• Up Coming Issue >
  • Up-Coming Conference
  • Conference Papers
  • Indexing
  • Peer-Review
  • Publication Ethics
  • Contact
  • FAQ
  • Terms&Conditions
  • Site Map
  • bh

     

    VOLUME 6 ISSUE 1 January - February 2015

    ISSN 0975 - 9646

    1. Talent Management in Organizations Using Mining Techniques
    Pages : 1-5
    Manogna.N, Sumedha Mehta
    Abstract | PDFPDF
    2. Survey Paper On Modoc: Multi Owner Data Sharing Over Cloud
    Pages : 6-9
    Shobha D. Patil, S. B. Sonkamble
    Abstract | PDFPDF
    3. Survey on Secure Public Auditing and Privacy Preserving in Cloud
    Pages : 10-13
    Madhumati B.Shinde, S. B. Sonkamble
    Abstract | PDFPDF
    4. Quantum Cryptography
    Pages : 14-17
    Lavannya Varghese , Raisa Varghese, Vince Paul, Sankaranarayanan P N
    Abstract | PDFPDF
    5. Securing MANETs using Cluster-based Certificate Revocation Method: An Overview
    Pages : 18-22
    Dipti S. Sawant, J. E. Kamalasekaran
    Abstract | PDFPDF
    6. Centralizing Cloud Security by Audit Management Using MASM
    Pages : 23-26
    Kalangi Naga Mallika, Vemula Rajiv Jetson
    Abstract | PDFPDF
    7. Multimodal Finger Biometric Score Fusion Verification Using Coarse Grained Distribution Function
    Pages :27-33
    J.Stanly Jayaprakash, Dr.S.Arumugam
    Abstract | PDFPDF
    8. Enhancement of the Face Recognition Using Gabor Filter
    Pages : 34-36
    Rahul Nayak, Dr.Rajesh Pathak, Ajay Kumar
    Abstract | PDFPDF
    9. Intrusion Determent using Dempster-Shafer Theory in MANET Routing
    Pages : 37-41
    Karuturi.Satish, K. Ramesh
    Abstract | PDFPDF
    10. An Adaptive MRI Tumor Detection Using Neural Network Based Adaboost Algorithm
    Pages : 42-47
    V.Trinadh babu, Sk.Salma begum
    Abstract | PDFPDF
    11. Semantic Web Technology and Ontology designing for e-Learning Environments
    Pages : 48-51
    Shaileshkumar K. Patel, Dr. Harshad B. Bhadka
    Abstract | PDFPDF
    12. A New Approach to Partial Face Recognition
    Pages : 52-56
    Amit V. Manapure, Nitin Mishra
    Abstract | PDFPDF
    13. An Improved Framework for Tamper Detection in Databases
    Pages :57-60
    Manisha K. Kambire, Pooja H. Gaikwad,Sujata Y. Gadilkar,Yogesh A. Funde
    Abstract | PDFPDF
    14. The Blue Brain Technology Using Wetware Technology and Fuzzy Logic
    Pages : 61-68
    Remya Vinayakumar, Deepthi Varghese, Vince Paul
    Abstract | PDFPDF
    15. Top 5 Proven Strategies to Boost PPM Software Adoption
    Pages : 69-70
    Rajeshwar Vayyavur
    Abstract | PDFPDF
    16. Practical Outsourcing of Linear Programming in Secured Cloud Computing
    Pages : 71-73
    Lochan .B
    Abstract | PDFPDF
    17. Survey of Fingerprint Matching Techniques for Privacy Protection
    Pages :74-80
    Anjali Rajak, Dr.Asif Ullah Khan, Asst Prof.Surendra Dubey, Dr.Bhupesh Gour
    Abstract | PDFPDF
    18. A Survey on Energy Efficient Routing Protocol for Wireless Sensor Networks
    Pages : 81-83
    Pallavi S. Katkar, Prof. (Dr.) Vijay R. Ghorpade
    Abstract | PDFPDF
    19. An Autoconfigurated Hybrid Honeypot for Improving Security in Computer Systems
    Pages : 84-88
    Shyamasundar L B
    Abstract | PDFPDF
    20. A Review of Secure Authorized Deduplication with Encrypted Data for Hybrid Cloud Storage
    Pages :89-91
    Bhavanashri Shivaji Raut, Prof. H. A. Hingoliwala
    Abstract | PDFPDF
    21. A Review of Image Processing for Pomegranate Disease Detection
    Pages : 92-94
    Manisha A. Bhange, Prof. H. A. Hingoliwala
    Abstract | PDFPDF
    22. Prominence of Spatial Database in Geographical Information Systems
    Pages : 95-98
    T.Aruna Sri
    Abstract | PDFPDF
    23. Preserving Privacy of Public Clouds through Access Control Mechanisms: A Review
    Pages : 99-100
    S Aparna, Devi Dath
    Abstract | PDFPDF
    24. A Review on Different Routing Protocols in MANETS
    Pages : 101-104
    Navjot Kaur, Dr. Tanupreet Singh
    Abstract | PDFPDF
    25. Enchanced of Network Security Using Simplified Encryption Standard (SES)
    Pages : 105-111
    K. Bommi Mayuri, E.Rajalakshmi
    Abstract | PDFPDF
