA 512 Signature Generation Technique
    Pages :4065-4068
    Ranjana Waman Gore, Rucha Tare
    Abstract | PDFPDF
    311. Despeckling of Images Using Wiener Filter in Dual Wavelet Transform Domain
    Pages :4069-4071
    Naman Chopra, Anshul Anand
    Abstract | PDFPDF
    312. Enhance the Security Level of MANET’s Using Digital Signature
    Pages :4072-4076
    M.BalaGanesh , M.Mohamed Faisal
    Abstract | PDFPDF
    313. Modified Secure Two Way Authentication System in Cloud Computing Using Encrypted One Time
    Password

    Pages :4077-4080
    Geetanjali Choudhury, Jainul Abudin
    Abstract | PDFPDF
    314. Sentiment Analysis Based Mining and Summarizing Using SVM-MapReduce
    Pages :4081-4085
    Jayashri Khairnar, Mayura Kinikar
    Abstract | PDFPDF
    315. Analysis of Different Techniques Used For Fault Tolerance
    Pages :4086-4090
    Jasbir Kaur, Supriya Kinger
    Abstract | PDFPDF
    316. A Survey Web Content Mining Methods and Applications for Information Extraction from Online Shopping Sites
    Pages :4091-4094
    Ananthi.J
    Abstract | PDFPDF
    317. Cloud Offerings: A Systematic Review
    Pages :4095-4103
    Dr. Reema Ajmera, Rudra Gautam
    Abstract | PDFPDF
    318. An Effective Approach of Data Security for Distributed Shared Memory Multiprocessors
    Pages :4104-4110
    Pradip S. Devan, R. K. Kamat
    Abstract | PDFPDF
    319. Review: Face Detection and Recognition Techniques
    Pages :4111-4117
    Shaily Pandey, Sandeep Sharma
    Abstract | PDFPDF
    320. Scalable and Flexible Access Control with Secure Data Auditing in Cloud Computing
    Pages :4118-4123
    Devi D, Arun P S
    Abstract | PDFPDF
    321. Analysis of Fast FIR Algorithms based Area Efficient FIR Digital Filters
    Pages :4124-4127
    Shikha Jain, Prof. Ravi Koneti, Dr. Rita Jain
    Abstract | PDFPDF
    322. Contour Based Object Tracking
    Pages :4128-4130
    Jaya P, Geethu Balakrishnan
    Abstract | PDFPDF
    323. Crime Trend Analysis and Prediction Using Mahanolobis Distance and Dynamic Time Warping Technique
    Pages :4131-4135
    Anchal Rani, Rajasree S.
    Abstract | PDFPDF
    324. Relevance Precise Protocol Structural Design for Wireless Sensor Networks
    Pages :4136-4139
    Gurpreet Singh, Ruby Gupta
    Abstract | PDFPDF
    325. Edge Detection of Sickle Cells in Red Blood Cells
    Pages :4140-4144
    Aruna N.S., Hariharan S.
