1. |
A Model for Detection of Application Layer Denial of Service Attacks using Group Testing
Theory
Pages : 931-935
Shazia Shafi, Sanjay Jamwal
Abstract | PDF |
2. |
HPIS: A Scalable Routing Protocol for WMN
Pages :936-940
Tapodhir Acharjee, Azhar Hussain Mozumder, Sudipta Roy
Abstract | PDF |
3. |
Attack Graph-Based Security Metrics and other Metrices for Producing Security to the Computer
Network
Pages : 941-943
Patil Priyanka Nagnath, Prakash B. Dhainje, Deshmukh Pradeep K.
Abstract | PDF |
4. |
Secure Key Establishment for Bundle Security Protocol of Space DTNs in Noninteractive manner
Pages : 944-946
Chaitali S.Jadhav, Prakash B. Dhainje, Deshmukh Pradeep K.
Abstract | PDF |
5. |
A Survey on Congestion Problem of MANET
Pages : 947-951
Ritu Jain, Bhawana Pillai
Abstract | PDF |
6. |
Automatic License Plate Based Smart Vehicle Validation &Security by Gate Control &Email
Send
Pages :952-957
Rinky Sharma
Abstract | PDF |
7. |
An Effective Personalization of User Search Behavior with Semantic Framework Algorithm
Pages :958-963
Dr.N.Sivakumar, S.Saranya
Abstract | PDF |
8. |
Improved Protein Function Classification Using Support Vector Machine
Pages : 964-968
Ravdeep Singh, Rajbir Singh, Dheeraj Pal Kaur
Abstract | PDF |
9. |
Providing Security And Privacy To Cloud Data Storage
Pages : 969-971
Yogesh V. Bhapkar, Rakesh S. Gaikwad, Milind R. Hegade
Abstract | PDF |
10. |
A Survey on Different Methods of Channel Estimation in a 3G Private Mobile Network Using
a Six Port Receiver
Pages : 972-974
Zeba Khan Rafi, E. Annadevi
Abstract | PDF |
11. |
Auto-Replication: Automated replication for Failover Clusters
Pages : 975-978
Swapnil Mirjolkar, Ankur Mourya,Vinay Karajagi, Dashrath Mane
Abstract | PDF |
12. |
Comparative Analysis of Programming Methodologies of Java, C and Assembly Language Programming
Pages : 979-989
Khandare Nikhil B
Abstract | PDF |
13. |
Optimum Patch Selection Using GA in Exemplar Based Image In-painting
Pages :990-997
Seema Kumari Singh , Prof J.V Shinde
Abstract | PDF |
14. |
Energy Efficient Self Adaptive on Demand Geographical Routing Protocols in MANET
Pages : 998-1001
Prachi Nikate, Prashant. Kumbharkar
Abstract | PDF |
15. |
A Correlative Study about Different Social
Networking Sites
Pages : 1002-1006
Raveendra Singh, Shashank Gupta
Abstract | PDF |
16. |
A Survey on Searching Techniques over Encrypted Data
Pages : 1007-1010
Archana D. Narudkar, Aparna A. Junnarkar
Abstract | PDF |
17. |
Article Removed
Pages : xxx-xxx
xxx, xxx
Abstract | PDF |
18. |
Sink Mobility for Data Collection in Wireless Sensor Network Life Cycle
Pages : 1015-1018
Dhivya.M,Divya.K,Keerthi.R, Kukatlapalli Pradeep Kumar
Abstract | PDF |
19. |
A Review on Wireless Nanosensor Networks Based on Electromagnetic Communication
Pages : 1019-1022
Vishranti Rupani, Sunera Kargathara, Jigisha Sureja
Abstract | PDF |
20. |
Energy Efficient Dynamic Threshold Based Load Balancing Technique in Cloud Computing
Environment
Pages : 1023-1026
Shivani Gupta, Damodar Tiwari, Shailendra Singh
Abstract | PDF |
21. |
LSB Steganography Using Android Phone
Pages : 1027-1029
Rajashri Ghare, Pruthvi Bansode, Sagar Bombale, Bilkis Chandargi
Abstract | PDF |
22. |
Region Based Algorithm Selection for Network Security
Pages : 1030-1032
V.Asaithambi, Dr.N.Rama
Abstract | PDF |
23. |
Cluster Head Selection Prediction in Wireless Sensor Networks
Pages : 1033-1035
Raveendra Singh, Shashank Gupta
Abstract | PDF |
24. |
License Plate Recognition for High Security Registration Plates: A Review
Pages : 1036-1039
Siddhartha Choubey, Anshuman Rai
Abstract | PDF |
25. |
Analysis and Detection of Heart Related Issues: A Proposed Algorithm
Pages : 1040-1043
Kumari Nirmala, R.M.Singh
Abstract | PDF |
26. |
Security Model to Detect and Avoid Wormhole Attack Using AODV Protocol
