1. |
A Study of Service Users’ Attitudes towards E-Government Initiatives in the Kingdom Of
Saudi Arabia
Pages : 6892-6901
Raed Alotaibi, Kuldeep Sandhu, Luke Houghton
Abstract | PDF |
2. |
Mining High BeneficialItemsets from Transactional Database
Pages : 6902-6904
Supriya P. Bhosale
Abstract | PDF |
3. |
Mainframes- Still standing the test of time
Pages : 6905-6906
Sophia Sharda
Abstract | PDF |
4. |
Speech Database for Speech Analysis
Pages : 6907-6910
Ganga Banavath, Sreedhar Potla
Abstract | PDF |
5. |
A Brief Study of Power Efficient Hierarchical Routing Protocols in Wireless Sensor Networks
Pages : 6911-6915
Anuradha, Inderjeet Singh Gill
Abstract | PDF |
6. |
Secure Token for Secure Routing of Packet in MANET
Pages : 6916-6919
S.S.Zalte, Prof.(Dr.)Vijay R.Ghorpade
Abstract | PDF |
7. |
Optimal Decision Support System Using Multilayer Neural Networks for Incinerator Control
Pages :6920-6925
Prakash G L, Samson Saju, Snehil Mitra and Vedant Sharma
Abstract | PDF |
8. |
Privacy Preserving Data Sharing in Multi Groups
Pages : 6926-6928
M.Kavya, M.V. Jagannatha Reddy
Abstract | PDF |
9. |
Survey on Application Layer DDoS Attacks
Pages : 6929-6931
Anjali. M, B.Padmavathi
Abstract | PDF |
10. |
Library Management System Using RFID Technology
Pages : 6932-6935
Sree Lakshmi Addepalli, Sree Gowri Addepalli
Abstract | PDF |
11. |
An Efficient and Flexible DC to DC Converter With Feedback Control for Communication
System
Pages : 6936-6938
Agus Harjoko, Tri Wahyu Supardi
Abstract | PDF |
12. |
Tonic Comprehension and Modeling of Analog Transmissions -An insight into the future of ‘Smart Music
Pages : 6939-6941
Siddhant Gawsane, Koninika Patil
Abstract | PDF |
13. |
Secure Data Storage and Log Records Using JAR, AES
Pages :6942-6945
K.Kartheek, C.Narasimha
Abstract | PDF |
14. |
An Enhanced SharePoint Authentication using Kerberos
Pages : 6946-6951
S.Vanitha, J.Jayachitra, K.Elavarasi
Abstract | PDF |
15. |
Comparison of TPatLetEn with TPF in Detecting and Preventing DoS Attack
Pages : 6952-6957
Durairaj M , Persia A
Abstract | PDF |
16. |
An Improved Heft Algorithm Using Multi- Criterian Resource Factors
Pages : 6958-6963
Renu Bala, Gagandeep Singh
Abstract | PDF |
17. |
Survey of Fingerprint Matching Techniques for Privacy Protection Pages : 6964-6966
Sayali Kapre, Antara Bhattacharya
Abstract | PDF |
18. |
Privacy Protection over Network Communication in Manet
Pages : 6967-6971
Dr.K.Rajangam, L.Dhanam, Anuradha Balasubramanian
Abstract | PDF |
19. |
Article Removed
Pages : xxx-xxx
xxx, xxx
Abstract | PDF |
20. |
Intrusion Detection System using Ripple Down Rule learner and Genetic Algorithm
Pages :6976-6980
D.P. Gaikwad, R.C.Thool
Abstract | PDF |
21. |
Data Hiding & Visual Cryptography:A Review
Pages : 6981-6984
Deepti B. Khasbage, Prof. DR .P.R. Deshmukh
Abstract | PDF |
22. |
A Novel Approach for Transductive Decision Tree
Pages : 6985-6988
B. Veera sekhar Reddy, Y.C.A.Padmanabha Reddy, S.Mohommad.ghouse
Abstract | PDF |
23. |
Text Data Linkage of Different Entities Using
Occt-One Class Clustering Tree
Pages : 6989-6991
E.Afreen Banu, R.Karthikeyan
Abstract | PDF |
24. |
A Fast and New Collaborative Web Recommendation System Using Fast Adaptive
Association Rule Mining
Pages :6992-6995
Dr A. Kumar
Abstract | PDF |
25. |
Facial Expression Recognition with PCA And LDA
Pages : 6996-6998
Taqdir, Jaspreet Kaur
Abstract | PDF |
26. |
Touchscreen Using Web Camera
Pages : 6999-7001
Kuntal B. Adak, Adarsh N. Singh, Abhilash B. Kamble
Abstract | PDF |
27. |
Image Segmentation using Bi Directional Self Organize Neural Network (BDSONN)
Pages : 7002-7011
Rudranath Banerjee, Arun Kanti Manna
Abstract | PDF |
28. |
A Survey on Web Pre-Fetching Techniques
Pages : 7012-7021
Priyansha bangar, Kedar Nath Singh
Abstract | PDF |
29. |
A Survey on Web Log Mining Pattern Discovery
Pages : 7022-7031
Amit Vishwakarma, Kedar Nath Singh
Abstract | PDF |
30. |
Virtual Reality: The Future Interface of Technology
Pages :7032-7034
Raghav Toshniwal, Kanishka Ghosh Dastidar
Abstract | PDF |
31. |
A Modified Pixel Frequency Based Reversible Data Hiding for Secure Data Communication
Pages : 7035-7040
Sowmyashree, R.R.Sedamkar, Sanjay Sharma
Abstract | PDF |
32. |
Improving Efficiency of Data Mining through Neural Networks
Pages : 7041-7044
D. Prashanth Kumar, B. Yakhoob, N. Raghu
Abstract | PDF |
33. |
SOA AND REST Synergistic Approach
Pages : 7045-7049
Navdeep Dahiya, Neha Parmar
Abstract | PDF |
34. |
Privacy Based Query Search by Using Content and Location
Pages : 7050-7053
Navya Theja C., Satheesh KRK
Abstract | PDF |
35. |
Design Of Mobility Robust Tree Construction Framework For Zigbee Wireless Networks
Pages : 7054-7059
Chaitali G.Golhar, Prof.A.W.Motikar
Abstract | PDF |
36. |
A Framework To Optimize Task Scheduling in Cloud Environment
Pages : 7060-7062
R. Jemina Priyadarsini and L. Arockiam
Abstract | PDF |
37. |
A Review on Risk Score Based App Classification
Using Enriched Contextual Information of App
Context
Pages : 7063-7066
Lokhande Prajakta Padmakar, Prof. Shivaji R Lahane
Abstract | PDF |
38. |
Simulation and Synthesis of 16×16 Switch for Feed Back Based Switch Systems
Pages : 7067-7070
P.Aruna, R. Mahesh Kumar , G.Mahammed Rafi
Abstract | PDF |
39. |
Transaction-Level Behavior Based Credit Card Fraud Detection Mechanism
Pages : 7071-7074
Bhakti Ratnaparkhi, Rahul Patil
Abstract | PDF |
40. |
Recent Advances in Audio Video Multimedia Communication Technology
Pages : 7075-7077
Narangale S. M., G. N. Shinde
Abstract | PDF |
41. |
Survey on Various Methods and Techniques for Searching Dimension in Incomplete Database
Pages : 7078-7081
Yogita M. Kapse, Antara Bhattacharya
Abstract | PDF |
42. |
Use of Genetic Algorithm with Fuzzy Class Association Rule Mining for Intrusion Detection
Pages : 7082-7087