    Abstract | PDFPDF
    326. An Approach to Perform Aspect level Sentiment Analysis on Customer Reviews using Sentiscore
    Algorithm and Priority Based Classification

    Pages :4145-4148
    Aishwarya Mohan, Manisha.R, Vijayaa.B, Naren.J
    Abstract | PDFPDF
    327. Classifying Linux Shell Commands using Naive Bayes Sequence Model
    Pages :4149-4151
    Prof. Darshika Lothe, Pradumna Gite, Amit Mishra, Anubhav Yadav, Snehal Kadlag
    Abstract | PDFPDF
    328. CBSE as Novel Approach for IDS
    Pages :4152-4154
    Mohit Angurala, Malti Rani
    Abstract | PDFPDF
    329. Article Removed
    Pages :4155-4161
    xxx, xxx
    Abstract | PDFPDF
    330. A Survey on Web Application Attacks
    Pages :4162-4166
    Gurvinder Kaur Pannu
    Abstract | PDFPDF
    331. Role of Software Metrics to Improve Software Quality
    Pages :4167-4170
    Vikash Chauhan, Dharmendra Lal Gupta, Sarvottam Dixit
    Abstract | PDFPDF
    332. Survey on Virtual Appliance - Technology, Merits and Case Studies
    Pages :4171-4174
    Sachin S. Pande, Parth Srivastava
    Abstract | PDFPDF
    333. Clustering of Documents using Particle Swarm Optimization and Semantics Information
    Pages :4175-4180
    Sunita Sarkar, Arindam Roy, Bipul Syam Purkayastha
    Abstract | PDFPDF
    334. IASC-CI: Improved Ant Based Swarm Computing for Classifying Imagery
    Pages :4181-4189
    Rebika Rai, Ratika Pradhan, M.K.Ghose
    Abstract | PDFPDF
    335. Visual Cryptography Scheme Based On Pixel Expansion for Black & White Image
    Pages :4190-4193
    Lekhika Chettri
    Abstract | PDFPDF
    336. Comparative Analysis of Performing Vehicle To Vehicle Communication Based On Two Tier Approach with High Security
    Pages :4194-4199
    Aarti R. Thakur, Prof. Jagdish Pimple
    Abstract | PDFPDF
    337. Study and Analysis of Universal Gates Using Stacking Low Power Technique
    Pages :4200-4204
    Neha Goyal, Renu Singla, Puneet Goyal
    Abstract | PDFPDF
    338. Performance Evaluation of Various Denoising Filters for Medical Image
    Pages :4205-4209
    P.Deepa, M.Suganthi
    Abstract | PDFPDF
    339. Dataset Segmentation for Cloud Computing and Securing Data Using ECC
    Pages :4210-4213
    Vidyanand Ukey, Nitin Mishra
    Abstract | PDFPDF
    340. Applications of Server Virtualization Technology
    Pages :4214-4217
    Shrithi H H, Vanamala C.K
    Abstract | PDFPDF
    341. A Survey on Different Available Detection Techniques of IDS and Attacks at Different Layers of MANET
    Pages :4218-4221
    Mahesh Gosavi, Prof. E. Jayanthi
    Abstract | PDFPDF
    342. Wireless Monitoring of Human Limb Motion
    Pages :4222-4225
    Vikas R Thakur, Snehal M Gajbhiye
    Abstract | PDFPDF
    343. CRI: A Novel Rating Based Leasing Policy and Algorithm for Efficient Resource Management in IaaS Clouds
    Pages :4226-4230
    Vivek Shrivastava, D. S. Bhilare
    Abstract | PDFPDF
    344. A Robust Trust Aware Secure Intrusion Detection for MANETs
    Pages :4231-4237
    R.Vineeth, Dr. N. K. Sakthivel, Dr. S. Subasree
    Abstract | PDFPDF
    345. EduPad-“A Tablet Based Educational System for Improving Adult Literacy in Rural India”
    Pages :4238-4244
    Mayuri Tawri, Prof. Richa Sharma
    Abstract | PDFPDF