Pages : 1044-1049
Gulzar Ahmad Wani, Dr. Sanjay Jamwal
Abstract | PDF |
27. |
Review Paper on Using Procedural Content Generation & Difficulty Curves
Pages : 1050-1052
Paritosh Desai, Ninad Kulkarni, Suraj Jaiswal, Sachin Chauthe, Prof. Yogini Bazaz
Abstract | PDF |
28. |
Artery: A Data-Centric Architecture for Wireless Sensor Networks
Pages : 1053-1058
Javad mozafari, Abbas Mirzaei Somarin, Amin Mohajer
Abstract | PDF |
29. |
Model To Prevent Websites From XSS Vulnerabilities
Pages : 1059-1067
Tejinder Singh Mehta , Sanjay Jamwal
Abstract | PDF |
30. |
A Survey on Signature Verification Approaches
Pages : 1068-1072
Shailaja Dilip Pawar
Abstract | PDF |
31. |
Self Improvement of Cloud Operation Using Dynarep Algorithm and Skewness Algorithm
Pages : 1073-1075
M. Senthamarai, J. Sakunthala
Abstract | PDF |
32. |
A Survey on Visual Cryptography Techniques and their Applications
Pages : 1076-1079
Bhawna Shrivas, Shweta Yadav
Abstract | PDF |
33. |
Cryptographic Techniques, Threats and Privacy Challenges in Cloud Computing
Pages : 1080-1083
Jissy Ann George, Dr.M.Hemalatha
Abstract | PDF |
34. |
A Survey on Analysis of Data centre Performance and QOS in IaaS Cloud
Pages : 1084-1087
Karthik.M, Sharavana K
Abstract | PDF |
35. |
A Review on Video Streaming in Education
Pages : 1088-1091
Supriya Bhosale, Prof. Vinayak Pottigar, Prof. Vijaysinh Chavan
Abstract | PDF |
36. |
Preserving Public Auditing and Privacy Policy for Shared Data in the Cloud
Pages : 1092-1095
Krishna Kumar L, Deepa P Sivan
Abstract | PDF |
37. |
Denial of Service Attack and Classification Techniques for Attack Detection
Pages : 1096-1099
Prajakta Solankar, Prof. Subhash Pingale, Prof. Ranjeetsingh Parihar
Abstract | PDF |
38. |
Log Aggregator for Better Root-Cause-Analysis
Pages : 1100-1102
Anamika, Gayatri Bisht, Kanhaiya and Poonam
Abstract | PDF |
39. |
Performance Analysis of Classification Algorithms Using Healthcare Dataset
Pages : 1103-1106
D. Rajeswara rao, Vidyullata Pellakuri, SathishTallam, T. Ramya Harika
Abstract | PDF |
40. |
Comparative Evaluation of Thresholding and Segmentation Algorithms
Pages : 1107-1110
Aaron Gonsalves, Rhea Machado, Gerffi Michael, Omprakash Yadav
Abstract | PDF |
41. |
Interpretation of Hand Gestures Using Neural Networks:A Review
Pages : 1111-1114
Priyanka Parvathy Dali, Dr. Hema C.R
Abstract | PDF |
42. |
Image Inpainting using Super Resolution : A Review
Pages : 1115-1117
Kanchan T. Narwade, Dr.S.A.Ladhake
Abstract | PDF |
43. |
B2B Order Management System
Pages : 1118-1122
Monisha Shetty, Waqaar Juned Shareef, Kanika Shetty, Savita Lohiya
Abstract | PDF |
44. |
Analysing Excellence Measure, Recital of Real World Web Services
Pages : 1123-1126
D.Venkatesh, C.Sivaraman
Abstract | PDF |
45. |
Uncertainty of Rendezvous and Unsurpassed Random Walk
Pages : 1127-1129
Monisha.S., Mrs.K.Ulagapriya
Abstract | PDF |
46. |
Kinect Gaming And Physiotherapy
Pages : 1130-1133
Sachin.V.Singh , Akshay.S.Sonawane , Prajakta Kshirsagar , Yogesh Mahajan
Abstract | PDF |
47. |
A Real – Time Research Platform for Extraocular Image Processing of Epiretinal Prosthesis
Pages : 1134-1140
Sharmili N, Seetha Ramaiah P
Abstract | PDF |
48. |
Improving Customer Satisfaction through Smart Shopping: A Prototype
Pages : 1141-1152
Dan Michael A. Cortez, Charito M. Molina, Khatalyn E. Mata, Jayson Raymund D. Bermudez
Abstract | PDF |
49. |
Air Drum Using Kinect and Arduino
Pages : 1153-1155
G.S.Raghavendra, D.R.N.S.Lakshmi, S.Venkateswarlu
Abstract | PDF |
50. |
Security Issues and Trends in Cloud Computing
Pages : 1156-1159
G.S.Raghavendra, D.R.N.S.Lakshmi, S.Venkateswarlu
Abstract | PDF |
51. |
Load Balancing in Parallel Network File System using Adaptive Load Data Migration
Pages : 1160-1163
Ratan Deokar, Sagar Hagwane, Shreenath Iyer, Vivek Labhade, Mayur Koli
