1. |
Comparison of Algebraic Reconstruction Methods in Computed Tomography
Pages : 6007-6009 G Vijayalakshmi, P Vindhya
Abstract | PDF |
2. |
Implementation of Optimization of Latency in Wireless Mesh Network
Pages : 6010-6015
Kusuma M, Umapathi G R
Abstract | PDF |
3. |
A Study of Power and Energy Aware Routing Technologies in Wireless Sensor Network
Pages : 6016-6021
Roshani Kushavaha, Umesh kumar Chourasiya, Mahesh Gour
Abstract | PDF |
4. |
Optimal Resource Allocation in Wireless Mesh Network
Pages : 6022-6026
Amlan Roy, Umapathi G R
Abstract | PDF |
5. |
A Review on Cloud Data Storage in Virtual Perspective
Pages : 6027-6031
B.Nagarajan, Dr.J.Suguna
Abstract | PDF |
6. |
A Comprehensive Framework for Reengineering Method for Web services architectures
Pages : 6032-6034
Venkatsampath Raja Gogineni, Dr.Syed Umar
Abstract | PDF |
7. |
Comprehensive Review of Web Focused Crawling
Pages : 6035-6038
Promila Devi, Ravinder Thakur
Abstract | PDF |
8. |
Haptic Technology :- A Comprehensive Review of its Applications and Future Prospects
Pages : 6039-6043
Anupam Alur,Pratik Shrivastav,Aditya Jumde
Abstract | PDF |
9. |
Design and Implementation of a Low Power Second Order Sigma-Delta ADC
Pages : 6044-6049
K. Lokesh Krishna, M. Jagadeesh , T.Ramashri, K.Anuradha
Abstract | PDF |
10. |
A Survey: Outlier Detection in Streaming Data Using Clustering Approached
Pages : 6050-6053
Safal V Bhosale
Abstract | PDF |
11. |
A Survey on Privacy Preserving Data Mining Techniques
Pages : 6054-5056
Mayil.S and Vanitha.M
Abstract | PDF |
12. |
A Review on Participating Sensing Networking
Pages : 6057-6059
Ravinder Singh Sidhu, Varinderjit kaur
Abstract | PDF |
13. |
A Review Paper on Evolution of Cloud Computing, its Approaches and Comparison with
Grid Computing
Pages : 6060-6063
Rajleen Kaur, Amanpreet Kaur
Abstract | PDF |
14. |
Performance Analysis of Clustering Based on Fuzzy System
Pages : 6064-6067
K.Vijayakumari, M. Preetha, K.Velusamy
Abstract | PDF |
15. |
Crime Detection and Avoidance in ATM: A New Framework
Pages : 6068-6071
Sujith B
Abstract | PDF |
16. |
Design and Development of Privacy Control Tool for Web Browsers using Value Sensitive Design
Pages : 6072-6078
Swarnangini Ghosh, Rajesh Shukla
Abstract | PDF |
17. |
CFixed and Mobile WiMAX Networks based on LTE Pages : 6079-6084
Bhuteswar Jena
Abstract | PDF |
18. |
Comparative Evaluation of Cluster based CBIR using different Similarity Measures
Pages : 6085-6088
Seema Anand Chaurasia, Vaishali Suryawanshi
Abstract | PDF |
19. |
Intelligent Medical Image Segmentation Using FCM, GA and PSO
Pages : 6089-6093
Dilpreet Kaur, Yadwinder Kaur
Abstract | PDF |
20. |
Addressing the Security, Privacy and Trust Challenges of Cloud Computing
Pages :6094-6097
Rama Krishna Kalluri, Dr. C. V. Guru Rao
Abstract | PDF |
21. |
Honeypots: The Need of Network Security
Pages : 6098-6101
Navneet Kambow, Lavleen Kaur Passi
Abstract | PDF |
22. |
Automatic Toll Collection by Using QR Code Capturing
Pages : 6102-6105
Shital Y. Gaikwad, Chandrakant S. Audhutwar
Abstract | PDF |
23. |
Relevancy Enhancement of Query with Czekanowski Coefficient by Expanding it Using
Genetic Algorithm
Pages : 6106-6110
Neha Soni, Jaswinder Singh
Abstract | PDF |
24. |
Comparative Evaluation of Transform Based CBIR Using Different Wavelets and Two Different
Feature Extraction Methods
Pages : 6111-6115 Omprakash Yadav, Vaishali Suryawanshi
Abstract | PDF |
25. |
Review on FPGA Implementation of OFDM
Pages : 6116-6120
