1. |
Implementation of a Unique Light Weight Time Stamp Based Security Protocol for Wireless Adhoc Network
Pages : 4826-4829 Rajeev Dhawan , Swati Singhal
Abstract | PDF |
2. |
Optimized Intrusion Detection System
Pages : 4830-4833
Ragini Sen, Navdeep Kaur Saluja, Pratibha sahu
Abstract | PDF |
3. |
Automatic Red Blood Cell Counting using Watershed Segmentation
Pages : 4834-4838
Sumeet Chourasiya, G Usha Rani
Abstract | PDF |
4. |
Smart Authentication for Smart Phones
Pages : 4839-4843
Arpit Agrawal, Ashish Patidar
Abstract | PDF |
5. |
An Image Based Path Planning And Motion Planning for Autonomous Robot
Pages : 4844-4847
Heramb Nandkishor Joshi, Prof. J. P. Shinde
Abstract | PDF |
6. |
Side View Face Identification Based on Wavelet and Random Forest
Pages :4848-4853
Rahul Yogi, G Usha Rani
Abstract | PDF |
7. |
Prediction of Web Page by Hybrid Markov Model
Pages :4854-4855
Poonam kaushal ,Jitendra Dangra ,Dr.M.K.Rawat
Abstract | PDF |
8. |
Smart Grid with Multilayer Consensus ECC based PAKE Protocol
Pages :4848-4853
Meera Jadhav, Shilpa R Patil, Madhusudhan M.V
Abstract | PDF |
9. |
Randomized Additive Data Perturbation and Reconstruction Technique to Approximate Distribution of Original Information in PPDM
Pages :4864-4869
Dr. P.Kamakshi
Abstract | PDF |
10. |
Analysis of DeepWeb Search Interface
Pages :4870-4872
Yasha goel, Megha Bansal
Abstract | PDF |
11. |
Importance of Software Metrics to Quantify of Software Design and Source Code Quality
Pages :4873-4879
Siddharth Jain, Pradeep Baniya
Abstract | PDF |
12. |
Secure Data Packet of Cluster Head and Base Station in Wireless Sensor Networks
Pages :4880-4885
Abdo Saif Mohammed, M.N.Shanmukhaswamy
Abstract | PDF |
13. |
A Survey of Resource Scheduling Algorithms in Green Computing
Pages :4886-4890
Arshjot Kaur, Supriya Kinger
Abstract | PDF |
14. |
Image Steganography: A Review
Pages :4891-4896
Ayush Purohit, P.S.V.S.Sridhar
Abstract | PDF |
15. |
A Survey On: Distributed Monitoring for Scalable Hosting Infrastructures
Pages :4897-4901
Akshada Bhondave, Santoshkumar Biradar
Abstract | PDF |
16. |
Study of TORA FOR Mobile Ad-hoc Network
Pages :4902-4905
Ritu Sharma, Ritu Sindhu
Abstract | PDF |
17. |
Communication within Sensor Networks by Using Key Distributor
Pages :4906-4910
Ch. Demudu Naidu, Prof.S. Pallam Setty, M.V.Kishore, V.Annapoorna, D.Sailaja
Abstract | PDF |
18. |
A Novel Approach for Auto Classification and Grouping Similar User Query for Image Search
Pages :4911-4915
Shamali K. Kherdikar, Rajesh Kulkarni
Abstract | PDF |
19. |
Design and Verification of USB 3.0 Link Layer (LTSSM)
Pages :4916-4921
Rohit Kumar, Hardik Trivedi, Nitish Alok
Abstract | PDF |
20. |
Some Issues, Challenges and Problems of Distributed Software System
Pages :4922-4925
Kamal Sheel Mishra, Anil Kumar Tripathi
Abstract | PDF |
21. |
Detection and Prevention Techniques for Wormhole Attacks
Pages :4926-4929
Chandandeep kaur, Dr.Navdeep Kaur
Abstract | PDF |
22. |
An Innovative Approach to increase the Life time of Wireless Sensor Networks
Pages :4930-4935
R.Deenadhayalan, Dr.S Anandamurugan
Abstract | PDF |
23. |
Web Spam Detection Using Improved Decision Tree Classification Method
Pages :4936-4942
Rashmi R. Tundalwar, Prof. Manasi Kulkarni
Abstract | PDF |
24. |
A Survey of Parkinson’s Disease Using Data Mining Alogorithms
Pages :4943-4944
Dr. Hariganesh S, Gracy Annamary S
Abstract | PDF |
25. |
Efficient Method for Wimax Soft Handover in VOIP and IPTV
Pages :4945-4948
Mehru Nisha Sheikh, Dr. Kamal Sharma, Surjeet Dalal
Abstract | PDF |
26. |
Event Driven Clustering Scheme and Energy Efficient Routing for Wireless Sensor Network
- A Review
Pages :4949-4951
Amandeep Kaur, Rupinder Kaur Gill
Abstract | PDF |
27. |
Genetic Algorithm Based Intrusion Detection System
Pages :4952-4957
Neha Rai, Khushbu Rai
Abstract | PDF |
28. |
Human Gait Recognition for Different Viewing Angles using PCA
Pages :4958-4961
Suvarna Shirke , Soudamini Pawar
Abstract | PDF |
29. |
Efficient Routing Tree Formation to Reduce Energy in Lightweight Routing in Wireless Sensor
Networks
Pages :4962-4965
Neelamma B.U, Manoj Challa
Abstract | PDF |
30. |
A New Approach of Enhanced Buffer Management Policy in Delay Tolerant Network
(DTN)
Pages :4966-4969
Mohammad Rahmatullah, Dr Priyanka Tripathi
Abstract | PDF |
31. |
Zero private information leak using multi-level security and privileged access for designated
authorities on demand
Pages :4970-4974
Syama BabuRaj, Pretty Babu
Abstract | PDF |
32. |
Simulation of MANET using GloMoSim Network Simulator
Pages :4975-4980
Kriti Jaiswal , Om Prakash
Abstract | PDF |
33. |
Encryption Techniques in Packet Hiding Methods to Prevent Jamming Attacks in Wireless Network
Pages :4981-4985