Abstract | PDF |
52. |
A Rapid Grouping Based Empirical Subset Selection Algorithm for High Dimensional Data
Pages :1164-1166
B.Praveenkumar, M.V.Jagannatha Reddy
Abstract | PDF |
53. |
Watermarked LTVC Scheme
Pages :1167-1170
Aswathy. S
Abstract | PDF |
54. |
Reinfection and Self-Start Analysis on the Propagation Dynamics of Modern Email Malware
Pages : 1171-1174
Preetha. S.M
Abstract | PDF |
55. |
Computation Load Sharing of Personalized Mobile Search Engine
Pages : 1175-1177
Ujvala Patil, N.Y.Suryawanshi
Abstract | PDF |
56. |
A User centric cost efficient resource management model for cloud computing
Pages : 1178-1180
Harleen Kaur, Vandana Pushe
Abstract | PDF |
57. |
Auditing Framework Service for Efficient Secure Data Storage in Multi- cloud
Pages : 1181-1183
M. Ravi kumar, E . Madhusudhana Reddy
Abstract | PDF |
58. |
Multifunction Web Log Analyzer: A Survey
Pages : 1184-1187
Lalit Agrawal, Prof. Anil Patidar
Abstract | PDF |
59. |
Reconstructing Minutiae and Orientation Fields Using Enhanced Feedback Paradigm
Pages : 1188-1191
Lekshmi S P, Lizmol Stephen
Abstract | PDF |
60. |
Advanced Security using VCS and Watermarking
Pages : 1192-1195
Minal Nerkar, Priya Talreja, Komal Pawar , Radha Gosavi, Devika Dhadphale
Abstract | PDF |
61. |
Securing Server/Client side Applications against XSS attack via XSS-Obliterator
Pages : 1196-1203
Amit Singh, Suraj Singh Tomer
Abstract | PDF |
62. |
A Model to Restrict Online Password Guessing Attacks
Pages : 1204-1208
Aqib Malik , Dr. Sanjay Jamwal
Abstract | PDF |
63. |
A Review on Web Image Retrieval Techniques
Pages : 1209-1212
Rasika V. Khandre, Dr. Neeta A. Deshpande
Abstract | PDF |
64. |
Using Ranking – Based Techniques Improvement
of Aggregate Recommendation Diversity and
Accuracy
Pages : 1213-1216
Dipika Anil Hole, Ashvini Sitaram Bangar, Priyanka Hanumant Rokade
Abstract | PDF |
65. |
Automated Detection and Classification of
Glaucoma from Eye Fundus Images: A Survey
Pages : 1217-1224
Syed Akhter Hussain, Dr. Holambe A. N
Abstract | PDF |
66. |
A Review on Incomplete Data And Clustering
Pages : 1225-1227
Vaishali H. Umathe, Gauri Chaudhary
Abstract | PDF |
67. |
Computational Auditory Scene Analysis for
Acoustic Event Detection: An Improved Approach
Pages : 1228-1231
Jincy Joseph.P, Shamla Beevi.A
Abstract | PDF |
68. |
Authentication with Colours and Session Password
Pages : 1232-1233
Priya More , Ankita Singh , Prakash Singh
Abstract | PDF |
69. |
Dynamic Message Authentication Code for Short Messages
Pages : 1234-1238
D.Ganesh, A.Jahnavi, M.Trivikram
Abstract | PDF |
70. |
Adoption Of Electronic Media Among the Farmers using Data Mining Techniques in
Perambalur District Of Tamil Nadu
Pages : 1239-1241
J. Nithya jayaseeli, S.Natarajan
Abstract | PDF |
71. |
Throughput Maximization in Wireless LAN by Load Balancing Approach
Pages : 1242-1244
Manjit Singh
Abstract | PDF |
72. |
Data Hiding in Encrypted Images
Pages : 1245-1247
Ankita Sawant, Vishakha Darji, Anisha Shetty
Abstract | PDF |
73. |
Segmentation of MR images for Tumor extraction by using clustering algorithms
Pages : 1248-1252
Shaik Salma Begum, T.Venkata Mohana Rao, P.Nageswara Rao, G.Srikanth
Abstract | PDF |
74. |
Understanding Architecture and Framework of J2EE using Web Application
Pages : 1253-1257
Devadrita Dey Sarkar ,Anavi jaiswal , Ankur Saxena
Abstract | PDF |
75. |
Hand & Upper Body Based Hybrid Gesture Recognition
Pages : 1258-1262
Prerna Sharma, Naman Sharma
Abstract | PDF |
76. |
A Survey on Machine Learning Techniques to Extract Chemical Names from Text Documents
Pages : 1263-1266
Snehal P. Umare, Dr. Neeta A. Deshpande
Abstract | PDF |
77. |
Enhancing Security and Privacy in Multi Cloud Computing Environment
Pages : 1267-1270
V. Vankireddy, N. Sudheer, R. Lakshmi Tulasi
Abstract | PDF |
78. |