Dipali Kharche, Prof. Rahul Patil
Abstract | PDF |
43. |
Improved Load Balanced & Energy Efficient Ad hoc on demand routing Algorithm
Pages : 7054-7059
Madhvi Saxena, K.J. Mathai
Abstract | PDF |
44. |
Privacy Preserving Multi-Keyword Ranked Search with Anonymous ID Assignment over Encrypted
Cloud Data
Pages : 7093-7096
Shiba Sampat Kale, Prof. Shivaji R Lahane
Abstract | PDF |
45. |
An Accurate Surfer Model to Enhance Web Search Criteria
Pages : 7097-7100
Neerumalla Swapna, S.Bhavani
Abstract | PDF |
46. |
Survey on Nearest Neighbor Search for Spatial Database
Pages : 7101-7103
Zarreen Anjum, Priti Saktel
Abstract | PDF |
47. |
Cloud Based SQL Query Mainframe
Pages : 7104-7106
Konolla Siva ramakrishna,Adoni Krishna Kumar,Kotagiri ManojKumar,Bikumalla Jaya Keerthi,Valiveti Krishna Priya
Abstract | PDF |
48. |
Smart Surveillance Monitoring System Using Raspberry PI and PIR Sensor
Pages : 7107-7109
Sanjana Prasad, P.Mahalakshmi, A.John Clement Sunder, R.Swathi
Abstract | PDF |
49. |
Advanced Cross-Layer Jamming Detection and Mitigation in Wireless Broadcast Networks
Pages : 7110-7113
Yogesh Adhar Mali, Anil Kumar Patidar
Abstract | PDF |
50. |
Survey on Semi-Supervised Feature Selection in Datamining
Pages : 7114-7117
Kalaiselvi.R, Premadevi.P, Hamsathvani.M
Abstract | PDF |
51. |
A Survey on Privacy Preserving in Roaming Network
Pages : 7118-7121
Kousalya.K, Anitha.P, Gowri.K
Abstract | PDF |
52. |
A Survey on Energy Conservation for Mobile-Sink in WSN
Pages : 7122-7125
Gowri.K, Dr.M.K.Chandrasekaran, Kousalya.K
Abstract | PDF |
53. |
A Novel Key Exchange Mechanism for Secure Intrusion-Detection System for MANET
Pages : 7126-7129
D.Anil, Dr. S. Vasundra
Abstract | PDF |
54. |
A New Method for Removal of Salt and Pepper Noise through Advanced Decision Based
Unsymmetric Median Filter
Pages : 7130-7135
A.Srinagesh, BRLKDheeraj, Dr.G.P.Saradhi Varma
Abstract | PDF |
55. |
Review on: - Human Identification using GAIT Recognition Technique with PAL and PAL
entropy, SVM and k-means with LDA
Pages : 7136-7141
Deepti Singh , Dr. Amit Dixit
Abstract | PDF |
56. |
Human Identification using GAIT Recognition Technique with PAL and PAL entropy, SVM
and k-means with LDA
Pages : 7141-7145
Deepti Singh, Dr. Amit Dixit
Abstract | PDF |
57. |
Network Security Testing Using Discovery Techniques
Pages : 7146-7153
U. Palani, S. Vanitha, S. Lakshminarasimman
Abstract | PDF |
58. |
Performance Comparison of Diverse Routing Protocols in Wireless Multimedia Sensor Networks
Pages : 7154-7162
A.Sivagami, S.Malarkkann, S.Sandiya, R.Ramakrishnan
Abstract | PDF |
59. |
A Highly Secured Four Layer Architecture Using NTRU Algorithem ( TITEL)
Pages : 7163-7165
Vipanjit Kaur, Vinay Bhardwaj
Abstract | PDF |
60. |
A New Approach to Authenticate Images in Different Datasets Using a Lossless Image
Watermarking Technique
Pages : 7166-7171
Arathi Chitla, Dr. M. Chandra Mohan
Abstract | PDF |
61. |
Role of Big Data Analytics in Rural Health Care - A Step Towards Svasth Bharath
Pages : 7172-7178
Muni Kumar N, Manjula R
Abstract | PDF |
62. |
Load Balancing For Presence Server Architecture
Pages : 7179-7183
M. Lokesh Kumar Rao, D. Kasi Viswanath
Abstract | PDF |
63. |
Intrusion Detection System using Genetic-Fuzzy Classification
Pages : 7184-7190
Prabhat Prakash, Dr. Rajendra Kumar Bharti
Abstract | PDF |
64. |
Review on Parallelized Multipattern Matching Using Optimized Parallel Aho-Corasick Algorithm
on GPU
Pages : 7191-7194
Prachi Oke, Prof. Mrs. A. S. Vaidya
Abstract | PDF |
65. |
Two Way Authentication For Android Client Against Active Directory
Pages : 7195-7198
Prof. Sunita M. Dol, Varsha Kulkarni, Vipula Moholkar
Abstract | PDF |
66. |
Performance Evaluation of Different Hybrid Optical Amplifiers for 64×10, 96×10 and 128×10
Gbps DWDM transmission system
Pages : 7199-7203
Rashmi, Anurag Sharma, Vikrant Sharma
Abstract | PDF |
67. |
Checking Language Dependent Accuracy of Web Applications using Data Mining Techniques
Pages : 7204-7209
Maninderjit Kaur, Dr. Sushil Kumar Garg
Abstract | PDF |
68. |
Half Life Variable Quantum Time Round Robin (HLVQTRR)
Pages : 7210-7217
Simon Ashiru , Salleh Abdullahi , Sahalu Junaidu
Abstract | PDF |
69. |
Ranking of Research Papers using WPCR with Clustering Algorithm
Pages : 7218-7222
Manpreet Kaur Gill, Jasmeet Singh
Abstract | PDF |
70. |
Proposals Assignment using Fuzzy C-Means and CART Algorithm
Pages : 7223-7227
Gurpreet Kaur, Jasmeet Singh
Abstract | PDF |
71. |
A Comparative Analysis of DSR and AODV Protocols under Blackhole and Grayhole Attacks
in MANET
Pages : 7228-7231
Monika Verma, Dr. N. C. Barwar
Abstract | PDF |
72. |
An Encryption Algorithm Based on ASCII Value of Data
Pages : 7232-7234
Satyajeet R. Shinge, Rahul Patil
Abstract | PDF |
73. |
Study of Various Crossover Operators in Genetic Algorithms
Pages : 7235-7238
Nitasha Soni, Dr .Tapas Kumar
Abstract | PDF |
74. |
A Review on Side Information Entangling For Effective Clustering Of Text Documents in Data
Mining
Pages : 7239-7242
Y.R.Gurav, P.B.Kumbharkar
Abstract | PDF |
75. |
Avance Bibliothek Management System
Pages : 7243-7251
Maddirala Jagadish, Palli Hemanth Kumar, Pamarthi Jagadish
Abstract | PDF |
76. |
A Survey: Face Recognition Techniques
Pages :7252-7256
Arun Agrawal, Ranjana Sikarwar
Abstract | PDF |
77. |
A Review on Recommendations and Overlapping Communities for Location Based Social Networks
Pages : 7257-7261
Kavita G. Gare, Nilesh V. Alone
Abstract | PDF |
78. |
Human User Identification Using Multi-Sensor Data Fusion
Pages : 7262-7264
Naman Patel, Ms Sindhu Nair, Harsh Trivedi
Abstract | PDF |
79. |
Real Time Optical Heart Rate Monitor
Pages : 7265-7269
Deepak Verma, Mahika Bhasin
Abstract | PDF |
80. |
A Novel Approach for Video Transmission in MANET
Pages : 7270-7275
Maddirala Jagadish, Palli Hemanth Kumar, Pamarthi Jagadish
