• Up Coming Issue >
  • Up-Coming Conference
  • Conference Papers
  • Indexing
  • Peer-Review
  • Publication Ethics
  • Contact
  • FAQ
  • Terms&Conditions
  • Site Map
  • bh

     

    VOLUME 5 ISSUE 6 November - December 2014

    ISSN 0975 - 9646

    1. A Study of Service Users’ Attitudes towards E-Government Initiatives in the Kingdom Of
    Saudi Arabia

    Pages : 6892-6901
    Raed Alotaibi, Kuldeep Sandhu, Luke Houghton
    Abstract | PDFPDF
    2. Mining High BeneficialItemsets from Transactional Database
    Pages : 6902-6904
    Supriya P. Bhosale
    Abstract | PDFPDF
    3. Mainframes- Still standing the test of time
    Pages : 6905-6906
    Sophia Sharda
    Abstract | PDFPDF
    4. Speech Database for Speech Analysis
    Pages : 6907-6910
    Ganga Banavath, Sreedhar Potla
    Abstract | PDFPDF
    5. A Brief Study of Power Efficient Hierarchical Routing Protocols in Wireless Sensor Networks
    Pages : 6911-6915
    Anuradha, Inderjeet Singh Gill
    Abstract | PDFPDF
    6. Secure Token for Secure Routing of Packet in MANET
    Pages : 6916-6919
    S.S.Zalte, Prof.(Dr.)Vijay R.Ghorpade
    Abstract | PDFPDF
    7. Optimal Decision Support System Using Multilayer Neural Networks for Incinerator Control
    Pages :6920-6925
    Prakash G L, Samson Saju, Snehil Mitra and Vedant Sharma
    Abstract | PDFPDF
    8. Privacy Preserving Data Sharing in Multi Groups
    Pages : 6926-6928
    M.Kavya, M.V. Jagannatha Reddy
    Abstract | PDFPDF
    9. Survey on Application Layer DDoS Attacks
    Pages : 6929-6931
    Anjali. M, B.Padmavathi
    Abstract | PDFPDF
    10. Library Management System Using RFID Technology
    Pages : 6932-6935
    Sree Lakshmi Addepalli, Sree Gowri Addepalli
    Abstract | PDFPDF
    11. An Efficient and Flexible DC to DC Converter With Feedback Control for Communication System
    Pages : 6936-6938
    Agus Harjoko, Tri Wahyu Supardi
    Abstract | PDFPDF
    12. Tonic Comprehension and Modeling of Analog Transmissions -An insight into the future of ‘Smart Music
    Pages : 6939-6941
    Siddhant Gawsane, Koninika Patil
    Abstract | PDFPDF
    13. Secure Data Storage and Log Records Using JAR, AES
    Pages :6942-6945
    K.Kartheek, C.Narasimha
    Abstract | PDFPDF
    14. An Enhanced SharePoint Authentication using Kerberos
    Pages : 6946-6951
    S.Vanitha, J.Jayachitra, K.Elavarasi
    Abstract | PDFPDF
    15. Comparison of TPatLetEn with TPF in Detecting and Preventing DoS Attack
    Pages : 6952-6957
    Durairaj M , Persia A
    Abstract | PDFPDF
    16. An Improved Heft Algorithm Using Multi- Criterian Resource Factors
    Pages : 6958-6963
    Renu Bala, Gagandeep Singh
    Abstract | PDFPDF
    17. Survey of Fingerprint Matching Techniques for Privacy Protection
    Pages : 6964-6966
    Sayali Kapre, Antara Bhattacharya
    Abstract | PDFPDF
    18. Privacy Protection over Network Communication in Manet
    Pages : 6967-6971
    Dr.K.Rajangam, L.Dhanam, Anuradha Balasubramanian
    Abstract | PDFPDF
    19. Article Removed
    Pages : xxx-xxx
    xxx, xxx
    Abstract | PDFPDF
    20. Intrusion Detection System using Ripple Down Rule learner and Genetic Algorithm
    Pages :6976-6980
    D.P. Gaikwad, R.C.Thool
    Abstract | PDFPDF
    21. Data Hiding & Visual Cryptography:A Review
    Pages : 6981-6984
    Deepti B. Khasbage, Prof. DR .P.R. Deshmukh
    Abstract | PDFPDF
    22. A Novel Approach for Transductive Decision Tree
    Pages : 6985-6988
    B. Veera sekhar Reddy, Y.C.A.Padmanabha Reddy, S.Mohommad.ghouse
    Abstract | PDFPDF
    23. Text Data Linkage of Different Entities Using Occt-One Class Clustering Tree
    Pages : 6989-6991
    E.Afreen Banu, R.Karthikeyan
    Abstract | PDFPDF
    24. A Fast and New Collaborative Web Recommendation System Using Fast Adaptive Association Rule Mining
    Pages :6992-6995
    Dr A. Kumar
    Abstract | PDFPDF
    25. Facial Expression Recognition with PCA And LDA
    Pages : 6996-6998
    Taqdir, Jaspreet Kaur
    Abstract | PDFPDF
    26. Touchscreen Using Web Camera
    Pages : 6999-7001
    Kuntal B. Adak, Adarsh N. Singh, Abhilash B. Kamble
    Abstract | PDFPDF
    27. Image Segmentation using Bi Directional Self Organize Neural Network (BDSONN)
    Pages : 7002-7011
    Rudranath Banerjee, Arun Kanti Manna
    Abstract | PDFPDF
    28. A Survey on Web Pre-Fetching Techniques
    Pages : 7012-7021
    Priyansha bangar, Kedar Nath Singh
    Abstract | PDFPDF
    29. A Survey on Web Log Mining Pattern Discovery
    Pages : 7022-7031
    Amit Vishwakarma, Kedar Nath Singh
    Abstract | PDFPDF
    30. Virtual Reality: The Future Interface of Technology
    Pages :7032-7034
    Raghav Toshniwal, Kanishka Ghosh Dastidar
    Abstract | PDFPDF
    31. A Modified Pixel Frequency Based Reversible Data Hiding for Secure Data Communication
    Pages : 7035-7040
    Sowmyashree, R.R.Sedamkar, Sanjay Sharma
    Abstract | PDFPDF
    32. Improving Efficiency of Data Mining through Neural Networks
    Pages : 7041-7044
    D. Prashanth Kumar, B. Yakhoob, N. Raghu
    Abstract | PDFPDF
    33. SOA AND REST Synergistic Approach
    Pages : 7045-7049
    Navdeep Dahiya, Neha Parmar
    Abstract | PDFPDF
    34. Privacy Based Query Search by Using Content and Location
    Pages : 7050-7053
    Navya Theja C., Satheesh KRK
    Abstract | PDFPDF
    35. Design Of Mobility Robust Tree Construction Framework For Zigbee Wireless Networks
    Pages : 7054-7059
    Chaitali G.Golhar, Prof.A.W.Motikar
    Abstract | PDFPDF
    36. A Framework To Optimize Task Scheduling in Cloud Environment
    Pages : 7060-7062
    R. Jemina Priyadarsini and L. Arockiam
    Abstract | PDFPDF
    37. A Review on Risk Score Based App Classification Using Enriched Contextual Information of App
    Context

