1. |
Talent Management in Organizations Using
Mining Techniques
Pages : 1-5
Manogna.N, Sumedha Mehta
Abstract | PDF |
2. |
Survey Paper On Modoc: Multi Owner Data Sharing Over Cloud
Pages : 6-9
Shobha D. Patil, S. B. Sonkamble
Abstract | PDF |
3. |
Survey on Secure Public Auditing and Privacy Preserving in Cloud
Pages : 10-13
Madhumati B.Shinde, S. B. Sonkamble
Abstract | PDF |
4. |
Quantum Cryptography
Pages : 14-17
Lavannya Varghese , Raisa Varghese, Vince Paul, Sankaranarayanan P N
Abstract | PDF |
5. |
Securing MANETs using Cluster-based Certificate Revocation Method: An Overview
Pages : 18-22
Dipti S. Sawant, J. E. Kamalasekaran
Abstract | PDF |
6. |
Centralizing Cloud Security by Audit Management Using MASM
Pages : 23-26
Kalangi Naga Mallika, Vemula Rajiv Jetson
Abstract | PDF |
7. |
Multimodal Finger Biometric Score Fusion Verification Using Coarse Grained Distribution
Function
Pages :27-33
J.Stanly Jayaprakash, Dr.S.Arumugam
Abstract | PDF |
8. |
Enhancement of the Face Recognition Using Gabor Filter
Pages : 34-36
Rahul Nayak, Dr.Rajesh Pathak, Ajay Kumar
Abstract | PDF |
9. |
Intrusion Determent using Dempster-Shafer Theory in MANET Routing
Pages : 37-41
Karuturi.Satish, K. Ramesh
Abstract | PDF |
10. |
An Adaptive MRI Tumor Detection Using Neural Network Based Adaboost Algorithm
Pages : 42-47
V.Trinadh babu, Sk.Salma begum
Abstract | PDF |
11. |
Semantic Web Technology and Ontology designing for e-Learning Environments
Pages : 48-51
Shaileshkumar K. Patel, Dr. Harshad B. Bhadka
Abstract | PDF |
12. |
A New Approach to Partial Face Recognition
Pages : 52-56
Amit V. Manapure, Nitin Mishra
Abstract | PDF |
13. |
An Improved Framework for Tamper Detection in Databases
Pages :57-60
Manisha K. Kambire, Pooja H. Gaikwad,Sujata Y. Gadilkar,Yogesh A. Funde
Abstract | PDF |
14. |
The Blue Brain Technology Using Wetware Technology and Fuzzy Logic
Pages : 61-68
Remya Vinayakumar, Deepthi Varghese, Vince Paul
Abstract | PDF |
15. |
Top 5 Proven Strategies to Boost PPM Software Adoption
Pages : 69-70
Rajeshwar Vayyavur
Abstract | PDF |
16. |
Practical Outsourcing of Linear Programming in Secured Cloud Computing
Pages : 71-73
Lochan .B
Abstract | PDF |
17. |
Survey of Fingerprint Matching Techniques for Privacy Protection Pages :74-80
Anjali Rajak, Dr.Asif Ullah Khan, Asst Prof.Surendra Dubey, Dr.Bhupesh Gour
Abstract | PDF |
18. |
A Survey on Energy Efficient Routing Protocol for Wireless Sensor Networks
Pages : 81-83
Pallavi S. Katkar, Prof. (Dr.) Vijay R. Ghorpade
Abstract | PDF |
19. |
An Autoconfigurated Hybrid Honeypot for Improving Security in Computer Systems
Pages : 84-88
Shyamasundar L B
Abstract | PDF |
20. |
A Review of Secure Authorized Deduplication with Encrypted Data for Hybrid Cloud Storage
Pages :89-91
Bhavanashri Shivaji Raut, Prof. H. A. Hingoliwala
Abstract | PDF |
21. |
A Review of Image Processing for Pomegranate Disease Detection
Pages : 92-94
Manisha A. Bhange, Prof. H. A. Hingoliwala
Abstract | PDF |
22. |
Prominence of Spatial Database in Geographical Information Systems
Pages : 95-98
T.Aruna Sri
Abstract | PDF |
23. |
Preserving Privacy of Public Clouds through Access Control Mechanisms: A Review
Pages : 99-100
S Aparna, Devi Dath
Abstract | PDF |
24. |
A Review on Different Routing Protocols in
MANETS
Pages : 101-104
Navjot Kaur, Dr. Tanupreet Singh
Abstract | PDF |
25. |
Enchanced of Network Security Using Simplified Encryption Standard (SES)
Pages : 105-111
K. Bommi Mayuri, E.Rajalakshmi
Abstract | PDF |
26. |
Scheduling of Parallel Applications Using Map Reduce On Cloud: A Literature Survey
Pages : 112-115
A.Sree Lakshmi, Dr.M.BalRaju, Dr.N.Subhash Chandra
Abstract | PDF |
27. |
Review Paper on Technologies used for Interactive Image Segmentation
Pages : 116-120
Vrushali Mendhule, Gaurav Soni, Rajesh Nigam
Abstract | PDF |
28. |
Feature Selection Technique Applied with Many Data Mining Based Model
Pages : 121-126
Pratibha Soni, Prabhakar Sharma
Abstract | PDF |
29. |
Big Data Processing Using Hadoop MapReduce Programming Model
Pages : 127-132
Anumol Johnson, Havinash P.H, Vince Paul, Sankaranarayanan P.N
Abstract | PDF |
30. |
A Review on Image Enhancement using Artificial Neural Network and Fuzzy Logic