Rashmi B.Dhamannavar, Dr.Rashmi M.Jogdand
Abstract | PDF |
34. |
Genetic Neuro Fuzzy System for Hypertension Diagnosis
Pages :4986-4989
Arpneek Kaur, Abhishek Bhardwaj
Abstract | PDF |
35. |
Energy Efficient Zone Based Location Aided Routing Protocol for MANET
Pages :4990-4994
Ruchi Aggarwal, Amanpreet Kaur
Abstract | PDF |
36. |
Adaptive Quality Enhancement for Videos Using AGCWD
Pages :4995-4998
Banu Fathima Mariyam, Annes Philip
Abstract | PDF |
37. |
Robust Data Collection in Wireless Sensor Networks with Mobile Sinks
Pages :4999-5002
Shrikant D. Dhamdhere, Shanthi K.Guru
Abstract | PDF |
38. |
Adaptive Wavelet Packet Decomposition for Efficient Image Denoising By Using NeighSure
Shrink Method
Pages :5003-5009
Mahalakshmi B.V, Anand M.J
Abstract | PDF |
39. |
Interpolation Based Image Super Resolution by Support-Vector-Regression
Pages :5010-5014
Sowmya. M , Anand M.J
Abstract | PDF |
40. |
Association Rule Mining in Discovering Travel Pattern in Passport Data Analysis
Pages :5015-5019
Praveen Rani, Dr. Rajan Vohra, Anju Gulia
Abstract | PDF |
41. |
Software Plagiarism Detection Techniques: A Comparative Study
Pages :5020-5024
Divya Luke, Divya P.S, Sony L Johnson, Sreeprabha S,Elizabeth.B.Varghese
Abstract | PDF |
42. |
Cloud Computing: Designing Different System Architecture Depending On Real-World Examples
Pages :5025-5029
Dr. Ravish Saggar, Ms. Shubhra Saggar,Ms. Nidhi Khurana
Abstract | PDF |
43. |
Secure Storage and Data Integrity Proof in Cloud
Pages :5030-5032
Adarsh R., P. ChidanandaMurthy
Abstract | PDF |
44. |
SYN Flooding Attacks in Mobile Adhoc Networks
Pages :5033-5037
K.Geetha
Abstract | PDF |
45. |
Attribute-Based Encryption for Scalable and Secure Sharing of Personal Health Records in
Cloud Computing
Pages :5038-5040
Prasad P S, Dr. G F Ali Ahammed
Abstract | PDF |
46. |
Automatic Face Detection & Identification Using Robust Face Name Graph Matching In Video &
Live Streaming
Pages :5041-5046
Ashish R Tulshi, Prof.Praveen Bhanodiya.
Abstract | PDF |
47. |
Algorithm to color a Circuit Dual Hypergraph for VLSI Circuit
Pages :5047-5052
Bornali Gogoi, Bichitra Kalita
Abstract | PDF |
48. |
Comparative Study of AODV, DSDV and DSR Routing Protocols in Wireless Sensor Network
Using NS-2 Simulator
Pages :5053-5056
Anu Arya, Jagtar Singh
Abstract | PDF |
49. |
A Novel Hybrid Algorithm for Permutation Flow Shop Scheduling
Pages :5057-5061
Sandeep Kumar, Pooja Jadon
Abstract | PDF |
50. |
Defend Data using ELGAMAL Digital Signature Data Decryption Algorithm
Pages :5062-5067
K Vahini, V Prasad ,U V Chandra Sekhar
Abstract | PDF |
51. |
Issues in Mobile e-commerce: A survey
Pages :5068-5070
Manoj Giri, Sonia Singh
Abstract | PDF |
52. |
An Extensive Survey of Monitoring of Load Balance in Oracle Real Application Cluster
Pages :5071-5074
Neha Chandrima, Sunil Phulre, Dr. Vineet Richhariya
Abstract | PDF |
53. |
Comparative Study of Project Tracking and Management Tools
Pages :5075-5080
Yakshi Makhija, Ankush Goyal
Abstract | PDF |
54. |
Traffic Congestion Control through Vehicle-to-Vehicle and Vehicle to Infrastructure Communication
Pages :5081-5084
Thirupathi Lingala, Ashok Galipelli, Mahesh Thanneru
Abstract | PDF |
55. |
AuthMAN: Authentication in Multicast Mobile AdHoc Networks using Time Asymmetry
Pages :5085-5088
Prasad Chaudhari, Deepali Gothawal
Abstract | PDF |
56. |
Android Based Remote Control of Mobile Devices Using VNC System
Pages :5089-5091
Rashmi A. Kalje, Prof. S. P. Kosbatwar
Abstract | PDF |
57. |
Analysis of Student Result Using Clustering Techniques
Pages :5092-5094
P.Veeramuthu, Dr.R.Periyasamy, V.Sugasini
Abstract | PDF |
58. |
Wireless Sensor Monitoring System Pages :5095-5097
Tushar C. Korade, Dr. Mrs. A. A. Shinde
Abstract | PDF |
59. |
Survey on Text Classification (Spam) Using Machine Learning
Pages :5098-5102
Neetu Sharma, GaganpreetKaur, Ashish Verma
Abstract | PDF |
60. |
Analysis and Classification Technique Based On ANN for EEG Signals
Pages :5103-5105
Neelam Rout
Abstract | PDF |
61. |
Detecting Users Behavior from Web Access Logs with Automated Log Analyzer Tool
Pages :5106-5109
Deepti Sahu, Shweta Meena
Abstract | PDF |
62. |
Liver Patient Classification Using Intelligent Techniques
Pages :5110-5115
Anju Gulia, Dr. Rajan Vohra, Praveen Rani
Abstract | PDF |
63. |
Maximum Profit Based tasks Scheduling Over Peer-to-Peer Network for Market-Like Cloud
Computing Systems
Pages :5116-5119
Sasidharan S
Abstract | PDF |
64. |
Impact & Analysis of DVROFT Filter on TEM Image
Pages :5120-5124
Garima Goyal
Abstract | PDF |
65. |
Design of a Cordic Based Radix-4 FFT Processor
Pages :5125-5128
Ajay S. Padekar, Prof. S. S. Belsare
Abstract | PDF |
66. |
A Review on: Advanced Artificial Neural Networks (ANN) approach for IDS by layered
method