Abstract | PDF |
81. |
DDoS Attack Detection based on Chaos Theory and Artificial Neural Network
Pages : 7276-7279
Anjali. M, B.Padmavathi
Abstract | PDF |
82. |
Comparative Study of Privacy Preservation Techniques in Data Mining
Pages : 7280-7287
Avruti Srivastava
Abstract | PDF |
83. |
A Novel Approach to Predict the Learning Skills of Autistic Children using SVM and Decision Tree
Pages :7288-7291
M.S.Mythili, Dr.A.R.Mohamed Shanavas
Abstract | PDF |
84. |
An Intensifying Concept of Intrusion Detection to Accelerate Accuracy and Effectiveness with
Knowledge
Pages : 7292-7295
Vipin Singh, Himanshu Arora
Abstract | PDF |
85. |
A Survey on Various Algorithms Used for Elliptic Curve Cryptography
Pages :7296-7301
Christina Thomas, Gnana Sheela K, Saranya P Krishnan
Abstract | PDF |
86. |
Hybrid cryptography technique using modified Diffie-Hellman and RSA
Pages :7302-7304
Shyam Deshmukh, Prof.Rahul Patil
Abstract | PDF |
87. |
Adaptive Texture Segmentation using M Band Wavelet Transform and Wavelet Packet
Pages :7305-7308
Taramati Taji, Deipali Gore
Abstract | PDF |
88. |
Centroid Based Clustering Algorithms- A Clarion Study
Pages :7309-7313
Santosh Kumar Uppada
Abstract | PDF |
89. |
DDoS Prevention on Rest Based Web Services
Pages :7314-7317
Neha Lad, Jwalant Baria
Abstract | PDF |
90. |
A Study on Large Scale Network Simulators
Pages :7318-7322
Gayatry Borboruah, Gypsy Nandi
Abstract | PDF |
91. |
A Review on Deterministic Finite Automata Compression Techniques for Efficient Pattern
Matching Process
Pages :7323-7325
Utkarsha P. Pisolkar, Shivaji R. Lahane
Abstract | PDF |
92. |
A Review on Meta Information Based Text Data Clustering
Pages :7326-7329
Mrunal V. Upasani, Rucha C. Samant
Abstract | PDF |
93. |
A Survey on Intrusion detection System for Mobile Ad-hoc Networks
Pages :7330-7333
Ranjit j. Bhosale, R.K.Ambekar
Abstract | PDF |
94. |
Review On Data Replication with QoS and Energy Consumption for Data Intensive Applications in
Cloud Computing
Pages :7334-7338
More Reena S, Nilesh V. Alone
Abstract | PDF |
95. |
A Review Paper on Filter Unwanted Messages from OSN
Pages :7339-7345
Tambe Ujwala S, Archana S. Vaidya
Abstract | PDF |
96. |
Automotive User Profiling Using Vehicle Data Considering Different Driving Scenarios
Pages :7346-7349
Bharat S. Dangra, Mangesh V. Bedekar, Suja S. Panicker
Abstract | PDF |
97. |
Survey on Modeling Human object interactions in Still Images
Pages :7350-7352
A.N.Bhagat, N.B.Pokale
Abstract | PDF |
98. |
Color Image Segmentation using Median Cut and Contourlet Transform : A Parallel Segmentation
Approach
Pages :7353-7358
Smita Patil, Aparna Junnarkar
Abstract | PDF |
99. |
Security Enhancement for Cloud Storage Systems
Pages :7359-7362
Harmanbir kaur, Meenakshi Sharma
Abstract | PDF |
100. |
A Survey on Impact of Social Media on Election System
Pages :7363-7366
Gayatri Wani , Nilesh Alone
Abstract | PDF |
101. |
A Survey: Power efficiency Live Migration for Data Centers in Cloud
Pages :7367-7370
Yogesh Eknathrao Gaikwad, Seema Singh Solanki
Abstract | PDF |
102. |
Promoting E-Commerce in India: Main Issues and Challenges
Pages :7371-7375
Sonnet Debbarma, Gypsy Nandi
Abstract | PDF |
103. |
Performance Analysis of Hash Algorithms and File Integrity
Pages :7376-7379
Hanumantu Rajeswari, Ramesh Yegireddi , Vudumula Govinda Rao
Abstract | PDF |
104. |
Survey of Trajectory Based Forwarding and Its Applications
Pages :7380-7384
Subhashini.S , Dr. T.V.P Sundararajan, Priyanga. D, Sanjanaprasad
Abstract | PDF |
105. |
A Review on Parallelization of Node based Game Tree Search Algorithms on GPU
Pages :7385-7388
Rutuja U. Gosavi, Payal S. Kulkarni
Abstract | PDF |
106. |
A Survey: Peer-to-Peer Traffic Identification technologies
Pages :7389-7392
S. R. Patil, Suraj S. Dangat
Abstract | PDF |
107. |
Securing Multimedia on Hybrid Architecture with Extended RBAC
Pages :7393-7398
Gurpinder Kaur, Monika Bharti
Abstract | PDF |
108. |
Axiomization of nw-MVD
Pages :7399-7403
V. Sangeetha, V. Valli Kumari
Abstract | PDF |
109. |
Assorted Image Based Obscure Techniques In Visual Cryptography
Pages :7404-7406
Thanuganesh.M, Saranya.R
Abstract | PDF |
110. |
A Survey on High Utility Itemset Mining Using Transaction Databases
Pages :7407-7410
Maya Joshi, Mansi Patel
Abstract | PDF |
111. |
Survey on Satellite Image Enhancement Techniques
Pages :7411-7414
Ravi B. Mehta , Richard Sonaliya
Abstract | PDF |
112. |
A Hybrid Image Contrast Enhancement Approach Using Genetic Algorithm and Neural Network
Pages :7415-7419
Cheenu Sharma, Rupinder Kaur
Abstract | PDF |
113. |
Paradigm Shift in Voting - Secure Mobile Voting
Pages :7420-7422
Neha Kapoor, Rampur Srinath, Lokesh S, Rajesh N
Abstract | PDF |
114. |
Dynamic Shortest Path Routing In Mobile Adhoc Networks Using Modified Artificial Bee Colony
Optimization Algorithm
Pages :7423-7426
E. Hemalatha Jai Kumari, Dr. Kannammal
Abstract | PDF |
115. |
Congestion Control Approach for TCP by Differentiating NCL and PR upon the ERT in
Wireless Mesh Networks
Pages :7427-7429
Neha Patil, Prof. Gajendra Singh Chandel
Abstract | PDF |
116. |
Genetic Algorithm Approach for Bandwidth Optimization in Near Video on Demand System
Pages :7430-7438
Kriti Priya Gupta
Abstract | PDF |
117. |
Web Database Annotation for Fast and Accurate Retrieval
Pages :7439-7442
VijayaLakshmi K, Sudhakar Yadav N
Abstract | PDF |
118. |
An Approach to Securely Transfer a Secret Image Using Reversible Color Transformations and HSV
Color Model
Pages :7443-7445
Shruti Sarwate, Hemlata Dakhore
Abstract | PDF |
119. |
Hidden Markov Model for Credit Card Fraud Detection
Pages :7446-7451
Ankit Vartak, Chinmay D Patil,Chinmay K Patil
Abstract | PDF |
120. |
Utilizing ICT to Fight against Crime: Emerging ICT Tools, Forms of Crime and Its Solutions