    Pages : 7063-7066
    Lokhande Prajakta Padmakar, Prof. Shivaji R Lahane
    Abstract | PDFPDF
    38. Simulation and Synthesis of 16×16 Switch for Feed Back Based Switch Systems
    Pages : 7067-7070
    P.Aruna, R. Mahesh Kumar , G.Mahammed Rafi
    Abstract | PDFPDF
    39. Transaction-Level Behavior Based Credit Card Fraud Detection Mechanism
    Pages : 7071-7074
    Bhakti Ratnaparkhi, Rahul Patil
    Abstract | PDFPDF
    40. Recent Advances in Audio Video Multimedia Communication Technology
    Pages : 7075-7077
    Narangale S. M., G. N. Shinde
    Abstract | PDFPDF
    41. Survey on Various Methods and Techniques for Searching Dimension in Incomplete Database
    Pages : 7078-7081
    Yogita M. Kapse, Antara Bhattacharya
    Abstract | PDFPDF
    42. Use of Genetic Algorithm with Fuzzy Class Association Rule Mining for Intrusion Detection
    Pages : 7082-7087
    Dipali Kharche, Prof. Rahul Patil
    Abstract | PDFPDF
    43. Improved Load Balanced & Energy Efficient Ad hoc on demand routing Algorithm
    Pages : 7054-7059
    Madhvi Saxena, K.J. Mathai
    Abstract | PDFPDF
    44. Privacy Preserving Multi-Keyword Ranked Search with Anonymous ID Assignment over Encrypted
    Cloud Data

    Pages : 7093-7096
    Shiba Sampat Kale, Prof. Shivaji R Lahane
    Abstract | PDFPDF
    45. An Accurate Surfer Model to Enhance Web Search Criteria
    Pages : 7097-7100
    Neerumalla Swapna, S.Bhavani
    Abstract | PDFPDF
    46. Survey on Nearest Neighbor Search for Spatial Database
    Pages : 7101-7103
    Zarreen Anjum, Priti Saktel
    Abstract | PDFPDF
    47. Cloud Based SQL Query Mainframe
    Pages : 7104-7106
    Konolla Siva ramakrishna,Adoni Krishna Kumar,Kotagiri ManojKumar,Bikumalla Jaya Keerthi,Valiveti Krishna Priya
    Abstract | PDFPDF
    48. Smart Surveillance Monitoring System Using Raspberry PI and PIR Sensor
    Pages : 7107-7109
    Sanjana Prasad, P.Mahalakshmi, A.John Clement Sunder, R.Swathi
    Abstract | PDFPDF
    49. Advanced Cross-Layer Jamming Detection and Mitigation in Wireless Broadcast Networks
    Pages : 7110-7113
    Yogesh Adhar Mali, Anil Kumar Patidar
    Abstract | PDFPDF
    50. Survey on Semi-Supervised Feature Selection in Datamining
    Pages : 7114-7117
    Kalaiselvi.R, Premadevi.P, Hamsathvani.M
    Abstract | PDFPDF
    51. A Survey on Privacy Preserving in Roaming Network
    Pages : 7118-7121
    Kousalya.K, Anitha.P, Gowri.K
    Abstract | PDFPDF
    52. A Survey on Energy Conservation for Mobile-Sink in WSN
    Pages : 7122-7125
    Gowri.K, Dr.M.K.Chandrasekaran, Kousalya.K
    Abstract | PDFPDF
    53. A Novel Key Exchange Mechanism for Secure Intrusion-Detection System for MANET
    Pages : 7126-7129
    D.Anil, Dr. S. Vasundra
    Abstract | PDFPDF
    54. A New Method for Removal of Salt and Pepper Noise through Advanced Decision Based Unsymmetric Median Filter
    Pages : 7130-7135
    A.Srinagesh, BRLKDheeraj, Dr.G.P.Saradhi Varma
    Abstract | PDFPDF
    55. Review on: - Human Identification using GAIT Recognition Technique with PAL and PAL entropy, SVM and k-means with LDA
    Pages : 7136-7141
    Deepti Singh , Dr. Amit Dixit
    Abstract | PDFPDF
    56. Human Identification using GAIT Recognition Technique with PAL and PAL entropy, SVM and k-means with LDA
    Pages : 7141-7145
    Deepti Singh, Dr. Amit Dixit
    Abstract | PDFPDF
    57. Network Security Testing Using Discovery Techniques
    Pages : 7146-7153
    U. Palani, S. Vanitha, S. Lakshminarasimman
    Abstract | PDFPDF
    58. Performance Comparison of Diverse Routing Protocols in Wireless Multimedia Sensor Networks
    Pages : 7154-7162
    A.Sivagami, S.Malarkkann, S.Sandiya, R.Ramakrishnan
    Abstract | PDFPDF
    59. A Highly Secured Four Layer Architecture Using NTRU Algorithem ( TITEL)
    Pages : 7163-7165
    Vipanjit Kaur, Vinay Bhardwaj
    Abstract | PDFPDF
    60. A New Approach to Authenticate Images in Different Datasets Using a Lossless Image Watermarking Technique
    Pages : 7166-7171
    Arathi Chitla, Dr. M. Chandra Mohan
    Abstract | PDFPDF
    61. Role of Big Data Analytics in Rural Health Care - A Step Towards Svasth Bharath
    Pages : 7172-7178
    Muni Kumar N, Manjula R
    Abstract | PDFPDF
    62. Load Balancing For Presence Server Architecture
    Pages : 7179-7183
    M. Lokesh Kumar Rao, D. Kasi Viswanath
    Abstract | PDFPDF
    63. Intrusion Detection System using Genetic-Fuzzy Classification
    Pages : 7184-7190
    Prabhat Prakash, Dr. Rajendra Kumar Bharti
    Abstract | PDFPDF
    64. Review on Parallelized Multipattern Matching Using Optimized Parallel Aho-Corasick Algorithm
    on GPU

    Pages : 7191-7194
    Prachi Oke, Prof. Mrs. A. S. Vaidya
    Abstract | PDFPDF
    65. Two Way Authentication For Android Client Against Active Directory
    Pages : 7195-7198
    Prof. Sunita M. Dol, Varsha Kulkarni, Vipula Moholkar
    Abstract | PDFPDF
    66. Performance Evaluation of Different Hybrid Optical Amplifiers for 64×10, 96×10 and 128×10
    Gbps DWDM transmission system

    Pages : 7199-7203
    Rashmi, Anurag Sharma, Vikrant Sharma
    Abstract | PDFPDF
    67. Checking Language Dependent Accuracy of Web Applications using Data Mining Techniques
    Pages : 7204-7209
    Maninderjit Kaur, Dr. Sushil Kumar Garg
    Abstract | PDFPDF
    68. Half Life Variable Quantum Time Round Robin (HLVQTRR)
    Pages : 7210-7217
    Simon Ashiru , Salleh Abdullahi , Sahalu Junaidu
    Abstract | PDFPDF
    69. Ranking of Research Papers using WPCR with Clustering Algorithm
    Pages : 7218-7222
    Manpreet Kaur Gill, Jasmeet Singh
    Abstract | PDFPDF
    70. Proposals Assignment using Fuzzy C-Means and CART Algorithm
    Pages : 7223-7227
    Gurpreet Kaur, Jasmeet Singh
    Abstract | PDFPDF
    71. A Comparative Analysis of DSR and AODV Protocols under Blackhole and Grayhole Attacks in MANET
    Pages : 7228-7231
    Monika Verma, Dr. N. C. Barwar
    Abstract | PDFPDF
    72. An Encryption Algorithm Based on ASCII Value of Data
    Pages : 7232-7234
    Satyajeet R. Shinge, Rahul Patil
    Abstract | PDFPDF
    73. Study of Various Crossover Operators in Genetic Algorithms
    Pages : 7235-7238
    Nitasha Soni, Dr .Tapas Kumar
    Abstract | PDFPDF
    74. A Review on Side Information Entangling For Effective Clustering Of Text Documents in Data
    Mining

