• Up Coming Issue >
  • Up-Coming Conference
  • Conference Papers
  • Indexing
  • Peer-Review
  • Publication Ethics
  • Contact
  • FAQ
  • Terms&Conditions
  • Site Map
  • bh

     

    VOLUME 5 ISSUE 5 September - October 2014

    ISSN 0975 - 9646

    1. Comparison of Algebraic Reconstruction Methods in Computed Tomography
    Pages : 6007-6009
    G Vijayalakshmi, P Vindhya
    Abstract | PDFPDF
    2. Implementation of Optimization of Latency in Wireless Mesh Network
    Pages : 6010-6015
    Kusuma M, Umapathi G R
    Abstract | PDFPDF
    3. A Study of Power and Energy Aware Routing Technologies in Wireless Sensor Network
    Pages : 6016-6021
    Roshani Kushavaha, Umesh kumar Chourasiya, Mahesh Gour
    Abstract | PDFPDF
    4. Optimal Resource Allocation in Wireless Mesh Network
    Pages : 6022-6026
    Amlan Roy, Umapathi G R
    Abstract | PDFPDF
    5. A Review on Cloud Data Storage in Virtual Perspective
    Pages : 6027-6031
    B.Nagarajan, Dr.J.Suguna
    Abstract | PDFPDF
    6. A Comprehensive Framework for Reengineering Method for Web services architectures
    Pages : 6032-6034
    Venkatsampath Raja Gogineni, Dr.Syed Umar
    Abstract | PDFPDF
    7. Comprehensive Review of Web Focused Crawling
    Pages : 6035-6038
    Promila Devi, Ravinder Thakur
    Abstract | PDFPDF
    8. Haptic Technology :- A Comprehensive Review of its Applications and Future Prospects
    Pages : 6039-6043
    Anupam Alur,Pratik Shrivastav,Aditya Jumde
    Abstract | PDFPDF
    9. Design and Implementation of a Low Power Second Order Sigma-Delta ADC
    Pages : 6044-6049
    K. Lokesh Krishna, M. Jagadeesh , T.Ramashri, K.Anuradha
    Abstract | PDFPDF
    10. A Survey: Outlier Detection in Streaming Data Using Clustering Approached
    Pages : 6050-6053
    Safal V Bhosale
    Abstract | PDFPDF
    11. A Survey on Privacy Preserving Data Mining Techniques
    Pages : 6054-5056
    Mayil.S and Vanitha.M
    Abstract | PDFPDF
    12. A Review on Participating Sensing Networking
    Pages : 6057-6059
    Ravinder Singh Sidhu, Varinderjit kaur
    Abstract | PDFPDF
    13. A Review Paper on Evolution of Cloud Computing, its Approaches and Comparison with Grid Computing
    Pages : 6060-6063
    Rajleen Kaur, Amanpreet Kaur
    Abstract | PDFPDF
    14. Performance Analysis of Clustering Based on Fuzzy System
    Pages : 6064-6067
    K.Vijayakumari, M. Preetha, K.Velusamy
    Abstract | PDFPDF
    15. Crime Detection and Avoidance in ATM: A New Framework
    Pages : 6068-6071
    Sujith B
    Abstract | PDFPDF
    16. Design and Development of Privacy Control Tool for Web Browsers using Value Sensitive Design
    Pages : 6072-6078
    Swarnangini Ghosh, Rajesh Shukla
    Abstract | PDFPDF
    17. CFixed and Mobile WiMAX Networks based on LTE
    Pages : 6079-6084
    Bhuteswar Jena
    Abstract | PDFPDF
    18. Comparative Evaluation of Cluster based CBIR using different Similarity Measures
    Pages : 6085-6088
    Seema Anand Chaurasia, Vaishali Suryawanshi
    Abstract | PDFPDF
    19. Intelligent Medical Image Segmentation Using FCM, GA and PSO
    Pages : 6089-6093
    Dilpreet Kaur, Yadwinder Kaur
    Abstract | PDFPDF
    20. Addressing the Security, Privacy and Trust Challenges of Cloud Computing
    Pages :6094-6097
    Rama Krishna Kalluri, Dr. C. V. Guru Rao
    Abstract | PDFPDF
    21. Honeypots: The Need of Network Security
    Pages : 6098-6101
    Navneet Kambow, Lavleen Kaur Passi
    Abstract | PDFPDF
    22. Automatic Toll Collection by Using QR Code Capturing
    Pages : 6102-6105
    Shital Y. Gaikwad, Chandrakant S. Audhutwar
    Abstract | PDFPDF
    23. Relevancy Enhancement of Query with Czekanowski Coefficient by Expanding it Using Genetic Algorithm
    Pages : 6106-6110
    Neha Soni, Jaswinder Singh
    Abstract | PDFPDF
    24. Comparative Evaluation of Transform Based CBIR Using Different Wavelets and Two Different Feature Extraction Methods
    Pages : 6111-6115
    Omprakash Yadav, Vaishali Suryawanshi
    Abstract | PDFPDF
    25. Review on FPGA Implementation of OFDM
    Pages : 6116-6120
    Prof. R. K. Paliwal, Dr. C. M. Jadhao, Prof. A.S. Kakad
    Abstract | PDFPDF
    26. Processing an Image using Inpainting and Super- Resolution Algorithm
    Pages : 6121-6123
    S. Vijayalakshmi
    Abstract | PDFPDF
    27. E-Learning :Technological Development in Teaching for school kids
    Pages : 6124-6126
    K. Udaya Sri, T.V.Vamsi Krishna
    Abstract | PDFPDF
    28. A Comprehensive Survey of Modern Content Based Image Retrieval Techniques
    Pages : 6127-6129
    Avneet Kaur Chhabra and Vijay Birchha
    Abstract | PDFPDF
    29. Enhancement of Radnet Protocol Using Red Routing Algorithm in Manets
    Pages : 6130-6134
    Balkar Singh, Vinay Bhardwaj
    Abstract | PDFPDF
    30. Image Denoising Algorithms and DWT: A Review
    Pages : 6135-6137
    Taranjot Kaur
    Abstract | PDFPDF
    31. Implementation of Text clustering using Genetic Algorithm
    Pages : 6138-6142
    Dhanya P.M, Jathavedan M, Sreekumar A
    Abstract | PDFPDF
    32. Effect of MANETS With and Without Malicious Node
    Pages : 6143-6146
    Katroth Balakrishna Maruthiram, Sri.Kare.Suresh Babu
    Abstract | PDFPDF
    33. A Survey on Predicting Student Performance
    Pages : 6147-6149
    A.Dinesh Kumar ,Dr.V.Radhika
    Abstract | PDFPDF
    34. Enacting A Service Engagement for Contracts Mining in Business Affairs and Temporal Constraints Using Cloud Computing
    Pages : 6138-6142
    Deepak M, Goutham R, Deeksha Hegde B, Chandrika C N
    Abstract | PDFPDF
    35. Comparative Study of Association Rule Mining Algorithms with Web Logs
    Pages : 6153-6157
    Archita Bonde, Deipali V. Gore
    Abstract | PDFPDF
    36. Stylometric Approach For Author Identification of Online Messages
    Pages : 6158-6159
    Smita Nirkhi, Dr.R.V.Dharaska, Dr.V.M.Thakre
    Abstract | PDFPDF
    37. Pattern Matching using Layered STRIFA for Intrusion Detection
    Pages : 6160-6164
    P Prudhvi, H Venkateswara reddy
    Abstract | PDFPDF
    38. Two Way Authentication Scheme for Mobile Applications and Web Application
    Pages : 6165-6168
    Md Jaleel Ahmed Ansari, P. Subhadra
    Abstract | PDFPDF
    39. A Survey on Speech Recogntion in Indian Languages
    Pages : 6169-6175
    Cini Kurian
    Abstract | PDFPDF
    40. Clean Migration of Data from Relational database to Object-Oriented database using three step data migration algorithm
    Pages : 6176-6180
    Sonali P. Dhawak, Prof. Akansha Jain, Prof. Amit Sinhal
    Abstract | PDFPDF
    41. A Smart Analytical Tool for Digital Governance with a Global Perspective employing Business
    Intelligence