A Survey on Modular Approach to Share Secure and Efficient Video Streaming over Cloud
Pages : 1271-1274
Radha A. Mundhada, Sapna S.Khapre
Abstract | PDF |
79. |
Distributed Approach for Replication of Scalable Service Deployment in Autonomic Network
Environment
Pages :1275-1281
Raji Rajasekharan
Abstract | PDF |
80. |
Energy Efficient Approach on Cut Detection in Wireless Sensor Networks
Pages : 1282-1286
Poojarini Mitra, Sinthia Roy, Sayani Chandra, Ipsita Saha, Bidyutmala Saha
Abstract | PDF |
81. |
An Optimization Based Approach for Image Embedding in QR Codes: A Review
Pages : 1287-1289
Pranjali A. Shrirao , Prof. V.T. Gaikwad , Prof. H.N. Datir
Abstract | PDF |
82. |
An Efficient Method for Predicting Heart Disease
Problem Using Fitness Value
Pages : 1290-1293
Prachi Paliwal , Mahesh Malviya
Abstract | PDF |
83. |
A Cluster-Based Filtering Algorithm for Mashup
Service
Pages : 1294-1295
Sathish.S, Nulyn Punitha J
Abstract | PDF |
84. |
Automatic Template Extraction from
Heterogeneous Web Pages
Pages : 1296-1299
Rashmi D Thakare , Mrs. Manisha R Patil
Abstract | PDF |
85. |
Face Annotation and Similar Image Retrieval
using PCA and MLP
Pages : 1300-1302
Anusree B S, Resmy V R
Abstract | PDF |
86. |
JPEG Anti-Forensics with Undetectability and
Image Quality
Pages : 1303-1306
Ruma V S, Neena Raj N R
Abstract | PDF |
87. |
An Automated Health Care Computing Model for Continuous Monitoring of Patients for Immediate
Medical Care during Emergency
Pages : 1307-1311
P. Samuel Kirubakaran, Dr.S.Uma, Donbyntalang Dewkhaid, Selva Kumar P
Abstract | PDF |
88. |
Performance and Evaluation of Classification Data
Mining Techniques in Diabetes
Pages : 1312-1319
Dr. D. Ashok Kumar and R. Govindasamy
Abstract | PDF |
89. |
An Efficient Mining of Sequential Rules Using Vertical Data Format
Pages : 1320-1323
Surbhi Jigneshkumar Sheth, Shailendra K Mishra
Abstract | PDF |
90. |
Simultaneous Secure Transmission for Textual Data Using Radomized Bits
Pages : 1324-1327
Remya R Nair
Abstract | PDF |
91. |
An Efficient Fully Dynamic Algorithm to Optimize the Task Scheduling Activities in Cloud
Systems
Pages : 1328-1332
Sarwat Jahan, Safdar Tanweer, Masoorul Haque
Abstract | PDF |
92. |
Modelling Cloud Services for Big Data using Hadoop
Pages : 1333-1335
Trapti Sharma
Abstract | PDF |
93. |
A Lexicon for Hadith Science Based on a Corpus
Pages : 1336-1340
Moath Najeeb, Abdelkarim Abdelkader, Musab Al-Zghoul , Abdelrahman Osman
Abstract | PDF |
94. |
Web Based Coaching Institute Management System
Pages : 1341-1344
Mayuri Kamble, Vidya Bhuvad, Omkar Keluskar, Vinayak Malavade
Abstract | PDF |
95. |
Dynamic Profile Activation for Enhancing Security in Android Devices
Pages : 1345-1349
Venkata Sai Abhishek Gogu, Venkata Sai Teja and Jahnavi Agepati
Abstract | PDF |
96. |
Empowering Service Claims Fraudulent Using Big Data Analytics
Pages : 1350-1353
U. Kartheek Chandra Patnaik, Ch. Navyatha, B.V.Maliney, B.Mounica, J. Neelima
Abstract | PDF |
97. |
E-Mail Filtering in Android
Pages : 1354-1355
Suvarna Bhoir, Sushil Shrestha, Sudarshan Mali, Vijay Bhammu
Abstract | PDF |
98. |
Minimizing Cost for big data processing using Online Database
Pages : 1356-1359
Shruthy Y, Sreenimol K. R
Abstract | PDF |
99. |
Smart Traffic Signal
Pages : 1360-1363
Monish Puthran, Sangeet Puthur, Radhika Dharulkar
Abstract | PDF |
100. |
NFC Based Healthcare System
Pages : 1364-1366
Ketan Bhadoriya, Rajshekhar Humbe, Yogesh Kodgire, S.G.Phule
Abstract | PDF |
101. |
Predicting the impact of different Variables on Students Academic Performance using Artificial
Intelligence
Pages : 1367-1370
Pratiksha R.Shetgaonkar
Abstract | PDF |
102. |
Cross Tier Framework for Rapid Web Application Development
Pages : 1371-1374
Avinash D’Silva, Majesly Correia, Pruthvish Vyas
Abstract | PDF |
103. |