    Pages : 7239-7242
    Y.R.Gurav, P.B.Kumbharkar
    Abstract | PDFPDF
    75. Avance Bibliothek Management System
    Pages : 7243-7251
    Maddirala Jagadish, Palli Hemanth Kumar, Pamarthi Jagadish
    Abstract | PDFPDF
    76. A Survey: Face Recognition Techniques
    Pages :7252-7256
    Arun Agrawal, Ranjana Sikarwar
    Abstract | PDFPDF
    77. A Review on Recommendations and Overlapping Communities for Location Based Social Networks
    Pages : 7257-7261
    Kavita G. Gare, Nilesh V. Alone
    Abstract | PDFPDF
    78. Human User Identification Using Multi-Sensor Data Fusion
    Pages : 7262-7264
    Naman Patel, Ms Sindhu Nair, Harsh Trivedi
    Abstract | PDFPDF
    79. Real Time Optical Heart Rate Monitor
    Pages : 7265-7269
    Deepak Verma, Mahika Bhasin
    Abstract | PDFPDF
    80. A Novel Approach for Video Transmission in MANET
    Pages : 7270-7275
    Maddirala Jagadish, Palli Hemanth Kumar, Pamarthi Jagadish
    Abstract | PDFPDF
    81. DDoS Attack Detection based on Chaos Theory and Artificial Neural Network
    Pages : 7276-7279
    Anjali. M, B.Padmavathi
    Abstract | PDFPDF
    82. Comparative Study of Privacy Preservation Techniques in Data Mining
    Pages : 7280-7287
    Avruti Srivastava
    Abstract | PDFPDF
    83. A Novel Approach to Predict the Learning Skills of Autistic Children using SVM and Decision Tree
    Pages :7288-7291
    M.S.Mythili, Dr.A.R.Mohamed Shanavas
    Abstract | PDFPDF
    84. An Intensifying Concept of Intrusion Detection to Accelerate Accuracy and Effectiveness with
    Knowledge

    Pages : 7292-7295
    Vipin Singh, Himanshu Arora
    Abstract | PDFPDF
    85. A Survey on Various Algorithms Used for Elliptic Curve Cryptography
    Pages :7296-7301
    Christina Thomas, Gnana Sheela K, Saranya P Krishnan
    Abstract | PDFPDF
    86. Hybrid cryptography technique using modified Diffie-Hellman and RSA
    Pages :7302-7304
    Shyam Deshmukh, Prof.Rahul Patil
    Abstract | PDFPDF
    87. Adaptive Texture Segmentation using M Band Wavelet Transform and Wavelet Packet
    Pages :7305-7308
    Taramati Taji, Deipali Gore
    Abstract | PDFPDF
    88. Centroid Based Clustering Algorithms- A Clarion Study
    Pages :7309-7313
    Santosh Kumar Uppada
    Abstract | PDFPDF
    89. DDoS Prevention on Rest Based Web Services
    Pages :7314-7317
    Neha Lad, Jwalant Baria
    Abstract | PDFPDF
    90. A Study on Large Scale Network Simulators
    Pages :7318-7322
    Gayatry Borboruah, Gypsy Nandi
    Abstract | PDFPDF
    91. A Review on Deterministic Finite Automata Compression Techniques for Efficient Pattern Matching Process
    Pages :7323-7325
    Utkarsha P. Pisolkar, Shivaji R. Lahane
    Abstract | PDFPDF
    92. A Review on Meta Information Based Text Data Clustering
    Pages :7326-7329
    Mrunal V. Upasani, Rucha C. Samant
    Abstract | PDFPDF
    93. A Survey on Intrusion detection System for Mobile Ad-hoc Networks
    Pages :7330-7333
    Ranjit j. Bhosale, R.K.Ambekar
    Abstract | PDFPDF
    94. Review On Data Replication with QoS and Energy Consumption for Data Intensive Applications in
    Cloud Computing

    Pages :7334-7338
    More Reena S, Nilesh V. Alone
    Abstract | PDFPDF
    95. A Review Paper on Filter Unwanted Messages from OSN
    Pages :7339-7345
    Tambe Ujwala S, Archana S. Vaidya
    Abstract | PDFPDF
    96. Automotive User Profiling Using Vehicle Data Considering Different Driving Scenarios
    Pages :7346-7349
    Bharat S. Dangra, Mangesh V. Bedekar, Suja S. Panicker
    Abstract | PDFPDF
    97. Survey on Modeling Human object interactions in Still Images
    Pages :7350-7352
    A.N.Bhagat, N.B.Pokale
    Abstract | PDFPDF
    98. Color Image Segmentation using Median Cut and Contourlet Transform : A Parallel Segmentation
    Approach

    Pages :7353-7358
    Smita Patil, Aparna Junnarkar
    Abstract | PDFPDF
    99. Security Enhancement for Cloud Storage Systems
    Pages :7359-7362
    Harmanbir kaur, Meenakshi Sharma
    Abstract | PDFPDF
    100. A Survey on Impact of Social Media on Election System
    Pages :7363-7366
    Gayatri Wani , Nilesh Alone
    Abstract | PDFPDF
    101. A Survey: Power efficiency Live Migration for Data Centers in Cloud
    Pages :7367-7370
    Yogesh Eknathrao Gaikwad, Seema Singh Solanki
    Abstract | PDFPDF
    102. Promoting E-Commerce in India: Main Issues and Challenges
    Pages :7371-7375
    Sonnet Debbarma, Gypsy Nandi
    Abstract | PDFPDF
    103. Performance Analysis of Hash Algorithms and File Integrity
    Pages :7376-7379
    Hanumantu Rajeswari, Ramesh Yegireddi , Vudumula Govinda Rao
    Abstract | PDFPDF
    104. Survey of Trajectory Based Forwarding and Its Applications
    Pages :7380-7384
    Subhashini.S , Dr. T.V.P Sundararajan, Priyanga. D, Sanjanaprasad
    Abstract | PDFPDF
    105. A Review on Parallelization of Node based Game Tree Search Algorithms on GPU
    Pages :7385-7388
    Rutuja U. Gosavi, Payal S. Kulkarni
    Abstract | PDFPDF
    106. A Survey: Peer-to-Peer Traffic Identification technologies
    Pages :7389-7392
    S. R. Patil, Suraj S. Dangat
    Abstract | PDFPDF
    107. Securing Multimedia on Hybrid Architecture with Extended RBAC
    Pages :7393-7398
    Gurpinder Kaur, Monika Bharti
    Abstract | PDFPDF
    108. Axiomization of nw-MVD
    Pages :7399-7403
    V. Sangeetha, V. Valli Kumari
    Abstract | PDFPDF
    109. Assorted Image Based Obscure Techniques In Visual Cryptography
    Pages :7404-7406
    Thanuganesh.M, Saranya.R
    Abstract | PDFPDF
    110. A Survey on High Utility Itemset Mining Using Transaction Databases
    Pages :7407-7410
    Maya Joshi, Mansi Patel
    Abstract | PDFPDF
    111. Survey on Satellite Image Enhancement Techniques
    Pages :7411-7414
    Ravi B. Mehta , Richard Sonaliya
    Abstract | PDFPDF
    112. A Hybrid Image Contrast Enhancement Approach Using Genetic Algorithm and Neural Network
    Pages :7415-7419
    Cheenu Sharma, Rupinder Kaur
    Abstract | PDFPDF
    113. Paradigm Shift in Voting - Secure Mobile Voting
    Pages :7420-7422
    Neha Kapoor, Rampur Srinath, Lokesh S, Rajesh N
    Abstract | PDFPDF
    114. Dynamic Shortest Path Routing In Mobile Adhoc Networks Using Modified Artificial Bee Colony
    Optimization Algorithm