    Pages : 6181-6183
    Aditya Vinay Jumde, Sayali Makarand ghaisas
    Abstract | PDFPDF
    42. Migration from One CSP to Another using Meta- Cloud
    Pages : 6184-6192
    G. Satish, Dr. G. Venkata Rami Reddy
    Abstract | PDFPDF
    43. A Survey of File Systems and File Access Systems
    Pages : 6193-6197
    R.Prathyusha, G.Praveen Babu
    Abstract | PDFPDF
    44. Implementing an Efficient Task to Build Data Sets for Datamining Analysis
    Pages : 6198-6201
    B.K.Manasa, H.Venkateswara Reddy
    Abstract | PDFPDF
    45. Experimental study of RED Performance by regulating Upper Threshold Parameter
    Pages : 6202-6204
    Rajeev Sharma, Dr. Gireesh Dixit
    Abstract | PDFPDF
    46. Achieving Efficiency of Power, Privacy and QoS for Online Videos
    Pages : 6205-6207
    Maneesha Patan, Krishna Sagar.B
    Abstract | PDFPDF
    47. Techniques for Reducing the Down Time during Virtual Machine Migration: Resource Failure &
    Live Migration Circumstances

    Pages : 6208-6212
    Dr. Abhay Kothari, Ashish Agrawal
    Abstract | PDFPDF
    48. Performance Evaluation of an approach for Secret data transfer using interpolation and LSB
    substitution with Watermarking