    346. Driver Drowsiness Detection System and Techniques: A Review
    Pages :4245-4249
    Vandna Saini, Rekha Saini
    Abstract | PDFPDF
    347. A Survey on Effective Video Retrieval using Image Fuzzy Ontology
    Pages :4250-4256
    Jeeva S, Saranya V
    Abstract | PDFPDF
    348. A Review on Clustering Algorithms in WSN
    Pages :4257-4258
    Manpreet Kaur, Er. Lokesh Pawar
    Abstract | PDFPDF
    349. An Empirical Approach of Optimizing AODV Routing Protocol for Route Discovery in Mobile Ad-Hoc Network
    Pages :4259-4264
    Hirkani Padwad, S. V. Sonekar
    Abstract | PDFPDF
    350. Efficient Certificate Revocation with Vindication Capability for Mobile Ad-Hoc Networks
    Pages :4265-4271
    Nausheen Shamsi, Ranjana B Nagagoudar, Amareshwari Patil
    Abstract | PDFPDF
    351. Article Removed
    Pages :4272-4277
    xxx,xxx
    Abstract | PDFPDF
    352. An Association Rrule Data Classification with Optimization
    Pages :4278-4283
    Suman Mishra, Prateek Gupta
    Abstract | PDFPDF
    353. 3D Face Recognition Using Geodesic Facial Curves to Handle Expression, Occlusion and Pose
    Variations

    Pages :4284-4287
    Ashwini S Gawali and Prof.Ratnadeep R Deshmukh
    Abstract | PDFPDF
    354. On the reliance of COM Metrics for a C# Project
    Pages :4288-4291
    Harsh Bhasin, Deepika Sharma, Rashmi Popli
    Abstract | PDFPDF
    355. Performance Analysis of Gaussian Minimum Shift Keying (GMSK) With Error Control Codes in Wireless Sensor Networks
    Pages :4292-4296
    M. Sheik Dawood ,C.Jenifer, R.Abdul Sikkandhar and G.Athisha
    Abstract | PDFPDF
    356. Hybrid Classification Models Integration of Data for Business Integration
    Pages :4297-4300
    Pornima Rathi
    Abstract | PDFPDF
    357. Image Enhancement with Different Techniques and Aspects
    Pages :4301-4303
    Poonam, Er.Rajiv Kamboj
    Abstract | PDFPDF
    358. Visually Summarizing the Web using Internal Images and Keyphrases
    Pages :4304-4309
    M.V.Gedam, S. A. Takale
    Abstract | PDFPDF
    359. Review on Online SLA Tracking
    Pages :4310-4312
    Anuradha Rana, Pratima Sharma
    Abstract | PDFPDF
    360. Greedy Estimation of Distributed Algorithm to Solve Bounded knapsack Problem
    Pages :4313-4316
    Shweta Gupta, Devesh Batra, Pragya Verma
    Abstract | PDFPDF
    361. Introduction to Signed Brauer Algebra
    Pages :4317-4319
    Dr.Jeyabharthi, J.Evangeline Jeba
    Abstract | PDFPDF
    362. LabVIEW based Automatic Data acquisition system for Electrical Impedance Tomography
    Pages :4320-4324
    Vidya Sarode, Hema Patil, Alice N. Cheeran
    Abstract | PDFPDF
    363. Real Time Tracking & Health Monitoring System of Remote Soldier
    Pages :4325-4330
    P. S. Kurhe , K. V. Karad , A. S. Chavan
    Abstract | PDFPDF
    364. Enhanced Leach for Better Cluster Management Using MAX-HEAP
    Pages :4331-4335
    Rajni Kamboj, Rohit Chahal
    Abstract | PDFPDF
    365. Business Intelligence System for Banking and Finance
    Pages :4336-4349
    Tejas Vaidya, Sagar Ahirrao, Kiran Kadam, Kundan Lugade
    Abstract | PDFPDF
    366. A Survey: Enhanced Offline Signature Recognition Using Neuro- Fuzzy and SURF Features Techniques
    Pages :4350-4353
    Rupali Mehra, Dr. R.C. Gangwar