    Pages :7423-7426
    E. Hemalatha Jai Kumari, Dr. Kannammal
    Abstract | PDFPDF
    115. Congestion Control Approach for TCP by Differentiating NCL and PR upon the ERT in Wireless Mesh Networks
    Pages :7427-7429
    Neha Patil, Prof. Gajendra Singh Chandel
    Abstract | PDFPDF
    116. Genetic Algorithm Approach for Bandwidth Optimization in Near Video on Demand System
    Pages :7430-7438
    Kriti Priya Gupta
    Abstract | PDFPDF
    117. Web Database Annotation for Fast and Accurate Retrieval
    Pages :7439-7442
    VijayaLakshmi K, Sudhakar Yadav N
    Abstract | PDFPDF
    118. An Approach to Securely Transfer a Secret Image Using Reversible Color Transformations and HSV Color Model
    Pages :7443-7445
    Shruti Sarwate, Hemlata Dakhore
    Abstract | PDFPDF
    119. Hidden Markov Model for Credit Card Fraud Detection
    Pages :7446-7451
    Ankit Vartak, Chinmay D Patil,Chinmay K Patil
    Abstract | PDFPDF
    120. Utilizing ICT to Fight against Crime: Emerging ICT Tools, Forms of Crime and Its Solutions
    Pages :7452-7457
    Ramandeep Kaur, Neeru Sharda
    Abstract | PDFPDF
    121. Vedic Mathematics in Computer: A Survey
    Pages :7458-7459
    Shivangi Jain , Prof. V. S. Jagtap
    Abstract | PDFPDF
    122. Securing User Location in Geo Social Networking Using Coordinate Conversions
    Pages :7460-7466
    J Maruthi Nagendra Prasad, N.Penchalaiah
    Abstract | PDFPDF
    123. Impact Analysis and Detection Method of Malicious Node Misbehavior over Mobile Ad Hoc Networks
    Pages :7467-7470
    Priyanka Jain, Mehul Maharshi
    Abstract | PDFPDF
    124. A Review on Semantic Ontology based E-Learning Framework
    Pages :7471-7476
    V. Geetha, Dr.M.V.Srinath, Dr. OmarA. AlHeyasat
    Abstract | PDFPDF
    125. Knowledge Discovery from Various Algorithms: A Survey
    Pages :7477-7479
    VINOD L.MANE , PROF. S. S. PANICKER , PROF. V. B. PATIL
    Abstract | PDFPDF
    126. Third-Party Net Stalk: Policy and Technology
    Pages :7480-7487
    S.Vanitha, U.Palani, A.Arthibala
    Abstract | PDFPDF
    127. Focused and Deep Web Crawling-A Review
    Pages :7488-7492
    Saloni Shah, Siddhi Patel , Prof. Sindhu Nair
    Abstract | PDFPDF
    128. Implementation of Modern RSA Variants
    Pages :7493-7495
    Akansha Tuteja, Amit Shrivastava
    Abstract | PDFPDF
    129. Compendium of Reversible Data Hiding
    Pages :7496-7500
    S.Bhavani and B.Ravi teja
    Abstract | PDFPDF
    130. CAPTCHAs based on the Principle- Hard to Separate Text from Background
    Pages :7501-7503
    Niket Kumar Choudhary, Rahul Patil
    Abstract | PDFPDF
    131. Portability in User Profiles: Single User – Multiple Devices
    Pages :7504-7507
    Saniya Zahoor ,Dr. Mangesh Bedekar ,Pranali Kosamkar
    Abstract | PDFPDF
    132. Curvelet and Wavelet Image Fusion using Neural Network Algorithm
    Pages :7508-7512
    Ankita Kaushal, Paramjeet Kaur
    Abstract | PDFPDF
    133. Review on: Blood Vessel Extraction and Eye Retinopathy Detection
    Pages :7513-7516
    Manvir Kaur, Dr Rajnessh Talwar
    Abstract | PDFPDF
    134. Ameliorate Degraded Document Images Using Synergized Technique
    Pages :7517-7520
    K.Lakshmipriya, K.Udhayalakshmi
    Abstract | PDFPDF
    135. Proficient Method towards Concurrency Control in Distributed Database
    Pages :7521-7524
    Anil Ahir
    Abstract | PDFPDF
    136. Survey on Adaptive Traffic Signal Re-Timing In Vehicular Ad-Hoc Network
    Pages :7525-7527
    Sarika Rakhade
    Abstract | PDFPDF
    137. Ant Colony Optimization Technique for Secure Various Data Retrieval in Cloud Computing
    Pages :7528-7531
    K.Sriprasadh, M.Prakash Kumar
    Abstract | PDFPDF
    138. CA Review on A highly scalable Privacy preserving content based Publisher/Subscriber system using event based encryption
    Pages :7532-7535
    Handore Jayshree Shrikant, Prof. Shivaji R. Lahane
    Abstract | PDFPDF
    139. Review: Various Image Segmentation Techniques
    Pages :7536-7539
    Swati Matta
    Abstract | PDFPDF
    140. Association Rule Mining in Horizontally Distributed Databases
    Pages :7540-7544
    Manali Rajeev Raut, Hemlata Dakhore
    Abstract | PDFPDF
    141. Detection and Localization of Spoofing in Wireless and Sensor Networks
    Pages :7545-7552
    Chandrakant M. Jadhav, Sharad S. Shinde
    Abstract | PDFPDF
    142. A Review on Software Testing Framework in Cloud Computing
    Pages :7553-7562
    D.Anitha and Dr.M.V.Srinath
    Abstract | PDFPDF
    143. Hybrid Encryption System
    Pages :7563-7566
    Sushant Susarla , Gautam Borkar
    Abstract | PDFPDF
    144. A Smart Crypto Scheme for Multi Owner Data Authentication over Cloud Service
    Pages :7567-7571
    V.Kiruthika, B.R.Laxmi Sree
    Abstract | PDFPDF
    145. Image Authentication by Features Extraction and Biomeric key
    Pages :7572-7576
    S.Saravanan
    Abstract | PDFPDF
    146. A Survey on Performance Modelling and Optimization Techniques for SpMV on GPUs
    Pages :7577-7582
    Aditi V. Kulkarni, Prof. C. R. Barde
    Abstract | PDFPDF
    147. Article Removed
    Pages :7583-7587
    xxx, xxx
    Abstract | PDFPDF
    148. SLA Provided Collaboration Cloud using OLAP
    Pages :7588-7589
    K.Vijay Kumar, A.Sathyavani, M.Yesudoss Winster
    Abstract | PDFPDF
    149. Evaluating Facial Expressions with Different Occlusion around Image Sequence
    Pages :7590-7594
    Ankita Vyas, Ramchand Hablani
    Abstract | PDFPDF
    150. Higher Order Fitting based Image De-noising using ANN
    Pages :7595-7601
    Barjinder Kaur, Manshi Shukla
    Abstract | PDFPDF
    151. Distributed Algorithm for Independent Fairness Management to Control the Congestion in Wireless Sensor Network
    Pages :7602-7605
    Padmashree T, Dr.N.K.Cauvery, Manasa M B
    Abstract | PDFPDF
    152. Intelligent System in Behavioural Analysis
    Pages :7606-7608
    Madhura Parlikar, Anjali Chavan, Kedar Khire, Ajit Ingavale
    Abstract | PDFPDF
    153. Design of New Low Power –Area Efficient Static Flip-Flops
    Pages :7609-7613
    M.Jagadeesh Kumar, Dr. R Ramana Reddy
    Abstract | PDFPDF
    154. A Probabilistic Model of Real Time Event Detection and Reporting
    Pages :7614-7617
    Dharnasi Rama Devi, Naga Aswani Puduru
    Abstract | PDFPDF
    155. Forgery Detection using Noise Inconsistency: A Review
    Pages :7618-7622
    Savita Walia, Mandeep Kaur
    Abstract | PDFPDF
    156. A Survey of Data Uncertainty in Face Recognition
    Pages :7623-7625
    Shubhangi G. Khadse
    Abstract | PDFPDF
    157. Dynamic Load Balancing Mechanism In Multiservice Cloud Storage
    Pages :7626-7630
    Karishma B. Badgujar, Prof. Pravin R. Patil
    Abstract | PDFPDF
    158. Implementation of NTRU Algorithm for the Security of N-Tier Architecture
    Pages :7631-7636
    Amandeep Kaur Gill, Charanjit Singh
    Abstract | PDFPDF
    159. Classifier Model for Intrusion Detection Using Bio-inspired Metaheuristic Approach
    Pages :7637-7642
    P.Amudha, S.Karthik, S.Sivakumari
    Abstract | PDFPDF
    160. A Survey Paper on an Efficient Approach towards Image Mining Using Association Rule with Fusion
    Pages :7643-7645
    Yugandhara A.Thakare, Prof.Shraddha P.Mankar
    Abstract | PDFPDF
    161. Access Control for Semantic Data Repository Using Description Logic
    Pages :7646-7648
    Suganyasree.K , Nagajothi.P
    Abstract | PDFPDF
    162. Review on Common Feature Discriminant Analysis for Matching Infrared Face Images To Optical Face Images
    Pages :7649-7651
    Shubhangi G. Rode
    Abstract | PDFPDF
    163. A Novel Load Balancing Model Using RR Algorithm for the Cloud Computing
    Pages :7652-7655
    B.Bhaskar, E. Madhusudhana Reddy
    Abstract | PDFPDF
    164. EEG Based Emotion Recognition System
    Pages :7656-7658
    Prashant Lahane, Shrutika Lokannavar, Apurva Gangurde, Poonam Bhosale, Pooja Chidre
    Abstract | PDFPDF
    165. Clustering Sentence-Level Text Using a Hierarchical Fuzzy Relational Clustering Algorithm
    Pages :7659-7660
    Deepika U. Shevatkar, V.K.Bhusari
    Abstract | PDFPDF
    166. Review On Image Portion Mixing With Background Using In-painting Technique
    Pages :7661-7663
    Neha Dangre, Prakash Mohod
    Abstract | PDFPDF
    167. Web Based User Interface Framework
    Pages :7664-7667
    Saroja Rani Polamarasetty
    Abstract | PDFPDF
    168. A Survey on Image Feature Descriptors
    Pages :7668-7673
    Rekhil M Kumar, Sreekumar K
    Abstract | PDFPDF
    169. Faster Transfer of AES Encrypted Data over Network
    Pages :7674-7676
    Suvarna Patil, Rahul Patil
    Abstract | PDFPDF
    170. Deep Web Data Extraction by Using Vision-Based Item and Data Extraction Algorithms
    Pages :7677-7682
    B.Sailaja, Ch.Kodanda Ramu, Y.Ramesh Kumar
    Abstract | PDFPDF
    171. Secure Secret Key Transfer Using Modified Hash Based LSB method
    Pages :7683-7685
    Aniket G. Meshram, Prof. Rahul Patil
    Abstract | PDFPDF
    172. A Parallel Genetic Algorithm for Generalized Vertex Cover Problem
    Pages :7686-7689
    Drona Pratap Chandu
    Abstract | PDFPDF
    173. An Enhancement of Mining Videos Based On Annotation Reranking Method Using Ncut Algorithms
    Pages :7690-7696
    R.Ranjani. S. Selva Seeba
    Abstract | PDFPDF
    174. A Compressive Survey on Restructuring User Search Results by Using Feedback Session
    Pages :7697-7701
    Shinde Sonali Bhaskar
    Abstract | PDFPDF
    175. Weighted Clustering Algorithm with Ant Colony Optimization to Provide Better Quality of Service
    Pages :7702-7705
    Sowmya K S, N. K. Cauvery
    Abstract | PDFPDF
    176. Cloud Service Reservation System with Price& Time Slot Negotiation
    Pages :7706-7709
    Sukeshini S.Gawai
    Abstract | PDFPDF
    177. Study of Process of Localization and Methods of Localization in Wireless Body Area Networks
    (WBANs)