    Pages : 6213-6217
    Sonia Bajaj, Manshi Shukla
    Abstract | PDFPDF
    49. Implementation of TCP Recognition of Broken Order (TCP-BO) Algorithm
    Pages : 6218-6224
    Monika Nath, Nidhi Sharma
    Abstract | PDFPDF
    50. Data Mining:Review
    Pages : 6225-6228
    Paramjit Kaur, Kanwalpreet Singh Attwal
    Abstract | PDFPDF
    51. Healthcare applications of the Internet of Things: A Review
    Pages : 6229-6232
    Alok Kulkarni, Sampada Sathe
    Abstract | PDFPDF
    52. Secure Multi-party Computation Protocols For Collaborative Data Publishing With m-Privacy
    Pages : 6233-6237
    K. Prathyusha, Sakshi Siva Ramakrishna
    Abstract | PDFPDF
    53. The Hadoop distributed file system
    Pages : 6238-6243
    Pooja S.Honnutagi
    Abstract | PDFPDF
    54. Implementation of Cloud computing for Mobile Users
    Pages : 6244-6247
    P.Dileep , S.Tirupati Rao
    Abstract | PDFPDF
    55. A Survey on Green Computing Techniques
    Pages : 6248-6252
    Sonu Choudhary
    Abstract | PDFPDF
    56. New Approach of Information Security through Steganography by using Wavelet Transformation
    and Symmetric Encryption

    Pages : 6253-6260
    Komal Hirachandani, Gaurav Soni, Prof. Rajesh Nigam
    Abstract | PDFPDF
    57. Comparative Study of Classification Algorithms used in Sentiment Analysis
    Pages : 6261-6264
    Amit Gupte, Sourabh Joshi, Pratik Gadgul, Akshay Kadam
    Abstract | PDFPDF
    58. Fuzzified Denoising Technique for Directional Total Variation Minimization on Color Image
    Pages : 6265-6269
    Hema Jagat, Rashmi Shrivas
    Abstract | PDFPDF
    59. Body Odor as a Biometric Authentication
    Pages : 6270-6274
    P.Inbavalli, G.Nandhini
    Abstract | PDFPDF
    60. An Extended Visual Cryptography Algorithm for Quality-Improved Gray Scale Image with Sigmoid
    Function.