Pages : 133-136
Shweta K. Narnaware, Roshni Khedgaonkar
Abstract | PDF |
31. |
Review of Perceptual Resemblance of Local Plastic Surgery Facial Images using Near Sets
Pages : 137-140
Prachi V.Wagde, Roshni Khedgaonkar
Abstract | PDF |
32. |
Enactment of Medium and Small Scale Enterprise ETL(MaSSEETL)-an Open Source Tool
Pages : 141-147
Rupali Gill, Jaiteg Singh
Abstract | PDF |
33. |
CAPCHA as Graphical Password
Pages : 148-151
Magniya Davis, Divya R, Vince Paul, Sankaranarayanan P N
Abstract | PDF |
34. |
Video Copy Detection Using F-Sift and Graph Based Video Sequence Matching
Pages : 152-158
Anju P S, Soumya Varma, Vince Paul, Sankaranarayanan P N
Abstract | PDF |
35. |
Integration of Wireless Sensor Networks and Mobile Cloud- a Survey
Pages :159-163
Sukanya C.M, Priya K.V, Vince Paul, Sankaranarayanan P.N
Abstract | PDF |
36. |
Different Digital Watermarking Techniques for Secure Data Transmission
Pages : 164-167
Evline.J.Alappatt, JsamyDavies, Vince Paul, Sankaranarayanan P.N
Abstract | PDF |
37. |
Software Development Life Cycle Models- Comparison, Consequences
Pages : 168-171
Vanshika Rastogi
Abstract | PDF |
38. |
Brain Tumor Detection and Classification Using Histogram Thresholding and ANN
Pages : 172-175
Swathi P S, Deepa Devassy, Vince Paul, Sankaranarayanan P N
Abstract | PDF |
39. |
A New Scalable Hybrid Routing Protocol for VANETs
Pages : 176-180
Soumya Xavier, Anto Jacob, Vince Paul, Sankaranarayanan P.N
Abstract | PDF |
40. |
Heuristic Approach for Document Clustering in Forensic Analysis
Pages : 181-184
Tushar Thopte, Yogesh Indani, Murlidhar Jangale,Sharad Gaikwad
Abstract | PDF |
41. |
A Survey : Spectral Clustering Applications and its Enhancements
Pages : 185-189
S.V.Suryanarayana, Dr.G.Venkateswara Rao, Dr. G.Veereswara Swamy
Abstract | PDF |
42. |
Quantifying Response Mechanism for
Effectiveness of Hybrid Virus Propagation through BT and SMS Channel-A Review
Pages : 190-193
Harsha Kubade, Deepali Khatwar
Abstract | PDF |
43. |
Survey of Scalable String Similarity Joins
Pages : 194-197
Khalid F. Alfatmi, Archana S. Vaidya
Abstract | PDF |
44. |
A Novel methodology for Searching Dimension
Incomplete Database
Pages : 201-204
Kalbhor Swati, Gupta Shyam
Abstract | PDF |
45. |
Web Usage mining for Predicting User Access Behaviour
Pages : 181-184
Amit Dipchandji Kasliwal, Dr. Girish S. Katkar
Abstract | PDF |
46. |
A Methodology for the Usage of Side Data in Content Mining
Pages : 205-212
Vishal Vitthal Bandgar, Priyanka S. Muttur, Amol Ulhas Kuntham, G.A.Fattepurkar
Abstract | PDF |
47. |
Survey on Supervised Classification using Self Organising Maps
Pages : 213-217
Nupur Choudhury, Rupesh Mandal
Abstract | PDF |
48. |
Survey on – Self Adaptive Focused Crawler
Pages : 218-220
Pallavi Wadibhasme, Prof. Nitin Shivale
Abstract | PDF |
49. |
An Evolutionary and Empirical Review on Cloud Computing in Mobile Applications
Pages : 221-223
Rajeshwar Vayyavur
Abstract | PDF |
50. |
Implementation of RSA RC5 Algorithm in Cloud
Pages : 224-227
Pallavi Pandey, Priyanka Dhasal, Rakesh Pandit
Abstract | PDF |
51. |
Fingerprint Compression based on Sparse Representation: A Review
Pages : 228-231
Naja M I, Afzal A L
Abstract | PDF |
52. |
MANCAF: A Framework for Building Collaborative Applications in Mobile Ad Hoc
Networks
Pages : 232-236
Hardik S. Mehta, Dr. Dhaval R. Kathiriya
Abstract | PDF |
53. |
Steganography Method Hiding Data in Video
Pages : 237-239
Roshani Patidar, Kamlesh Patidar
Abstract | PDF |
54. |
Object Scanning based Road Obstacles Detection using Weighted Sum Method-A Review
Pages : 240-242
Neha Chalana, Lovnish Bansal
Abstract | PDF |
55. |
Content Based Image Retrieval: Integration of Neural Networks Using Speed-Up Robust Feature and SVM
Pages : 243-248
Sukhmanjeet Kaur, Prince Verma
Abstract | PDF |
56. |
Hybrid Approach for Image Classification using SVM Classifier and SURF Descriptor
Pages : 249-251
Parul Prashar, Harish Kundra
Abstract | PDF |
57. |
Non-Dominated Sorting Genetic Algorithm-II – A Succinct Survey
Pages : 252-255
Ankita Golchha, Shahana Gajala Qureshi
Abstract | PDF |
58. |
Enhanced NSGA-II Algorithm for Solving Multiobjective Optimization Problems Using PBX
Crossover and POM Mutation.