    Pages :7710-7714
    Shubhangi Sonone, Vishal Shrivastava
    Abstract | PDFPDF
    178. A Survey on Search Results Annotation
    Pages :7715-7719
    Rosamma K S , Jiby J Puthiyidam
    Abstract | PDFPDF
    179. A Survey on Detecting Compromised Nodes in Wireless Sensor Networks
    Pages :7720-7722
    K.Sumathi & Dr.M.Venkatesan
    Abstract | PDFPDF
    180. Hybrid Solution in Honeypot Mechanism using Hadoop
    Pages :7723-7726
    Girija Srikanth, R.Sathish
    Abstract | PDFPDF
    181. A Survey of Building a Reverse Dictionary
    Pages :7727-7728
    Jincy A K, Sindhu L
    Abstract | PDFPDF
    182. Knowledge based Inter-point Braille document Analysis and Recognition
    Pages :7729-7732
    Srinath.S, C.N. Ravi kumar
    Abstract | PDFPDF
    183. Novel Method for Trusted Third Party Security Services for Cloud
    Pages :7733-7737
    Kalyani Madurwar , Prof. Ismail
    Abstract | PDFPDF
    184. A Survey on Event Detection for Geographical Packets Forwarding in Wireless Sensor Networks
    Pages :7738-7739
    Rajani Anandrao Madame
    Abstract | PDFPDF
    185. Effective Demonstrate Recommendation on Scarce Data
    Pages :7740-7744
    A.Srinivas, K.Rama Krishna, B.Kavitha Laxmi, M. Sravani
    Abstract | PDFPDF
    186. Using Advanced Encryption Standard for Secure and Scalable Sharing of Personal Health Records
    in Cloud

    Pages :7745-7747
    B. Sri Varsha, P.S. Suryateja
    Abstract | PDFPDF
    187. A Survey on Reversible Data Hiding in Encrypted Image
    Pages :7748-7751
    Princy Raj, Sreekumar K
    Abstract | PDFPDF
    188. ZigBee based Wireless Sensor Networks
    Pages :7752-7755
    Kanchan Kaushal, Taranvir Kaur, Jaspinder Kaur
    Abstract | PDFPDF
    189. Designing of Fingerprint Enhancement Based on Curved Region Based Ridge Frequency Estimation
    Pages :7756-7760
    Navjot Kaur, Gagandeep Singh
    Abstract | PDFPDF
    190. Impact of Social Influence on Entrepreneurs to Use e-Commerce in Saudi Arabia
    Pages :7761-7772
    Abdullah Almaimouni, Luke Houghton, Kuldeep Sandhu
    Abstract | PDFPDF
    191. A Modified Approach for Aggreration Technique in WSN
    Pages :7773-7775
    Balihar Singh, Varinderjit Kaur
    Abstract | PDFPDF
    192. Forensic-as-a-Service for Mobile Devices (Literature Survey)
    Pages :7776-7778
    Prashant N. Ninawe, Shrikant B. Ardhapurkar
    Abstract | PDFPDF
    193. Design and Implementation of Performance Guaranteed Symmetric Load Balancing Algorithm
    Pages :7779-7783
    Shaik Nagoor Meeravali, R. Daniel, CH. Srinivasa Reddy
    Abstract | PDFPDF
    194. Designing an Efficient Image Encryption-Then- Compression System with Haar and Daubechies
    Wavelet