Pages :5129-5131
P. D. Somwanshi and S. M. Chaware
Abstract | PDF |
67. |
Survey: Secured Techniques for Vulnerability Assessment and Penetration Testing
Pages :5132-5135
Sushilkumar Yadav, Chandrakant Navdeti
Abstract | PDF |
68. |
Improved Qualitative Color Image Steganography Based on DWT
Pages :5136-5140
Naresh Goud M, Arjun Nelikanti, Muni Sekhar V
Abstract | PDF |
69. |
Study of Network Coding Based Multipath Routing Protocol For Multicast Network
Pages :5141-5144
Gunjal M.S., Prof.S.A.Shaikh
Abstract | PDF |
70. |
City Crime Profiling Using Cluster Analysis
Pages :5145-5148
Priyanka Gera, Rajan Vohra
Abstract | PDF |
71. |
A Novel Methodology for Implementing a DDos Attack and Prevention
Pages :5149-5152
Rachna Tewani, Saumya Singh, Arun Kumar Dubey
Abstract | PDF |
72. |
A Secured Adaptive Mobile Video Streaming and Efficient Social Video Sharing in the Clouds
Pages :5153-5156
V.Manasa , M.Vikram
Abstract | PDF |
73. |
Balanced- Ternary Logic for Improved and Advanced Computing
Pages :5157-5160
Shamshad Ahmad, Mansaf Alam
Abstract | PDF |
74. |
Load Estimation and Prediction on Passport Data Using Linear Regression
Pages :5161-5165
Swati Rana, Rajan Vohra
Abstract | PDF |
75. |
Risk Computation and Identification in Passport Data Analysis
Pages :5166-5169
Sucheta Gulia,Dr. Rajan Vohra
Abstract | PDF |
76. |
Sharing Health Records in Personal and Public Domains in a Secure Environment with ABE
Pages :5170-5173
M Thulasi, D Shobha Rani
Abstract | PDF |
77. |
Prediction of Diabetes Using Bayesian Network
Pages :5174-5178
Mukesh kumari, Dr. Rajan Vohra ,Anshul Arora
Abstract | PDF |
78. |
Trusted Clustering Based Event Detection for Disaster Management in Wireless Sensor Network
Pages :5179-5181
Apurva Saoji, Prof.P.D.Lambhate
Abstract | PDF |
79. |
Traditional Learning versus Web Based Learning: Performance Analysis
Pages :5182-5184
Kavita Saini, Dr. Abdul Wahid, Dr. G N Purohit
Abstract | PDF |
80. |
Token-MAC: Inactive RFID Systems for A light MAC Protocol
Pages :5185-5188
N.Anusha, P. Ramesh Babu, P.Nirupama
Abstract | PDF |
81. |
Efficient Self Protection in Clustered Distributed System Using Access Detection
Pages :5189-5191
Priyadarshini Patil
Abstract | PDF |
82. |
Radar Imaging of Concealed Targets
Pages :5192-5196
Vidya H A
Abstract | PDF |
83. |
Performance Improvement of Mobile Ad hoc Networks under Jamming Attack
Pages :5197-5200
Snehita Modi, Dr. Paramjeet Singh, Dr. Shaveta Rani
Abstract | PDF |
84. |
Prevention of Black Hole Attack in AODV Routing
Algorithm of MANET Using Trust Based Computing
Pages :5201-5205
Ashish Sharma, Dinesh Bhuriya, Upendra Singh, Sushma Singh
Abstract | PDF |
85. |
A System to Improve Data Quality in healthcare
using Naïve Bayes Classifier
Pages :5206-5209
Shwetkranti N. Taware, Vaishali Kolhe
Abstract | PDF |
86. |
Securing Image Password by using Persuasive
Cued Click Points with AES Algorithm
Pages :5210-5215
Smita Chaturvedi, Rekha Sharma
Abstract | PDF |
87. |
Estimation of Missing Values Using Decision Tree
Approach
Pages :5216-5220
Gimpy, Dr. Rajan Vohra, Minakshi
Abstract | PDF |
88. |
Dynamic Caption Generation with Image Annotation
Pages :5221-5224
Thirupathi Podeti, Bhanu Prasad A
Abstract | PDF |
89. |
Performance Analysis of Black-Hole Attack in MANET
Pages :5225-5230
Jyoti, Rashmi Kushwah
Abstract | PDF |
90. |
Studies on Clustering and Fuzzy Clustering
Pages :5231-5232
K.Velusamy, A. Sakthivel, M. Jayakeerthi
Abstract | PDF |
91. |
Storing, Querying and Validating Fuzzy XML
Data in Relational Database
Pages :5233-5240
Naresh Kumar. K, Satyanand Reddy. Ch, V.E.S. Murthy. N
Abstract | PDF |
92. |
Segmentation of Mobile Customers for Improving Profitability Using Data Mining Techniques
Pages :5241-5244
Anshul Arora, Dr. Rajan Vohra
Abstract | PDF |
93. |
Extractive Multi Document Summarizer Alogorithim
Pages :5245-5248
Amit.S.Zore, Aarati Deshpande
Abstract | PDF |
94. |
Digital Watermarking Using Hybridization of Optimization Techniques:A Review
Pages :5249-5251
Sonil Sood
Abstract | PDF |
95. |
Automated Detection of Neovascular Glaucoma through Fractal Dimension Method
Pages :5252-5257
Dharmanna Lamani, Dr. T. C. Manjunath, Dr. U P Kulkarni
Abstract | PDF |
96. |
Review of Algorithms and Applications in Speech Recognition System
Pages :5258-5262
Rashmi C R
Abstract | PDF |
97. |
Parallel Programming Models: A Systematic Survey
Pages :5268-5271
Chougule Meenal D, Gutte Prashant H
Abstract | PDF |
98. |
Content Based Video Retrieval by Genre Recognition Using Tree Pruning Technique
Pages :5263-5267
Amit Fegade, Prof. Vipul Dalal
Abstract | PDF |
99. |
A New Clustering Based Algorithm for Feature Subset Selection
Pages :5272-5275
Nitin B Chopade, Beena S Khade
Abstract | PDF |
100. |