Prof. R. K. Paliwal, Dr. C. M. Jadhao, Prof. A.S. Kakad
Abstract | PDF |
26. |
Processing an Image using Inpainting and Super- Resolution Algorithm
Pages : 6121-6123
S. Vijayalakshmi
Abstract | PDF |
27. |
E-Learning :Technological Development in Teaching for school kids
Pages : 6124-6126
K. Udaya Sri, T.V.Vamsi Krishna
Abstract | PDF |
28. |
A Comprehensive Survey of Modern Content Based Image Retrieval Techniques
Pages : 6127-6129
Avneet Kaur Chhabra and Vijay Birchha
Abstract | PDF |
29. |
Enhancement of Radnet Protocol Using Red Routing Algorithm in Manets
Pages : 6130-6134
Balkar Singh, Vinay Bhardwaj
Abstract | PDF |
30. |
Image Denoising Algorithms and DWT: A Review
Pages : 6135-6137
Taranjot Kaur
Abstract | PDF |
31. |
Implementation of Text clustering using Genetic Algorithm
Pages : 6138-6142
Dhanya P.M, Jathavedan M, Sreekumar A
Abstract | PDF |
32. |
Effect of MANETS With and Without Malicious Node
Pages : 6143-6146
Katroth Balakrishna Maruthiram, Sri.Kare.Suresh Babu
Abstract | PDF |
33. |
A Survey on Predicting Student Performance
Pages : 6147-6149
A.Dinesh Kumar ,Dr.V.Radhika
Abstract | PDF |
34. |
Enacting A Service Engagement for Contracts Mining in Business Affairs and Temporal Constraints Using Cloud Computing
Pages : 6138-6142
Deepak M, Goutham R, Deeksha Hegde B, Chandrika C N
Abstract | PDF |
35. |
Comparative Study of Association Rule Mining Algorithms with Web Logs
Pages : 6153-6157
Archita Bonde, Deipali V. Gore
Abstract | PDF |
36. |
Stylometric Approach For Author Identification of Online Messages
Pages : 6158-6159
Smita Nirkhi, Dr.R.V.Dharaska, Dr.V.M.Thakre
Abstract | PDF |
37. |
Pattern Matching using Layered STRIFA for Intrusion Detection
Pages : 6160-6164
P Prudhvi, H Venkateswara reddy
Abstract | PDF |
38. |
Two Way Authentication Scheme for Mobile Applications and Web Application
Pages : 6165-6168
Md Jaleel Ahmed Ansari, P. Subhadra
Abstract | PDF |
39. |
A Survey on Speech Recogntion in Indian Languages
Pages : 6169-6175
Cini Kurian
Abstract | PDF |
40. |
Clean Migration of Data from Relational database
to Object-Oriented database using three step data
migration algorithm
Pages : 6176-6180
Sonali P. Dhawak, Prof. Akansha Jain, Prof. Amit Sinhal
Abstract | PDF |
41. |
A Smart Analytical Tool for Digital Governance with a Global Perspective employing Business
Intelligence
Pages : 6181-6183
Aditya Vinay Jumde, Sayali Makarand ghaisas
Abstract | PDF |
42. |
Migration from One CSP to Another using Meta- Cloud
Pages : 6184-6192
G. Satish, Dr. G. Venkata Rami Reddy
Abstract | PDF |
43. |
A Survey of File Systems and File Access Systems
Pages : 6193-6197
R.Prathyusha, G.Praveen Babu
Abstract | PDF |
44. |
Implementing an Efficient Task to Build Data Sets for Datamining Analysis
Pages : 6198-6201
B.K.Manasa, H.Venkateswara Reddy
Abstract | PDF |
45. |
Experimental study of RED Performance by regulating Upper Threshold Parameter
Pages : 6202-6204
Rajeev Sharma, Dr. Gireesh Dixit
Abstract | PDF |
46. |
Achieving Efficiency of Power, Privacy and QoS for Online Videos
Pages : 6205-6207
Maneesha Patan, Krishna Sagar.B
Abstract | PDF |
47. |
Techniques for Reducing the Down Time during Virtual Machine Migration: Resource Failure &
Live Migration Circumstances
Pages : 6208-6212
Dr. Abhay Kothari, Ashish Agrawal
Abstract | PDF |
48. |
Performance Evaluation of an approach for Secret data transfer using interpolation and LSB
substitution with Watermarking
Pages : 6213-6217
Sonia Bajaj, Manshi Shukla