    26. Scheduling of Parallel Applications Using Map Reduce On Cloud: A Literature Survey
    Pages : 112-115
    A.Sree Lakshmi, Dr.M.BalRaju, Dr.N.Subhash Chandra
    Abstract | PDFPDF
    27. Review Paper on Technologies used for Interactive Image Segmentation
    Pages : 116-120
    Vrushali Mendhule, Gaurav Soni, Rajesh Nigam
    Abstract | PDFPDF
    28. Feature Selection Technique Applied with Many Data Mining Based Model
    Pages : 121-126
    Pratibha Soni, Prabhakar Sharma
    Abstract | PDFPDF
    29. Big Data Processing Using Hadoop MapReduce Programming Model
    Pages : 127-132
    Anumol Johnson, Havinash P.H, Vince Paul, Sankaranarayanan P.N
    Abstract | PDFPDF
    30. A Review on Image Enhancement using Artificial Neural Network and Fuzzy Logic
    Pages : 133-136
    Shweta K. Narnaware, Roshni Khedgaonkar
    Abstract | PDFPDF
    31. Review of Perceptual Resemblance of Local Plastic Surgery Facial Images using Near Sets
    Pages : 137-140
    Prachi V.Wagde, Roshni Khedgaonkar
    Abstract | PDFPDF
    32. Enactment of Medium and Small Scale Enterprise ETL(MaSSEETL)-an Open Source Tool
    Pages : 141-147
    Rupali Gill, Jaiteg Singh
    Abstract | PDFPDF
    33. CAPCHA as Graphical Password
    Pages : 148-151
    Magniya Davis, Divya R, Vince Paul, Sankaranarayanan P N
    Abstract | PDFPDF
    34. Video Copy Detection Using F-Sift and Graph Based Video Sequence Matching
    Pages : 152-158
    Anju P S, Soumya Varma, Vince Paul, Sankaranarayanan P N
    Abstract | PDFPDF
    35. Integration of Wireless Sensor Networks and Mobile Cloud- a Survey
    Pages :159-163
    Sukanya C.M, Priya K.V, Vince Paul, Sankaranarayanan P.N
    Abstract | PDFPDF
    36. Different Digital Watermarking Techniques for Secure Data Transmission
    Pages : 164-167
    Evline.J.Alappatt, JsamyDavies, Vince Paul, Sankaranarayanan P.N
    Abstract | PDFPDF
    37. Software Development Life Cycle Models- Comparison, Consequences
    Pages : 168-171
    Vanshika Rastogi
    Abstract | PDFPDF
    38. Brain Tumor Detection and Classification Using Histogram Thresholding and ANN
    Pages : 172-175
    Swathi P S, Deepa Devassy, Vince Paul, Sankaranarayanan P N
    Abstract | PDFPDF
    39. A New Scalable Hybrid Routing Protocol for VANETs
    Pages : 176-180
    Soumya Xavier, Anto Jacob, Vince Paul, Sankaranarayanan P.N
    Abstract | PDFPDF
    40. Heuristic Approach for Document Clustering in Forensic Analysis
    Pages : 181-184
    Tushar Thopte, Yogesh Indani, Murlidhar Jangale,Sharad Gaikwad
    Abstract | PDFPDF
    41. A Survey : Spectral Clustering Applications and its Enhancements
    Pages : 185-189
    S.V.Suryanarayana, Dr.G.Venkateswara Rao, Dr. G.Veereswara Swamy
    Abstract | PDFPDF
    42. Quantifying Response Mechanism for Effectiveness of Hybrid Virus Propagation through BT and SMS Channel-A Review
    Pages : 190-193
    Harsha Kubade, Deepali Khatwar
    Abstract | PDFPDF
    43. Survey of Scalable String Similarity Joins
    Pages : 194-197
    Khalid F. Alfatmi, Archana S. Vaidya
    Abstract | PDFPDF
    44. A Novel methodology for Searching Dimension Incomplete Database
    Pages : 201-204
    Kalbhor Swati, Gupta Shyam
    Abstract | PDFPDF
    45. Web Usage mining for Predicting User Access Behaviour
    Pages : 181-184
    Amit Dipchandji Kasliwal, Dr. Girish S. Katkar
    Abstract | PDFPDF
    46. A Methodology for the Usage of Side Data in Content Mining
    Pages : 205-212
    Vishal Vitthal Bandgar, Priyanka S. Muttur, Amol Ulhas Kuntham, G.A.Fattepurkar
    Abstract | PDFPDF
    47. Survey on Supervised Classification using Self Organising Maps
    Pages : 213-217
    Nupur Choudhury, Rupesh Mandal
    Abstract | PDFPDF
    48. Survey on – Self Adaptive Focused Crawler
    Pages : 218-220
    Pallavi Wadibhasme, Prof. Nitin Shivale
    Abstract | PDFPDF
    49. An Evolutionary and Empirical Review on Cloud Computing in Mobile Applications
    Pages : 221-223
    Rajeshwar Vayyavur
    Abstract | PDFPDF
    50. Implementation of RSA RC5 Algorithm in Cloud
    Pages : 224-227
    Pallavi Pandey, Priyanka Dhasal, Rakesh Pandit
    Abstract | PDFPDF
    51. Fingerprint Compression based on Sparse Representation: A Review