    Pages : 6275-6277
    Santosh Kumar, Prof. Sini Shibu
    Abstract | PDFPDF
    61. Efficient Algorithm for Fault Tolerance in Cloud Computing
    Pages : 6278-6281
    Jasbir Kaur, Supriya Kinger
    Abstract | PDFPDF
    62. An Efficient Technique of Image Noising and Denoising using Neuro Fuzzy and SVM
    Pages : 6282-6285
    Jyoti Sharma and Mrs.Rupinder Kaur
    Abstract | PDFPDF
    63. Performance Evaluation of Mobility Management using Mobile IPv4 and Mobile IPv6 protocols
    Pages : 6286-6289
    G B Himabindu, A.M Vedhagrani, S R Raj Kumar
    Abstract | PDFPDF
    64. Doctor App: A life saving Mobile Application
    Pages : 6290-6295
    Mayank Aggarwal, Akshay Mathur , Yatin Karel
    Abstract | PDFPDF
    65. Effect of Varying Initial Energy on Multihop Routing Protocol in Wireless Sensor Network
    Pages :6296-6302
    Namita Sharma
    Abstract | PDFPDF
    66. Image Restoration by Using Hybrid Filling-in Technique
    Pages :6303-6306
    Gurpinder Kaur Sivia, Amanpreet Kaur
    Abstract | PDFPDF
    67. Incorporation of Swarm Intelligence in Autonomous Cars
    Pages : 6307-6309
    Yadhu Prakash, Kahan Prabhu, Shruti Kamtekar, Sainath Gadhe
    Abstract | PDFPDF
    68. A Survey on Load Balancing Techniques Using ACO Algorithm
    Pages : 6310-6314
    Preeti Kushwah
    Abstract | PDFPDF
    69. Improve Security of Attribute Based Encryption for Secure Sharing of Personal Health Records
    Pages : 6315-6317
    Able E Alias, Neethu Roy
    Abstract | PDFPDF
    70. Comparative Study of Wireless Network Technologies
    Pages : 6318-6321
    Harshil Shah , Lakshmi Kurup
    Abstract | PDFPDF
    71. Comparative Analysis and Classification of Multispectral Remote Sensing Data
    Pages : 6322-6325
    Kusum, Paramvir Rathi
    Abstract | PDFPDF
    72. Approaches for Information Security Modeling
    Pages : 6326-6328
    Harshitaa.B, G.Praveen Babu
    Abstract | PDFPDF
    73. Comparative Analysis of TCP variants with AODV in Mobile Ad Hoc Network
    Pages :6329-6332
    Sandeep Sandhu, Anirudh Menon, Parikshit Sinha, Nirav Afinwale, Mrs.Payal T. Mahida
    Abstract | PDFPDF
    74. Effect of Mobile Social Networks on Secondary School Students
    Pages : 6333-6335
    Abba Almu and Bello Alhaji Buhari
    Abstract | PDFPDF
    75. Optimization of Security Policies on Virtual Machines using Flow Differentiator & Zone Manager
    Pages : 6336-6340
    J.Madhulatha, E.S.Phalguna Krishna , E.Sandhya
    Abstract | PDFPDF
    76. Captcha and Its Techniques: A Review
    Pages : 6341-6344
    Kiranjot Kaur, Sunny Behal
    Abstract | PDFPDF
    77. Multicast Routing and Its Protocols
    Pages : 6345-6349
    Mithun B Patil
    Abstract | PDFPDF
    78. Detailed Survey on Exemplar Based Image Inpainting Techniques
    Pages :6350-6354
    Jaspreet Kaur Chhabra and Mr. Vijay Birchha
    Abstract | PDFPDF
    79. Feature Based Video Extraction Using Tree Pruning
    Pages : 6355-6360
    R. Manjunath, B. Sreepathi
    Abstract | PDFPDF
    80. Hybrid Approach for Hindi to English Transliteration System for Proper Nouns
    Pages : 6361-6366
    Veerpal Kaur, Amandeep kaur Sarao, Jagtar Singh
    Abstract | PDFPDF
    81. Image Filtering and Re-ranking Using Data mining Techniques
    Pages : 6367-6372
    N.Lakshmi Prasanna, Thirumala Sree G
    Abstract | PDFPDF
    82. A Location Based Protocol for Anonymity Protection of Nodes and Routes at Low Cost
    Pages : 6373-6378
    M.Bhavana, M.R.Pavan Kumar
    Abstract | PDFPDF
    83. Predicting Error in Software Effort Estimate using K-means and Quad Tree algorithm
    Pages : 6379-6382
    Rutvi Vanapalli, Ch.Satyananda Reddy
    Abstract | PDFPDF
    84. Detection of Ozone Layer Depletion Using Image Processing and Data Mining Technique
    Pages : 6383-6388
    Nomula Divya,Narasimha Prasad Lakkakula,Arjun Nelikanti
    Abstract | PDFPDF
    85. Optimized Method for Tracking of Data Leaving the Cloud Environment
    Pages : 6389-6394
    Lokendra Vishwakarma, Pallavi Gupta, Awadheshwari patel
    Abstract | PDFPDF
    86. Using Attribute-Based Encryption with Advanced Encryption Standard for Secure and Scalable
    Sharing of Personal Health Records in Cloud

    Pages : 6395-6399
    B. Sri Varsha, P.S. Suryateja
    Abstract | PDFPDF
    87. A New Methodology for Improvement of Contrast to Show Fractures in X-ray Images
    Pages : 6400-6403
    Priya Thamman, Rekha Bhatia
    Abstract | PDFPDF
    88. A Novel Secured Communication Channel Based On Genetic Functions
    Pages : 6404-6409
    Lakshmikanth Gurlanka, Vasupalli Mahesh, Y.Ramesh kumar
    Abstract | PDFPDF
    89. A Novel Secured Data Communication and Prevention of Forgery Attacks Using Digital Certificates
    Pages : 6410-6415
    Sharina Toor, Kesava Rao Seerapu, Y.Ramesh kumar
    Abstract | PDFPDF
    90. A Novel Secured Transmission Of Color Extended Visual Images Using Error Diffusion
    Pages : 6416-6420
    Srujan pentakota, Maher Prasad, Y.Ramesh kumar
    Abstract | PDFPDF
    91. Efficient Summarization of Text Data Based on Categorized Keywords Ranking
    Pages : 6421-6426
    Sailaja Madhu, B.Ramesh Babu, Y.Ramesh kumar
    Abstract | PDFPDF
    92. A Secured Multicasting Key and Data Exchange By Using Extended Chebhysev Map
    Pages : 6427-6431
    Jyothsna Ivaturi, K.Ravindra, Y.Ramesh Kumar
    Abstract | PDFPDF
    93. Improving Audit Service in Cloud for Outsourced Storage Dynamically
    Pages : 6432-6435
    N.Praveen kumar, S.Bavaji
    Abstract | PDFPDF
    94. Improving the Performance of Processing for Small Files in Hadoop: A Case Study of Weather
    Data Analytics