False Node Detection in Trust Aware Routing Framework (TARF) in WSN
Pages : 1375-1378
Bhagyashree N V, Bhat Geetalaxmi Jairam
Abstract | PDF |
104. |
Fraud Detection in Credit Card Transactions: Classification, Risks and Prevention Techniques
Pages : 1379-1386
N.Sivakumar, Dr.R.Balasubramanian
Abstract | PDF |
105. |
Target Planning System
Pages : 1387-1389
Dhara K.N, B.K Raghavendra, Santosh Kumar J, VNBM Krishna
Abstract | PDF |
106. |
A Survey on Unicast Routing Protocols for VANET
Pages : 1390-1392
Imtisunep T Longchar, Rwngouti Chamframary, Dip Jyoti Deka, T Sivakumar
Abstract | PDF |
107. |
Vehicle Information System
Pages : 1393-1395
Sanjeev Shelar, Wasim Sheikh , Pratik Shinde
Abstract | PDF |
108. |
Performance Evaluation of WiMAX 802.16e OFDM PHY LAYER
Pages : 1396-1400
Ashish Kishore
Abstract | PDF |
109. |
Decentralized Firewall as a Service (D-FAAS) Applicability Model with Improved Queuing
Using Dynamic Support for Cloud
Pages : 1401-1407
Palak Purohit, Awani Joshi, Richa Jain
Abstract | PDF |
110. |
A Simplified Rule Based Distributed Information Flow Control for Cloud Computing
Pages : 1408-1414
Awani Joshi, Palak Purohit, Richa Jain
Abstract | PDF |
111. |
Enhancing Security of Traffic Redundancy and
Elimination Approach in Cloud Data Storage using
3DES
Pages : 1415-1419
Anisha Sarah Mathew, Mitha Rachel Jose
Abstract | PDF |
112. |
Session Authentication using Color Scheme
Pages : 1420-1423
Shefali Amlani, Shweta Jaiswal, Suchitra Patil
Abstract | PDF |
113. |
FDM (Fast Distributed Mining) over normal mining
algorithm based on A-priori property and its
application in market basket analysis
Pages : 1424-1428
Suvarna Bhoir, Sushil Shrestha, Sudarshan Mali, Vijay Bhammu
Abstract | PDF |
114. |
Fastest Pedestrian Detector
Pages : 1429-1432
Tinto Raj R V
Abstract | PDF |
115. |
Collaborative Web Service QoS Prediction with
Multi-Criteria Decision Making Using CB-NIMF
Pages : 1433-1438
M.Thirumaran, A.V.Arimathi
Abstract | PDF |
116. |
Semantic Reasoner Based Change
Management Framework for Ev: LCS
Pages : 1439-1450
M.Thirumaran, G.Gayathry@Brendha , Subham Soni
Abstract | PDF |
117. |
Hadoop Based Analytics on Next Generation
Medicare System
Pages : 1451-1453
Gopal A. Tathe, Pratik S. Patil, Sangram C. Parle,Vishal S. Pathare,Prof. Sudarshan S. Deshmukh
Abstract | PDF |
118. |
Counter Measures against Malicious Program in
Universal Serial Bus
Pages : 1454-1456
Selvi Grija, Kovartthan, Selva Kumar, Thamilzselvan
Abstract | PDF |
119. |
CHOKe: A Stateless Queue for Securing Flows
Pages : 1457-1459
Saniya Elza Dominic, Gayathri .R Krishna
Abstract | PDF |
120. |
A Novel Ontology Processing System Using Information Filter and Knowledge Repository for
Semantic Web
Pages :1460-1464
Sudha J Vishwakarma
Abstract | PDF |
121. |
Survey on Online Recommendation Using Web Usage Mining
Pages : 1465-1467
Neeraj Iyer, Alex Dcunha, Akshay Desai, Kavita Jain
Abstract | PDF |
122. |
Parking Navigation System Based on RFID and IR Sensor
Pages : 1468-1472
Prof.Gayatri Bhandari, Mrinal Bari, Shweta Borse, Ashwini Gaikwad, Reshma Kadam
Abstract | PDF |
123. |
Vehicle Tracking Using Number Plate Recognition System
Pages : 1473-1476
D.Madhu Babu, K.Manvitha, M.S.Narendra, A.Swathi, K.Praveen Varma
Abstract | PDF |
124. |
A Rule Based Verification with Strongly Typed Field based SQL Injection and XSS Attack
Detection
Pages : 1477-1482
Ajay Singh Dikhit, Prof.khushboo Karodia
Abstract | PDF |
125. |
An E-Commerce Website based Chatbot
Pages : 1483-1485
Siddharth Gupta, Deep Borkar, Chevelyn De Mello, Saurabh Patil
Abstract | PDF |
126. |
Fusion of Local and Global Iris Features to
Construct Feature Vector Using Genetic Algorithm
Pages : 1486-1489
S.Pon Sangeetha
Abstract | PDF |
127. |
Mining Social Network Data for Cyber Physical System
Pages : 1490-1492