    Pages : 228-231
    Naja M I, Afzal A L
    Abstract | PDFPDF
    52. MANCAF: A Framework for Building Collaborative Applications in Mobile Ad Hoc Networks
    Pages : 232-236
    Hardik S. Mehta, Dr. Dhaval R. Kathiriya
    Abstract | PDFPDF
    53. Steganography Method Hiding Data in Video
    Pages : 237-239
    Roshani Patidar, Kamlesh Patidar
    Abstract | PDFPDF
    54. Object Scanning based Road Obstacles Detection using Weighted Sum Method-A Review
    Pages : 240-242
    Neha Chalana, Lovnish Bansal
    Abstract | PDFPDF
    55. Content Based Image Retrieval: Integration of Neural Networks Using Speed-Up Robust Feature and SVM
    Pages : 243-248
    Sukhmanjeet Kaur, Prince Verma
    Abstract | PDFPDF
    56. Hybrid Approach for Image Classification using SVM Classifier and SURF Descriptor
    Pages : 249-251
    Parul Prashar, Harish Kundra
    Abstract | PDFPDF
    57. Non-Dominated Sorting Genetic Algorithm-II – A Succinct Survey
    Pages : 252-255
    Ankita Golchha, Shahana Gajala Qureshi
    Abstract | PDFPDF
    58. Enhanced NSGA-II Algorithm for Solving Multiobjective Optimization Problems Using PBX Crossover and POM Mutation.
    Pages : 256-261
    Ankita Golchha, Shahana Gajala Qureshi
    Abstract | PDFPDF
    59. Prediction with V&V and Fault-Tolerance Strategies for Mandelbugs
    Pages : 262-264
    Pooja Maltare,Vishal Sharma
    Abstract | PDFPDF
    60. Efficient String Matching Using Bit Parallelism
    Pages : 265-269
    Kapil Kumar Soni, Rohit Vyas, Dr. Vivek Sharma
    Abstract | PDFPDF
    61. Drowsy Driver Identification Using Eye Blink detection
    Pages : 270-274
    Raees Ahmad, Prof. J.N. Borole
    Abstract | PDFPDF
    62. Recommendation System for Music File
    Pages : 275-277
    Tuhina Sultana, Nikita Sharma, Sunil Aher, Nikhil Pate and Mayura Kinikar
    Abstract | PDFPDF
    63. Information Hiding using Image Embedding in QR Codes for Color Images: A Review
    Pages : 278-283
    Akshara Gaikwad, K.R.Singh
    Abstract | PDFPDF
    64. A Technical Analysis of Image Stitching Algorithm
    Pages : 284-288
    Pranoti Kale, K.R.Singh
    Abstract | PDFPDF
    65. Recent Developments in Indian Sign Language Recognition: An Analysis
    Pages : 289-293
    Daleesha M Viswanathan, Sumam Mary Idicula
    Abstract | PDFPDF
    66. A Novel and Light Weight Defence Mechanism for Securing Wireless Networks
    Pages : 294-297
    Prajnya Priyadarsini Satapathy, Debi Prasad Mishra, Deepesh Kumar Singh
    Abstract | PDFPDF
    67. Handwritten Marathi Vowels Recognition using Correlation Coefficient
    Pages : 298-301
    Parshuram M. Kambale, Balasaheb J. Kshirsagar
    Abstract | PDFPDF
    68. Effect of Varying Embedding Energy and Energy wise Sorting on Watermarking using Wavelet
    Transforms of Orthogonal Transforms DCT, Walsh and Haar

    Pages : 302-313
    Dr. H. B. Kekre, Dr. Tanuja Sarode, Shachi Natu
    Abstract | PDFPDF
    69. Mining for Faintly Labeled Web Facial Images By Using Face Annotation
    Pages : 314-316
    Pranjal N. Chopade, Sonali M. Rahinj, Gauri G. Shelar , R.B.Kagade
    Abstract | PDFPDF
    70. Energy and Power Aware Stable Routing Strategy for Ad hoc Wireless Networks based on DSR
    Pages : 317-321
    Nirav Bhatt, Dr. Dhaval Kathiriya
    Abstract | PDFPDF
    71. Enhanced Clustering Technique to Improve the Network Lifetime for Wireless Sensor Network
    Pages : 322-325
    J.Surekha, T.Tamizharasi
    Abstract | PDFPDF
    72. A Survey on Software Project Planning and Control Using Case Tools
    Pages : 326-331
    NadanaSundaram P V, Dr.K.Iyakutti
    Abstract | PDFPDF
    73. Article Removed
    Pages : xxx-xxx
    xxx, xxx
    Abstract | PDFPDF
    74. Modular System for Mitigating Flood Attacks
    Pages : 345-349
    Devisha Srivastava
    Abstract | PDFPDF
    75. Overview of Modern Cryptography
    Pages : 350-353
    M.Kundalakesi, Sharmathi.R, Akshaya.R
    Abstract | PDFPDF
    76. Web Usage Mining Using Apriori and FP Growth Alogrithm
    Pages : 354-357
    Aanum Shaikh
    Abstract | PDFPDF
    77. Secure and Efficient Data Transfer for Hierarchical Based Wireless Sensor Network