    Pages :7784-7788
    Harmanpreet Kaur Aujla, Rajesh Sharma
    Abstract | PDFPDF
    195. Location Based and Energy Efficient Anonymous Routing Protocol for MANET
    Pages :7789-7794
    Snehlata Handrale , Prof. S. K. Pathan
    Abstract | PDFPDF
    196. An E-learning system with Image compression
    Pages :7795-7798
    Milind Tambe, Azar Maniyar, Rohan Patil, Kiran Uttekar
    Abstract | PDFPDF
    197. Area Extraction of beads in Membrane filter using Image Segmentation Techniques
    Pages :7799-7803
    Neeti Taneja, Sudha Goyal
    Abstract | PDFPDF
    198. Increasing Throughput Capacity of Multihop Wireless Networks
    Pages :7804-7806
    K.Sumithra devi, .R.Sivakani and M.Pabitha
    Abstract | PDFPDF
    199. A Survey on Forwarding Game Theory in Mobile Ad hoc Network
    Pages :7807-7809
    Ashwini Chandrashekhar Maske
    Abstract | PDFPDF
    200. A Study of Wireless Networks: WLANs, WPANs, WMANs, and WWANs with Comparison
    Pages :7810-7813
    Kanika Sharma, Neha Dhir
    Abstract | PDFPDF
    201. A Comprehensive Overview on Data Mining: Approaches and Applications
    Pages :7814-7816
    Deepti Mishra, Dr. DevpriyaSoni
    Abstract | PDFPDF
    202. A Survey on Security Frameworks for Software-as-a-Service
    Pages :7817-7820
    Sithara Sahadevan , Jiby J Puthiyedam
    Abstract | PDFPDF
    203. Analysis of Real Time Driver Fatigue Detection Based on Eye and Yawning
    Pages :7821-7826
    Narender Kuamr, Dr. N.C. Barwar
    Abstract | PDFPDF
    204. Clustering of Random Data: A New Concept
    Pages :7827-7830
    Bhumika Ingale, Antara Bhattacharya
    Abstract | PDFPDF
    205. User-Centric Based Crawler System
    Pages :7831-7836
    Santosh Kumar Uppada
    Abstract | PDFPDF
    206. Energy Efficient Mobile Cloud Computing
    Pages :7837-7840
    Siddiqui Mohammad Saad, S.C.Nandedkar
    Abstract | PDFPDF
    207. Impact of queuing policy variations on MaxProp DTN routing protocol
    Pages :7841-7843
    Mohsin Naziruddin
    Abstract | PDFPDF
    208. Enhancement of Security in Data Mining Using FEAL (Fast Encryption Algorithm)
    Pages :7844-7846
    Amarpreet Singh, Vinay Bhardwaj
    Abstract | PDFPDF
    209. A Survey on Image Feature Descriptors-Color, Shape and Texture
    Pages :7847-7850
    Alphonsa Thomas, Sreekumar K
    Abstract | PDFPDF
    210. P2P Topological Ad-hoc Routing Protocol (P2P-ARP)
    Pages :7851-7854
    Mriganka Sarmah, Pradeep Sharma, Pallabi Borah, Meenakshi Sharma
    Abstract | PDFPDF
    211. Overview of Offloading in Smart Mobile Devices for Mobile Cloud Computing
    Pages :7855-7860
    Roopali, Rajkumari
    Abstract | PDFPDF
    212. A Survey on Expert System in Agriculture
    Pages :7861-7864
    Divya Joy, Sreekumar K
    Abstract | PDFPDF
    213. A Survey on Collaborative Tagging
    Pages :7865-7869
    Pradnya Deshmane, Prof.N.R.Wankhade
    Abstract | PDFPDF
    214. A Study on Different JPEG Steganograhic Schemes
    Pages :7870-7874
    Alphy Ros Mathew, Sreekumar K
    Abstract | PDFPDF
    215. Survey on Online Spam Review Detection Methods
    Pages :7875-7876
    Kalyani Adhav, S.Z Gawali, Ravindra Murumkar
    Abstract | PDFPDF
    216. A Survey on Image Segmentation and Feature Extraction Methods for Acute Myelogenous
    Leukemia Detection in Blood Microscopic Images

    Pages :7877-7879
    Athira Krishnan, Sreekumar
    Abstract | PDFPDF
    217. A Study of Similarity Functions Used in Textual Information Retrieval in Wide Area Networks
    Pages :7880-7884
    Jaswinder Singh, Parvinder Singh , Yogesh Chaba
    Abstract | PDFPDF
    218. Content Based Image Retrieval of User’s Interest Using Feature Fusion and Optimization Using
    Genetic Algorithm: A Survey

    Pages :7885-7888
    Ajimi Ameer, SreeKumar.K, Minu K.K
    Abstract | PDFPDF
    219. A Survey on Automatic Text Summarization
    Pages :7889-7893
    Saranyamol C S, Sindhu L
    Abstract | PDFPDF
    220. The Study of Various Server Architectures for Mobile Presence Services in Social Network
    Applications

    Pages :7894-7898
    Jareena Shaikh, Bhandari G. M.
    Abstract | PDFPDF
    221. Gateway Load Balancing in Integrated Internet- MANET to Improve Network Performance
    Pages :7899-7903
    Ajay Kumar, Udai Shankar, Mahesh Kumar Tiwari
    Abstract | PDFPDF
    222. Intrusion Detection through Session Hijacking
    Pages :7909-7913
    Keshav Jain
    Abstract | PDFPDF
    223. Content Leakage Detection by Using Traffic Pattern for Trusted Content Delivery Networks
    Pages :7841-7843
    V.S.Motade, Deepak Gupta
    Abstract | PDFPDF
    224. Virtualization Study in Education Era with Some Environmental Beneficial Issues
    Pages :7914-7916
    Nitin R. Suradkar and Amol S. Gadkari
    Abstract | PDFPDF
    225. Beneficial Implementing GIS in Optical Fiber Communication in Government and Private Industries an Overview
    Pages :7917-7919
    Rahul D. Taur, Dr. Santosh S. Lomte
    Abstract | PDFPDF
    226. Overview of Database Security
    Pages :7920-7921
    Manisha R.Shinde
    Abstract | PDFPDF
    227. Detection of Node Replication Attacks in Mobile Sensor Networks Using Localized Algorithms
    Pages :7922-7926
    Pooja Chaturvedi, Shyam S. Gupta
    Abstract | PDFPDF
    228. A Comparative Analysis of Provable Data Possession Schemes in Cloud
    Pages :7927-7931
    Pooja Natu, Shikha Pachouly
    Abstract | PDFPDF
    229. Survey Paper On Big Data
    Pages :7932-7939
    Vibhavari Chavan, Rajesh. N. Phursule
    Abstract | PDFPDF
    230. Task Scheduling in Cloud Computing: Review
    Pages :7940-7944
    Raja Manish Singh, Sanchita Paul, Abhishek Kumar
    Abstract | PDFPDF
    231. A Survey of Personalized Web Search in Current Techniques
    Pages :7945-7947
    Priyanka C. Ghegade, Vinod Wadane
    Abstract | PDFPDF
    232. Cost Minimization Assignment Problem Using Fuzzy Quantifier
    Pages :7948-7950
    G. Nirmala and R. Anju
    Abstract | PDFPDF
    233. Ultimate Way to Preserve Privacy in Data Mining
    Pages :7951-7953
    Neha Agrawal, Nidhi Chaturvedi
    Abstract | PDFPDF
    234. A Survey on Security Vulnerabilities And Its CountermeasuresAt Network Layer In MANET
    Pages :7954-7957
    Rishikesh Teke, Manohar Chaudhari
    Abstract | PDFPDF
    235. Centralized Profile Translation Architecture Using Enhance Security
    Pages :7958-7960
    Priyanka Badwaik
    Abstract | PDFPDF
    236. Binate Code WAP Approach to access Sequential Pattern Mining for Web Log
    Pages :7961-7964
    Abhilasha Vyas, Priyanka Dhasal
    Abstract | PDFPDF
    237. A Comparative Analysis of Proposed Schemes for Increasing Channel Utilization In 3G Networks
    Pages :7965-7971
    Shekhar Tyagi, Hariom Tyagi
    Abstract | PDFPDF
    238. 3D Face Detection and Recognition under Occlusion
    Pages :7972-7976
    V.Ramaswamy, Parashuram Baraki
    Abstract | PDFPDF
    239. Article Withdrawn
    Pages :xxx-xxx
    xxxxxxxxx
    Abstract | PDFPDF
    240. Comparision between Quad tree based K-Means and EM Algorithm for Fault Prediction
    Pages :7984-7988
    Swapna M. Patil, R.V.Argiddi
    Abstract | PDFPDF
    241. Visual up Gradation of Mammogram Image Using Grey Scale Extending Techniques
    Pages :7989-7992
    N. Angayarkanni, D. Kumar
    Abstract | PDFPDF
    242. Search Results From the Web Databases Using Ontology-Assisted Data Extraction
    Pages :7993-7997
    J. Siva Jyothi , Ch. Satyananada Reddy
    Abstract | PDFPDF
    243. Design of Ripple Carry Adder using Quantum Cellular Automata
    Pages :7998-8002
    B Praveenkumar, J Thirumal Murugan, R. Prabhakar
    Abstract | PDFPDF
    244. Human Identification with Finger Veins Using Repeated Line Tracking, Even Gabor and Automatic Trimap Generation Algorithms
    Pages :8003-8007
    Prabjot kaur, Prince Verma
    Abstract | PDFPDF
    245. Survey On Sleep And Awake Method Using Geographic Opportunistic Routing In Wireless Sensor Networks
    Pages :8008-8011
    B.Senthamil Selvi, S.P.Kavya
    Abstract | PDFPDF
    246. Extending functionalities of default clipboard
    Pages :8012-8014
    Sarang B. Kimmatkar
    Abstract | PDFPDF
    247. Comparative Analysis of Genetic Algorithm Based Approach for Gene Cancer Classification using
    prominent features with PSO for Dimensionality Reduction and FFBNN as Classifier