Pages :7452-7457
Ramandeep Kaur, Neeru Sharda
Abstract | PDF |
121. |
Vedic Mathematics in Computer: A Survey
Pages :7458-7459
Shivangi Jain , Prof. V. S. Jagtap
Abstract | PDF |
122. |
Securing User Location in Geo Social Networking Using Coordinate Conversions
Pages :7460-7466
J Maruthi Nagendra Prasad, N.Penchalaiah
Abstract | PDF |
123. |
Impact Analysis and Detection Method of
Malicious Node Misbehavior over Mobile
Ad Hoc Networks
Pages :7467-7470
Priyanka Jain, Mehul Maharshi
Abstract | PDF |
124. |
A Review on Semantic Ontology based E-Learning Framework
Pages :7471-7476
V. Geetha, Dr.M.V.Srinath, Dr. OmarA. AlHeyasat
Abstract | PDF |
125. |
Knowledge Discovery from Various Algorithms: A Survey
Pages :7477-7479
VINOD L.MANE , PROF. S. S. PANICKER , PROF. V. B. PATIL
Abstract | PDF |
126. |
Third-Party Net Stalk: Policy and Technology
Pages :7480-7487
S.Vanitha, U.Palani, A.Arthibala
Abstract | PDF |
127. |
Focused and Deep Web Crawling-A Review
Pages :7488-7492
Saloni Shah, Siddhi Patel , Prof. Sindhu Nair
Abstract | PDF |
128. |
Implementation of Modern RSA Variants
Pages :7493-7495
Akansha Tuteja, Amit Shrivastava
Abstract | PDF |
129. |
Compendium of Reversible Data Hiding
Pages :7496-7500
S.Bhavani and B.Ravi teja
Abstract | PDF |
130. |
CAPTCHAs based on the Principle- Hard to Separate Text from Background
Pages :7501-7503
Niket Kumar Choudhary, Rahul Patil
Abstract | PDF |
131. |
Portability in User Profiles: Single User – Multiple Devices
Pages :7504-7507
Saniya Zahoor ,Dr. Mangesh Bedekar ,Pranali Kosamkar
Abstract | PDF |
132. |
Curvelet and Wavelet Image Fusion using Neural Network Algorithm
Pages :7508-7512
Ankita Kaushal, Paramjeet Kaur
Abstract | PDF |
133. |
Review on: Blood Vessel Extraction and Eye Retinopathy Detection
Pages :7513-7516
Manvir Kaur, Dr Rajnessh Talwar
Abstract | PDF |
134. |
Ameliorate Degraded Document Images Using Synergized Technique
Pages :7517-7520
K.Lakshmipriya, K.Udhayalakshmi
Abstract | PDF |
135. |
Proficient Method towards Concurrency Control in Distributed Database
Pages :7521-7524
Anil Ahir
Abstract | PDF |
136. |
Survey on Adaptive Traffic Signal Re-Timing In Vehicular Ad-Hoc Network
Pages :7525-7527
Sarika Rakhade
Abstract | PDF |
137. |
Ant Colony Optimization Technique for Secure Various Data Retrieval in Cloud Computing
Pages :7528-7531
K.Sriprasadh, M.Prakash Kumar
Abstract | PDF |
138. |
CA Review on A highly scalable Privacy preserving content based Publisher/Subscriber system using event based encryption
Pages :7532-7535
Handore Jayshree Shrikant, Prof. Shivaji R. Lahane
Abstract | PDF |
139. |
Review: Various Image Segmentation Techniques
Pages :7536-7539
Swati Matta
Abstract | PDF |
140. |
Association Rule Mining in Horizontally Distributed Databases
Pages :7540-7544
Manali Rajeev Raut, Hemlata Dakhore
Abstract | PDF |
141. |
Detection and Localization of Spoofing in Wireless and Sensor Networks
Pages :7545-7552
Chandrakant M. Jadhav, Sharad S. Shinde
Abstract | PDF |
142. |
A Review on Software Testing Framework in Cloud Computing
Pages :7553-7562
D.Anitha and Dr.M.V.Srinath
Abstract | PDF |
143. |
Hybrid Encryption System
Pages :7563-7566
Sushant Susarla , Gautam Borkar
Abstract | PDF |
144. |
A Smart Crypto Scheme for Multi Owner Data Authentication over Cloud Service
Pages :7567-7571
V.Kiruthika, B.R.Laxmi Sree
Abstract | PDF |
145. |
Image Authentication by Features Extraction and Biomeric key
Pages :7572-7576
S.Saravanan
Abstract | PDF |
146. |
A Survey on Performance Modelling and Optimization Techniques for SpMV on GPUs
Pages :7577-7582
Aditi V. Kulkarni, Prof. C. R. Barde
Abstract | PDF |
147. |
Article Removed
Pages :7583-7587
xxx, xxx
Abstract | PDF |
148. |
SLA Provided Collaboration Cloud using OLAP
Pages :7588-7589
K.Vijay Kumar, A.Sathyavani, M.Yesudoss Winster
Abstract | PDF |
149. |
Evaluating Facial Expressions with Different Occlusion around Image Sequence
Pages :7590-7594
Ankita Vyas, Ramchand Hablani
Abstract | PDF |
150. |
Higher Order Fitting based Image De-noising using ANN
Pages :7595-7601
Barjinder Kaur, Manshi Shukla
Abstract | PDF |
151. |
Distributed Algorithm for Independent Fairness Management to Control the Congestion in
Wireless Sensor Network
Pages :7602-7605
Padmashree T, Dr.N.K.Cauvery, Manasa M B
Abstract | PDF |
152. |
Intelligent System in Behavioural Analysis
Pages :7606-7608
Madhura Parlikar, Anjali Chavan, Kedar Khire, Ajit Ingavale
Abstract | PDF |
153. |
Design of New Low Power –Area Efficient Static Flip-Flops
Pages :7609-7613
M.Jagadeesh Kumar, Dr. R Ramana Reddy
Abstract | PDF |
154. |
A Probabilistic Model of Real Time Event Detection and Reporting
Pages :7614-7617
Dharnasi Rama Devi, Naga Aswani Puduru
Abstract | PDF |
155. |
Forgery Detection using Noise Inconsistency: A Review
Pages :7618-7622
Savita Walia, Mandeep Kaur
Abstract | PDF |
156. |
A Survey of Data Uncertainty in Face Recognition
Pages :7623-7625
Shubhangi G. Khadse
Abstract | PDF |
157. |
Dynamic Load Balancing Mechanism In Multiservice Cloud Storage
Pages :7626-7630
Karishma B. Badgujar, Prof. Pravin R. Patil
Abstract | PDF |
158. |
Implementation of NTRU Algorithm for the Security of N-Tier Architecture
Pages :7631-7636
Amandeep Kaur Gill, Charanjit Singh
Abstract | PDF |
159. |
Classifier Model for Intrusion Detection Using Bio-inspired Metaheuristic Approach
Pages :7637-7642
P.Amudha, S.Karthik, S.Sivakumari
Abstract | PDF |
160. |
A Survey Paper on an Efficient Approach towards Image Mining Using Association Rule with Fusion
Pages :7643-7645
Yugandhara A.Thakare, Prof.Shraddha P.Mankar
Abstract | PDF |
161. |
Access Control for Semantic Data Repository Using Description Logic
Pages :7646-7648 Suganyasree.K , Nagajothi.P
Abstract | PDF |
162. |
Review on Common Feature Discriminant Analysis for Matching Infrared Face Images To