    Pages : 358-360
    Akshada Deokar, Deepali Borade, B.A.Tidke
    Abstract | PDFPDF
    78. Designing Secured Incremental Backup System for Cloud
    Pages : 361-364
    Shyamsunder Ingle , Rajesh Kulkarni
    Abstract | PDFPDF
    79. The Data Recovery File System for Hadoop Cluster -Review Paper
    Pages : 365-367
    V. S. Karwande, Dr. S. S.Lomte, Prof. R. A. Auti
    Abstract | PDFPDF
    80. Context Aware Service Information Extraction from Bigdata
    Pages : 368-373
    G.Suvarna, S. Murali Krishna
    Abstract | PDFPDF
    81. Recognition of Face Using Neural Network
    Pages : 374-376
    Nisha Vasudeva , Vivek kumar Sharma , Vikas Mishra
    Abstract | PDFPDF
    82. A Comparative Analysis & Survey of various Feature Extraction Techniques
    Pages : 377-379
    Kapil Kumar Pachouri, Atul Barve
    Abstract | PDFPDF
    83. Performance Analysis and Optimization of Supervised Learning Techniques for Medical Diagnosis Using Open Source Tools
    Pages : 380-383
    Vidyullatha Pellakuri, Deepthi Gurram, Dr.D. Rajeswara Rao, Dr.M.R.Narasinga Rao
    Abstract | PDFPDF
    84. Basic Tree Terminologies, their Representation and Applications
    Pages : 384-387
    Ramesh M. Patelia, Shilpan D. Vyas, Parina S. Vyas, Nayan Patel
    Abstract | PDFPDF
    85. Annotation Based Web Databases Search Technique
    Pages : 388-391
    Boraste Jagruti Balkrishna, Swati.K.Bhavsar
    Abstract | PDFPDF
    86. Robust Watermarking Using Secret Key Encryption by Embedding Noise in JPEG Image
    Pages : 392-394
    P.B.Ranbhare,.S.Kavitha
    Abstract | PDFPDF
    87. Android Based Wireless PC Controller
    Pages : 395-398
    Mahesh Deshmukh , Damini Jawale , Shruti Joshi, P.S. Kulkarni
    Abstract | PDFPDF
    88. Trustworthy and Energy-Saving Measures in Wireless Sensor Networks by using Multipath Routing
    Pages : 399-403
    Arun Kumar. S
    Abstract | PDFPDF
    89. Simple and Efficient Secret Sharing Schemes for Sharing Data and Image
    Pages : 404-409
    Binu V P, Sreekumar A
    Abstract | PDFPDF
    90. Efficient Voting system with (2,2) Secret Sharing Based Authentication
    Pages : 410-412
    Ashwini Walake, Pallavi Chavan
    Abstract | PDFPDF
    91. A Survey of Personalized Recommendation System with User Interest in Social Network
    Pages : 413-415
    Anil Rathod, Indiramma M
    Abstract | PDFPDF
    92. Verifications of Network Protocol Implementations - A Review
    Pages : 416-418
    Saleema D, Bejoy Abraham
    Abstract | PDFPDF
    93. A Survey on Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud
    Pages : 419-422
    Gauri Thorat, S.R.Todmal
    Abstract | PDFPDF
    94. Performance Analysis of New Conversion Tool from Relational Datasets to XML Datasets on Selected Websites
    Pages :423-430
    B. Hemanth Kumar, M. Surendra Prasad Babu
    Abstract | PDFPDF
    95. A Review on Semantic Web Mining
    Pages : 431-433
    Amruta Arun Joshi, Vrishali A. Chakkarwar
    Abstract | PDFPDF
    96. Efficient Keyword Query Routing for Search Engines
    Pages : 434-437
    Pawar Prajakta Bhagwat, Niranjan L. Bhale
    Abstract | PDFPDF
    97. Synthesis of Speech & Speaker Recognition Using Data Driven Approach
    Pages : 438-442
    Leela Kumari , Rahul Guha , Geetika Gera
    Abstract | PDFPDF
    98. Big Data Processing Using Hadoop
    Pages : 443-445
    R.A.Fadnavis, Samrudhi Tabhane
    Abstract | PDFPDF
    99. A Nobel Approach of Providing Confidentiality over Text Data with High PSNR Value
    Pages : 446-450
    Harsh Deepak Shrivastava, Sushil Tiwari, Sriram Yadav
    Abstract | PDFPDF
    100. MDT-Auction: A New Approach for Decision Making to map the best cloud provider to best cloud user
    Pages : 451-454
    Ninad Shinde, J. Ratnaraj Kumar
    Abstract | PDFPDF
    101. Study of Data Mining in Higher Education-A Review
    Pages : 455-458
    Khushbu N.Shah, Misika R. Patel, Neha V. Trivedi, Priyanka N. Gadariya, Richa H. Shah, Ms. Nehal Adhvaryu
    Abstract | PDFPDF
    102. Data Replication & Caching in Data Grid :A Review
    Pages : 459-462
    Rajshri S. Patil, Prof.L.K.Gautam
    Abstract | PDFPDF