    Pages : 6436-6439
    Guru Prasad M S, Nagesh H R, Deepthi M
    Abstract | PDFPDF
    95. Text Search Optimization Using Latent Semantic Indexing
    Pages : 6440-6442
    Navneet kaur Waraich, Hardeep Singh Sindher
    Abstract | PDFPDF
    96. Improved Similarity Based Matrix Completion Algorithm Using Latent Semantic Indexing
    Pages : 6443-6448
    Navneet kaur Waraich, Hardeep Singh Sindher
    Abstract | PDFPDF
    97. A Survey on Image Feature Selection Techniques
    Pages : 6449-6452
    Dr. Sanjay Kumar , Er. Ankur Chauhan
    Abstract | PDFPDF
    98. Comparative Analysis of Clustering & Enhancing Classification Using Bio- Inspired Approaches
    Pages : 6453-6457
    Navpreet Rupal , Poonam Kataria
    Abstract | PDFPDF
    99. Ranking Objects by Evaluating Spatial Points through Materialized Datasets
    Pages : 6458-6463
    K.Swathi, B.Renuka Devi
    Abstract | PDFPDF
    100. A Flexible and Efficient Natural Language Query interface to databases
    Pages : 6464-6467
    B.Sujatha, Dr.S. Viswanadha Raju
    Abstract | PDFPDF
    101. Spatial Index Keyword Search in Multi dimensional Database
    Pages : 6468-6471
    C. Usha Rani , N.Munisankar
    Abstract | PDFPDF
    102. Categorising Web Search Results from Search Engine Logs
    Pages : 6472-6474
    K.Morarjee, Bijam.Mownika
    Abstract | PDFPDF
    103. Hybrid Approach to Enhance Architecture Supporting WSN Using AODV AND DPR
    Pages : 6475-6477
    Kulbir Singh Khatra,Vinay Bhardwaj
    Abstract | PDFPDF
    104. Comparative Analysis of AntHocNet, AODV, DSR Routing Protocols for Improvising Loss Packet Delivery Factor
    Pages : 6478-6482
    Maahi Amit Khemchandani, Prof. B. W. Balkhande
    Abstract | PDFPDF
    105. Developers Harness Open Source Cloud Management Platforms for Novel Applications
    Pages : 6483-6486
    Dr. Urmila R. Pol
    Abstract | PDFPDF
    106. Data Mining Techniques For Diagnosis And Prognosis Of Breast Cancer
    Pages : 6487-6490
    Jaimini Majali, Rishikesh Niranjan, Vinamra Phatak, Omkar Tadakhe
    Abstract | PDFPDF
    107. Face Recognition Using Principal Component Analysis
    Pages : 6491-6496
    Ningthoujam Sunita Devi, K. Hemachandran
    Abstract | PDFPDF
    108. Lifetime Improvement of WSN by Trust Level based Ant Colony Optimization
    Pages : 6497-6501
    Dr.V.Raghunatha Reddy, A.Rajasekhar Reddy
    Abstract | PDFPDF
    109. Detection of DDoS Attacks based on Network Traffic Prediction and Chaos Theory
    Pages : 6502-6505
    Anjali. M
    Abstract | PDFPDF
    110. Secure Data Spread using Dispersed Key Cohort Scheme in Wireless Sensor Networks
    Pages : 6506-6513
    R.Kavitha
    Abstract | PDFPDF
    111. Study of Different Security Issues in Cloud Storage
    Pages : 6514-6516
    Dandawate Vrushali Vilas, Dr. Ravindra C. Thool
    Abstract | PDFPDF
    112. Video Surveillance for Theft Detection
    Pages : 6517-6520
    Abhiram Chaudhari, Ajinkya Jaisingkar, Ankit Patil, Rishi Kajgaonkar
    Abstract | PDFPDF
    113. Enhanced Offline Signature Recognition Using Neuro- Fuzzy and SURF Features Techniques
    Pages : 6521-6527
    Rupali Mehra, Dr.R.C.Gangwar
    Abstract | PDFPDF
    114. A Novel Gaussian Error Diffusion based Colour Extended Visual Cryptography
    Pages :6528-6531
    T. Anuradha, Dr. K. Usha Rani
    Abstract | PDFPDF
    115. An Indian Coin Recognition System Using Artificial Neural Networks
    Pages : 6532-6537
    Loveneet Kaur, Rekha Bhatia
    Abstract | PDFPDF
    116. Literature Survey on Digital Watermarking
    Pages : 6538-6542
    Manoranjan Kr Sinha , Dr. Rajesh Rai, Prof. G. Kumar
    Abstract | PDFPDF
    117. Enhancement in AODV protocol to select the secure and shortest path in Mobile Ad hoc Network
    Pages : 6543-6546
    Gagandeep Singh Hundal, Rajeev Bedi, Dr. Sunil Kumar Gupta
    Abstract | PDFPDF
    118. An approach for VM Migration
    Pages : 6547-6550
    Lavneet Kaur, Er. Kanchan Lalit
    Abstract | PDFPDF
    119. Anomaly Detection and SQL Prepare Data Sets for Data Mining Analysis
    Pages : 6551-6555
    P.V.Balakrishna, B.Rama Ganesh
    Abstract | PDFPDF
    120. Implementing REA Algorithm to Increase Performance of the Encrypted Databases While
    Query Processing