Pages : 256-261
Ankita Golchha, Shahana Gajala Qureshi
Abstract | PDF |
59. |
Prediction with V&V and Fault-Tolerance Strategies for Mandelbugs
Pages : 262-264
Pooja Maltare,Vishal Sharma
Abstract | PDF |
60. |
Efficient String Matching Using Bit Parallelism
Pages : 265-269
Kapil Kumar Soni, Rohit Vyas, Dr. Vivek Sharma
Abstract | PDF |
61. |
Drowsy Driver Identification Using Eye Blink detection
Pages : 270-274
Raees Ahmad, Prof. J.N. Borole
Abstract | PDF |
62. |
Recommendation System for Music File
Pages : 275-277
Tuhina Sultana, Nikita Sharma, Sunil Aher, Nikhil Pate and Mayura Kinikar
Abstract | PDF |
63. |
Information Hiding using Image Embedding in QR Codes for Color Images: A Review
Pages : 278-283
Akshara Gaikwad, K.R.Singh
Abstract | PDF |
64. |
A Technical Analysis of Image Stitching Algorithm
Pages : 284-288
Pranoti Kale, K.R.Singh
Abstract | PDF |
65. |
Recent Developments in Indian Sign Language Recognition: An Analysis
Pages : 289-293
Daleesha M Viswanathan, Sumam Mary Idicula
Abstract | PDF |
66. |
A Novel and Light Weight Defence Mechanism for Securing Wireless Networks
Pages : 294-297
Prajnya Priyadarsini Satapathy, Debi Prasad Mishra, Deepesh Kumar Singh
Abstract | PDF |
67. |
Handwritten Marathi Vowels Recognition using Correlation Coefficient
Pages : 298-301
Parshuram M. Kambale, Balasaheb J. Kshirsagar
Abstract | PDF |
68. |
Effect of Varying Embedding Energy and Energy wise Sorting on Watermarking using Wavelet
Transforms of Orthogonal Transforms DCT, Walsh
and Haar
Pages : 302-313
Dr. H. B. Kekre, Dr. Tanuja Sarode, Shachi Natu
Abstract | PDF |
69. |
Mining for Faintly Labeled Web Facial Images By Using Face Annotation
Pages : 314-316 Pranjal N. Chopade, Sonali M. Rahinj, Gauri G. Shelar , R.B.Kagade
Abstract | PDF |
70. |
Energy and Power Aware Stable Routing Strategy for Ad hoc Wireless Networks based on DSR
Pages : 317-321
Nirav Bhatt, Dr. Dhaval Kathiriya
Abstract | PDF |
71. |
Enhanced Clustering Technique to Improve the Network Lifetime for Wireless Sensor Network
Pages : 322-325
J.Surekha, T.Tamizharasi
Abstract | PDF |
72. |
A Survey on Software Project Planning and Control Using Case Tools
Pages : 326-331
NadanaSundaram P V, Dr.K.Iyakutti
Abstract | PDF |
73. |
Article Removed
Pages : xxx-xxx
xxx, xxx
Abstract | PDF |
74. |
Modular System for Mitigating Flood Attacks
Pages : 345-349
Devisha Srivastava
Abstract | PDF |
75. |
Overview of Modern Cryptography
Pages : 350-353
M.Kundalakesi, Sharmathi.R, Akshaya.R
Abstract | PDF |
76. |
Web Usage Mining Using Apriori and FP Growth Alogrithm
Pages : 354-357
Aanum Shaikh
Abstract | PDF |
77. |
Secure and Efficient Data Transfer for Hierarchical Based Wireless Sensor Network
Pages : 358-360
Akshada Deokar, Deepali Borade, B.A.Tidke
Abstract | PDF |
78. |
Designing Secured Incremental Backup System for Cloud
Pages : 361-364
Shyamsunder Ingle , Rajesh Kulkarni
Abstract | PDF |
79. |
The Data Recovery File System for Hadoop Cluster -Review Paper
Pages : 365-367
V. S. Karwande, Dr. S. S.Lomte, Prof. R. A. Auti
Abstract | PDF |
80. |
Context Aware Service Information Extraction from Bigdata
Pages : 368-373
G.Suvarna, S. Murali Krishna
Abstract | PDF |
81. |
Recognition of Face Using Neural Network
Pages : 374-376
Nisha Vasudeva , Vivek kumar Sharma , Vikas Mishra
Abstract | PDF |
82. |
A Comparative Analysis & Survey of various Feature Extraction Techniques
Pages : 377-379