Issues and Challenges in Complex Analysis of Variables
Pages :5276-5278
M.V.Mawale, Dr.Vinay Chavan
Abstract | PDF |
101. |
Survey on Data Mining with Privacy Preservation
Pages :5279-5283
Sachin Janbandhu, Dr.S.M.Chaware
Abstract | PDF |
102. |
Enhancing Storage and Computational Performance of Android Phones Using Virtual Machine in Cloud
Pages :5284-5287
Joshi Rakhi, Prof. V.B. Maral
Abstract | PDF |
103. |
An Efficient Software Prediction on Cloud infrastructure With Self- Adaptive Classification
Model
Pages :5288-5295
Chidambaram Kandavel, Chandrasekar C
Abstract | PDF |
104. |
Comparison of LTE (Long Term Evolution) and
WiMax on fixed and mobile networks for TCP,
UDP traffics using NS2 Simulator
Pages :5296-5300
Ankita Sengar
Abstract | PDF |
105. |
Speech Based Voice Recognition System for Natural Language Processing
Pages :5301-5305
Dr. Kavitha. R, Nachammai. N, Ranjani. R, Shifali. J
Abstract | PDF |
106. |
Biometric Identification of an Individual Using Eigenface Method
Pages :5306-5309
Sheela Shankar, V.R Udupi
Abstract | PDF |
107. |
A survey: Web mining via Tag and Value
Pages :5310-5314
Khirade Rajratna Rajaram, Balaji Shetty
Abstract | PDF |
108. |
Missing Value Imputation in Multi Attribute Data Set
Pages :5315-5321
Minakshi, Dr. Rajan Vohra, Gimpy
Abstract | PDF |
109. |
Privacy Preservation of Published Data through Record Elimination by Anonymizied Approach
Pages :5322-5324
Sakshi Agrawal
Abstract | PDF |
110. |
Uncovering of Plant Disease Based on Content Recovery from Images
Pages :5325-5327
Tejaswini C. Karpe, Deipali V. Gore
Abstract | PDF |
111. |
Implementation of Emergency Call Notification - Advanced PBX Feature using SIP protocol
Pages :5328-5332
Sunil. S, T. A. Chavan
Abstract | PDF |
112. |
Cloud Computing and an End-System Redundancy Elimination Service for Enterprises
Pages :5333-5335
Ganapathi Avabrath
Abstract | PDF |
113. |
A Case Study on Mathematical Morphology Segmentation for MRI Brain Image
Pages :5336-5340
Senthilkumaran N , Kirubakaran C
Abstract | PDF |
114. |
Flame Detection in Videos Based on SVM
Pages :5341-5344
Madhuri R. Choutmahal, Prof. Pravin M. Kamde
Abstract | PDF |
115. |
An Enhanced Agent Based Simulation using Selected Viewing Multi-Resolution Modeling
Pages :5345-5350
Vivek Sharma, Anil Sagar
Abstract | PDF |
116. |
A Survey on Data Sharing Using Encryption Technique in Cloud Computing
Pages :5351-5354
Swarup kshatriya, Dr.Sandip M Chaware
Abstract | PDF |
117. |
Challenges in Edge Extraction of Dental X-Ray Images Using Image Processing Algorithms – A Review
Pages :5355-5358
Gayathri V, Hema P Menon
Abstract | PDF |
118. |
Improved Handover Mechanisms to Reduce Packet Forwarding in LTE-Advanced Using Single Poll
Technique
Pages :5359-5362
Nikhil Trikoti S, Nayana S
Abstract | PDF |
119. |
Image Denoising using Neural Network with SVM (Support Vector Machine) and
LDA (Linear Discriminant Analysis)
Pages :5363-5367
Ahmad Ali Saihood
Abstract | PDF |
120. |
Firefly Algorithm to Solve Two Dimensional Bin Packing Problem
Pages :5368-5373
Kratika Chandra , Sudhir Singh
Abstract | PDF |
121. |
Classification Of PEC Detect Using Hybrid Technique
Pages :5374- 5385
V.Leelavathy, Dr.J.Komalalakshmi
Abstract | PDF |
122. |
Geocast Routing in Vehicular Ad Hoc Networks: A Survey
Pages :5365-5370
Seema Kamboj, Sunil Chawla
Abstract | PDF |
123. |
Propagate Cooperative Caching on MANETS
Pages :5371-5374
P. Nagaraju, S. Praneetha
Abstract | PDF |
124. |
An Empirical Study of Multipath Routing Protocols in Wireless Sensor Networks
Pages :5375-5379
Swati Lipsa
Abstract | PDF |
125. |
Performance Efficient DNA Sequence Detection on GPUUsing Parallel Pattern Matching Approach
Pages :5380-5385
Rahul Shirude,
Valmik B. Nikam,
B.B. Meshram
Abstract | PDF |
126. |
Off-line Signature Verification Using Artificial
Neural Network & Error Detection
Pages :5386-5389
Madhavi D. Malekar, Prof. Sachin Sohara
Abstract | PDF |
127. |
Review for Multibiometric Cryptosystem using Fuzzy Vault for Wired Network
Pages :5390-5392
Ketaki N. Bhoyar, Manasi K. Kulkarni
Abstract | PDF |
128. |
Image Fusion on Multi Focused Images using NSCT
Pages :5393-5396
Kurakula Sravya, Dr. P. Govardhan, Naresh Goud M
Abstract | PDF |
129. |
Using SG-PKM Improve security mechanism for Supporting Routing Services on WANET
Pages :5397-5399
Ashwini Shendre, P. S. Mohod
Abstract | PDF |
130. |
Fuzzy Weighted Associative Classifier based on Positive and Negative Rules
Pages :5400-5403
M. Kalpana Devi, M. Usha Rani
Abstract | PDF |
131. |
Authenticated Diffie-Hellman Key Exchange Algorithm
Pages :5404-5407
Navpreet Kaur, Ritu Nagpal
Abstract | PDF |
132. |
Image-to-Image Retrieval with Similarity Measures
Pages :5408-5411
Manisha Ballal, Prof. Potdar G.P.