    Abstract | PDFPDF
    367. An Efficient Neural Network Based System for Diagnosis of Breast Cancer
    Pages :4354-4360
    Seema Singh, Sushmitha H, Harini J and Surabhi B.R
    Abstract | PDFPDF
    368. A Survey on Data Extraction of Web Pages Using Tag Tree Structure
    Pages :4361-4363
    Vivek D. Mohod, Mrs. J. V. Megha
    Abstract | PDFPDF
    369. Robust Security Solution to Countermeasure of Malicious Nodes for the Security of MANET
    Pages :4364-4368
    Kritika Sharma, Parikshit Singla
    Abstract | PDFPDF
    370. A Survey of Different Approaches to Detect Wormhole attack
    Pages :4369-4372
    Baltej Kaur Saluja, Prof A.K.Gupta
    Abstract | PDFPDF
    371. Enhanced QoS Support with Self Reconfigurable Wireless Mesh Networks
    Pages :4373-4380
    Sameena Fatima, Dr. Mohammed Abdul Waheed, Shridevi Soma
    Abstract | PDFPDF
    372. A Self-Healing Approach for Service Unavailability in Dynamic Web Service Composition
    Pages :4381-4383
    S.Poonguzhali, L.JerlinRubini, S.Divya
    Abstract | PDFPDF
    373. Change Profile with SMS on Android Platform
    Pages :4384-4389
    B. Lakshmi, B. Vijay Dattu and K. Anji Reddy
    Abstract | PDFPDF
    374. A MetaModel for Quality Software Based on the MDA Approach
    Pages :4390-4393
    Youness BOUKOUCHI, Adil KHAMAL, Abdalaziz MARZAK, Hicham MOUTACHAOUIK
    Abstract | PDFPDF
    375. An Interface for Extracting and Cropping of Face from Video Frames
    Pages :4394-4397
    Jyoti Rani, Dr. Kanwal Garg
    Abstract | PDFPDF
    376. Empirical Analysis for Web Based Projects - Software Components Reuse Techniques
    Pages :4398-4404
    Prof. Vuppu Padmakar, Dr. B V Ramana Murthy
    Abstract | PDFPDF
    377. A Survey of Uncertain Data Handling
    Pages :4405-4410
    Deepali Karne, Prof Pramod Patil
    Abstract | PDFPDF
    378. Quaternion Fourier Transform for Colour Images
    Pages :4411-4416
    Vikas R. Dubey
    Abstract | PDFPDF
    379. Performance Analysis of Black Hole Attack on different MANET Routing Protocols
    Pages :4417-4419
    Neeraj Arora, Dr. N.C. Barwar
    Abstract | PDFPDF
    380. Attack-Resistant Routing for Wireless Ad Hoc Networks
    Pages :4420-4423
    Susan Sharon George, Suma.R
    Abstract | PDFPDF
    381. Web Mining: Application for Web Based Distance Education Platform
    Pages :4424-4425
    Mohd Majid Shaikh, Dr.V.M.Patil, Prof.S.V.Dhopte
    Abstract | PDFPDF
    382. Study of Hummingbird Cryptographic Algorithms based on FPGA Implementation
    Pages :4426-4430
    Reena Bhatia
    Abstract | PDFPDF
    383. Yesterday’s Technology is Today’s Social Problem: Compelling Need to Incorporate Ethical Theories in Information System
    Pages :4431-4435
    Devashish Gosain, Mohit Sajwan, Sagarkumar Surani
    Abstract | PDFPDF
    384. Hands free JAVA (Through Speech Recognition)
    Pages :4436-4439
    Rakesh Patel , Mili Patel
    Abstract | PDFPDF
    385. A New Congestion Control Algorithm Based on Novel AQM
    Pages :4440-4443
    Dr. T.Karthikeyan, B. Subramani
    Abstract | PDFPDF
    386. Review of Algorithms for Clustering Random Data
    Pages :4444-4445
    Bhumika Ingale, Priyanka Fulare
    Abstract | PDFPDF
    387. FPGA Based Implementation Of Baseband OFDM Transceiver Using VHDL