    Pages : 6556-6561
    Rohini A. Chirde, Prof. S. S. Kulkarni
    Abstract | PDFPDF
    121. A Novel Secured Data and Key Exchange Mechanism for Sensor Networks
    Pages : 6562-6566
    Bhargavi, Vasupalli Mahesh, Y.Rameshkumar
    Abstract | PDFPDF
    122. A Novel Secured Protocol for Data Transmission in Adhoc Networks Using Clustering
    Pages : 6567-6571
    K.Komali, V.Mahesh, Y.Ramesh Kumar
    Abstract | PDFPDF
    123. A Web Search Engine Application to Compare Semantic Equivalence between Two Words
    Pages : 6572-6577
    Mallela Haribabu, H.Devaraj, Y.Ramesh Kumar
    Abstract | PDFPDF
    124. Application of Concept-Based Mining Model in Text Clustering
    Pages : 6578-6582
    Modu Sowjanya, K.Ravindra, Y.Ramesh Kumar
    Abstract | PDFPDF
    125. THR: Efficient Technique to Reduce Delay with F-Cast in MANET
    Pages : 6583-6585
    G.Vasundara Devi, Surya Bahadur
    Abstract | PDFPDF
    126. Human Motion Analysis with the Help of Video Surveillance: A Review
    Pages : 6586-6590
    Kavita V. Bhaltilak, Harleen Kaur, Cherry Khosla
    Abstract | PDFPDF
    127. A Report on the Analysis of Metrics and Measures on Software Quality Factors – A Literature Study
    Pages : 6591-6595
    Vanitha N, ThirumalaiSelvi R
    Abstract | PDFPDF
    128. Adaptive Node Resurgence in Wireless Sensor- Actuator Networks
    Pages : 6596-6598
    T Sridepa, G Vijaybaskar
    Abstract | PDFPDF
    129. Assay of Data Security in Cloud Computing
    Pages : 6599-6601
    Navan Preet Singh, Bhavkaran Singh Walia
    Abstract | PDFPDF
    130. Semantic Image Retrieval:A Review
    Pages : 6602-6605
    Ashitha.S.S
    Abstract | PDFPDF
    131. Packet Hiding Scheme without Packet Loss (PHSPL) for defensive against Jamming Attack
    Pages : 6606-6608
    Archana Patil, Prof. S.P.Pingat
    Abstract | PDFPDF
    132. A Review on Transform Domain Adaptive Filters
    Pages : 6609-6613
    Sangeeta Sharma, Deepak Gupta, V K Gupta, Mahesh Chandra
    Abstract | PDFPDF
    133. Survey on Clustering Techniques in Wireless Sensor Network
    Pages : 6614-6619
    Priya Vyas, Manoj Chouhan
    Abstract | PDFPDF
    134. Wormhole Detection and Prevention Scheme using Beacon Node Mechanism with Neighbor Node
    Discovery