Manjushree Gokhale, Bhushan Barde, Ajinkya Bhuse, Sonali Kaklij
Abstract | PDF |
128. |
Route Prediction in Wireless Sensor Networks
using Markov Model
Pages : 1493-1496
Nisha Pachori, Vivek Suryawanshi
Abstract | PDF |
129. |
Dynamic Signature Recognition and Verification Using Pixel Based Approach
Pages : 1497-1499
Rinku N. Patel, Suman P. Chauhan, Khushbu C. Panwala, Hardi D. Prajapati
Abstract | PDF |
130. |
Improving Trust Management for Effective Collaborative Intrusion Detection Network
Pages : 1500-1504
P.Ayesha Barvin, G.Bakkiyaraj
Abstract | PDF |
131. |
MRI Brain Tumor Classification Using SVM and Histogram Based Image Segmentation
Pages : 1505-1508
Chinnu A
Abstract | PDF |
132. |
A Survey on the Role of Cloud Computing in Social Networking Sites
Pages : 1509-1512
Tadepalli Sarada Kiranmayee
Abstract | PDF |
133. |
ANN Based Head Movement Detection with Eye
Tracking
Pages : 1513-1517
NIMI M R, RENJI S
Abstract | PDF |
134. |
Fuzzy based clustering of High Dimensional Datasets
Pages : 1518-1520
M.Pavani, M.Pravallika, M. SaiChandan, M.Lokesh, A. Snehitha
Abstract | PDF |
135. |
Image Registration using Discrete Wavelet Transform and Particle Swarm Optimization
Pages : 1521-1525
Jitendra Pramanik, Sunita Dalai, Debaraj Rana
Abstract | PDF |
136. |
An Automated Framework for Shortest Path
Computation
Pages : 1526-1534
R.Kamatchi, Dr.S.Lakshmi
Abstract | PDF |
137. |
A Survey on Big Data, Data Mining and Overlay Based Parallel Data Mining
Pages : 1535-1538
Pushpanjali, Jyothi S Nayak
Abstract | PDF |
138. |
Review of Efficient Techniques for Reducing Web Page Complexity
Pages : 1539-1540
Chaitali Domde, Hemlata Dakhore
Abstract | PDF |
139. |
Improving Scalability Of Storage System:Object
Storage Using Open Stack Swift
Pages : 1541-1546
G.Kathirvel Karthika, R.C.Malathy, M.Keerthana
Abstract | PDF |
140. |
Optimizing Resource Consumption in Computational Cloud Using Enhanced ACO
Algorithm
Pages : 1547-1551
Preeti Kushwah, Dr. Abhay Kothari
Abstract | PDF |
141. |
Mitigating Flood Attack Using AODV in Disruption Tolerant Network
Pages : 1552-1555
Jananii.M, Vasanthi.S
Abstract | PDF |
142. |
Enhancing the Query Processing in Unstructured Peer To Peer Network
Pages : 1556-1559
Rajashree Dongare, Prof.Rachana Satao
Abstract | PDF |
143. |
A Novel Method for Making a Photo-book Using Cloud
Pages : 1560-1564
Aishwarya Habib, Praveen Mulgund, Abdul Kareem Sirasgi, Priyadarshini Kalwad
Abstract | PDF |
144. |
Software Metrics Evaluation: An Open Source Case Study
Pages : 1565-1568
Sandeep Kaur, Navjot Kaur
Abstract | PDF |
145. |
Hybrid CPU Scheduling Algorithm
Pages : 1569-1572
Anil Kumar Gupta
Abstract | PDF |
146. |
Comparative Analysis of Recall-based (Drawmetric) and Click-based (Locimetric) Graphical Password
Authentication Schemes
Pages : 1573-1577
1Km Ritu, #2Rajiv Ranjan Singh, #3Bharti Kumar
Abstract | PDF |
147. |
Survey on Types of Bug Reports and General Classification Techniques in Data Mining
Pages : 1578-1583
Smita Mishra, Somesh Kumar
Abstract | PDF |
148. |
A Comparative Study on Semantic Web Service Discovery Approaches
Pages : 1584-1587
Mourougaradjane Puthupattan, Dinadayalan Perumal
Abstract | PDF |
149. |
Privacy Preserving Issues and their Solutions in Cloud Computing: A Survey
Pages : 1588-1592
Pooja HP, Nagarathna N
Abstract | PDF |
150. |
An Hybrid Anti-Phishing Approach Using MAC Verifier, Pattern Similarity Index (PSI)
and SLIQ Decision System
Pages : 1593-1597
Anil Kumar Goutam, Tejalal Choudhary
Abstract | PDF |
151. |
Android App Based Robot
Pages : 1598-1600
Aiman Ansari, Yakub Ansari, Saquib Gadkari, Aarti Gokul
Abstract | PDF |
152. |
Minimizing Search Latency using Portable Existence Services
Pages : 1601-1605
Rage.Parasuramudu, M.Veeresh babu
Abstract | PDF |
153. |