    Pages :4446-4449
    A. S. Chavan , P. S. Kurhe , K. V. Karad
    Abstract | PDFPDF
    388. GSM & RFID Based Tx & Rx For Collision Avoidance & Speed Control
    Pages :4450-4454
    K. V. Karad , P. S. Kurhe , A. S. Chavan
    Abstract | PDFPDF
    389. A Recommendation Based Efficient Secure discover-predict-deliver Content Sharing Scheme
    Pages :4455-4462
    Asiya Zareen, Dr. Mohammed Abdul Waheed, Shridevi Soma
    Abstract | PDFPDF
    390. Parameter Estimation of COCOMO II using Tabu Search
    Pages :4463-4465
    Jagjit Kaur, Ritu Sindhu
    Abstract | PDFPDF
    391. Food Sustainability Using Wireless Sensors Networks: Waspmote and Meshlium
    Pages :4466-4468
    GeetinderKaur , Sourabh Joshi , Gulwatanpreet Singh
    Abstract | PDFPDF
    392. A Review of Various Agent Based Resolution Modelling Methods
    Pages :4469-4472
    Vivek Sharma, Anil Sagar, S B Taneja
    Abstract | PDFPDF
    393. Encrypt an Audio file using Combine Approach of Transformation and Cryptography
    Pages :4473-4476
    Vinita Makwana, Neha Parmar
    Abstract | PDFPDF
    394. Layers of Cloud – IaaS, PaaS and SaaS: A Survey
    Pages :4477-4480
    S.K. Sowmya, P. Deepika, J. Naren
    Abstract | PDFPDF
    395. Delegation of Auditing Operation to Auditor by Data Owner with Multiple Authorities for Secure
    Cloud Storage

    Pages :4481-4484
    Sowmya M N, Girish
    Abstract | PDFPDF
    396. Development of a New Scalable Parallelization Strategy for GCM Varsha and its Historical
    Perspective

    Pages :4485-4489
    T. Venkatesh and U.N.Sinha
    Abstract | PDFPDF
    397. Android Based, Arduino Powered Automated Wall Painting
    Pages :4490-4491
    Praneet Singh, Deepanshu Suneja, Prachi, Jitendra Kumar
    Abstract | PDFPDF
    398. A Comparative Analysis of SHA and MD5 Algorithm
    Pages :4492-4495
    Piyush Gupta, Sandeep Kumar
    Abstract | PDFPDF
    399. Comparative Analysis of Conventional IP Network and MPLS Network over VoIP Application
    Pages :4496-4499
    Rohit Mishra, Hifzan Ahmad
    Abstract | PDFPDF
    400. Study of Network Characteristics Incorporating Different Routing Protocols
    Pages :4500-4504
    Sumitpal Kaur, Hardeep S Ryait, Manpreet Kaur
    Abstract | PDFPDF
    401. Designing a new Applications of Data Warehousing Using 3-tier Architecture for Petroleum Industry
    Pages :4505-4510
    Dr. D.V.S.S.Subrahmanyam
    Abstract | PDFPDF
    402. Impacts of Keyword Frequency and Ranking Scope on Relevance of Web Search Results
    Pages :4511-4513
    Preeti Sharma
    Abstract | PDFPDF
    403. Comparative Study on Content Based Image Retrieval With Various Approaches
    Pages :4514-4518
    Sukhman Kaur, Rajesh Sharma
    Abstract | PDFPDF
    404. Study of Various Mutation Operators in Genetic Algorithms
    Pages :4519-4521
    Nitasha Soni, Dr Tapas Kumar
    Abstract | PDFPDF
    405. Improving Performance by combining Fingerprint and Iris in Multimodal Biometric
    Pages :4522-4525
    Sakshi Kalra, Anil Lamba
    Abstract | PDFPDF
    406. Third Party Auditor: An Integrity Checking Technique for Client Data Security in Cloud Computing
    Pages :4526-4530
    Renuka Goyal, Navjot Sidhu
    Abstract | PDFPDF