Abstract | PDF |
49. |
Implementation of TCP Recognition of Broken Order (TCP-BO) Algorithm
Pages : 6218-6224
Monika Nath, Nidhi Sharma
Abstract | PDF |
50. |
Data Mining:Review
Pages : 6225-6228
Paramjit Kaur, Kanwalpreet Singh Attwal
Abstract | PDF |
51. |
Healthcare applications of the Internet of Things:
A Review
Pages : 6229-6232
Alok Kulkarni, Sampada Sathe
Abstract | PDF |
52. |
Secure Multi-party Computation Protocols For
Collaborative Data Publishing With m-Privacy
Pages : 6233-6237
K. Prathyusha, Sakshi Siva Ramakrishna
Abstract | PDF |
53. |
The Hadoop distributed file system
Pages : 6238-6243
Pooja S.Honnutagi
Abstract | PDF |
54. |
Implementation of Cloud computing for Mobile Users
Pages : 6244-6247
P.Dileep , S.Tirupati Rao
Abstract | PDF |
55. |
A Survey on Green Computing Techniques
Pages : 6248-6252
Sonu Choudhary
Abstract | PDF |
56. |
New Approach of Information Security through Steganography by using Wavelet Transformation
and Symmetric Encryption
Pages : 6253-6260
Komal Hirachandani, Gaurav Soni, Prof. Rajesh Nigam
Abstract | PDF |
57. |
Comparative Study of Classification Algorithms used in Sentiment Analysis
Pages : 6261-6264
Amit Gupte, Sourabh Joshi, Pratik Gadgul, Akshay Kadam
Abstract | PDF |
58. |
Fuzzified Denoising Technique for Directional Total Variation Minimization on Color Image
Pages : 6265-6269
Hema Jagat, Rashmi Shrivas
Abstract | PDF |
59. |
Body Odor as a Biometric Authentication
Pages : 6270-6274
P.Inbavalli, G.Nandhini
Abstract | PDF |
60. |
An Extended Visual Cryptography Algorithm for Quality-Improved Gray Scale Image with Sigmoid
Function.
Pages : 6275-6277
Santosh Kumar, Prof. Sini Shibu
Abstract | PDF |
61. |
Efficient Algorithm for Fault Tolerance in Cloud Computing
Pages : 6278-6281
Jasbir Kaur, Supriya Kinger
Abstract | PDF |
62. |
An Efficient Technique of Image Noising and Denoising using Neuro Fuzzy and SVM
Pages : 6282-6285
Jyoti Sharma and Mrs.Rupinder Kaur
Abstract | PDF |
63. |
Performance Evaluation of Mobility Management using Mobile IPv4 and Mobile IPv6 protocols
Pages : 6286-6289
G B Himabindu, A.M Vedhagrani, S R Raj Kumar
Abstract | PDF |
64. |
Doctor App: A life saving Mobile Application
Pages : 6290-6295
Mayank Aggarwal, Akshay Mathur , Yatin Karel
Abstract | PDF |
65. |
Effect of Varying Initial Energy on Multihop Routing Protocol in Wireless Sensor Network
Pages :6296-6302
Namita Sharma
Abstract | PDF |
66. |
Image Restoration by Using Hybrid Filling-in Technique
Pages :6303-6306
Gurpinder Kaur Sivia, Amanpreet Kaur
Abstract | PDF |
67. |
Incorporation of Swarm Intelligence in Autonomous Cars
Pages : 6307-6309
Yadhu Prakash, Kahan Prabhu, Shruti Kamtekar, Sainath Gadhe
Abstract | PDF |
68. |
A Survey on Load Balancing Techniques Using ACO Algorithm
Pages : 6310-6314
Preeti Kushwah
Abstract | PDF |
69. |
Improve Security of Attribute Based Encryption for Secure Sharing of Personal Health Records
Pages : 6315-6317
Able E Alias, Neethu Roy
Abstract | PDF |
70. |
Comparative Study of Wireless Network Technologies
Pages : 6318-6321
Harshil Shah , Lakshmi Kurup
Abstract | PDF |
71. |
Comparative Analysis and Classification of Multispectral Remote Sensing Data
Pages : 6322-6325
Kusum, Paramvir Rathi
Abstract | PDF |
72. |
Approaches for Information Security Modeling
Pages : 6326-6328
Harshitaa.B, G.Praveen Babu
Abstract | PDF |
73. |
Comparative Analysis of TCP variants with AODV in Mobile Ad Hoc Network
Pages :6329-6332