    103. Ranking Through Vector Machine-Domain Specific Search
    Pages : 463-466
    C. Palguna Reddy, D. Kasi Viswanath
    Abstract | PDFPDF
    104. Load Degree Calculation for the Public Cloud based on Cloud Partitioning Model using Turnaround Time
    Pages : 467-469
    Priti Singh, Pankaj Sharma
    Abstract | PDFPDF
    105. Applications of Elliptic Curve Cryptography
    Pages : 470-472
    Chetan S. Pagar, Manisha M. Naoghare, Yogita S. Pagar
    Abstract | PDFPDF
    106. An Epistemological Text Mining Method by Generating D-Matrix for Unstructured Text
    Pages : 473-475
    Ninad Shinde, J. Ratnaraj Kumar
    Abstract | PDFPDF
    107. Reviewing Information Systems Usage and Performance Models
    Pages : 476-484
    Francis B. Osang , Nchise Abinwi, Clive Tsuma
    Abstract | PDFPDF
    108. Bio-Inspired Scheduling of High Performance Computing Applications in Cloud: A Review
    Pages : 485-487
    Delsy Jyothi, Anoop S
    Abstract | PDFPDF
    109. An Automated Sequence Model Testing (ASMT) For Improved Test Case Generation Using Cloud
    Integration

    Pages : 488-494
    Priya Purohit, Yunus Khan
    Abstract | PDFPDF
    110. A Critical Analysis of Some Symmetric Key Block Cipher Algorithms
    Pages : 495-499
    Sunil Mankotia and Manu Sood
    Abstract | PDFPDF
    111. Load Balanced Data Aggregation Methods for Virtual Backbone in Wireless Sensor Networks
    Pages :500-502
    Miss.Vrishali Popat Wagaj , Prof.Vinayak V.Pottigar, Prof.Prakash R.Gadekar
    Abstract | PDFPDF
    112. Model-Based Data Collection in Wireless Sensor Networks
    Pages : 503-509
    Geeta Gupta, Vinod Khandelwal, Vikas Gupta
    Abstract | PDFPDF
    113. Crime Area Detection and Criminal Data Record
    Pages : 510-513
    Aanchal Dabhere, Aniruddha Kulkarni, Ketaki Kumbharkar , Vrushali Chhajed,Sneha Tirth
    Abstract | PDFPDF
    114. Hybrid Method for Image Segmentation
    Pages : 514-518
    Barkha Bhansali, Sonam Tiwari, Savita Agrawal
    Abstract | PDFPDF
    115. Review of Graph Algorithms on GPU using CUDA Architecture
    Pages : 519-521
    Trupti R. Desale
    Abstract | PDFPDF
    116. Big Data Analytics: Hadoop-Map Reduce& NoSQL Databases
    Pages : 522-527
    Abinav Pothuganti
    Abstract | PDFPDF
    117. Admitive Data Aggregation in WSN
    Pages : 528-530
    Gaurav Tiwari and Archana Khandekar
    Abstract | PDFPDF
    118. An Evaluation of IP-Based Fast Rerouting Techniques
    Pages : 531-533
    Bhanu Vardhan, D. Satyanarayana, Uma Sista
    Abstract | PDFPDF
    119. Finger Sleeve: A Wearable Navigation Device
    Pages : 534-538
    Hemant Bhaskar Surale
    Abstract | PDFPDF
    120. Criminal Detection Using Eigenfaces Approach on Android Device
    Pages : 539-541
    Viraj, Pradip More, Pankaj Thombre , Shweta Malvi
    Abstract | PDFPDF
    121. Operating System Used in Cloud Computing
    Pages : 542-544
    Noopur Bardhan, Pooja Singh
    Abstract | PDFPDF
    122. Efficient Backingup Data for Migrating Cloud to Cloud
    Pages : 545-549
    PS.Vijayabaskaran, U.Prabu, R.Sriram
    Abstract | PDFPDF
    123. Combination of Neuro Fuzzy Techniques Give Better Performance over Individual Techniques of
    Soft Computing

    Pages : 550-553
    Shweta Katke, Madhavi Pawar, Trupti Kadam , Sudhanshu Gonge
    Abstract | PDFPDF
    124. Load Balancing In Multistage Packet Switches
    Pages : 554-557
    Jadhav Mahadeo , Dhage Anand , Navgire Narsingh, Patil Rohini ., Prof. Sirdeshpande S. A.
    Abstract | PDFPDF
    125. Fault Routing Node Detection Using DUAL in Wireless Sensor Networks
    Pages : 558-563
    B.Vijay Kumar, G. Hemanth Kumar Yadav
    Abstract | PDFPDF
    126. A Novel Fuzzy Image Enhancement using S-Shaped Membership Function
    Pages : 564-569
    Pushpa Devi Patel, Prof. Vijay Kumar Trivedi, Dr. Sadhna Mishra
    Abstract | PDFPDF
    127. Protecting Frequent Patterns using Distributed Security on M-Clouds
    Pages : 570-576
    K.H.Shabbeer Basha, E .Madhusudhana Reddy
    Abstract | PDFPDF
    128. Automated Identification of Substituted Words in Text
    Pages : 577-579
    Amit Kulkarni, Mayur Patil, Nitish Mali, Rajesh Kharche Prof. Mrs. G.S.Navale.