Kapil Kumar Pachouri, Atul Barve
Abstract | PDF |
83. |
Performance Analysis and Optimization of Supervised Learning Techniques for Medical
Diagnosis Using Open Source Tools
Pages : 380-383
Vidyullatha Pellakuri, Deepthi Gurram, Dr.D. Rajeswara Rao, Dr.M.R.Narasinga Rao
Abstract | PDF |
84. |
Basic Tree Terminologies, their Representation and Applications
Pages : 384-387
Ramesh M. Patelia, Shilpan D. Vyas, Parina S. Vyas, Nayan Patel
Abstract | PDF |
85. |
Annotation Based Web Databases Search Technique
Pages : 388-391
Boraste Jagruti Balkrishna, Swati.K.Bhavsar
Abstract | PDF |
86. |
Robust Watermarking Using Secret Key Encryption by Embedding Noise in JPEG Image
Pages : 392-394
P.B.Ranbhare,.S.Kavitha
Abstract | PDF |
87. |
Android Based Wireless PC Controller
Pages : 395-398
Mahesh Deshmukh , Damini Jawale , Shruti Joshi, P.S. Kulkarni
Abstract | PDF |
88. |
Trustworthy and Energy-Saving Measures in Wireless Sensor Networks by using Multipath
Routing
Pages : 399-403
Arun Kumar. S
Abstract | PDF |
89. |
Simple and Efficient Secret Sharing Schemes for Sharing Data and Image
Pages : 404-409
Binu V P, Sreekumar A
Abstract | PDF |
90. |
Efficient Voting system with (2,2) Secret Sharing Based Authentication
Pages : 410-412
Ashwini Walake, Pallavi Chavan
Abstract | PDF |
91. |
A Survey of Personalized Recommendation System with User Interest in Social Network
Pages : 413-415
Anil Rathod, Indiramma M
Abstract | PDF |
92. |
Verifications of Network Protocol Implementations - A Review
Pages : 416-418
Saleema D, Bejoy Abraham
Abstract | PDF |
93. |
A Survey on Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud
Pages : 419-422
Gauri Thorat, S.R.Todmal
Abstract | PDF |
94. |
Performance Analysis of New Conversion Tool from Relational Datasets to XML Datasets on Selected Websites
Pages :423-430
B. Hemanth Kumar, M. Surendra Prasad Babu
Abstract | PDF |
95. |
A Review on Semantic Web Mining
Pages : 431-433
Amruta Arun Joshi, Vrishali A. Chakkarwar
Abstract | PDF |
96. |
Efficient Keyword Query Routing for Search Engines
Pages : 434-437
Pawar Prajakta Bhagwat, Niranjan L. Bhale
Abstract | PDF |
97. |
Synthesis of Speech & Speaker Recognition Using Data Driven Approach
Pages : 438-442
Leela Kumari , Rahul Guha , Geetika Gera
Abstract | PDF |
98. |
Big Data Processing Using Hadoop
Pages : 443-445
R.A.Fadnavis, Samrudhi Tabhane
Abstract | PDF |
99. |
A Nobel Approach of Providing Confidentiality over Text Data with High PSNR Value
Pages : 446-450
Harsh Deepak Shrivastava, Sushil Tiwari, Sriram Yadav
Abstract | PDF |
100. |
MDT-Auction: A New Approach for Decision Making to map the best cloud provider to best cloud user
Pages : 451-454
Ninad Shinde, J. Ratnaraj Kumar
Abstract | PDF |
101. |
Study of Data Mining in Higher Education-A Review
Pages : 455-458
Khushbu N.Shah, Misika R. Patel, Neha V. Trivedi, Priyanka N. Gadariya, Richa H. Shah, Ms. Nehal Adhvaryu
Abstract | PDF |
102. |
Data Replication & Caching in Data Grid :A Review
Pages : 459-462
Rajshri S. Patil, Prof.L.K.Gautam
Abstract | PDF |
103. |
Ranking Through Vector Machine-Domain Specific Search
Pages : 463-466
C. Palguna Reddy, D. Kasi Viswanath
Abstract | PDF |
104. |
Load Degree Calculation for the Public Cloud based on Cloud Partitioning Model using
Turnaround Time
Pages : 467-469
Priti Singh, Pankaj Sharma
Abstract | PDF |
105. |
Applications of Elliptic Curve Cryptography
Pages : 470-472