Sandeep Sandhu, Anirudh Menon, Parikshit Sinha, Nirav Afinwale, Mrs.Payal T. Mahida
Abstract | PDF |
74. |
Effect of Mobile Social Networks on Secondary School Students
Pages : 6333-6335
Abba Almu and Bello Alhaji Buhari
Abstract | PDF |
75. |
Optimization of Security Policies on Virtual Machines using Flow Differentiator & Zone Manager
Pages : 6336-6340
J.Madhulatha, E.S.Phalguna Krishna , E.Sandhya
Abstract | PDF |
76. |
Captcha and Its Techniques: A Review
Pages : 6341-6344
Kiranjot Kaur, Sunny Behal
Abstract | PDF |
77. |
Multicast Routing and Its Protocols
Pages : 6345-6349
Mithun B Patil
Abstract | PDF |
78. |
Detailed Survey on Exemplar Based Image Inpainting Techniques
Pages :6350-6354
Jaspreet Kaur Chhabra and Mr. Vijay Birchha
Abstract | PDF |
79. |
Feature Based Video Extraction Using Tree Pruning
Pages : 6355-6360
R. Manjunath, B. Sreepathi
Abstract | PDF |
80. |
Hybrid Approach for Hindi to English Transliteration System for Proper Nouns
Pages : 6361-6366
Veerpal Kaur, Amandeep kaur Sarao, Jagtar Singh
Abstract | PDF |
81. |
Image Filtering and Re-ranking Using Data mining Techniques
Pages : 6367-6372
N.Lakshmi Prasanna, Thirumala Sree G
Abstract | PDF |
82. |
A Location Based Protocol for Anonymity Protection of Nodes and Routes at Low Cost
Pages : 6373-6378
M.Bhavana, M.R.Pavan Kumar
Abstract | PDF |
83. |
Predicting Error in Software Effort Estimate using K-means and Quad Tree algorithm
Pages : 6379-6382
Rutvi Vanapalli, Ch.Satyananda Reddy
Abstract | PDF |
84. |
Detection of Ozone Layer Depletion Using Image Processing and Data Mining Technique
Pages : 6383-6388
Nomula Divya,Narasimha Prasad Lakkakula,Arjun Nelikanti
Abstract | PDF |
85. |
Optimized Method for Tracking of Data Leaving the Cloud Environment
Pages : 6389-6394
Lokendra Vishwakarma, Pallavi Gupta, Awadheshwari patel
Abstract | PDF |
86. |
Using Attribute-Based Encryption with Advanced Encryption Standard for Secure and Scalable
Sharing of Personal Health Records in Cloud
Pages : 6395-6399
B. Sri Varsha, P.S. Suryateja
Abstract | PDF |
87. |
A New Methodology for Improvement of Contrast to Show Fractures in X-ray Images
Pages : 6400-6403
Priya Thamman, Rekha Bhatia
Abstract | PDF |
88. |
A Novel Secured Communication Channel Based On Genetic Functions
Pages : 6404-6409
Lakshmikanth Gurlanka, Vasupalli Mahesh, Y.Ramesh kumar
Abstract | PDF |
89. |
A Novel Secured Data Communication and Prevention of Forgery Attacks Using Digital Certificates
Pages : 6410-6415
Sharina Toor, Kesava Rao Seerapu, Y.Ramesh kumar
Abstract | PDF |
90. |
A Novel Secured Transmission Of Color Extended Visual Images Using Error Diffusion
Pages : 6416-6420
Srujan pentakota, Maher Prasad, Y.Ramesh kumar
Abstract | PDF |
91. |
Efficient Summarization of Text Data Based on Categorized Keywords Ranking
Pages : 6421-6426
Sailaja Madhu, B.Ramesh Babu, Y.Ramesh kumar
Abstract | PDF |
92. |
A Secured Multicasting Key and Data Exchange By Using Extended Chebhysev Map
Pages : 6427-6431
Jyothsna Ivaturi, K.Ravindra, Y.Ramesh Kumar
Abstract | PDF |
93. |
Improving Audit Service in Cloud for Outsourced Storage Dynamically
Pages : 6432-6435
N.Praveen kumar, S.Bavaji
Abstract | PDF |
94. |
Improving the Performance of Processing for Small Files in Hadoop: A Case Study of Weather
Data Analytics
Pages : 6436-6439
Guru Prasad M S, Nagesh H R, Deepthi M
Abstract | PDF |
95. |
Text Search Optimization Using Latent Semantic Indexing
Pages : 6440-6442
Navneet kaur Waraich, Hardeep Singh Sindher
Abstract | PDF |
96. |