    Pages : 6620-6625
    Akansha Agrawal, Prof. Amit Saxena
    Abstract | PDFPDF
    135. An Energy Efficient Zigbee Standard 802.15.4 Enviornment for a Holter Device
    Pages : 6626-6630
    Jaspreet Singh, Parminder Kaur, Ashish Verma
    Abstract | PDFPDF
    136. Performance Analysis of A Novel Scheduling Algorithm for Different Traffics in LTE Networks
    Pages : 6631-6634
    Vallari Sharma, Prof. P.K Chopra
    Abstract | PDFPDF
    137. Mobile Cloud Computing : Issues, Security,Advantages, Trends
    Pages : 6635-6639
    Dhammapal Tayade
    Abstract | PDFPDF
    138. Improve Multi Path Congestion Control Technique Using EIA
    Pages : 6640-6643
    Ankur Nahar, Neeraj Shrivastwa
    Abstract | PDFPDF
    139. Performance Analysis and Designing of Fingerprints Enhancement Technique Based on Segmentation, oF Estimation and Ridge Frequency, Gabor Filters with Wavelet Transform
    Pages : 6644-6651
    Nadira Quadri, Surendra Singh Choudhary
    Abstract | PDFPDF
    140. Extended Framework for Social Trust-aware Recommendation System
    Pages : 6652-6655
    YashneetTyagi, Swati Tiwari
    Abstract | PDFPDF
    141. Intrusion Detection System Using Clustering
    Pages : 6656-6658
    Madhulika Deshmukh, Prof. S.K. Shinde
    Abstract | PDFPDF
    142. Reversible Data Hiding in Images using Circular Hough Transform
    Pages : 6659-6663
    Sukhdeep Kaur, Manshi Shukla
    Abstract | PDFPDF
    143. Tamil Speech Recognition Using Hybrid Technique of EWTLBO and HMM
    Pages : 6664-6669
    Dr.E.Chandra, S.Sujiya
    Abstract | PDFPDF
    144. Analysis of Fragment Mining on Indian Financial Market
    Pages : 6670-6675
    Rajesh V. Argiddi, Dr.Mrs.S.S.Apte
    Abstract | PDFPDF
    145. A Hybrid Framework of Facial Expression Recognition using SVD & PCA
    Pages : 6676-6679
    Rupinder Saini, Narinder Rana
    Abstract | PDFPDF
    146. Improving Data Integrity for Data Storage Security in Cloud Computing
    Pages : 6680-6685
    Poonam M. Pardeshi, Prof. Bharat Tidke
    Abstract | PDFPDF
    147. A Survey on Face Identification Methodologies in Videos
    Pages : 6686-6688
    Deepti Yadav, Ms. Antara Bhattacharya
    Abstract | PDFPDF
    148. A Review of Web Crawler Algorithms
    Pages :6689-6691
    Apoorv Vikram Singh , Vikas , Achyut Mishra
    Abstract | PDFPDF
    149. Agent Based Simulation of Street Robbery
    Pages : 6692-6696
    Amrutha S
    Abstract | PDFPDF
    150. A Comparative Study of Various Metaheuristic Algorithms
    Pages :6701-6704
    Prabhneet kaur , Taranjot kaur
    Abstract | PDFPDF
    151. A Research for Modified PEPSI Architecture
    Pages : 6697-6700
    Shreya Ahuja, Amninder Kaur Gill
    Abstract | PDFPDF
    152. Privacy Preserving in Collaborative Data Publishing
    Pages : 6705-6706
    K. Reddi Kumari, P.Rajarajeswari, Dr.D.Vasumathi
    Abstract | PDFPDF
    153. Human Activity Tracking and Analysis for Surveillance
    Pages : 6707-6711
    Swati Chourasia, Vishal Jain
    Abstract | PDFPDF
    154. Power and Data Aware Best Fit Algorithm for Energy Saving in Cloud Computing
    Pages : 6712-6715
    Pradeep Kumar, Dilbag Singh, Ankur Kaushik
    Abstract | PDFPDF
    155. DACD: Delegated Access Control of Data in Cloud computing environment
    Pages :6716-6718
    Dhanamjay.K, Krishna Sagar.B
    Abstract | PDFPDF
    156. Optimization of Examination Timetable Using Harmony Search Hyper-Heuristics (HSHH)
    Pages : 6719-6723
    Ms.Jayashree Rankhambe, Mrs.S.Kavita
    Abstract | PDFPDF
    157. Anonymization of Centralized and Distributed Social Networks by Incremental Clustering
    Pages : 6724-6727
    Ms. Sonali M. Khairnar, Prof. Sanchika Bajpai
    Abstract | PDFPDF
    158. Student Profile Assessor for University Prognosis Using Classification Algorithms
    Pages : 6728-6731
    Divyansh Jain, Ameya Shringi
    Abstract | PDFPDF
    159. Evaluating Performance of Compressive sensing for speech signal with Combined Basis
    Pages :6732-6735
    Siddhi Desai
    Abstract | PDFPDF
    160. Literature Review of Model Based Test case Prioritization
    Pages :6736-6738
    Shweta A. Joshi, Prof. B.S. Tiple
    Abstract | PDFPDF
    161. Blind Source Separation via Independent Component Analysis : Algorithms and Applications
    Pages : 6739-6743
    Jaya Kulchandani, Kruti J. Dangarwala
    Abstract | PDFPDF
    162. Recent Trends in Users’ Query Clustering
    Pages : 6744-6749
    Sami Uddin , Amit kumar Nandandwar
    Abstract | PDFPDF
    163. Article Removed
    Pages : xxxx-xxxx
    xxxx, xxxx
    Abstract | PDFPDF
    164. Hybrid Approach for Improvement of Web page Response Time
    Pages : 6755-6759
    Kushwant Kaur, Prof. Kanwalvir Singh Dhindsa
    Abstract | PDFPDF
    165. Disaster Management System on Mobile Phones Using Google Map
    Pages :6760-6763
    Varsha S. Sonwane
    Abstract | PDFPDF
    166. Recognition and Classification Of Speech And Its Related Fluency Disorders
    Pages : 6764-6767
    Monica Mundada , Bharti Gawali ,Sangramsing Kayte
    Abstract | PDFPDF
    167. Multi-point Gesture Recognition Using LED Gloves For Interactive HCI
    Pages : 6768-6773
    Manisha R.Ghunawat
    Abstract | PDFPDF
    168. Design of Lightweight Secure and Distributed Reprogramming Protocol for Wireless Sensor
    Networks using Identity-Based Signature Scheme