A New Approach to Event Dissemination in Distributed Systems
Pages : 1606-1609
Anson Antony Fertal, P. Priya Ponnusamy
Abstract | PDF |
154. |
Mitigating Man in the Middle attack Using Vi-Fickle Algorithm
Pages : 1610-1612
Vishnuganth.M, Mohanraj.S, Stanly Jayaprakash.J
Abstract | PDF |
155. |
Text Clustering for Information Retrieval System Using Supplementary Information
Pages : 1613-1615
Chitra Kalyanasundaram, Snehal Ahire, Gaurav Jain, Swapnil Jain
Abstract | PDF |
156. |
Radius Bone Fracture Detection Using Morphological Gradient Based Image Segmentation Technique
Pages : 1616-1619
Swathika.B, Anandhanarayanan.K, Baskaran.B and Govindaraj.R
Abstract | PDF |
157. |
Comparative Analysis of Video Watermarking Scheme Using Different Wavelets & SVD
Pages : 1620-1624
Aswathy K.Nair, Flower Abraham Mundackal
Abstract | PDF |
158. |
A Secure tunnel technique using IPv6 Transition over IPv4 Channel
Pages : 1625-1628
Kamna Chauhan, Pooja Jain
Abstract | PDF |
159. |
Transpiler and it’s Advantages
Pages :1629-1631
Rohit Kulkarni, Aditi Chavan, Abhinav Hardikar
Abstract | PDF |
160. |
Dual Stenography Approach For Secure Data Communication
Pages : 1632-1635
Kirti Shukla, Priyanka Vijaywargiya
Abstract | PDF |
161. |
Generalized Multiple ROI Prioritization in JPEG2000 for Natural Images
Pages : 1636-1642
Omprakash Rajankar, Dr. Uttam Kolekar
Abstract | PDF |
162. |
Identification of Age And Gender Using HMM
Pages : 1643-1647
Bhavana R. Jawale, Swati patil, Mayur Agrawal
Abstract | PDF |
163. |
A Survey of Machine Learning Based Approaches for Parkinson Disease Prediction
Pages : 1648-1655
Shubham Bind, Arvind Kumar Tiwari, Anil Kumar Sahani
Abstract | PDF |
164. |
Non-Saperable Reversible Data Hiding in Encrypted Image Using Chaoutic Map
Pages : 1656-1659
Nilesh Solanki, Mahesh Parmar, Dr. Vineet Richhariya
Abstract | PDF |
165. |
Advanced Probabilistic Binary Decision Tree Using SVM for large class problem
Pages : 1660-1664
Anita Meshram, Roopam Gupta and Sanjeev Sharma
Abstract | PDF |
166. |
Semi Supervised Collaborative Image Retrieval Using Binary Classifier
Pages : 1665-1668
Gaurav Kulkarni, Mahesh Kulkarni, Prashant Kausal , Suraj Kedar
Abstract | PDF |
167. |
Reliable Cloud Using elliptical Curve Deffie Hellman and Elliptical Curve Digital Signature
Pages : 1669-1671
Akash Shrivastava, Nitya M Nerli
Abstract | PDF |
168. |
Green Data Center Using Spearman’s Ranking Algorithm
Pages : 1672-1676
Sonu Choudhary, Dr. Abhay Kothari
Abstract | PDF |
169. |
Secure Multimatch Packet Classification Based on SignatureTree
Pages : 1677-1679
Pinky M S , Anna Prathibha Shobak
Abstract | PDF |
170. |
Web Log Based Analysis of User’s Browsing Behavior
Pages : 1680-1684
Ashwini ladekar, Pooja Pawar, Dhanashree Raikar, Prof.Jayashree Chaudhari
Abstract | PDF |
171. |
Analysis of Various Clustering Algorithms in Wireless Sensor Network
Pages : 1685-1691
Kunkunuru Udaykumar, Tamizharasi Thirugnanam
Abstract | PDF |
172. |
Image Based Authentication Using Visual
Cryptography and Encryption Algorithm
Pages : 1692-1696
Shreya Zarkar, Sayali vaidya, Arifa Tadvi, Tanashree Chavan, Prof. Achal Bharambe
Abstract | PDF |
173. |
Recursive Binary Time Partitioning For Low-Power
Mobile Discovery and Bandwidth Allocation in
Cloud-Based Wireless Live-Streaming
Pages : 1697-1702
Kaushlya Salunkhe, Gadekar Devendra
Abstract | PDF |
174. |
Optimized Resource Management Decision
System (ORM-DS) for Distributed Infrastructure
Management in Cloud Computing
Pages : 1703-1709
Nandini Kranti, Anand Singh Rajavat
Abstract | PDF |
175. |
Fault Node Discovery and Efficient Route
Repairing Algorithm for Wireless Sensor Network
Pages : 1710-1715
Vibha Paradkar, Gajendra Singh Chandel, Kailash Patidar
Abstract | PDF |
176. |
ORSMF: Optimistic Replacement Based Switching
Median Filter for Highly Corrupted Images