Chetan S. Pagar, Manisha M. Naoghare, Yogita S. Pagar
Abstract | PDF |
106. |
An Epistemological Text Mining Method by Generating D-Matrix for Unstructured Text
Pages : 473-475
Ninad Shinde, J. Ratnaraj Kumar
Abstract | PDF |
107. |
Reviewing Information Systems Usage and Performance Models
Pages : 476-484
Francis B. Osang , Nchise Abinwi, Clive Tsuma
Abstract | PDF |
108. |
Bio-Inspired Scheduling of High Performance Computing Applications in Cloud: A Review
Pages : 485-487
Delsy Jyothi, Anoop S
Abstract | PDF |
109. |
An Automated Sequence Model Testing (ASMT) For Improved Test Case Generation Using Cloud
Integration
Pages : 488-494
Priya Purohit, Yunus Khan
Abstract | PDF |
110. |
A Critical Analysis of Some Symmetric Key Block Cipher Algorithms
Pages : 495-499
Sunil Mankotia and Manu Sood
Abstract | PDF |
111. |
Load Balanced Data Aggregation Methods for Virtual Backbone in Wireless Sensor Networks
Pages :500-502
Miss.Vrishali Popat Wagaj , Prof.Vinayak V.Pottigar, Prof.Prakash R.Gadekar
Abstract | PDF |
112. |
Model-Based Data Collection in Wireless Sensor Networks
Pages : 503-509
Geeta Gupta, Vinod Khandelwal, Vikas Gupta
Abstract | PDF |
113. |
Crime Area Detection and Criminal Data Record
Pages : 510-513
Aanchal Dabhere, Aniruddha Kulkarni, Ketaki Kumbharkar , Vrushali Chhajed,Sneha Tirth
Abstract | PDF |
114. |
Hybrid Method for Image Segmentation
Pages : 514-518
Barkha Bhansali, Sonam Tiwari, Savita Agrawal
Abstract | PDF |
115. |
Review of Graph Algorithms on GPU using CUDA Architecture
Pages : 519-521
Trupti R. Desale
Abstract | PDF |
116. |
Big Data Analytics: Hadoop-Map Reduce& NoSQL Databases
Pages : 522-527
Abinav Pothuganti
Abstract | PDF |
117. |
Admitive Data Aggregation in WSN
Pages : 528-530
Gaurav Tiwari and Archana Khandekar
Abstract | PDF |
118. |
An Evaluation of IP-Based Fast Rerouting Techniques
Pages : 531-533
Bhanu Vardhan, D. Satyanarayana, Uma Sista
Abstract | PDF |
119. |
Finger Sleeve: A Wearable Navigation Device
Pages : 534-538
Hemant Bhaskar Surale
Abstract | PDF |
120. |
Criminal Detection Using Eigenfaces Approach on Android Device
Pages : 539-541
Viraj, Pradip More, Pankaj Thombre , Shweta Malvi
Abstract | PDF |
121. |
Operating System Used in Cloud Computing
Pages : 542-544
Noopur Bardhan, Pooja Singh
Abstract | PDF |
122. |
Efficient Backingup Data for Migrating Cloud to Cloud
Pages : 545-549
PS.Vijayabaskaran, U.Prabu, R.Sriram
Abstract | PDF |
123. |
Combination of Neuro Fuzzy Techniques Give Better Performance over Individual Techniques of
Soft Computing
Pages : 550-553
Shweta Katke, Madhavi Pawar, Trupti Kadam , Sudhanshu Gonge
Abstract | PDF |
124. |
Load Balancing In Multistage Packet Switches
Pages : 554-557
Jadhav Mahadeo , Dhage Anand , Navgire Narsingh, Patil Rohini ., Prof. Sirdeshpande S. A.
Abstract | PDF |
125. |
Fault Routing Node Detection Using DUAL in Wireless Sensor Networks
Pages : 558-563
B.Vijay Kumar, G. Hemanth Kumar Yadav
Abstract | PDF |
126. |
A Novel Fuzzy Image Enhancement using S-Shaped Membership Function
Pages : 564-569
Pushpa Devi Patel, Prof. Vijay Kumar Trivedi, Dr. Sadhna Mishra
Abstract | PDF |
127. |
Protecting Frequent Patterns using Distributed Security on M-Clouds
Pages : 570-576
K.H.Shabbeer Basha, E .Madhusudhana Reddy
Abstract | PDF |
128. |
Automated Identification of Substituted Words in Text
Pages : 577-579
Amit Kulkarni, Mayur Patil, Nitish Mali, Rajesh Kharche Prof. Mrs. G.S.Navale.