    Abstract | PDFPDF
    129. Modeling and Simulation of a Wireless Body Area Network for Monitoring Sick Patient Remotely
    Pages : 580-585
    Anas Bouayad, Nour El Houda Chaoui, Mohammed El Ghazi, Moulhim El Bekkali
    Abstract | PDFPDF
    130. Hadoop Cluster on Linode Using Ambari for Improving Task Assignment Scheme Running in the Clouds
    Pages : 586-589
    Minthu Ram Chiary, R. Anand
    Abstract | PDFPDF
    131. Unique Decision Making Process For Seamless Communication After Disaster
    Pages : 590-593
    R.Adline Freeda, R.N Sharmila
    Abstract | PDFPDF
    132. Survey on Efficient Framework for Aggregate Key Management in Cloud
    Pages : 594-596
    Shrikant D. Jadhav, Jaising Jadhav, Vaishali Khaire, Pratiksha Giakwad, Sandeep Gore
    Abstract | PDFPDF
    133. Security Analysis Using IDs Based on Mobile Agents and Data Mining Algorithms
    Pages : 597-602
    Chaimae Saadi, Habiba Chaoui Mejhed, Hassan Erguig
    Abstract | PDFPDF
    134. Survey: Routing Protocols in Cognitive Radio Mesh Networks
    Pages : 603-608
    T. Pavan Kumar, E. Suresh babu, B. Venkata Ramana, B. Sai Shashank
    Abstract | PDFPDF
    135. Ant Colony Optimization Based Routing to Improve QoS in MANETs
    Pages : 609-613
    Swapna Priya Jaladi
    Abstract | PDFPDF
    136. Survey on Real Time Broadcast Authentication Schemes for Command and Control Messages
    Pages : 614-618
    Sonia Thomas, Elisabeth Thomas
    Abstract | PDFPDF
    137. FixDec: Fixed Spherical n Points Density-Based Clustering Technique for Cloth Simulation
    Pages : 619-625
    Nur Saadah Mohd Shapri, Riza Sulaiman, Abdullah Bade
    Abstract | PDFPDF
    138. Article Removed
    Pages : xxx-xxx
    xxxxxxxx
    Abstract | PDFPDF
    139. Objective of Keystroke Dynamics for Identifying Emotional State
    Pages : 632-636
    Shivshankar Rajput and Priyanka Vijayavargiya
    Abstract | PDFPDF
    140. An Intelligent Heart Disease Prediction System Using K-Means Clustering and Naïve Bayes Algorithm
    Pages : 637-639
    Rucha Shinde, Sandhya Arjun, Priyanka Patil, Prof. Jaishree Waghmare
    Abstract | PDFPDF
    141. Outsourced Security Policy Updates Through Role Hierarchies for Security and Isolation in Cloud
    Computing

    Pages : 640-646
    Aditi Vyas, Prof. Hemant Kumar Pathak
    Abstract | PDFPDF
    142. A New Approach for Improving Computer Inspections by Using Fuzzy Methods for Forensic Data Analysis
    Pages : 647-651
    P. Jyothi, Dr S. Murali Krishna
    Abstract | PDFPDF
    143. Ensuring Distributed Accountability for Data Sharing in Cloud Using AES and SHA
    Pages : 652-657
    Vikas Vitthal Lonare, Prof.J.N.Nandimath
    Abstract | PDFPDF
    144. A Review of Trust Model in Delay Tolerant Network
    Pages : 658-660
    Ashwini Borkar
    Abstract | PDFPDF
    145. Fuzzy Logic Based Texture, Queries for Image Retrieval System: An Analysis
    Pages : 661-663
    Avdhesh Kumar Tiwari, Akash Awasthi
    Abstract | PDFPDF
    146. A Comparitive Study of: Quality Assessment of Object Oriented Software at Design Level
    Pages : 664-666
    Aarti Rathour, Akash Awasthi,Shubhendra Singh
    Abstract | PDFPDF
    147. Article Removed
    Pages : 667-670
    xxxxx
    Abstract | PDFPDF
    148. A Proposal to Enhance A-KNN Clustering Method
    Pages : 671-673
    Kamaljeet Kaur, Satwinder Singh
    Abstract | PDFPDF
    149. Analysis of Hybrid GPSR and Location Based Routing Protocol in VANET
    Pages : 674-677
    Neha, Isha
    Abstract | PDFPDF
    150. Analysis of Enhanced Request Response Detection Algorithm for Denial of Service attack in VANET: A Review
    Pages : 678-681
    Deepali., Isha
    Abstract | PDFPDF
    151. A Study on Intrusion Detection in Mobile Ad Hoc Networks
    Pages : 682-684
    R.Amutha, M.Savithri
    Abstract | PDFPDF
    152. A Study and literature Review on Image Steganography
    Pages :685-688
    Parmar Ajit Kumar Maganbhai, Prof. Krishna Chouhan
    Abstract | PDFPDF
    153. Simulation of Urban Area through Opus : Open Platform for Urban Simulation
    Pages : 689-693
    Nilesh Shingne, Deepa Ramteke, Sagarkumar Meshram
    Abstract | PDFPDF
    154. A Hybrid Technique for Medical Image Denoising using NN, Bilateral filter and LDA
    Pages : 694-698
    Rupinder Pal Singh, Varsha Varma, Pooja Chaudhary
    Abstract | PDFPDF
    155. Combinatorial approach for Text Classification Algorithm
    Pages : 699-702
    Namekar Shirish Manohar, Deipali V. Gore
    Abstract | PDFPDF
    156. A Survey on Techniques to Extract High- Quality Data from the Database
    Pages : 703-705
    MD.Khasim Pasha, C.Malathy
    Abstract | PDFPDF
    157. The Design of N bit Quantization Sigma-Delta Analog to Digital Converter
    Pages : 706-709
    J. Snehalatha
    Abstract | PDFPDF
    158. E-Government in Developed Countries, The Case of Turkey
    Pages : 710-714
    Recep Benzer
    Abstract | PDFPDF
    159. Generation of Electricity by Solar Using Programmable System on Chip
    Pages : 715-718
    Deshmukh P.R., Kolkure V.S.