    407. Prevention of Selective Jamming Attack Using Cryptographic Packet Hiding Methods
    Pages :4531-4535
    S.B.Gavali , A. K. Bongale and A.B.Gavali
    Abstract | PDFPDF
    408. Discriminants of Brauer Algebra
    Pages :4536-4540
    Dr.Jeyabharthi, J.Evangeline Jeba
    Abstract | PDFPDF
    409. Effective Classifier for User's Behavioral Profile Classification
    Pages :4541-4545
    Umesh K. Gaikwad , Shirish S. Sane
    Abstract | PDFPDF
    410. Building Domain Specific Search Engine Based on DLS and VSM Algorithms
    Pages :4546-4551
    Mohamed. M. Elbasyouni, Elsaeed. E. Abdelrazek, Doaa. M. Hawa
    Abstract | PDFPDF
    411. GPGPU in the Most Avid Communication Medium: Emails
    Pages :4552-4555
    Prachi Goyal Juneja, R.K.Pateriya
    Abstract | PDFPDF
    412. Critical Need of the Data Warehouse for an Educational Institution and Its Challenges
    Pages :4556-4559
    Shaweta
    Abstract | PDFPDF
    413. Morphological based Face Detection& Recognition with Principal Component Analysis
    Pages :4560-4565
    Mandar Kiran Kulkarni, Prof. S. S. Lokhande
    Abstract | PDFPDF
    414. Privacy-Preserving For Collaborative Data Publishing
    Pages :4566-4569
    V. V. Nagendra kumar, C. Lavanya
    Abstract | PDFPDF
    415. AODV based Congestion Control Protocols: Review
    Pages :4570-4575
    Bandana Bhatia, Neha Sood
    Abstract | PDFPDF
    416. Efficient Bucketization Technique for Multidimensional Range Queries over Encrypted Metering Data for Smart Grid
    Pages :4576-4581
    Reshma Sultana N, Girish
    Abstract | PDFPDF
    417. A Review on Fault Tolerant Analysis for Hard Real Time Safety Critical Embedded System
    Pages :4582-4586
    Nisha O. S., Dr. K. Siva Sankar
    Abstract | PDFPDF
    418. Reduction of Confusing-Pair Effect in Car Registration Plate Identification
    Pages :4587-4589
    Dipankar Bhattacharya
    Abstract | PDFPDF
    419. Implementation of an Efficient Mechanism for Improving Web Image Search based on User Intention
    Pages :4590-4593
    Sanjyot S.Desale, Y.C.Kulkarni
    Abstract | PDFPDF
    420. A Systematic Approach for News Caption Generation
    Pages :4594-4598
    PHILO SUMI, ANU.T.P
    Abstract | PDFPDF
    421. A Review of Different Reputation Schemes to Thwart the Misbehaving Nodes in Mobile Ad Hoc Network
    Pages :4599-4603
    Suhas Sutariya, Prof. Prashant Modi
    Abstract | PDFPDF
    422. A Novel Approach to Detect Web Page Tampering
    Pages :4604-4607
    Ramniwas Kachhawa, Nikhil Kumar Singh, Deepak Singh Tomar
    Abstract | PDFPDF
    423. Protected Data Sharing scheme with Multi- Ownership for Non Static Groups in the Cloud
    Pages :4608-4614
    Chaitra C, Dr. T. R. Mahesh
    Abstract | PDFPDF
    424. A Survey on Feature Extraction Techniques for Color Images
    Pages :4615-4620
    Gaurav Mandloi
    Abstract | PDFPDF
    425. Sentiment Classification of News Articles
    Pages :4621-4623
    Kiran Shriniwas Doddi, Dr. Mrs. Y. V. Haribhakta, Dr. Parag Kulkarni
    Abstract | PDFPDF
    426. SMS Spam Filtering Application Using Android
    Pages :4624-4626
    Gaurav Sethi, Vijender Bhootna
    Abstract | PDFPDF
    427. Performance-Energy Aggregate metric based Scheduler (PEAS) for Smartphones
    Pages :4627-4632
    Rashmi Devi, Preeti Sharma