Abstract | PDF |
129. |
Modeling and Simulation of a Wireless Body Area Network for Monitoring Sick Patient Remotely
Pages : 580-585
Anas Bouayad, Nour El Houda Chaoui, Mohammed El Ghazi, Moulhim El Bekkali
Abstract | PDF |
130. |
Hadoop Cluster on Linode Using Ambari for Improving Task Assignment Scheme Running in
the Clouds
Pages : 586-589
Minthu Ram Chiary, R. Anand
Abstract | PDF |
131. |
Unique Decision Making Process For Seamless Communication After Disaster
Pages : 590-593
R.Adline Freeda, R.N Sharmila
Abstract | PDF |
132. |
Survey on Efficient Framework for Aggregate Key Management in Cloud
Pages : 594-596
Shrikant D. Jadhav, Jaising Jadhav, Vaishali Khaire, Pratiksha Giakwad, Sandeep Gore
Abstract | PDF |
133. |
Security Analysis Using IDs Based on Mobile Agents and Data Mining Algorithms
Pages : 597-602
Chaimae Saadi, Habiba Chaoui Mejhed, Hassan Erguig
Abstract | PDF |
134. |
Survey: Routing Protocols in Cognitive Radio Mesh Networks
Pages : 603-608
T. Pavan Kumar, E. Suresh babu, B. Venkata Ramana, B. Sai Shashank
Abstract | PDF |
135. |
Ant Colony Optimization Based Routing to Improve QoS in MANETs
Pages : 609-613
Swapna Priya Jaladi
Abstract | PDF |
136. |
Survey on Real Time Broadcast Authentication Schemes for Command and Control Messages
Pages : 614-618
Sonia Thomas, Elisabeth Thomas
Abstract | PDF |
137. |
FixDec: Fixed Spherical n Points Density-Based Clustering Technique for Cloth Simulation
Pages : 619-625
Nur Saadah Mohd Shapri, Riza Sulaiman, Abdullah Bade
Abstract | PDF |
138. |
Article Removed
Pages : xxx-xxx
xxxxxxxx
Abstract | PDF |
139. |
Objective of Keystroke Dynamics for Identifying Emotional State
Pages : 632-636
Shivshankar Rajput and Priyanka Vijayavargiya
Abstract | PDF |
140. |
An Intelligent Heart Disease Prediction System Using K-Means Clustering and Naïve Bayes Algorithm
Pages : 637-639
Rucha Shinde, Sandhya Arjun, Priyanka Patil, Prof. Jaishree Waghmare
Abstract | PDF |
141. |
Outsourced Security Policy Updates Through Role Hierarchies for Security and Isolation in Cloud
Computing
Pages : 640-646
Aditi Vyas, Prof. Hemant Kumar Pathak
Abstract | PDF |
142. |
A New Approach for Improving Computer Inspections by Using Fuzzy Methods for Forensic
Data Analysis
Pages : 647-651
P. Jyothi, Dr S. Murali Krishna
Abstract | PDF |
143. |
Ensuring Distributed Accountability for Data Sharing in Cloud Using AES and SHA
Pages : 652-657
Vikas Vitthal Lonare, Prof.J.N.Nandimath
Abstract | PDF |
144. |
A Review of Trust Model in Delay Tolerant Network
Pages : 658-660
Ashwini Borkar
Abstract | PDF |
145. |
Fuzzy Logic Based Texture, Queries for Image Retrieval System: An Analysis
Pages : 661-663
Avdhesh Kumar Tiwari, Akash Awasthi
Abstract | PDF |
146. |
A Comparitive Study of: Quality Assessment of Object Oriented Software at Design Level
Pages : 664-666
Aarti Rathour, Akash Awasthi,Shubhendra Singh
Abstract | PDF |
147. |
Article Removed
Pages : 667-670
xxxxx
Abstract | PDF |
148. |
A Proposal to Enhance A-KNN Clustering Method
Pages : 671-673
Kamaljeet Kaur, Satwinder Singh
Abstract | PDF |
149. |
Analysis of Hybrid GPSR and Location Based Routing Protocol in VANET
Pages : 674-677
Neha, Isha
Abstract | PDF |
150. |
Analysis of Enhanced Request Response Detection Algorithm for Denial of Service attack in VANET:
A Review
Pages : 678-681
Deepali., Isha
Abstract | PDF |
151. |
A Study on Intrusion Detection in Mobile Ad Hoc Networks
Pages : 682-684
R.Amutha, M.Savithri
Abstract | PDF |
152. |
A Study and literature Review on Image Steganography
Pages :685-688
Parmar Ajit Kumar Maganbhai, Prof. Krishna Chouhan
Abstract | PDF |
153. |
Simulation of Urban Area through Opus : Open Platform for Urban Simulation
Pages : 689-693
Nilesh Shingne, Deepa Ramteke, Sagarkumar Meshram
Abstract | PDF |
154. |
A Hybrid Technique for Medical Image Denoising using NN, Bilateral filter and LDA
Pages : 694-698
Rupinder Pal Singh, Varsha Varma, Pooja Chaudhary
Abstract | PDF |
155. |
Combinatorial approach for Text Classification Algorithm
Pages : 699-702
Namekar Shirish Manohar, Deipali V. Gore
Abstract | PDF |
156. |
A Survey on Techniques to Extract High- Quality Data from the Database
Pages : 703-705
MD.Khasim Pasha, C.Malathy
Abstract | PDF |
157. |
The Design of N bit Quantization Sigma-Delta Analog to Digital Converter
Pages : 706-709
J. Snehalatha
Abstract | PDF |
158. |
E-Government in Developed Countries, The Case of Turkey
Pages : 710-714
Recep Benzer
Abstract | PDF |
159. |
Generation of Electricity by Solar Using Programmable System on Chip
Pages : 715-718
Deshmukh P.R., Kolkure V.S.