Abstract | PDF |
133. |
Awareness of Plagiarism: Marching Approaches and Renovations-A Survey
Pages :5412-5414
C.I.Arthi, Dimple Bohra
Abstract | PDF |
134. |
Improvement of Bandwidth Efficient Video and Live Streaming in Mobile using AWS Cloud
Pages :5415-5421
Vinod S H , Dr. K N Rama Mohan Babu
Abstract | PDF |
135. |
A Survey on Feature Level Sentiment Analysis
Pages :5422-5425
Neha S. Joshi, Suhasini A. Itkat
Abstract | PDF |
136. |
Locating Sequence Blocks using Logical Match
Pages :5426-5428
Sanil Shanker KP
Abstract | PDF |
137. |
A Study of the Issues and Security of Cloud Computing
Pages :5429-5434
Shaurya Gupta, Piyush Gupta
Abstract | PDF |
138. |
Wireless Networks And Cross-Layer Design: An Implementation Approach
Pages :5435-5440
Vitthal B.Kamble, Dr. M.U.Kharat
Abstract | PDF |
139. |
State-of-the-art of Content Delivery Network
Pages :5441-5446
Manish Gupta, Dharmendra Kumar
Abstract | PDF |
140. |
Secure Cloud – A Survey
Pages :5447-5449
I Jaffar Ali, N Shareefa Rabiya
Abstract | PDF |
141. |
A Novel Pattern Matching Algorithm in Genome Sequence Analysis
Pages :5450-5457
Ashish Prosad Gope, Rabi Narayan Behera
Abstract | PDF |
142. |
Refining an Ad-hoc Network Performance by Executing Multiple Channel in Mac Protocol
Pages :5458-5460
D.Helen, Dr.D.Arivazhagan
Abstract | PDF |
143. |
Iris Image compression using Mallat based wavelet, Directional Filter Bank and SPIHT
Pages :5461-5464
Uma Rathod, Mandar Sohani, Deepali Vora
Abstract | PDF |
144. |
Energy Economical Resolution for Heavy Computation Using Cloud
Pages :5465-5469
Fazeel Irshad Zama, Dr. Manoj B. Chandak
Abstract | PDF |
145. |
Comparative Analysis of Encrypted Video Streaming in Cloud Network
Pages :5470-5476
Sangeeta Gupta, Lalit Kishor, Dinesh Goyal
Abstract | PDF |
146. |
Virtual Machine Placement Based on Disk I/O Load in Cloud
Pages :5477-5479
Pathan Noumankhan Sayeedkhan, Shetty Balaji S.
Abstract | PDF |
147. |
Mining Social Media-Utility Based Privacy Preservation
Pages :5480-5485
V.Vijayalakshmi, A.S.Arunachalam, R.Nandhakumar
Abstract | PDF |
148. |
Panoramic Image Formation Using Corner Detection On Image Grids
Pages :5486-5490
Amar Nath Shukla, Imran Ullah Khan, Manshi Shukla
Abstract | PDF |
149. |
Node-Disjoint Multipath Routing Based on AOMDV Protocol for MANETS
Pages :5491-5496
Er.Rubia Singla, Er. Jasvir Singh
Abstract | PDF |
150. |
RAI-DD: Reliability, Availability Identification& Dynamic Decision Based Replica Distribution for
Cloud Computing
Pages :5497-5502
Sapna Engle, Gaurav Shriwastava
Abstract | PDF |
151. |
A Compartive Study about Different Social Networking Sites
Pages :5503-5507
Shashank Gupta, Shilpi Sharma
Abstract | PDF |
152. |
Review paper on Cognitive Radio Networking and Communications
Pages :5508-5511
Ayubi Preet, Amandeep Kaur
Abstract | PDF |
153. |
A Survey on Different Hybrid Routing Protocols of MANET
Pages :5512-5516
Kanishka Raheja , Sunil Kr Maakar
Abstract | PDF |
154. |
Survey on Energy Efficient Approach for Wireless Multimedia Sensor Network
Pages :5517-5520
Mohini Kumrawat, Manoj Dhawan
Abstract | PDF |
155. |
Identity-Based Cryptography and Comparison with traditional Public key Encryption: A Survey
Pages :5521-5525
Girish, Phaneendra H.D
Abstract | PDF |
156. |
Natural Feature Tracking (NFT) Enabled Low Cost Human Machine Interface (HMI) for Real Time
Applications in Mobile
Pages :5526-5528
Krishna Chauhan, Sandeep Singh Padan
Abstract | PDF |
157. |
A Self-Configured Secure Protocol for the Management of Wireless Ad Hoc Networks
Pages :5529-5532
K.Srinivas, G.Balu NarasimhaRao, Dr.Sai Satyanarayana Reddy
Abstract | PDF |
158. |
VOIP Over Wimax: A Comprehensive Review
Pages :5533-5535
Preetinder Singh, Ravneet Kaur
Abstract | PDF |
159. |
EMS: An Android Application for Emergency Patients
Pages :5536-5538
Sanjay. A. Agrawal, Shrikant. B. Chavan
Abstract | PDF |
160. |
Flocking Behaviour Simulation : Explanation and Enhancements in Boid Algorithm
Pages :5539-5544
Mohit Sajwan, Devashish Gosain, Sagarkumar Surani
Abstract | PDF |
161. |
Overview: Software Reliability Growth Models
Pages :5545-5547
Shailee Lohmor, Dr. B B Sagar
Abstract | PDF |
162. |
Dual Digest Symmetric Key Security Scheme for AODV in MANET
Pages :5548-5552
Gandhi Krunal A., Patel Tejal K.