    Pages :8015-8021
    Vaishali P Khobragade, M.Anup Kumar
    Abstract | PDFPDF
    248. Optimizing and Generating Dynamic intricate Cluster construction in MANETs using Integer Linear Programming with Rough set (ILPR) Model Technique
    Pages :8022-8026
    S.R.M. Krishna , M. N. Seeta Ramanath, V. Kamakshi Prasad
    Abstract | PDFPDF
    249. QOS Oriented Vertical Handoff for Wimax/Wlan in Overlay Network
    Pages :8027-8030
    M.Ramya, R.T.Thivya Lakshmi, D.Sujeetha Lakshmi
    Abstract | PDFPDF
    250. Li-Fi Technology
    Pages :8031-8032
    Polshetwar Poonam V. , Mr. Saad Siddiqui
    Abstract | PDFPDF
    251. Performance Analysis of Energy Dissipation in WSNs Using Multi-Chain PEGASIS
    Pages :8033-8036
    Mukesh Prajapat, Dr. N.C. Barwar
    Abstract | PDFPDF
    252. Predicting Educational Performance of a Student Failure and Dropout by using Data mining Techniques
    Pages :8037-8040
    U.Harilatha, N.Sudhakaryadav
    Abstract | PDFPDF
    253. An Exploratory Review of Face Recognition Techniques and Algorithms
    Pages :8041-8045
    Ajit Kumar Tiwari, Shrikant Lade
    Abstract | PDFPDF
    254. Efficiently Detection of Intrusion in Multi-tire Web Applications Using DoubleGuard: A Survey
    Pages :8046-8050
    Prerna U. Randive
    Abstract | PDFPDF
    255. Optimal Dynamic Load Balance in Distributed Systems for Client Server Assignment
    Pages :8051-8054
    D.Saritha, Ch. Satyananda Reddy
    Abstract | PDFPDF
    256. An Efficient Generation of Potential High Utility Itemsets from Transactional Databases
    Pages :8055-8060
    Velpula Koteswara Rao, Ch. Satyananda Reddy
    Abstract | PDFPDF
    257. Ayurvedic leaf recognition for Plant Classification
    Pages :8061-8066
    Sethulekshmi A V, Sreekumar K
    Abstract | PDFPDF
    258. An analysis of Projection Based Multiplicative Data Perturbation for K-means Clustering
    Pages :8067-8069
    Bhupendra Kumar Pandya, Umesh Kumar Singh, Keerti Dixit
    Abstract | PDFPDF
    259. A Novel Approach for Record Deduplication using Hidden Markov Model
    Pages :8070-8073
    R.Parimala devi, V.Thigarasu
    Abstract | PDFPDF
    260. Hash Based Approach for Providing Privacy and Integrity in Cloud Data Storage using Digital
    Signatures

    Pages :8074-8078
    N Gowtham Kumar, K Praveen Kumar Rao
    Abstract | PDFPDF
    261. A Review on Dynamic Query Forms for Database Queries
    Pages :8079-8081
    Priyanka P. Nikam
    Abstract | PDFPDF
    262. Single-Sign on Using Social Networking Sites
    Pages :8082-8085
    K.Naveen
    Abstract | PDFPDF
    263. Iterative Methods of Order Four for Solving Nonlinear Equations
    Pages :8086-8090
    V.B. Kumar,Vatti, Shouri Dominic and Mounica,V
    Abstract | PDFPDF
    264. Survey on Analysis of Students’ Emotions through Social Media Data Mining
    Pages :8091-8095
    Ranjeeta Rana, V. L. Kolhe
    Abstract | PDFPDF
    265. World Wide Web and Its Journey from Web 1.0 to Web 4.0
    Pages :8096-8100
    Nupur Choudhury
    Abstract | PDFPDF
    266. Review on Preserving Cloud Consistency Using CAAS Model
    Pages :8101-8102
    Yogesh Chimate, Prof. P. B. Kumbharkar
    Abstract | PDFPDF
    267. Integrity Verification and Availability Using PDP in Multi-Cloud
    Pages :8103-8105
    Vrushali K Gaikwad
    Abstract | PDFPDF
    268. Problem Solving Strategy for Decision Making in Market Basket Analysis
    Pages :8106-8109
    Sneha Sawlani, Piyush Vyas
    Abstract | PDFPDF
    269. A Novel Approach for Detecting of Tampering On Images
    Pages :8110-8113
    Sajja.Karthik, M.Gargi
    Abstract | PDFPDF
    270. Survey of Approaches for Discrimination Prevention in Data Mining
    Pages :8114-8118
    Harshali M. Saindane, V. L. Kolhe
    Abstract | PDFPDF
    271. Finger Writing in Air using Kinect
    Pages :8119-8121
    Utsav Jambusaria, Neerja Katwala, Manali Kadam, Harish Narula
    Abstract | PDFPDF
    272. A New Approach for Inferring User Search Goals using user’s implicite Feedback
    Pages :8122-8126
    Vidya V. Hire , Swati K. Bhavsar
    Abstract | PDFPDF
    273. Load Balancing in Cloud Environment Using Task Transfer: A Review
    Pages :8127-8129
    Syam Sankar, Devi Dath
    Abstract | PDFPDF
    274. Efficient Node Address Auto configuration in MANET
    Pages :8130-8134
    Vikas Subhashrao Shinde, K.Vishal Reddy
    Abstract | PDFPDF
    275. A review on Digital Image Steganography
    Pages :8135-8137
    Navjot Kaur, Ashima Bansal
    Abstract | PDFPDF
    276. A Novel Techinque For Ranking of Documents Using Semantic Similarity
    Pages :8138-8143
    Rajni Kumari Rajpal, Yogesh Rathore
    Abstract | PDFPDF
    277. QRcode Based Navigation System on Cloud Computing Platforms
    Pages :8144-8146
    Chaithra M H, Sridevi S, Mamatha E
    Abstract | PDFPDF
    278. A Survey on Various Algorithms of Sequential Frequent Pattern Mining and Uncertain Data Mining
    Pages :8147-8149
    Kshiti S Rana, Hiren V Mer
    Abstract | PDFPDF
    279. A Survey On Facilitating Document Annotation Using Content And Querying Value
    Pages :8150-8152
    Sonal Nikam, Prof.J.V.Shinde
    Abstract | PDFPDF
    280. A Survey on Outlier Detection Methods
    Pages :8153-8156
    Sreevidya S S
    Abstract | PDFPDF
    281. Differential Privilege based Secure Authorized Deduplication Using Public Private Cloud
    Pages :8157-8160
    Amit Harish Palange , Prof.Deepak Gupta
    Abstract | PDFPDF
    282. Implementation of Perception Classification based on BDI Model using Bayesian Classifier
    Pages :8161-8165
    Vishwanath Y, Murali T S, Dr M.V Vijayakumar
    Abstract | PDFPDF
    283. A Survey on Secure Data Hiding Techniques in Encrypted Images
    Pages :8166-8169
    Anjaly Mohanachandran, Mary Linda P.A.
    Abstract | PDFPDF
    284. EMET: Extracting Metadata using ElementTree to Recommend Tags for Web Contents
    Pages :8170-8177
    Pushpa C N, Shankar R, Thriveni J, Venugopal K R, L M Patnaik
    Abstract | PDFPDF
    285. An Effective Use of Meta Information Using Clustering and Classification Techniques for Text
    Mining: A Survey