Abstract | PDF |
160. |
Design of Single mode TE mode optical Polarizer Using Silicon Oxynitide multilayed
waveguide
Pages : 719-723
Sparsh Pratik, Upendra Kumar, Rajat Butola
Abstract | PDF |
161. |
The Internet of Things- Where the Web and the Physical world will meet
Pages : 724-727
Vaishali Jain, Roopali Jain
Abstract | PDF |
162. |
Best-Fit Wavelength Assignment Algorithm For Persistent Communication in Optical
Networks
Pages : 728-733
P.Sathishkumar, V.Mahalingam
Abstract | PDF |
163. |
Dynamic Server Provisioning Approach with Dynamic Content Application Server on Multitier
Cluster over Heterogeneous Network
Pages : 734-736
Mahesh B. Shelke, Prof. R. A. Auti, Dr. S. S. Lomte
Abstract | PDF |
164. |
Energy Efficiency Communication Protocol With Mobility in Wireless Sensor Network: A Survey
Pages : 737-740
Manisha, Surya Prakesh Sharma
Abstract | PDF |
165. |
E-Governance in Rural India
Pages : 741-744
Nidhi Srivastava
Abstract | PDF |
166. |
Speed Alert System for GPS-enabled Smartphone’s with Android operating system
Pages : 745-748
Jameer G.Kotwal, Niraj S. Kalokhe, Amol V. Roundhal, Pravin Nakhate, Rahul D. Kembhavi
Abstract | PDF |
167. |
A Review on Byzantine Attack Detection and Prevention Using Game Theory
Pages : 749-752
Chetna Guntewar, Vaishali Sahare
Abstract | PDF |
168. |
A Personalized Method for Blacklisting Users and Implementing Filtered Walls in OSN
Pages : 753-756
Sai Sudha Gadde
Abstract | PDF |
169. |
Security Mechanism in Alumni Portal
Pages :757-761
Vikrant Pawar, Sagar Date, Suraj Iyer, Chhaya Narvekar.
Abstract | PDF |
170. |
Review of Neighbor Coverage Based Probabilistic Rebroadcast with Cryptographic Technique
Pages :762-764
Nishakumari Ashokkumar Lodha, Dipali Sakharam Patil
Abstract | PDF |
171. |
RA Study on Approximation Algorithms for Constructing Rectilinear Steiner Trees
Pages :765-769
Latha N.R.