Abstract | PDF |
163. |
Optimized Mobile Search Engine
Pages :5553-5559
E.Chaitanya, Dr.Sai Satyanarayana Reddy, O.Srinivasa Reddy
Abstract | PDF |
164. |
IMPACT OF VIRUS: A Strategy against Virus Attack in Daily Life
Pages :5560-5564
Pramod Kumar Maurya, Gireesh Dixit, Jay Prakash Maurya
Abstract | PDF |
165. |
Enhanced Character Recognition Using Surf Feature and Neural Network Technique
Pages :5565-5570
Reetika Verma
, Rupinder Kaur
Abstract | PDF |
166. |
An Approach to Effective Bandwidth Utilization using Software Define Networking
Pages :5571-5574
Deepika M S, K N Rama Mohan babu
Abstract | PDF |
167. |
Future Practicability of Android Application Development with New Android Libraries and
Frameworks
Pages :5575-5579
Shruti Mukherjee , Ishani Mondal
Abstract | PDF |
168. |
An Approach to Remove Security Vulnerability Affected By SQL Code Injection Attack
Pages :5580-5583
Shanu Verma, Poonam
Abstract | PDF |
169. |
Data Compression Techniques
Pages :5584-5586
Gaurav Sethi , Sweta Shaw ,Vinutha K , Chandrani Chakravorty
Abstract | PDF |
170. |
Comparison of Different Adaptive Speech Algorithm to Correct Wow and Flutter in Audio
Signals
Pages :5587-5600
Chanda Thakur , Satbir Singh
Abstract | PDF |
171. |
Review on Event Retrieval in Soccer Video
Pages :5601-5605
Ganesh.I.Rathod, Dipali.A.Nikam
Abstract | PDF |
172. |
Different Clustering Pattern Algorithms using Tropical Storm Data
Pages :5606-5609
Capt.Dr.S.Santhosh Baboo, K.Tajudin
Abstract | PDF |
173. |
Content Based Image Retrieval Using Interactive Genetic Algorithm with Relevance Feedback
Technique-Survey
Pages :5610-5613
Anita N. Ligade, Manisha R. Patil
Abstract | PDF |
174. |
An Ensemble Approach to Enhance Performance of Webpage Classification
Pages :5614-5619
Roshani Choudhary, Jagdish Raikwal
Abstract | PDF |
175. |
Investigating the Effect of Fault Category on Overall Capture Probability during Requirements
Inspection
Pages :5620-5624
Tejalal Choudhary, Anurag Goswami
Abstract | PDF |
176. |
ICT And National Security in Developing and Underdeveloped Countries – The Good, The Bad and
The Ugly: A Case Study of Nigeria’s Cyberspace
Pages :5625-5633
Emmanuel C. Ogu, Oyeyinka D. Oyerinde
Abstract | PDF |
177. |
A Comparative Study of Software Quality Models
Pages :5634-5638
Suman, Manoj Wadhwa
Abstract | PDF |
178. |
Multi-Parametrized Optimized Ad-Hoc On Demand Distance Vector Routing
Pages :5639-5642
Pratibha Sahu
Abstract | PDF |
179. |
Multi-Criteria Decision Making: An overview of different selection problems and methods
Pages :5643-5646
Rohan K. Gavade
Abstract | PDF |
180. |
Sequential Clustering Algorithms for Anonymizing Social Networks
Pages :5647-5650
P.Mohana Lakshmi, P.Balaji, P.Nirupama
Abstract | PDF |
181. |
A Hybrid Best So Far Artificial Bee Colony Algorithm for Function Optimization
Pages :5651-5658
Gajendra Shrimal, Rakesh Rathi
Abstract | PDF |
182. |
A Generalized Association Rule Mining Framework for Pattern Discovery
Pages :5659-5662
Ravindra Changala, Dr. D Rajeswara Rao, Annapurna Gummadi
Abstract | PDF |
183. |
PhishIdentifier: A Mozilla Firefox plugin to protect user against Phishing attacks
Pages :5663-5666
Pooja V. Kalola, Sachin Patel, Rakesh Pandit
Abstract | PDF |
184. |
Enhanced Adaptive Acknowledgement for Mobile Ad Hoc Network
Pages :5667-5670
B.Sowndarya, G.V.Suresh, O.SrinivasaReddy, Dr.Sai Satyanarayana Reddy
Abstract | PDF |
185. |
A Comparative Study on Load Balancing Algorithms with Different Service Broker Policies
in Cloud Computing
Pages :5671-5677
Sonia Lamba , Dharmendra Kumar
Abstract | PDF |
186. |
Performance Analysis of Beacon Enabled IEEE 802.15.4 Using GTS in Zigbee
Pages :5678-5682
Rajashri Wavage, Aman Kaushik
Abstract | PDF |
187. |
A System for Quantitative Evaluation of the Privacy in Cloud Computing
Pages :5683-5689
Fatima N. AL-Aswadi, Omar Batarfi
Abstract | PDF |
188. |
Military Simulator-A Case Study
Pages :5690-5693
Shruti Jadon, Anubhav Singhal
Abstract | PDF |
189. |
Modified GA Based Routing Protocol for Efficient QoS Routing for MANETs
Pages :5694-5699
M.L.Ravi Chandra , Dr.P. Chandra Sekhar Reddy
Abstract | PDF |
190. |
Wearable Computing and its Application
Pages :5700-5704
Smita Jhajharia, Dr. S. K. Pal, Dr. Seema Verma
Abstract | PDF |
191. |
Improving QoS in Spontaneous Ad hoc Neworks
Pages :5705-5707
Gayathri Pradeep, Anna Prathiba Shobak
Abstract | PDF |