Optical Face Images
Pages :7649-7651
Shubhangi G. Rode
Abstract | PDF |
163. |
A Novel Load Balancing Model Using RR Algorithm for the Cloud Computing
Pages :7652-7655
B.Bhaskar, E. Madhusudhana Reddy
Abstract | PDF |
164. |
EEG Based Emotion Recognition System
Pages :7656-7658
Prashant Lahane, Shrutika Lokannavar, Apurva Gangurde, Poonam Bhosale, Pooja Chidre
Abstract | PDF |
165. |
Clustering Sentence-Level Text Using a Hierarchical Fuzzy Relational Clustering
Algorithm
Pages :7659-7660
Deepika U. Shevatkar, V.K.Bhusari
Abstract | PDF |
166. |
Review On Image Portion Mixing With Background Using In-painting Technique
Pages :7661-7663
Neha Dangre, Prakash Mohod
Abstract | PDF |
167. |
Web Based User Interface Framework
Pages :7664-7667
Saroja Rani Polamarasetty
Abstract | PDF |
168. |
A Survey on Image Feature Descriptors
Pages :7668-7673
Rekhil M Kumar, Sreekumar K
Abstract | PDF |
169. |
Faster Transfer of AES Encrypted Data over Network
Pages :7674-7676
Suvarna Patil, Rahul Patil
Abstract | PDF |
170. |
Deep Web Data Extraction by Using Vision-Based Item and Data Extraction Algorithms
Pages :7677-7682
B.Sailaja, Ch.Kodanda Ramu, Y.Ramesh Kumar
Abstract | PDF |
171. |
Secure Secret Key Transfer Using Modified Hash Based LSB method
Pages :7683-7685
Aniket G. Meshram, Prof. Rahul Patil
Abstract | PDF |
172. |
A Parallel Genetic Algorithm for Generalized Vertex Cover Problem
Pages :7686-7689
Drona Pratap Chandu
Abstract | PDF |
173. |
An Enhancement of Mining Videos Based On Annotation Reranking Method Using Ncut Algorithms
Pages :7690-7696
R.Ranjani. S. Selva Seeba
Abstract | PDF |
174. |
A Compressive Survey on Restructuring User Search Results by Using Feedback Session
Pages :7697-7701
Shinde Sonali Bhaskar
Abstract | PDF |
175. |
Weighted Clustering Algorithm with Ant Colony Optimization to Provide Better Quality of Service
Pages :7702-7705
Sowmya K S, N. K. Cauvery
Abstract | PDF |
176. |
Cloud Service Reservation System with Price& Time Slot Negotiation
Pages :7706-7709
Sukeshini S.Gawai
Abstract | PDF |
177. |
Study of Process of Localization and Methods of Localization in Wireless Body Area Networks
(WBANs)
Pages :7710-7714
Shubhangi Sonone, Vishal Shrivastava
Abstract | PDF |
178. |
A Survey on Search Results Annotation
Pages :7715-7719
Rosamma K S , Jiby J Puthiyidam
Abstract | PDF |
179. |
A Survey on Detecting Compromised Nodes in Wireless Sensor Networks
Pages :7720-7722
K.Sumathi & Dr.M.Venkatesan
Abstract | PDF |
180. |
Hybrid Solution in Honeypot Mechanism using Hadoop
Pages :7723-7726
Girija Srikanth, R.Sathish
Abstract | PDF |
181. |
A Survey of Building a Reverse Dictionary
Pages :7727-7728
Jincy A K, Sindhu L
Abstract | PDF |
182. |
Knowledge based Inter-point Braille document Analysis and Recognition
Pages :7729-7732
Srinath.S, C.N. Ravi kumar
Abstract | PDF |
183. |
Novel Method for Trusted Third Party Security Services for Cloud
Pages :7733-7737
Kalyani Madurwar , Prof. Ismail
Abstract | PDF |
184. |
A Survey on Event Detection for Geographical Packets Forwarding in Wireless Sensor Networks
Pages :7738-7739
Rajani Anandrao Madame
Abstract | PDF |
185. |
Effective Demonstrate Recommendation on Scarce Data
Pages :7740-7744
A.Srinivas, K.Rama Krishna, B.Kavitha Laxmi, M. Sravani
Abstract | PDF |
186. |
Using Advanced Encryption Standard for Secure and Scalable Sharing of Personal Health Records
in Cloud
Pages :7745-7747
B. Sri Varsha, P.S. Suryateja
Abstract | PDF |
187. |
A Survey on Reversible Data Hiding in Encrypted Image
Pages :7748-7751
Princy Raj, Sreekumar K
Abstract | PDF |
188. |
ZigBee based Wireless Sensor Networks
Pages :7752-7755
Kanchan Kaushal, Taranvir Kaur, Jaspinder Kaur
Abstract | PDF |
189. |
Designing of Fingerprint Enhancement Based on Curved Region Based Ridge Frequency Estimation
Pages :7756-7760
Navjot Kaur, Gagandeep Singh
Abstract | PDF |
190. |
Impact of Social Influence on Entrepreneurs to Use e-Commerce in Saudi Arabia
Pages :7761-7772
Abdullah Almaimouni, Luke Houghton, Kuldeep Sandhu
Abstract | PDF |
191. |
A Modified Approach for Aggreration Technique in WSN
Pages :7773-7775
Balihar Singh, Varinderjit Kaur
Abstract | PDF |
192. |
Forensic-as-a-Service for Mobile Devices (Literature Survey)
Pages :7776-7778
Prashant N. Ninawe, Shrikant B. Ardhapurkar
Abstract | PDF |
193. |
Design and Implementation of Performance Guaranteed Symmetric Load Balancing Algorithm
Pages :7779-7783
Shaik Nagoor Meeravali, R. Daniel, CH. Srinivasa Reddy
Abstract | PDF |
194. |
Designing an Efficient Image Encryption-Then- Compression System with Haar and Daubechies
Wavelet
Pages :7784-7788
Harmanpreet Kaur Aujla, Rajesh Sharma
Abstract | PDF |
195. |
Location Based and Energy Efficient Anonymous Routing Protocol for MANET
Pages :7789-7794
Snehlata Handrale , Prof. S. K. Pathan
Abstract | PDF |
196. |
An E-learning system with Image compression
Pages :7795-7798
Milind Tambe, Azar Maniyar, Rohan Patil, Kiran Uttekar
Abstract | PDF |
197. |
Area Extraction of beads in Membrane filter using Image Segmentation Techniques
Pages :7799-7803
Neeti Taneja, Sudha Goyal
Abstract | PDF |
198. |
Increasing Throughput Capacity of Multihop Wireless Networks
Pages :7804-7806
K.Sumithra devi, .R.Sivakani and M.Pabitha
Abstract | PDF |
199. |
A Survey on Forwarding Game Theory in Mobile Ad hoc Network
Pages :7807-7809
Ashwini Chandrashekhar Maske
Abstract | PDF |
200. |
A Study of Wireless Networks: WLANs, WPANs, WMANs, and WWANs with Comparison
Pages :7810-7813
Kanika Sharma, Neha Dhir
Abstract | PDF |
201. |
A Comprehensive Overview on Data Mining: Approaches and Applications
Pages :7814-7816
Deepti Mishra, Dr. DevpriyaSoni
Abstract | PDF |
202. |
A Survey on Security Frameworks for Software-as-a-Service
Pages :7817-7820