    Pages :8178-8181
    Nitin J.Ghatge, Poonam D. Lambhate
    Abstract | PDFPDF
    286. MDA based approach towards Design of Database for Online HealthCare System
    Pages :8182-8187
    Dr. Suman Kumar Mishra, Vansh Raj Upadhyay
    Abstract | PDFPDF
    287. Analysis of CMOs Dynamic Comparators for Low Power and High Speed ADCs
    Pages :8188-8194
    Vaijayanthi.M, Vivek.K, Hemaprabha.A
    Abstract | PDFPDF
    288. A Novel Secured Data Exchange Mechanism for Text Data Using Encode and Decode Mechanism
    Pages :8195-8198
    V.S.Aravind Nambala, H.Deva Raj, Y.Ramesh kumar
    Abstract | PDFPDF
    289. A Parallel Recursive Approach for Solving All Pairs Shortest Path Problem on GPU using OpenCL
    Pages :8198-8204
    Manish Pandey, Sanjay Sharma
    Abstract | PDFPDF
    290. A Survey on Service Integrity in Software as a Service
    Pages :8205-8209
    Gohila Priyadharshini.C, Mohana.S
    Abstract | PDFPDF
    291. Security for Data Mining
    Pages :8210-8213
    N.Kohila, P.Poornima, P.Elamathi
    Abstract | PDFPDF
    292. Next generation tools for Oil and Gas Companies? – Cloud Computing
    Pages :8214-8220
    C.Subhalakshmipriya, R.Tamilarasi
    Abstract | PDFPDF
    293. Multiple Routing Configurations for Fast IP Network Recovery
    Pages :8221-8224
    Aditi Thakkar
    Abstract | PDFPDF
    294. Privacy-Preserving Decentralized Key Policy Attribute-Based Encryption
    Pages :8225-8228
    Girija Patil
    Abstract | PDFPDF
    295. Securing Online Reputation Systems through Trust Modelling and Temporal Analysis
    Pages :8229-8232
    Aanum Shaikh
    Abstract | PDFPDF
    296. Article Removed
    Pages :8233-8235
    xxx, xxx, xxx
    Abstract | PDFPDF
    297. A Survey on Different Backup and Restore Techniques used in Mobile devices
    Pages :8236-8238
    Pratap P.Nayadkar, B.L Parne
    Abstract | PDFPDF
    298. An Improved Extraction Algorithm from Domain Specific Hidden Web
    Pages :8239-8242
    Juhi Sharma, Mukesh Rawat
    Abstract | PDFPDF
    299. Survey on Fast IP Network Recovery
    Pages :8243-8245
    Manoj Baingne, K. Palanivel
    Abstract | PDFPDF
    300. A Method for Privacy Preserving Data Mining in Secure Multiparty Computation using Hadamard
    Matrix

    Pages :8246-8249
    Neha Pathak, Anand Rajavat
    Abstract | PDFPDF
    301. Enhanced Sentence-Level Text Clustering using Semantic Sentence Similarity from Different
    Aspects

    Pages :8250-8254
    Saranya.J, Arunpriya.C
    Abstract | PDFPDF
    302. Lambda Calculus
    Pages :8255-8258
    Sampa Das
    Abstract | PDFPDF
    303. Security in Multi-Cloud Storage with Cooperative Provable Data Possession
    Pages :8259-8262
    Megha Patil, G.R.Rao
    Abstract | PDFPDF
    304. A Review of Data Warehousing and Business Intelligence in different perspective
    Pages :8263-8268
    Vijay Gupta, Dr. Jayant Singh
    Abstract | PDFPDF
    305. A Review on Content Based Image Retrieval and Search Based Face Annotation on Weakly Labeled
    Images

    Pages :8269-8271
    Krishna Prasanth I B, Anoop S
    Abstract | PDFPDF
    306. A Survey on Content Based Image Retrieval Based On Edge Detection
    Pages :8272-8275
    S.Asha, R.Rajesh Kanna
    Abstract | PDFPDF
    307. Enforcing Text Summarization using Fuzzy Logic
    Pages :8276-8279
    Rajesh D. Shinde, Suraj H. Routela, Savita S. Jadhav, Smita R.Sagare
    Abstract | PDFPDF
    308. NeuroSVM: A Graphical User Interface for Identification of Liver Patients
    Pages :8280-8284
    Kalyan Nagaraj, Amulyashree Sridhar
    Abstract | PDFPDF
    309. Automatic Text Detection and Information Retrieval on Mobile
    Pages :8285-8292
    Mohit K.Chauhan, Gaurav Kumar
    Abstract | PDFPDF
    310. MCD based Principal Component Analysis in Computer Vision
    Pages :8293-8296
    R. Muthukrishnan , E.D. Boobalan, R. Mathaiyan
    Abstract | PDFPDF
    311. Sector Based Cloud Storage of Blood Groups
    Pages :8297-8299
    Anuraag Vikram Kate, Nikilav P V, Praneeth Ramesh, Sriniketh R, Naren J
    Abstract | PDFPDF
    312. Optimal Energy Efficient Multicast Algorithm for MANETs
    Pages :8300-8302
    Lakshmi Kala Pampana, Srija Kathi
    Abstract | PDFPDF
    313. Emperical Resource Allocation Using Dynamic Distributed Allocation Policy in Cloud Computing
    Pages :8303-8308
    Sasmita Parida, Suvendu Chandan Nayak
    Abstract | PDFPDF
    314. A Study on 5th Generation Mobile Technology - Future Network Service
    Pages :8309-8313
    D. Hema Latha, D. Rama Krishna Reddy, K. Sudha, Azmath Mubeen, T.S.Savita
    Abstract | PDFPDF
    315. High Security Provided through a Secret Password Using Steganographic Technique
    Pages :8314-8315
    Minakshi Kumari, Somesh Kumar Dewangan
    Abstract | PDFPDF
    316. MRAR: Mining Ranked Association Rules Using Information Extraction
    Pages :8316-8320
    M. Kanaka Surya Padmaja, S. Siva Skandha, Ch. Raja Kishore
    Abstract | PDFPDF
    317. A Survey Paper on Hop by Hop Message Authentication in Wireless Sensor Network
    Pages :8321-8324
    N.R.Wankhade, Jadhav Ashvini B.
    Abstract | PDFPDF
    318. Secured E-Voting Using NFC Technology
    Pages :8325-8327
    Rutuja Nikam, Monika Rankhambe, Diksha Raikwar, Atharv Kashyap
    Abstract | PDFPDF
       
    -All rights are reserved by International Journal of Computer Science and Information Technologies-