Improved Similarity Based Matrix Completion Algorithm Using Latent Semantic Indexing
Pages : 6443-6448
Navneet kaur Waraich, Hardeep Singh Sindher
Abstract | PDF |
97. |
A Survey on Image Feature Selection Techniques
Pages : 6449-6452
Dr. Sanjay Kumar , Er. Ankur Chauhan
Abstract | PDF |
98. |
Comparative Analysis of Clustering & Enhancing Classification Using Bio- Inspired Approaches
Pages : 6453-6457
Navpreet Rupal , Poonam Kataria
Abstract | PDF |
99. |
Ranking Objects by Evaluating Spatial Points through Materialized Datasets
Pages : 6458-6463
K.Swathi, B.Renuka Devi
Abstract | PDF |
100. |
A Flexible and Efficient Natural Language Query interface to databases
Pages : 6464-6467
B.Sujatha, Dr.S. Viswanadha Raju
Abstract | PDF |
101. |
Spatial Index Keyword Search in Multi dimensional Database
Pages : 6468-6471 C. Usha Rani , N.Munisankar
Abstract | PDF |
102. |
Categorising Web Search Results from Search Engine Logs
Pages : 6472-6474
K.Morarjee, Bijam.Mownika
Abstract | PDF |
103. |
Hybrid Approach to Enhance Architecture Supporting WSN Using AODV AND DPR
Pages : 6475-6477
Kulbir Singh Khatra,Vinay Bhardwaj
Abstract | PDF |
104. |
Comparative Analysis of AntHocNet, AODV, DSR Routing Protocols for Improvising Loss
Packet Delivery Factor
Pages : 6478-6482
Maahi Amit Khemchandani, Prof. B. W. Balkhande
Abstract | PDF |
105. |
Developers Harness Open Source Cloud Management Platforms for Novel Applications
Pages : 6483-6486
Dr. Urmila R. Pol
Abstract | PDF |
106. |
Data Mining Techniques For Diagnosis And Prognosis Of Breast Cancer
Pages : 6487-6490
Jaimini Majali, Rishikesh Niranjan, Vinamra Phatak, Omkar Tadakhe
Abstract | PDF |
107. |
Face Recognition Using Principal Component Analysis
Pages : 6491-6496
Ningthoujam Sunita Devi, K. Hemachandran
Abstract | PDF |
108. |
Lifetime Improvement of WSN by Trust Level based Ant Colony Optimization
Pages : 6497-6501
Dr.V.Raghunatha Reddy, A.Rajasekhar Reddy
Abstract | PDF |
109. |
Detection of DDoS Attacks based on Network Traffic Prediction and Chaos Theory
Pages : 6502-6505
Anjali. M
Abstract | PDF |
110. |
Secure Data Spread using Dispersed Key Cohort Scheme in Wireless Sensor Networks
Pages : 6506-6513
R.Kavitha
Abstract | PDF |
111. |
Study of Different Security Issues in Cloud Storage
Pages : 6514-6516
Dandawate Vrushali Vilas, Dr. Ravindra C. Thool
Abstract | PDF |
112. |
Video Surveillance for Theft Detection
Pages : 6517-6520
Abhiram Chaudhari, Ajinkya Jaisingkar, Ankit Patil, Rishi Kajgaonkar
Abstract | PDF |
113. |
Enhanced Offline Signature Recognition Using Neuro- Fuzzy and SURF Features Techniques
Pages : 6521-6527
Rupali Mehra, Dr.R.C.Gangwar
Abstract | PDF |
114. |
A Novel Gaussian Error Diffusion based Colour Extended Visual Cryptography
Pages :6528-6531
T. Anuradha, Dr. K. Usha Rani
Abstract | PDF |
115. |
An Indian Coin Recognition System Using Artificial Neural Networks
Pages : 6532-6537
Loveneet Kaur, Rekha Bhatia
Abstract | PDF |
116. |
Literature Survey on Digital Watermarking
Pages : 6538-6542
Manoranjan Kr Sinha , Dr. Rajesh Rai, Prof. G. Kumar
Abstract | PDF |
117. |
Enhancement in AODV protocol to select the secure and shortest path in Mobile Ad hoc Network
Pages : 6543-6546
Gagandeep Singh Hundal, Rajeev Bedi, Dr. Sunil Kumar Gupta
Abstract | PDF |
118. |
An approach for VM Migration
Pages : 6547-6550
Lavneet Kaur, Er. Kanchan Lalit
Abstract | PDF |
119. |
Anomaly Detection and SQL Prepare Data Sets for Data Mining Analysis
Pages : 6551-6555