    Abstract | PDFPDF
    428. A Result Analysis on Privacy-Preserving Public Auditing System of Data Storage Security in Cloud
    Computing through Trusted TPA

    Pages :4633-4637
    Nupoor M. Yawale, Prof. V. B. Gadicha
    Abstract | PDFPDF
    429. Grading & Identification of Disease in Pomegranate Leaf and Fruit
    Pages :4638-4645
    Tejal Deshpande, Sharmila Sengupta, K.S.Raghuvanshi
    Abstract | PDFPDF
    430. Dynamically Allocating the Resources Using Virtual Machines
    Pages :4646-4648
    Gavine Kanakadurga Santan B.Veeramallu
    Abstract | PDFPDF
    431. Application of Data Mining in Educational Database for Predicting Behavioural Patterns of the Students
    Pages :4649-4652
    Elakia, Gayathri, Aarthi, Naren J
    Abstract | PDFPDF
    432. GA Based Spatial Time Scheduler for Reliable Multicasting in Wireless Ad-hoc Network
    Pages :4653-4660
    A.P.Shanmugasundaram, C.Chandrasekar
    Abstract | PDFPDF
    433. Low Energy Adaptive Clustering Hierarchy in Wireless Sensor Network (LEACH)
    Pages :4661-4664
    Lalita Yadav, Ch. Sunitha
    Abstract | PDFPDF
    434. A Comparative Study: Efficient Multihop Broadcast Protocol and Receiver Initiated-Medium
    Access Control Protocol

    Pages :4665-4668
    Pramatha.S , Dr.N.K.Sakthivel , Dr.S.Subasree
    Abstract | PDFPDF
    435. Comparison and Analysis of Different Mutation Strategies to improve the Performance of Genetic Algorithm
    Pages :4669-4673
    Suvarna Patil, Manisha Bhende
    Abstract | PDFPDF
    436. A Survey on Association Rule Mining Algorithm and Architecture for Distributed Processing
    Pages :4674-4678
    Imran Qureshi, Jammi Ashok, Vinaysagar Anchuri
    Abstract | PDFPDF
    437. Dynamic Resource Allocation to Maximize the Profits in Cloud Environment
    Pages :4679-4683
    K.R Dilip, J Bala Murali Krishna
    Abstract | PDFPDF
    438. A Secure way of performing Credit Card Transaction using Hybrid Model
    Pages :4684-4691
    Ashish Gupta, Jagdish Raikwal
    Abstract | PDFPDF
    439. A Survey of Analyzing the Efficiency Based Feature Selection of High Dimensional Data using
    Fast Algorithm

    Pages :4692-4695
    S.Nagendrudu, Chakali Subba Govardhan
    Abstract | PDFPDF
    440. Haze Removal and Color Compensation of Underwater Image and Denoising
    Pages :4627-4632
    Alka Tripathi, Pragya Gupta, Dr. Vineet Richaria
    Abstract | PDFPDF
    441. A Cellular Data Placement model for Wireless Sensor Network based on Distributed Clustering
    Approach

    Pages :4702-4705
    Virendra P. Yadav, Prof Kemal U. Koche
    Abstract | PDFPDF
    442. Localization Techniques and Their Challenges in Underwater Wireless Sensor Networks
    Pages :4706-4710
    Mukesh Beniwal, Rishipal Singh
    Abstract | PDFPDF
    443. Survey on Frauds in Financial Transactions
    Pages :4711-4713
    Vaibhav Bhosale, Megha Jonnalagedda
    Abstract | PDFPDF
    444. Design Of Flash Memory Controller
    Pages :4714-4718
    Sanket Jadhav, Sachin Shinde , Mrs. Shruti Oza
    Abstract | PDFPDF
    445. Optimization techniques for Routing in Wireless Sensor Network
    Pages :4719-4721
    Loveneet Kaur, Dinesh Kumar
    Abstract | PDFPDF
    446. Comparison of various Edge Detection Techniques for maximum data hiding using LSB Algorithm