Sithara Sahadevan , Jiby J Puthiyedam
Abstract | PDF |
203. |
Analysis of Real Time Driver Fatigue Detection Based on Eye and Yawning
Pages :7821-7826
Narender Kuamr, Dr. N.C. Barwar
Abstract | PDF |
204. |
Clustering of Random Data: A New Concept
Pages :7827-7830
Bhumika Ingale, Antara Bhattacharya
Abstract | PDF |
205. |
User-Centric Based Crawler System
Pages :7831-7836
Santosh Kumar Uppada
Abstract | PDF |
206. |
Energy Efficient Mobile Cloud Computing
Pages :7837-7840
Siddiqui Mohammad Saad, S.C.Nandedkar
Abstract | PDF |
207. |
Impact of queuing policy variations on MaxProp DTN routing protocol
Pages :7841-7843
Mohsin Naziruddin
Abstract | PDF |
208. |
Enhancement of Security in Data Mining Using FEAL (Fast Encryption Algorithm)
Pages :7844-7846
Amarpreet Singh, Vinay Bhardwaj
Abstract | PDF |
209. |
A Survey on Image Feature Descriptors-Color, Shape and Texture
Pages :7847-7850
Alphonsa Thomas, Sreekumar K
Abstract | PDF |
210. |
P2P Topological Ad-hoc Routing Protocol (P2P-ARP)
Pages :7851-7854
Mriganka Sarmah, Pradeep Sharma, Pallabi Borah, Meenakshi Sharma
Abstract | PDF |
211. |
Overview of Offloading in Smart Mobile Devices for Mobile Cloud Computing
Pages :7855-7860
Roopali, Rajkumari
Abstract | PDF |
212. |
A Survey on Expert System in Agriculture
Pages :7861-7864
Divya Joy, Sreekumar K
Abstract | PDF |
213. |
A Survey on Collaborative Tagging
Pages :7865-7869
Pradnya Deshmane, Prof.N.R.Wankhade
Abstract | PDF |
214. |
A Study on Different JPEG Steganograhic Schemes
Pages :7870-7874
Alphy Ros Mathew, Sreekumar K
Abstract | PDF |
215. |
Survey on Online Spam Review Detection Methods
Pages :7875-7876
Kalyani Adhav, S.Z Gawali, Ravindra Murumkar
Abstract | PDF |
216. |
A Survey on Image Segmentation and Feature Extraction Methods for Acute Myelogenous
Leukemia Detection in Blood Microscopic Images
Pages :7877-7879
Athira Krishnan, Sreekumar
Abstract | PDF |
217. |
A Study of Similarity Functions Used in Textual Information Retrieval in Wide Area Networks
Pages :7880-7884
Jaswinder Singh, Parvinder Singh , Yogesh Chaba
Abstract | PDF |
218. |
Content Based Image Retrieval of User’s Interest Using Feature Fusion and Optimization Using
Genetic Algorithm: A Survey
Pages :7885-7888
Ajimi Ameer, SreeKumar.K, Minu K.K
Abstract | PDF |
219. |
A Survey on Automatic Text Summarization
Pages :7889-7893
Saranyamol C S, Sindhu L
Abstract | PDF |
220. |
The Study of Various Server Architectures for Mobile Presence Services in Social Network
Applications
Pages :7894-7898
Jareena Shaikh, Bhandari G. M.
Abstract | PDF |
221. |
Gateway Load Balancing in Integrated Internet- MANET to Improve Network Performance
Pages :7899-7903
Ajay Kumar, Udai Shankar, Mahesh Kumar Tiwari
Abstract | PDF |
222. |
Intrusion Detection through Session Hijacking
Pages :7909-7913
Keshav Jain
Abstract | PDF |
223. |
Content Leakage Detection by Using Traffic Pattern for Trusted Content Delivery Networks
Pages :7841-7843
V.S.Motade, Deepak Gupta
Abstract | PDF |
224. |
Virtualization Study in Education Era with Some Environmental Beneficial Issues
Pages :7914-7916
Nitin R. Suradkar and Amol S. Gadkari
Abstract | PDF |
225. |
Beneficial Implementing GIS in Optical Fiber Communication in Government and Private
Industries an Overview
Pages :7917-7919
Rahul D. Taur, Dr. Santosh S. Lomte
Abstract | PDF |
226. |
Overview of Database Security
Pages :7920-7921
Manisha R.Shinde
Abstract | PDF |
227. |
Detection of Node Replication Attacks in Mobile Sensor Networks Using Localized Algorithms
Pages :7922-7926
Pooja Chaturvedi, Shyam S. Gupta
Abstract | PDF |
228. |
A Comparative Analysis of Provable Data
Possession Schemes in Cloud
Pages :7927-7931
Pooja Natu, Shikha Pachouly
Abstract | PDF |
229. |
Survey Paper On Big Data
Pages :7932-7939
Vibhavari Chavan, Rajesh. N. Phursule
Abstract | PDF |
230. |
Task Scheduling in Cloud Computing: Review
Pages :7940-7944
Raja Manish Singh, Sanchita Paul, Abhishek Kumar
Abstract | PDF |
231. |
A Survey of Personalized Web Search in Current Techniques
Pages :7945-7947
Priyanka C. Ghegade, Vinod Wadane
Abstract | PDF |
232. |
Cost Minimization Assignment Problem Using Fuzzy Quantifier
Pages :7948-7950
G. Nirmala and R. Anju
Abstract | PDF |
233. |
Ultimate Way to Preserve Privacy in Data Mining
Pages :7951-7953
Neha Agrawal, Nidhi Chaturvedi
Abstract | PDF |
234. |
A Survey on Security Vulnerabilities And Its CountermeasuresAt Network Layer In MANET
Pages :7954-7957
Rishikesh Teke, Manohar Chaudhari
Abstract | PDF |
235. |
Centralized Profile Translation Architecture Using Enhance Security
Pages :7958-7960
Priyanka Badwaik
Abstract | PDF |
236. |
Binate Code WAP Approach to access Sequential Pattern Mining for Web Log
Pages :7961-7964
Abhilasha Vyas, Priyanka Dhasal
Abstract | PDF |
237. |
A Comparative Analysis of Proposed Schemes for Increasing Channel Utilization In 3G Networks
Pages :7965-7971
Shekhar Tyagi, Hariom Tyagi
Abstract | PDF |
238. |
3D Face Detection and Recognition under Occlusion
Pages :7972-7976
V.Ramaswamy, Parashuram Baraki
Abstract | PDF |
239. |
Article Withdrawn
Pages :xxx-xxx
xxxxxxxxx
Abstract | PDF |
240. |
Comparision between Quad tree based K-Means and EM Algorithm for Fault Prediction
Pages :7984-7988
Swapna M. Patil, R.V.Argiddi
Abstract | PDF |
241. |
Visual up Gradation of Mammogram Image Using Grey Scale Extending Techniques
Pages :7989-7992
N. Angayarkanni, D. Kumar
Abstract | PDF |
242. |
Search Results From the Web Databases Using Ontology-Assisted Data Extraction
Pages :7993-7997
J. Siva Jyothi , Ch. Satyananada Reddy
Abstract | PDF |
243. |
Design of Ripple Carry Adder using Quantum Cellular Automata
Pages :7998-8002
B Praveenkumar, J Thirumal Murugan, R. Prabhakar
Abstract | PDF |
244. |
Human Identification with Finger Veins Using Repeated Line Tracking, Even Gabor and