P.V.Balakrishna, B.Rama Ganesh
Abstract | PDF |
120. |
Implementing REA Algorithm to Increase Performance of the Encrypted Databases While
Query Processing
Pages : 6556-6561
Rohini A. Chirde, Prof. S. S. Kulkarni
Abstract | PDF |
121. |
A Novel Secured Data and Key Exchange Mechanism for Sensor Networks
Pages : 6562-6566
Bhargavi, Vasupalli Mahesh, Y.Rameshkumar
Abstract | PDF |
122. |
A Novel Secured Protocol for Data Transmission in Adhoc Networks Using Clustering
Pages : 6567-6571
K.Komali, V.Mahesh, Y.Ramesh Kumar
Abstract | PDF |
123. |
A Web Search Engine Application to Compare
Semantic Equivalence between Two Words
Pages : 6572-6577
Mallela Haribabu, H.Devaraj, Y.Ramesh Kumar
Abstract | PDF |
124. |
Application of Concept-Based Mining Model in
Text Clustering
Pages : 6578-6582
Modu Sowjanya, K.Ravindra, Y.Ramesh Kumar
Abstract | PDF |
125. |
THR: Efficient Technique to Reduce Delay with
F-Cast in MANET
Pages : 6583-6585
G.Vasundara Devi, Surya Bahadur
Abstract | PDF |
126. |
Human Motion Analysis with the Help of Video Surveillance: A Review
Pages : 6586-6590
Kavita V. Bhaltilak, Harleen Kaur, Cherry Khosla
Abstract | PDF |
127. |
A Report on the Analysis of Metrics and Measures on Software Quality Factors – A Literature Study
Pages : 6591-6595
Vanitha N, ThirumalaiSelvi R
Abstract | PDF |
128. |
Adaptive Node Resurgence in Wireless Sensor- Actuator Networks
Pages : 6596-6598
T Sridepa, G Vijaybaskar
Abstract | PDF |
129. |
Assay of Data Security in Cloud Computing
Pages : 6599-6601
Navan Preet Singh, Bhavkaran Singh Walia
Abstract | PDF |
130. |
Semantic Image Retrieval:A Review
Pages : 6602-6605
Ashitha.S.S
Abstract | PDF |
131. |
Packet Hiding Scheme without Packet Loss (PHSPL) for defensive against Jamming Attack
Pages : 6606-6608
Archana Patil, Prof. S.P.Pingat
Abstract | PDF |
132. |
A Review on Transform Domain Adaptive Filters
Pages : 6609-6613
Sangeeta Sharma, Deepak Gupta, V K Gupta, Mahesh Chandra
Abstract | PDF |
133. |
Survey on Clustering Techniques in Wireless Sensor Network
Pages : 6614-6619
Priya Vyas, Manoj Chouhan
Abstract | PDF |
134. |
Wormhole Detection and Prevention Scheme using Beacon Node Mechanism with Neighbor Node
Discovery
Pages : 6620-6625
Akansha Agrawal, Prof. Amit Saxena
Abstract | PDF |
135. |
An Energy Efficient Zigbee Standard 802.15.4 Enviornment for a Holter Device
Pages : 6626-6630
Jaspreet Singh, Parminder Kaur, Ashish Verma
Abstract | PDF |
136. |
Performance Analysis of A Novel Scheduling
Algorithm for Different Traffics in LTE Networks
Pages : 6631-6634 Vallari Sharma, Prof. P.K Chopra
Abstract | PDF |
137. |
Mobile Cloud Computing : Issues, Security,Advantages, Trends
Pages : 6635-6639
Dhammapal Tayade
Abstract | PDF |
138. |
Improve Multi Path Congestion Control Technique Using EIA
Pages : 6640-6643
Ankur Nahar, Neeraj Shrivastwa
Abstract | PDF |
139. |
Performance Analysis and Designing of Fingerprints Enhancement Technique Based on
Segmentation, oF Estimation and Ridge
Frequency, Gabor Filters with Wavelet Transform
Pages : 6644-6651
Nadira Quadri, Surendra Singh Choudhary
Abstract | PDF |
140. |
Extended Framework for Social Trust-aware Recommendation System
Pages : 6652-6655
YashneetTyagi, Swati Tiwari
Abstract | PDF |
141. |
Intrusion Detection System Using Clustering
Pages : 6656-6658
Madhulika Deshmukh, Prof. S.K. Shinde
Abstract | PDF |
142. |
Reversible Data Hiding in Images using Circular Hough Transform
Pages : 6659-6663
Sukhdeep Kaur, Manshi Shukla
Abstract | PDF |