    Abstract | PDFPDF
    160. Design of Single mode TE mode optical Polarizer Using Silicon Oxynitide multilayed waveguide
    Pages : 719-723
    Sparsh Pratik, Upendra Kumar, Rajat Butola
    Abstract | PDFPDF
    161. The Internet of Things- Where the Web and the Physical world will meet
    Pages : 724-727
    Vaishali Jain, Roopali Jain
    Abstract | PDFPDF
    162. Best-Fit Wavelength Assignment Algorithm For Persistent Communication in Optical Networks
    Pages : 728-733
    P.Sathishkumar, V.Mahalingam
    Abstract | PDFPDF
    163. Dynamic Server Provisioning Approach with Dynamic Content Application Server on Multitier
    Cluster over Heterogeneous Network

    Pages : 734-736
    Mahesh B. Shelke, Prof. R. A. Auti, Dr. S. S. Lomte
    Abstract | PDFPDF
    164. Energy Efficiency Communication Protocol With Mobility in Wireless Sensor Network: A Survey
    Pages : 737-740
    Manisha, Surya Prakesh Sharma
    Abstract | PDFPDF
    165. E-Governance in Rural India
    Pages : 741-744
    Nidhi Srivastava
    Abstract | PDFPDF
    166. Speed Alert System for GPS-enabled Smartphone’s with Android operating system
    Pages : 745-748
    Jameer G.Kotwal, Niraj S. Kalokhe, Amol V. Roundhal, Pravin Nakhate, Rahul D. Kembhavi
    Abstract | PDFPDF
    167. A Review on Byzantine Attack Detection and Prevention Using Game Theory
    Pages : 749-752
    Chetna Guntewar, Vaishali Sahare
    Abstract | PDFPDF
    168. A Personalized Method for Blacklisting Users and Implementing Filtered Walls in OSN
    Pages : 753-756
    Sai Sudha Gadde
    Abstract | PDFPDF
    169. Security Mechanism in Alumni Portal
    Pages :757-761
    Vikrant Pawar, Sagar Date, Suraj Iyer, Chhaya Narvekar.
    Abstract | PDFPDF
    170. Review of Neighbor Coverage Based Probabilistic Rebroadcast with Cryptographic Technique
    Pages :762-764
    Nishakumari Ashokkumar Lodha, Dipali Sakharam Patil
    Abstract | PDFPDF
    171. RA Study on Approximation Algorithms for Constructing Rectilinear Steiner Trees
    Pages :765-769
    Latha N.R.