Automatic Trimap Generation Algorithms
Pages :8003-8007
Prabjot kaur, Prince Verma
Abstract | PDF |
245. |
Survey On Sleep And Awake Method Using Geographic Opportunistic Routing In Wireless
Sensor Networks
Pages :8008-8011
B.Senthamil Selvi, S.P.Kavya
Abstract | PDF |
246. |
Extending functionalities of default clipboard
Pages :8012-8014
Sarang B. Kimmatkar
Abstract | PDF |
247. |
Comparative Analysis of Genetic Algorithm Based Approach for Gene Cancer Classification using
prominent features with PSO for Dimensionality
Reduction and FFBNN as Classifier
Pages :8015-8021
Vaishali P Khobragade, M.Anup Kumar
Abstract | PDF |
248. |
Optimizing and Generating Dynamic intricate Cluster construction in MANETs using Integer
Linear Programming with Rough set (ILPR)
Model Technique
Pages :8022-8026
S.R.M. Krishna , M. N. Seeta Ramanath, V. Kamakshi Prasad
Abstract | PDF |
249. |
QOS Oriented Vertical Handoff for Wimax/Wlan in Overlay Network
Pages :8027-8030
M.Ramya, R.T.Thivya Lakshmi, D.Sujeetha Lakshmi
Abstract | PDF |
250. |
Li-Fi Technology
Pages :8031-8032
Polshetwar Poonam V. , Mr. Saad Siddiqui
Abstract | PDF |
251. |
Performance Analysis of Energy Dissipation in WSNs Using Multi-Chain PEGASIS
Pages :8033-8036
Mukesh Prajapat, Dr. N.C. Barwar
Abstract | PDF |
252. |
Predicting Educational Performance of a Student Failure and Dropout by using Data
mining Techniques
Pages :8037-8040
U.Harilatha, N.Sudhakaryadav
Abstract | PDF |
253. |
An Exploratory Review of Face Recognition Techniques and Algorithms
Pages :8041-8045
Ajit Kumar Tiwari, Shrikant Lade
Abstract | PDF |
254. |
Efficiently Detection of Intrusion in Multi-tire Web Applications Using DoubleGuard: A Survey
Pages :8046-8050
Prerna U. Randive
Abstract | PDF |
255. |
Optimal Dynamic Load Balance in Distributed Systems for Client Server Assignment
Pages :8051-8054
D.Saritha, Ch. Satyananda Reddy
Abstract | PDF |
256. |
An Efficient Generation of Potential High Utility
Itemsets from Transactional Databases
Pages :8055-8060
Velpula Koteswara Rao, Ch. Satyananda Reddy
Abstract | PDF |
257. |
Ayurvedic leaf recognition for Plant Classification
Pages :8061-8066
Sethulekshmi A V, Sreekumar K
Abstract | PDF |
258. |
An analysis of Projection Based Multiplicative Data Perturbation for K-means Clustering
Pages :8067-8069
Bhupendra Kumar Pandya, Umesh Kumar Singh, Keerti Dixit
Abstract | PDF |
259. |
A Novel Approach for Record Deduplication using Hidden Markov Model
Pages :8070-8073
R.Parimala devi, V.Thigarasu
Abstract | PDF |
260. |
Hash Based Approach for Providing Privacy and Integrity in Cloud Data Storage using Digital
Signatures
Pages :8074-8078
N Gowtham Kumar, K Praveen Kumar Rao
Abstract | PDF |
261. |
A Review on Dynamic Query Forms for Database Queries
Pages :8079-8081
Priyanka P. Nikam
Abstract | PDF |
262. |
Single-Sign on Using Social Networking Sites
Pages :8082-8085
K.Naveen
Abstract | PDF |
263. |
Iterative Methods of Order Four for Solving Nonlinear Equations
Pages :8086-8090
V.B. Kumar,Vatti, Shouri Dominic and Mounica,V
Abstract | PDF |
264. |
Survey on Analysis of Students’ Emotions through Social Media Data Mining
Pages :8091-8095
Ranjeeta Rana, V. L. Kolhe
Abstract | PDF |
265. |
World Wide Web and Its Journey from Web 1.0 to Web 4.0
Pages :8096-8100
Nupur Choudhury
Abstract | PDF |
266. |
Review on Preserving Cloud Consistency Using CAAS Model
Pages :8101-8102
Yogesh Chimate, Prof. P. B. Kumbharkar
Abstract | PDF |
267. |
Integrity Verification and Availability Using PDP in Multi-Cloud
Pages :8103-8105
Vrushali K Gaikwad
Abstract | PDF |
268. |
Problem Solving Strategy for Decision Making in Market Basket Analysis
Pages :8106-8109
Sneha Sawlani, Piyush Vyas
Abstract | PDF |
269. |
A Novel Approach for Detecting of Tampering On Images
Pages :8110-8113
Sajja.Karthik, M.Gargi
Abstract | PDF |
270. |
Survey of Approaches for Discrimination Prevention in Data Mining
Pages :8114-8118
Harshali M. Saindane, V. L. Kolhe
Abstract | PDF |
271. |
Finger Writing in Air using Kinect
Pages :8119-8121
Utsav Jambusaria, Neerja Katwala, Manali Kadam, Harish Narula
Abstract | PDF |
272. |
A New Approach for Inferring User Search Goals using user’s implicite Feedback
Pages :8122-8126
Vidya V. Hire , Swati K. Bhavsar
Abstract | PDF |
273. |
Load Balancing in Cloud Environment Using Task Transfer: A Review
Pages :8127-8129
Syam Sankar, Devi Dath
Abstract | PDF |
274. |
Efficient Node Address Auto configuration in MANET
Pages :8130-8134
Vikas Subhashrao Shinde, K.Vishal Reddy
Abstract | PDF |
275. |
A review on Digital Image Steganography
Pages :8135-8137
Navjot Kaur, Ashima Bansal
Abstract | PDF |
276. |
A Novel Techinque For Ranking of Documents Using Semantic Similarity
Pages :8138-8143
Rajni Kumari Rajpal, Yogesh Rathore
Abstract | PDF |
277. |
QRcode Based Navigation System on Cloud Computing Platforms
Pages :8144-8146
Chaithra M H, Sridevi S, Mamatha E
Abstract | PDF |
278. |
A Survey on Various Algorithms of Sequential Frequent Pattern Mining and Uncertain Data
Mining
Pages :8147-8149
Kshiti S Rana, Hiren V Mer
Abstract | PDF |
279. |
A Survey On Facilitating Document Annotation Using Content And Querying Value
Pages :8150-8152
Sonal Nikam, Prof.J.V.Shinde
Abstract | PDF |
280. |
A Survey on Outlier Detection Methods
Pages :8153-8156
Sreevidya S S
Abstract | PDF |
281. |
Differential Privilege based Secure Authorized Deduplication Using Public Private Cloud
Pages :8157-8160
Amit Harish Palange , Prof.Deepak Gupta
Abstract | PDF |
282. |
Implementation of Perception Classification based on BDI Model using Bayesian Classifier
Pages :8161-8165
Vishwanath Y, Murali T S, Dr M.V Vijayakumar
Abstract | PDF |
283. |
A Survey on Secure Data Hiding Techniques in Encrypted Images
Pages :8166-8169
Anjaly Mohanachandran, Mary Linda P.A.