143. |
Tamil Speech Recognition Using Hybrid
Technique of EWTLBO and HMM
Pages : 6664-6669
Dr.E.Chandra, S.Sujiya
Abstract | PDF |
144. |
Analysis of Fragment Mining on Indian Financial Market
Pages : 6670-6675
Rajesh V. Argiddi, Dr.Mrs.S.S.Apte
Abstract | PDF |
145. |
A Hybrid Framework of Facial Expression Recognition using SVD & PCA
Pages : 6676-6679
Rupinder Saini, Narinder Rana
Abstract | PDF |
146. |
Improving Data Integrity for Data Storage Security in Cloud Computing
Pages : 6680-6685
Poonam M. Pardeshi, Prof. Bharat Tidke
Abstract | PDF |
147. |
A Survey on Face Identification Methodologies in Videos
Pages : 6686-6688
Deepti Yadav, Ms. Antara Bhattacharya
Abstract | PDF |
148. |
A Review of Web Crawler Algorithms
Pages :6689-6691
Apoorv Vikram Singh , Vikas , Achyut Mishra
Abstract | PDF |
149. |
Agent Based Simulation of Street Robbery Pages : 6692-6696
Amrutha S
Abstract | PDF |
150. |
A Comparative Study of Various Metaheuristic Algorithms
Pages :6701-6704
Prabhneet kaur , Taranjot kaur
Abstract | PDF |
151. |
A Research for Modified PEPSI Architecture
Pages : 6697-6700
Shreya Ahuja, Amninder Kaur Gill
Abstract | PDF |
152. |
Privacy Preserving in Collaborative Data Publishing
Pages : 6705-6706
K. Reddi Kumari, P.Rajarajeswari, Dr.D.Vasumathi
Abstract | PDF |
153. |
Human Activity Tracking and Analysis for Surveillance
Pages : 6707-6711
Swati Chourasia, Vishal Jain
Abstract | PDF |
154. |
Power and Data Aware Best Fit Algorithm for Energy Saving in Cloud Computing
Pages : 6712-6715
Pradeep Kumar, Dilbag Singh, Ankur Kaushik
Abstract | PDF |
155. |
DACD: Delegated Access Control of Data in Cloud computing environment
Pages :6716-6718
Dhanamjay.K, Krishna Sagar.B
Abstract | PDF |
156. |
Optimization of Examination Timetable Using Harmony Search Hyper-Heuristics (HSHH)
Pages : 6719-6723
Ms.Jayashree Rankhambe, Mrs.S.Kavita
Abstract | PDF |
157. |
Anonymization of Centralized and Distributed Social Networks by Incremental Clustering
Pages : 6724-6727
Ms. Sonali M. Khairnar, Prof. Sanchika Bajpai
Abstract | PDF |
158. |
Student Profile Assessor for University Prognosis Using Classification Algorithms
Pages : 6728-6731
Divyansh Jain, Ameya Shringi
Abstract | PDF |
159. |
Evaluating Performance of Compressive sensing for speech signal with Combined Basis
Pages :6732-6735
Siddhi Desai
Abstract | PDF |
160. |
Literature Review of Model Based Test case Prioritization
Pages :6736-6738
Shweta A. Joshi, Prof. B.S. Tiple
Abstract | PDF |
161. |
Blind Source Separation via Independent Component Analysis : Algorithms and
Applications
Pages : 6739-6743
Jaya Kulchandani, Kruti J. Dangarwala
Abstract | PDF |
162. |
Recent Trends in Users’ Query Clustering
Pages : 6744-6749
Sami Uddin , Amit kumar Nandandwar
Abstract | PDF |
163. |
Article Removed
Pages : xxxx-xxxx
xxxx, xxxx
Abstract | PDF |
164. |
Hybrid Approach for Improvement of Web page Response Time
Pages : 6755-6759
Kushwant Kaur, Prof. Kanwalvir Singh Dhindsa
Abstract | PDF |
165. |
Disaster Management System on Mobile Phones Using Google Map
Pages :6760-6763
Varsha S. Sonwane
Abstract | PDF |
166. |
Recognition and Classification Of Speech And Its Related Fluency Disorders
Pages : 6764-6767
Monica Mundada , Bharti Gawali ,Sangramsing Kayte
Abstract | PDF |
167. |
Multi-point Gesture Recognition Using LED Gloves For Interactive HCI
Pages : 6768-6773
Manisha R.Ghunawat
Abstract | PDF |
168. |
Design of Lightweight Secure and Distributed Reprogramming Protocol for Wireless Sensor