192. |
A Study on RSA Algorithm for Cryptography
Pages :5708-5709
Saranya, Vinothini, Vasumathi
Abstract | PDF |
193. |
New Antiphishing Approach Based on Probabilistic Model of (t, n) VC Scheme for
Commerce Bank
Pages :5710-5715
Mangala S. Wale, Gayatri M. Bhandari
Abstract | PDF |
194. |
Motion Detection and Optical Flow
Pages :5716-5719
Deepa Raju, Philumon Joseph
Abstract | PDF |
195. |
Stipulated Ranking Technique for Image Search Engines
Pages :5720-5723
B. Ravi Teja, P.V. Hari Prasad
Abstract | PDF |
196. |
Proof-Based Intrusion Detection System in MANETs
Pages :5724-5725
Nimmy.S, Sreenimol K.R
Abstract | PDF |
197. |
The Migration to Meta Cloud from Vendor Lock-In
Pages :5726-5728
Vishweshwaraiah.L.M, N.Parashuram, Dr.S.Prem kumar
Abstract | PDF |
198. |
Online Hand Writing Recognition System on Android Based Mobiles
Pages :5729-5733
Phani Sridhar A
Abstract | PDF |
199. |
Comparative Study on Linear and Non-Linear Models for Spell Correction
Pages :5734-5736
Sai Sathya Bapuji, K. Abirami
Abstract | PDF |
200. |
Hierarchical Sensor Network Routing: A Survey
Pages :5737-5740
Priyanka Pareek
Abstract | PDF |
201. |
Integration of Advanced e-FIR Lodging System with General Hospitals for Medical Report
Generation
Pages :5741-5744
Amit Sharma, Ashok, Meenakshi Sindhu
Abstract | PDF |
202. |
Detection and Removal of Shadow using Chromaticity
Pages :5745-5747
Priya Garg, Kirtika Goyal
Abstract | PDF |
203. |
Development of an Electronic Patient Medical Record (e-PMR) App for Doctors Using Smart Phones
Pages :5748-5750
Rajesh R Mane, R.V.Kulkarni, Pallavi M Dessai
Abstract | PDF |
204. |
Medical Data Mining Life Cycle and its Role in Medical Domain
Pages :5751-5755 Surabhi Thorat, Seema Kute
Abstract | PDF |
205. |
Episode Discovery from Event Evolution
Pages :5756-5762
Rutuja Ahirrao, Sachin Patel, Rakesh Pandit
Abstract | PDF |
206. |
A Novel Hybrid Artificial Bee Colony Algorithm for Numerical Function Optimization
Pages :5763-5770
Suraj Yadav, Sunil Dhankhar
Abstract | PDF |
207. |
Recommendation Systems:Issues and challenges
Pages :5771-5772
Soanpet .Sree Lakshmi , Dr.T.Adi Lakshmi
Abstract | PDF |
208. |
An ACO Approach to Maximize Lifetime of Heterogeneous WSN
Pages :5773-5775
Saburi Parvatkar, Deipali Gore
Abstract | PDF |
209. |
Analysis of Client Honeypots
Pages :5776-5780
Jhilam Biswas, Ashutosh
Abstract | PDF |
210. |
An Improved Approach for MANET Security using Cluster Based Certificate Revocation
Pages :5781-5784
Gayathri Mohan, Renjana Ramachandran
Abstract | PDF |
211. |
QoS based Optimal Routing in WSN using Hybrid Intelligent Bee Colony Agent
Pages :5785-5792
T. Karthikeyan and B. Subramani
Abstract | PDF |
212. |
Detection of Clones in Sparse and Dense Data Sets Using Efficient Data Mining Techniques
: A Comparative Study
Pages :5793-5796
Puli Manjeera, Panuganti.Ravi
Abstract | PDF |
213. |
Implementing Intelligent Monitoring Techniques in Agriculture Using Wireless Sensor Networks
Pages :5797-5800
Julakanti Preetham Kumar, Dr Syed Umar, Chunduri Sree Harsha, Bommareddy Nagasai
Abstract | PDF |
214. |
Markov Logic Network: Unify Framework for Ontology Learning
Pages :5801 - 5806
K. Karthikeyan, Dr. V. Karthikeyani
Abstract | PDF |
215. |
On Effective Protection of Security and Privacy in XML Information Brokering
Pages :5807-5813
Noe Elisa, Kare Suresh Babu
Abstract | PDF |
216. |
Performance Comparison of Variants of Ant Colony Optimization Technique for Online
Tuning of a Pi Controller for a Three Phase
Induction Motor Drive
Pages :5814-5820
Jasdeep Kour, Sheela Tiwari
Abstract | PDF |
217. |
Big Data and the Opportunities and Challenges for Government Agencies
Pages :5821-5824
Varun Singh, Ishan Srivastava, Vishal Johri
Abstract | PDF |
218. |
Triple Security of Data in Cloud Computing
Pages :5825-5827
Garima Saini, Naveen Sharma
Abstract | PDF |
219. |
Enhancing Engineering Education in an Indian Education System: WebBlogs
Pages :5828-5830
Dr. K.Udai Kumar,Dr. Uma N. Dulhare
Abstract | PDF |
220. |
Feature Subset Selection Algorithm for Elevated Dimensional Data By using Fast Cluster
Pages :5831-5834
B.Swarna Kumari, M.Doorvasulu Naidu
Abstract | PDF |
221. |
Adoption Factors for e-Malls in the SME Sector in Saudi Arabia
Pages :5835-5856
Adel A. Bahaddad, Rayed AlGhamdi, Salem Alkhalaf
Abstract | PDF |
222. |
Data Mining Techniques Using WEKA classification for Sickle Cell Disease