Abstract | PDF |
284. |
EMET: Extracting Metadata using ElementTree to Recommend Tags for Web Contents
Pages :8170-8177
Pushpa C N, Shankar R, Thriveni J, Venugopal K R, L M Patnaik
Abstract | PDF |
285. |
An Effective Use of Meta Information Using Clustering and Classification Techniques for Text
Mining: A Survey
Pages :8178-8181
Nitin J.Ghatge, Poonam D. Lambhate
Abstract | PDF |
286. |
MDA based approach towards Design of Database for Online HealthCare System
Pages :8182-8187
Dr. Suman Kumar Mishra, Vansh Raj Upadhyay
Abstract | PDF |
287. |
Analysis of CMOs Dynamic Comparators for Low Power and High Speed ADCs
Pages :8188-8194
Vaijayanthi.M, Vivek.K, Hemaprabha.A
Abstract | PDF |
288. |
A Novel Secured Data Exchange Mechanism for Text Data Using Encode and Decode Mechanism
Pages :8195-8198
V.S.Aravind Nambala, H.Deva Raj, Y.Ramesh kumar
Abstract | PDF |
289. |
A Parallel Recursive Approach for Solving All Pairs Shortest Path Problem on GPU using
OpenCL
Pages :8198-8204
Manish Pandey, Sanjay Sharma
Abstract | PDF |
290. |
A Survey on Service Integrity in Software as a Service
Pages :8205-8209
Gohila Priyadharshini.C, Mohana.S
Abstract | PDF |
291. |
Security for Data Mining
Pages :8210-8213
N.Kohila, P.Poornima, P.Elamathi
Abstract | PDF |
292. |
Next generation tools for Oil and Gas Companies? – Cloud Computing
Pages :8214-8220
C.Subhalakshmipriya, R.Tamilarasi
Abstract | PDF |
293. |
Multiple Routing Configurations for Fast IP Network Recovery
Pages :8221-8224
Aditi Thakkar
Abstract | PDF |
294. |
Privacy-Preserving Decentralized Key Policy Attribute-Based Encryption
Pages :8225-8228
Girija Patil
Abstract | PDF |
295. |
Securing Online Reputation Systems through Trust Modelling and Temporal Analysis
Pages :8229-8232
Aanum Shaikh
Abstract | PDF |
296. |
Article Removed
Pages :8233-8235
xxx, xxx, xxx
Abstract | PDF |
297. |
A Survey on Different Backup and Restore Techniques used in Mobile devices
Pages :8236-8238
Pratap P.Nayadkar, B.L Parne
Abstract | PDF |
298. |
An Improved Extraction Algorithm from Domain Specific Hidden Web
Pages :8239-8242
Juhi Sharma, Mukesh Rawat
Abstract | PDF |
299. |
Survey on Fast IP Network Recovery
Pages :8243-8245
Manoj Baingne, K. Palanivel
Abstract | PDF |
300. |
A Method for Privacy Preserving Data Mining in Secure Multiparty Computation using Hadamard
Matrix
Pages :8246-8249
Neha Pathak, Anand Rajavat
Abstract | PDF |
301. |
Enhanced Sentence-Level Text Clustering using Semantic Sentence Similarity from Different
Aspects
Pages :8250-8254
Saranya.J, Arunpriya.C
Abstract | PDF |
302. |
Lambda Calculus
Pages :8255-8258
Sampa Das
Abstract | PDF |
303. |
Security in Multi-Cloud Storage with Cooperative Provable Data Possession
Pages :8259-8262
Megha Patil, G.R.Rao
Abstract | PDF |
304. |
A Review of Data Warehousing and Business Intelligence in different perspective
Pages :8263-8268
Vijay Gupta, Dr. Jayant Singh
Abstract | PDF |
305. |
A Review on Content Based Image Retrieval and Search Based Face Annotation on Weakly Labeled
Images
Pages :8269-8271
Krishna Prasanth I B, Anoop S
Abstract | PDF |
306. |
A Survey on Content Based Image Retrieval Based On Edge Detection
Pages :8272-8275
S.Asha, R.Rajesh Kanna
Abstract | PDF |
307. |
Enforcing Text Summarization using Fuzzy Logic
Pages :8276-8279
Rajesh D. Shinde, Suraj H. Routela, Savita S. Jadhav, Smita R.Sagare
Abstract | PDF |
308. |
NeuroSVM: A Graphical User Interface for Identification of Liver Patients
Pages :8280-8284
Kalyan Nagaraj, Amulyashree Sridhar
Abstract | PDF |
309. |
Automatic Text Detection and Information Retrieval on Mobile
Pages :8285-8292
Mohit K.Chauhan, Gaurav Kumar
Abstract | PDF |
310. |
MCD based Principal Component Analysis in Computer Vision
Pages :8293-8296
R. Muthukrishnan , E.D. Boobalan, R. Mathaiyan
Abstract | PDF |
311. |
Sector Based Cloud Storage of Blood Groups
Pages :8297-8299
Anuraag Vikram Kate, Nikilav P V, Praneeth Ramesh, Sriniketh R, Naren J
Abstract | PDF |
312. |
Optimal Energy Efficient Multicast Algorithm for MANETs
Pages :8300-8302
Lakshmi Kala Pampana, Srija Kathi
Abstract | PDF |
313. |
Emperical Resource Allocation Using Dynamic Distributed Allocation Policy in Cloud Computing
Pages :8303-8308
Sasmita Parida, Suvendu Chandan Nayak
Abstract | PDF |
314. |
A Study on 5th Generation Mobile Technology - Future Network Service
Pages :8309-8313
D. Hema Latha, D. Rama Krishna Reddy, K. Sudha, Azmath Mubeen, T.S.Savita
Abstract | PDF |
315. |
High Security Provided through a Secret Password Using Steganographic Technique
Pages :8314-8315
Minakshi Kumari, Somesh Kumar Dewangan
Abstract | PDF |
316. |
MRAR: Mining Ranked Association Rules Using Information Extraction
Pages :8316-8320
M. Kanaka Surya Padmaja, S. Siva Skandha, Ch. Raja Kishore
Abstract | PDF |
317. |
A Survey Paper on Hop by Hop Message Authentication in Wireless Sensor Network
Pages :8321-8324
N.R.Wankhade, Jadhav Ashvini B.
Abstract | PDF |
318. |
Secured E-Voting Using NFC Technology
Pages :8325-8327
Rutuja Nikam, Monika Rankhambe, Diksha Raikwar, Atharv Kashyap
Abstract | PDF |
|
|