    Pages :4722-4727
    Soumyajit Sarkar, Arijit Basu
    Abstract | PDFPDF
    447. Evaluating the Usability and Security of a Spelling Based Captcha System
    Pages :4728-4731
    Prof. Yogdhar Pandey, Darshika Lothe
    Abstract | PDFPDF
    448. A Study on String Matching Methodologies
    Pages :4732-4735
    Shivendra Kumar Pandey, Neeraj Kumar Dubey, Sonam Sharma
    Abstract | PDFPDF
    449. Evaluation of Epidemic Routing Protocol in Delay Tolerant Networks
    Pages :4736-4740
    D. Kiranmayi
    Abstract | PDFPDF
    450. Survey: Vision based Road Detection Techniques
    Pages :4741-4747
    Vipul H. Mistry, Dr. Ramji Makwana
    Abstract | PDFPDF
    451. Dynamic Role Assignment in Loose-Virtual-Clustering- Based Networks for Power Efficient MANETs
    Pages :4748-4751
    Pooja Deshpande, Prof.Anil Bende
    Abstract | PDFPDF
    452. Survey on Universal Image Steganalysis
    Pages :4752-4759
    Madhavi B. Desai, Dr. S.V. Patel
    Abstract | PDFPDF
    453. A Survey on Simulators for Cognitive Radio Network
    Pages :4760-4761
    Meenakshi Bhrugubanda
    Abstract | PDFPDF
    454. Enhanced Color Correction Using Histogram Stretching Based On Modified Gray World and White Patch Algorithms
    Pages :4762-4770
    Manjinder Singh, Dr. Sandeep Sharma
    Abstract | PDFPDF
    455. Improved Hop-by-Hop Congestion Control Algorithm
    Pages :4771-4773
    Urvashi Handa
    Abstract | PDFPDF
    456. Mobile Cloud Multimedia Services Using Enhance Blind Online Scheduling Algorithm
    Pages :4774-4778
    Saiyad Sharik Kaji, Prof.M.B.Chandak
    Abstract | PDFPDF
    457. An Implementation on Secure Hash Algorithm in Wireless Algorithms to Ensure the Integrity
    Pages :4779-4781
    Neetesh Tiwari, Amit Sinhal
    Abstract | PDFPDF
    458. Content based Recommender System on Customer Reviews using Sentiment Classification Algorithms
    Pages :4782-4787
    Keshav R,Arvind Swaminathan S,Goutham R,Naren J
    Abstract | PDFPDF
    459. Improving Energy and Efficiency in cluster based VANETs through AODV Protocol
    Pages :4788-4792
    Prerana Deshmukh, Prof. Shrikant Sonekar
    Abstract | PDFPDF
    460. Design and Development of Software for the Implementation of Image Processing Approach for
    Leaf Area Measurement

    Pages :4793-4797
    Gurjot Kaur, Salam Din, Amandeep Singh Brar
    Abstract | PDFPDF
    461. A Novel Scheme to Detect Wormhole Attacks in Wireless Mesh Network
    Pages :4798-4801
    Priti Gupta, Suveg Moudgil
    Abstract | PDFPDF
    462. Socket Programming
    Pages :4802-4807
    Limi Kalita
    Abstract | PDFPDF
    463. Secure Cloud Environment Using Hidden Markov Model and Rule Based Generation
    Pages :4808-4817
    Harsha Banafar, Sanjay Sharma
    Abstract | PDFPDF
    464. Parallel Implementation & Performance Evaluation of Blast Algorithm on Linux Cluster
    Pages :4818-4820
    Nisha Dhankher , O P Gupta
    Abstract | PDFPDF
    465. A Cost Effective Automatic Online Bus Information System using RFID and ZigBee
    Pages :4821-4825
    P. Prudhvi Kiran, R.Daniel,K.Venkata Prasad
    Abstract | PDFPDF
    -All rights are reserved by International Journal of Computer Science and Information Technologies-