Networks using Identity-Based Signature Scheme
Pages : 6774-6778
Pooja Motwani, Purnima Soni, Priyanka Fulare
Abstract | PDF |
169. |
Dataset Watermarking Using Hybrid Optimization and ELM
Pages : 6779-6784
Vithyaa Raajamanickam, Ms.R. Mahalakshmi
Abstract | PDF |
170. |
Multipurpose Web Log Analyzer: A Survey
Pages : 6785-6788
Lalit Agrawal
Abstract | PDF |
171. |
Self Adaptive Harmony Search Algorithm for Optimizing ECG Signal
Pages : 6789-6791
Asha J Gomez, Mitha Rachel Jose
Abstract | PDF |
172. |
Attribute Based Encryption with Privacy Preserving using Asymmetric Key in Cloud Computing
Pages : 6792-6795
S Sankareswari
, S.Hemanth
Abstract | PDF |
173. |
H-ARPT: A Hybrid Adaptive Random Partition Testing for Improved Bug Detection and Test Coverage
Pages : 6796-6801
Mahesh Malviya, Reetika Patidar
Abstract | PDF |
174. |
Body Area Network- A Perspective
Pages : 6802-6809
Gomita Verma , Prof.Moinuddin
Abstract | PDF |
175. |
Stealthy P2P Botnet Detection Based on Automated Threshold Computing Using Genetic
Algorithm
Pages : 6810-6813
Vishnu S Sekhar, Neena Joseph
Abstract | PDF |
176. |
Comparisons of Test t Case Prioritization Algorithm with Random Prioritization
Pages : 6814-6818
Thillaikarasi Muthusamy, Dr. Seetharaman.K
Abstract | PDF |
177. |
A Review on Storage & Prevention in Cloud Computing
Pages : 6819-6823
Tarun Soni, Piyush Singh
Abstract | PDF |
178. |
Cut Paste Detection in Document Images Using Neural Network
Pages : 6824-6826
Sarabjot Singh , Nishu Bansal
Abstract | PDF |
179. |
A Simple and Effective Optical Character Recognition System for Digits Recognition using the
Pixel-Contour Features and Mathematical Parameters
Pages : 6827-6830
Jenil Shah, Viral Gokani
Abstract | PDF |
180. |
Segmentation of Skin Lesions from Digital Images using an Optimized Approach: Genetic Algorithm
Pages : 6831-6837
Hina Sood, Manshi Shukla
Abstract | PDF |
181. |
Performance Comparison of K-means and Rectangle Segmentation Algorithms in
Compression of Color Images
Pages : 6838-6845
Kitty Arora, Manshi Shukla
Abstract | PDF |
182. |
Cellular-Genetic Key Generation Algorithm
Pages : 6846-6848
Neha Singla
Abstract | PDF |
183. |
Understanding Focused Crawler
Pages : 6849-6852
Vruksha Shah, Riya Patni , Vivek Patani, Rhythm Shah
Abstract | PDF |
184. |
Image Encryption using AES Algorithm based on FPGA
Pages : 6853-6859
Anup.Gujar
Abstract | PDF |
185. |
Survey on Improvement of Efficiency of Classified Machinery Datasets Using VPRS
Pages : 6860-6863
Rashmi Rani Upadhyay, Ritesh Shah
Abstract | PDF |
186. |
Sharing of Personal Health Records Securely in
Cloud Computing with Attribute Based Encryption
Pages : 6864-6866
Muhib Anwar Lambay, M. Jhansi Lakshmi, Pralhad S. Gamare
Abstract | PDF |
187. |
Deep Web Query Extraction Algorithm for
Information Retrieval System
Pages : 6867-6870
Divya Dalal, Anil Panwar
Abstract | PDF |
188. |
GWSVM Algorithm for a Grid System
Pages : 6871-6876
P.Vishvapathi, Dr.S.Ramachandram, Dr.A.Govardhan
Abstract | PDF |
189. |
RICEsmart: An Expert System to Enhance Rice Yield
Pages : 6877-6879
Shailendra Kumar Yadav, Niraj Singhal and Vivek Yadav
Abstract | PDF |
190. |
A Replica Distribution Based Fault Tolerance Management For Cloud Computing
Pages : 6880-6887
Ajitabh Mahalkari, Prof. Ritu Tondon
Abstract | PDF |
191. |
Comparative Study of Reactive Routing Protocols AODV and DSR for Mobile Ad hoc Networks
Pages : 6888-6891
Nikhil Kumar, Vishant Kumar,Nitin Kumar
Abstract | PDF |