    Pages : 6774-6778
    Pooja Motwani, Purnima Soni, Priyanka Fulare
    Abstract | PDFPDF
    169. Dataset Watermarking Using Hybrid Optimization and ELM
    Pages : 6779-6784
    Vithyaa Raajamanickam, Ms.R. Mahalakshmi
    Abstract | PDFPDF
    170. Multipurpose Web Log Analyzer: A Survey
    Pages : 6785-6788
    Lalit Agrawal
    Abstract | PDFPDF
    171. Self Adaptive Harmony Search Algorithm for Optimizing ECG Signal
    Pages : 6789-6791
    Asha J Gomez, Mitha Rachel Jose
    Abstract | PDFPDF
    172. Attribute Based Encryption with Privacy Preserving using Asymmetric Key in Cloud Computing
    Pages : 6792-6795
    S Sankareswari , S.Hemanth
    Abstract | PDFPDF
    173. H-ARPT: A Hybrid Adaptive Random Partition Testing for Improved Bug Detection and Test Coverage
    Pages : 6796-6801
    Mahesh Malviya, Reetika Patidar
    Abstract | PDFPDF
    174. Body Area Network- A Perspective
    Pages : 6802-6809
    Gomita Verma , Prof.Moinuddin
    Abstract | PDFPDF
    175. Stealthy P2P Botnet Detection Based on Automated Threshold Computing Using Genetic
    Algorithm

    Pages : 6810-6813
    Vishnu S Sekhar, Neena Joseph
    Abstract | PDFPDF
    176. Comparisons of Test t Case Prioritization Algorithm with Random Prioritization
    Pages : 6814-6818
    Thillaikarasi Muthusamy, Dr. Seetharaman.K
    Abstract | PDFPDF
    177. A Review on Storage & Prevention in Cloud Computing
    Pages : 6819-6823
    Tarun Soni, Piyush Singh
    Abstract | PDFPDF
    178. Cut Paste Detection in Document Images Using Neural Network
    Pages : 6824-6826
    Sarabjot Singh , Nishu Bansal
    Abstract | PDFPDF
    179. A Simple and Effective Optical Character Recognition System for Digits Recognition using the
    Pixel-Contour Features and Mathematical Parameters

    Pages : 6827-6830
    Jenil Shah, Viral Gokani
    Abstract | PDFPDF
    180. Segmentation of Skin Lesions from Digital Images using an Optimized Approach: Genetic Algorithm
    Pages : 6831-6837
    Hina Sood, Manshi Shukla
    Abstract | PDFPDF
    181. Performance Comparison of K-means and Rectangle Segmentation Algorithms in Compression of Color Images
    Pages : 6838-6845
    Kitty Arora, Manshi Shukla
    Abstract | PDFPDF
    182. Cellular-Genetic Key Generation Algorithm
    Pages : 6846-6848
    Neha Singla
    Abstract | PDFPDF
    183. Understanding Focused Crawler
    Pages : 6849-6852
    Vruksha Shah, Riya Patni , Vivek Patani, Rhythm Shah
    Abstract | PDFPDF
    184. Image Encryption using AES Algorithm based on FPGA
    Pages : 6853-6859
    Anup.Gujar
    Abstract | PDFPDF
    185. Survey on Improvement of Efficiency of Classified Machinery Datasets Using VPRS
    Pages : 6860-6863
    Rashmi Rani Upadhyay, Ritesh Shah
    Abstract | PDFPDF
    186. Sharing of Personal Health Records Securely in Cloud Computing with Attribute Based Encryption
    Pages : 6864-6866
    Muhib Anwar Lambay, M. Jhansi Lakshmi, Pralhad S. Gamare
    Abstract | PDFPDF
    187. Deep Web Query Extraction Algorithm for Information Retrieval System
    Pages : 6867-6870
    Divya Dalal, Anil Panwar
    Abstract | PDFPDF
    188. GWSVM Algorithm for a Grid System
    Pages : 6871-6876
    P.Vishvapathi, Dr.S.Ramachandram, Dr.A.Govardhan
    Abstract | PDFPDF
    189. RICEsmart: An Expert System to Enhance Rice Yield
    Pages : 6877-6879
    Shailendra Kumar Yadav, Niraj Singhal and Vivek Yadav
    Abstract | PDFPDF
    190. A Replica Distribution Based Fault Tolerance Management For Cloud Computing
    Pages : 6880-6887
    Ajitabh Mahalkari, Prof. Ritu Tondon
    Abstract | PDFPDF
    191. Comparative Study of Reactive Routing Protocols AODV and DSR for Mobile Ad hoc Networks
    Pages : 6888-6891
    Nikhil Kumar, Vishant Kumar,Nitin Kumar
    Abstract | PDFPDF
    -All rights are reserved by International Journal of Computer Science and Information Technologies-