    Abstract | PDFPDF
    172. Survey on different types of Security Threats on Wireless Sensor Networks
    Pages :770-774
    Genita Gautam, Biswaraj Sen
    Abstract | PDFPDF
    173. A Novel Framework for Biometric Authentication Using Segmentation of Iris Detection
    Pages :775-777
    Harshada S. Terkhedkar, Preeti Topannavar
    Abstract | PDFPDF
    174. Prioritization of Re-Executable Test Cases in Model Based Environment- A Survey
    Pages :778-780
    Komal Jadhav, Sharmila Shinde
    Abstract | PDFPDF
    175. Article Removed
    Pages :xxx-xxx
    XXXXX
    Abstract | PDFPDF
    176. A Review on Health Assistant: Android Application for Fitness Support using Body Sensor Network
    Pages :785-787
    Khairnar Asha , Shinde Karishma, Prof.Swati Khokale
    Abstract | PDFPDF
    177. SPRAM: Selective Pheromone Removal Based Routing Algorithm for Manet’s
    Pages :788-792
    Muneesh Vishnoi, Prajna Krishnan
    Abstract | PDFPDF
    178. Survey on Geographical Routing Protocols in Network-Centric Warfare Paradigm
    Pages :793-795
    Anand M
    Abstract | PDFPDF
    179. Securely Sharing Of Data with Others in Cloud Storage Using Public–Key Cryptosystem
    Pages :796-800
    R.S.Bhalerao, S.M.Rokade
    Abstract | PDFPDF
    180. Public Key Cryptosystem for Scalable Data Sharing In Cloud Storage
    Pages :801-804
    R.S.Bhalerao, S.M.Rokade
    Abstract | PDFPDF
    181. User Future Request Prediction
    Pages :805-809
    Rujuta Panvalkar, Namrata Valera, Ami Vashi, Khushali Deulkar
    Abstract | PDFPDF
    182. Evaluation of PCA and LDA techniques for Face recognition using ORL face database
    Pages :810-813
    M.Saraswathi, Dr. S. Sivakumari
    Abstract | PDFPDF
    183. e Store for Cloud Services
    Pages :814-817
    Asha N, Jabed Al Hassan
    Abstract | PDFPDF
    184. Data Compression Techniques for Wireless Sensor Network
    Pages :818-821
    Shahina Sheikh, Ms. Hemlata Dakhore
    Abstract | PDFPDF
    185. Enhanced Adaptive Routing With Transmission Success Probability in Wireless Mesh Networks
    Pages :822-825
    Swetha. D, Wilson Thomas
    Abstract | PDFPDF
    186. Dynamic Multi-Keyword Ranked Searchable Security Algorithm Using CRSA and B-Tree
    Pages :826-832
    Prasanna B T, C B Akki
    Abstract | PDFPDF
    187. Digital Watermarking-Revisit
    Pages :833-838
    Anita Chauhan
    Abstract | PDFPDF
    188. Efficient and Secure Scheme for Distributed Data Storage Systems
    Pages :839-843
    Y.Vijaya Ratna Kumari, T. Bindu Madhavi, L.Ravi Kumar
    Abstract | PDFPDF
    189. Localization Techniques in Wireless Sensor Networks
    Pages :844-850
    Shweta Singh, Ravi Shakya, Yaduvir Singh
    Abstract | PDFPDF
    190. MSL Based Concurrent and Efficient Priority Queue
    Pages :851-857
    Ranjeet Kaur, Dr. Pushpa Rani Suri
    Abstract | PDFPDF
    191. KNN Query Processing 0f Secured Multi Data Owner Using Voronoi Diagram
    Pages :858-862
    Jemi Florence, Kanya Devi J
    Abstract | PDFPDF
    192. Survey on Calculation of Mutual Impedance of Plannar Dipole Array Using Method of Moment
    Pages :863-865
    Tamajit Nag, Dr. Amlan Datta
    Abstract | PDFPDF
    193. An Analytical Survey of Power Consumption and Modeling in Different Areas of ICT Networks
    Pages :866-870
    Payel Giri, Sudhansu Sekhar Singh
    Abstract | PDFPDF
    194. Effective Lossless Authentication in Video for Data Embedding Application
    Pages :871-874
    Prof .Deepali S.Chavan
    Abstract | PDFPDF
    195. The Major Symptoms that Determine Video Game Addiction Case Study: Jordanian Universities Students
    Pages :875-879
    Rawan Abulail
    Abstract | PDFPDF
    196. Protecting User Privacy By Using Decentralized Key-Policy Attribute-Based Encryption
    Pages :880-888
    Kishor B.Badade, Dr.S.S.Lomte, R.A.Auti
    Abstract | PDFPDF
    197. Different Image Fusion Techniques and Parameters: A Review
    Pages :889-892
    Priya D. Vora, Neeta Chudasama
    Abstract | PDFPDF
    198. Role of Digital Signature in Network Security and Cryptography
    Pages :893-895
    Kishor B.Badade, Dr.S.S.Lomte, R.A.Auti
    Abstract | PDFPDF
    199. Classification and Adaptive Novel Class of Botnet Detection
    Pages :896-899
    Nijhandhan.M, Narmadha.R.P
    Abstract | PDFPDF
    200. Integrity Verification in Multi-Cloud Storage by Efficient Cooperative Provable Data Possession
    Pages :900-903
    Kishor B.Badade, Dr.S.S.Lomte, R.A.Auti
    Abstract | PDFPDF
    201. To Build and Develop Client Performance profiles Repeatedly
    Pages :904-907
    K. Khadar Valli
    Abstract | PDFPDF
    202. Segmenting the Contour on a Robust Way in Interactive Image Segmentation Using Region and Boundary Term
    Pages :908-912
    A.Raja Ravi Sekar, P.Ilanchezhian
    Abstract | PDFPDF
    203. Region Based Data Hiding For High Payload
    Pages :913-919
    Shreela Dash, Mamatarani Das, Kartik Chandra Jena
    Abstract | PDFPDF
    204. Security Issues in Wireless Sensor Networks – An Overview
    Pages :920-924
    Sujesh P. Lal, Dr. Joe prathap P M
    Abstract | PDFPDF
    205. An Efficient Centralized Clustering approach for Wireless Sensor Networks
    Pages :925-930
    M.Srinivasa Rao and K.Durga Bhavani
    Abstract | PDFPDF
       
    -All rights are reserved by International Journal of Computer Science and Information Technologies-