Pages :5857-5860
Ashokkumar Vijaysinh Solanki
Abstract | PDF |
223. |
An Enhanced Method for Spam Filtering Based on Basiyan Classifier
Pages :5861-5864
Krutika Rani Sahu
Abstract | PDF |
224. |
A Survey On Big Data Analytics In Health Care
Pages :5865-5868
Priyanka K, Nagarathna Kulennavar
Abstract | PDF |
225. |
Linux Kernel Memory Protection (ARM)
Pages :5869-5871
Manjeet Singh, Vaneet
Abstract | PDF |
226. |
Holy Grail of Outlier Detection Technique: A Macro Level Take on the State of the Art
Pages :5872-5874
Safal V Bhosale
Abstract | PDF |
227. |
Survey on Name Entity Recognition
Pages :5875-5879
Daljit Kaur, Ashish Verma
Abstract | PDF |
228. |
Monitoring Physical Activities Using WBAN
Pages :5880-5886
R.Meena, S.Ravishankar, J.Gayathri
Abstract | PDF |
229. |
Article Removed
Pages :xxx-xxx
xxx, xxx
Abstract | PDF |
230. |
Data Mining Vs Statistical Techniques for Classification of NSL-KDD Intrusion Data
Pages :5892-5895
Aakansha Patel, Santosh Sammarvar, Amar Naik
Abstract | PDF |
231. |
An Information Motivated Framework to Behavioral Reasoning in Smart Locations
Pages :5896-5897
G.Tamilmani, P.Ponnaruvi, B.Kayalvizhi, K.Rajathi, M.Ramya
Abstract | PDF |
232. |
A Review on Edge Detection Techniques for Image Segmentation
Pages :5898-5900
Shubhashree Savant
Abstract | PDF |
233. |
An SVM Based Approach to Breast Cancer Classification using RBF and Polynomial Kernel
Functions with Varying Arguments
Pages :5901-5904
S.V.G.Reddy, K.Thammi Reddy, V. Valli Kumari , Kamadi VSRP Varma
Abstract | PDF |
234. |
An Study on Performance Analysis of Ring Based Index Data Management in WSN
Pages :5905-5911
Dasprakash.G, Manjunath T N, Kanche Rajkumar
Abstract | PDF |
235. |
Electronic Parking Lot Payment using Passive RFID and Cloud Computing
Pages :5912-5914
Shilpa Batwal(Abhang), Dr. S. K. Yadav
Abstract | PDF |
236. |
Review on Traditional Methods of Edge Detection to Morphological based Techniques
Pages :5915-5920
Debaraj Rana, Sunita Dalai
Abstract | PDF |
237. |
Relevance of Genetic Algorithm Strategies in Query Optimization in Information Retrieval
Pages :5921-5927
Anubha Jain, Swati V. Chande, Preeti Tiwari
Abstract | PDF |
238. |
An Effective Image Enhancement Method using Binary Morphology
Pages :5928-5930
P.Manju Bala, S.Usharani, J.Nulyn Punitha
Abstract | PDF |
239. |
Design Criteria and Challenges of Industrial Wireless Sensor Network
Pages :5931-5934
P.Velmani
Abstract | PDF |
240. |
An Efficient Image Re Ranking Based On Keyword Expansion Using Query Log
Pages :5935 - 5938
M.Jeyappratha, S.C.Punitha
Abstract | PDF |
241. |
Data Mining Approaches for Diabetes using Feature selection
Pages :5939-5943
Thangaraju P, NancyBharathi G
Abstract | PDF |
242. |
Image Fusion Using Kuwahara Filter
Pages :5944 - 5949
Jincy Kuriakose, Jeena Joy
Abstract | PDF |
243. |
Hybrid Ant System Algorithm for Solving Quadratic Assignment Problems
Pages :5950-5956
Santosh Kumar Sahu, Manish Pandey
Abstract | PDF |
244. |
Sequence Alignment in DNA Using Smith Waterman and Needleman Algorithms
Pages :5957-5960
M.P Sudha, P.Sripriya
Abstract | PDF |
245. |
Data Mining Classification Algorithm for ETesting and Analysis Processing
Pages :5961-5962
M.Archana, Veeraraghavan
Abstract | PDF |
246. |
IAPSO-TCI: Improved Ant and Particle Swarm based Optimization Techniques for Classifying Imagery
Pages :5963-5969
Rebika Rai, Ratika Pradhan, M.K.Ghose
Abstract | PDF |
247. |
Huddle Based Harmonic K Means Clustering Using Iterative Relocation on Water Treatment
Plant Data Attributes
Pages :5970-5977
S. Adaekalavan and Dr. C. Chandrasekar
Abstract | PDF |
248. |
A Novel Approach Towards K-Mean Clustering Algorithm With PSO
Pages :5978-5986
Gursharan Saini, Harpreet Kaur
Abstract | PDF |
249. |
Educational Data mining for Prediction of Student
Performance Using Clustering Algorithms
Pages :5987-5991
M. Durairaj , C. Vijitha
Abstract | PDF |
250. |
Geography Ontology Used to Improve Semantic Information Retrieval
Pages :5992-5994
Chetna Devkar, Preeti Jain
Abstract | PDF |
251. |
Anonymization: Enhancing Privacy and Security of Sensitive Data of Online Social Networks
Pages :5995-6000
Gaurav .P.R., Gururaj.T
Abstract | PDF |
252. |
Investigating Suspicious Transactions through High Value Networks in Financial Intelligence Services
Pages :6001-6006
Anu Dahiya, Rajan Vohra
Abstract | PDF |