Abstract | PDF |
172. |
Survey on different types of Security Threats on Wireless Sensor Networks
Pages :770-774
Genita Gautam, Biswaraj Sen
Abstract | PDF |
173. |
A Novel Framework for Biometric Authentication Using Segmentation of Iris Detection
Pages :775-777
Harshada S. Terkhedkar, Preeti Topannavar
Abstract | PDF |
174. |
Prioritization of Re-Executable Test Cases in Model Based Environment- A Survey
Pages :778-780
Komal Jadhav, Sharmila Shinde
Abstract | PDF |
175. |
Article Removed
Pages :xxx-xxx
XXXXX
Abstract | PDF |
176. |
A Review on Health Assistant: Android Application for Fitness Support using Body Sensor Network
Pages :785-787
Khairnar Asha , Shinde Karishma, Prof.Swati Khokale
Abstract | PDF |
177. |
SPRAM: Selective Pheromone Removal Based Routing Algorithm for Manet’s
Pages :788-792
Muneesh Vishnoi, Prajna Krishnan
Abstract | PDF |
178. |
Survey on Geographical Routing Protocols in Network-Centric Warfare Paradigm
Pages :793-795
Anand M
Abstract | PDF |
179. |
Securely Sharing Of Data with Others in Cloud Storage Using Public–Key Cryptosystem
Pages :796-800
R.S.Bhalerao, S.M.Rokade
Abstract | PDF |
180. |
Public Key Cryptosystem for Scalable Data Sharing In Cloud Storage
Pages :801-804
R.S.Bhalerao, S.M.Rokade
Abstract | PDF |
181. |
User Future Request Prediction
Pages :805-809
Rujuta Panvalkar, Namrata Valera, Ami Vashi, Khushali Deulkar
Abstract | PDF |
182. |
Evaluation of PCA and LDA techniques for Face recognition using ORL face database
Pages :810-813
M.Saraswathi, Dr. S. Sivakumari
Abstract | PDF |
183. |
e Store for Cloud Services
Pages :814-817
Asha N, Jabed Al Hassan
Abstract | PDF |
184. |
Data Compression Techniques for Wireless Sensor Network
Pages :818-821
Shahina Sheikh, Ms. Hemlata Dakhore
Abstract | PDF |
185. |
Enhanced Adaptive Routing With Transmission Success Probability in Wireless Mesh Networks
Pages :822-825
Swetha. D, Wilson Thomas
Abstract | PDF |
186. |
Dynamic Multi-Keyword Ranked Searchable Security Algorithm Using CRSA and B-Tree
Pages :826-832
Prasanna B T, C B Akki
Abstract | PDF |
187. |
Digital Watermarking-Revisit
Pages :833-838
Anita Chauhan
Abstract | PDF |
188. |
Efficient and Secure Scheme for Distributed Data Storage Systems
Pages :839-843
Y.Vijaya Ratna Kumari, T. Bindu Madhavi, L.Ravi Kumar
Abstract | PDF |
189. |
Localization Techniques in Wireless Sensor Networks
Pages :844-850
Shweta Singh, Ravi Shakya, Yaduvir Singh
Abstract | PDF |
190. |
MSL Based Concurrent and Efficient Priority Queue
Pages :851-857
Ranjeet Kaur, Dr. Pushpa Rani Suri
Abstract | PDF |
191. |
KNN Query Processing 0f Secured Multi Data Owner Using Voronoi Diagram
Pages :858-862
Jemi Florence, Kanya Devi J
Abstract | PDF |
192. |
Survey on Calculation of Mutual Impedance of Plannar Dipole Array Using Method of Moment
Pages :863-865
Tamajit Nag, Dr. Amlan Datta
Abstract | PDF |
193. |
An Analytical Survey of Power Consumption and Modeling in Different Areas of ICT Networks
Pages :866-870
Payel Giri, Sudhansu Sekhar Singh
Abstract | PDF |
194. |
Effective Lossless Authentication in Video for Data Embedding Application
Pages :871-874
Prof .Deepali S.Chavan
Abstract | PDF |
195. |
The Major Symptoms that Determine Video Game Addiction Case Study: Jordanian Universities
Students
Pages :875-879
Rawan Abulail
Abstract | PDF |
196. |
Protecting User Privacy By Using Decentralized Key-Policy Attribute-Based Encryption
Pages :880-888
Kishor B.Badade, Dr.S.S.Lomte, R.A.Auti
Abstract | PDF |
197. |
Different Image Fusion Techniques and
Parameters: A Review
Pages :889-892
Priya D. Vora, Neeta Chudasama
Abstract | PDF |
198. |
Role of Digital Signature in Network Security and Cryptography
Pages :893-895
Kishor B.Badade, Dr.S.S.Lomte, R.A.Auti
Abstract | PDF |
199. |
Classification and Adaptive Novel Class of Botnet Detection
Pages :896-899
Nijhandhan.M, Narmadha.R.P
Abstract | PDF |
200. |
Integrity Verification in Multi-Cloud Storage by Efficient Cooperative Provable Data Possession
Pages :900-903
Kishor B.Badade, Dr.S.S.Lomte, R.A.Auti
Abstract | PDF |
201. |
To Build and Develop Client Performance profiles Repeatedly
Pages :904-907
K. Khadar Valli
Abstract | PDF |
202. |
Segmenting the Contour on a Robust Way in Interactive Image Segmentation Using Region
and Boundary Term
Pages :908-912
A.Raja Ravi Sekar, P.Ilanchezhian
Abstract | PDF |
203. |
Region Based Data Hiding For High Payload
Pages :913-919
Shreela Dash, Mamatarani Das, Kartik Chandra Jena
Abstract | PDF |
204. |
Security Issues in Wireless Sensor Networks – An Overview
Pages :920-924
Sujesh P. Lal, Dr. Joe prathap P M
Abstract | PDF |
205. |
An Efficient Centralized Clustering approach for Wireless Sensor Networks
Pages :925-930
M.Srinivasa Rao and K.Durga Bhavani
Abstract | PDF |
|
|