Pages : 1716-1723
Rupinder Kaur, Dinesh Kumar
Abstract | PDF |
177. |
Genetic K-means Algorithm for Credit Card Fraud
Detection
Pages : 1724-1727
Pooja Chougule, A.D. Thakare, Prajakta Kale, Madhura Gole, Priyanka Nanekar
Abstract | PDF |
178. |
Sensitive Broadcasting of Data for Cluster Based WSNs
Pages : 1728-1730
Renuga.A, Sakthivel.B
Abstract | PDF |
179. |
A Survey on Comparative Study of Routing Protocol in Delay-Tolerant Networks
Pages : 1731-1736
Vikash, R.K.Singh
Abstract | PDF |
180. |
A Proposed Hybrid Spatial Indexing: QX Tree
Pages : 1737-1739
Jayanaranjan Dash, Dipa Patra, Chittaranjan Pradhan
Abstract | PDF |
181. |
Enhanced Video Retrieval and Classification of Video Database Using Multiple Frames Based on
Texture Information
Pages : 1740-1745
Mohd. Aasif Ansari, Dr. Hemlata Vasishtha
Abstract | PDF |
182. |
Minimizing Communication Overhead of Server in Client Server Communication
Pages : 1746-1749
Rucha R. Goundadkar, Roshani K. Nakhate, Sonali K. Koratkar, Prof. R. H. Kulkarni
Abstract | PDF |
183. |
GIntrusion Detection Using Data Mining Technique
(Classification)
Pages : 1750-1754
Dr.D.Aruna Kumari, N.Tejeswani, G.Sravani, R.Phani Krishna
Abstract | PDF |
184. |
Shadow Detection and Removal from Images-A Review
Pages : 1755-1757
Harpreet Kaur, Navdeep Kaur
Abstract | PDF |
185. |
A Context-Aware Search System for Smart Phones
Based on Context-Aware Infrastructure
Pages : 1758-1760
Gayatri Dange, Rajan Jamgekar, Swapnaja Ubale
Abstract | PDF |
186. |
Privacy –Enhanced Web Personalization
Pages : 1761-1764
Rupali Keshavrao Aher, Akshay Rajdhar Adik
Abstract | PDF |
187. |
Performance Analysis of DYMO FSR & GSR
Using Wormhole attack under VANET’s
Pages : 1765-1768
Gurminder Kaur, Manju Bala, Manoj Kumar
Abstract | PDF |
188. |
Agile Testing
Pages : 1769-1773
Sakshi Sachdeva, Purnima Khurana
Abstract | PDF |
189. |
A Review on Large-scale Video Classification
with Recurrent Neural Network (RNN)
Pages : 1774-1778
Bhagyashri P. Lokhande, Sanjay S. Gharde
Abstract | PDF |
190. |
Audio Visual Speech Synthesis and Speech
Recognition for Hindi Language
Pages : 1779-1783
Kaveri Kamble, Ramesh Kagalkar
Abstract | PDF |
191. |
Kinship Verification
Pages : 1784-1786
Kanchan Pardeshi , Vrushali Pawar, Snehal Sonawane , Kavita Wagh
Abstract | PDF |
192. |
ETL Life Cycle
Pages : 1787-1791
Purnima Bindal , Purnima Khurana
Abstract | PDF |
193. |
Development of improved Aggregated Key
Cryptosystem for scalable data sharing
Pages : 1792-1794
Rashmi Khawale, Roshani Ade
Abstract | PDF |
194. |
Credit Card Fraud Detection System using Hidden Markov Model and Adaptive Communal Detection
Pages : 1795-1797
Nabha Kshirsagar, Neha Pandey,Shraddha Kotkar, Suja S. Panicker, Amol Pate
Abstract | PDF |
195. |
Embedded Image Capturing & Digital Converting Process
using Raspberry pi System interfacing and Comparision of
Generation 2 verses Generation 1 models in Raspberry pi
Pages : 1798-1801
Anoop Mishra, Arshita Dixit
Abstract | PDF |
196. |
AUTHOR IDENTIFICATION in MAIL
Pages : 1802-1805
S.A.Aher, D.S.Nikam, J.M.Tadge, Bharti.Avhad, V.D.Mahajan
Abstract | PDF |
197. |
Detection of Burr type XII Reliable Software
Using SPRT on Interval Domain Data
Pages : 1806-1811
Dr. R. Satya Prasad, B. Ramadevi, Dr. G.Sridevi
Abstract | PDF |
198. |
An Efficient Reuse of Legacy C-ISAM through
Java Native Interface
Pages : 1812-1813
Raphael O. Anumba
Abstract | PDF |
199. |
Aggregating Correlated Naive Predictions to
Detect Network Traffic Intrusion
Pages : 1814-1818
G.Vivek, B.Logesshwar, Civashritt.A.B, D.Ashok
Abstract | PDF |
200. |
Portfolio Investment Model Using Neuro Fuzzy System
Pages : 1819-1823
Keerti. S.Mahajan, Shruti. S. Jamsandekar, Dr. R .V. Kulkarni
Abstract | PDF |
201. |
Solving NP hard Problems using Genetic Algorithm
Pages : 1824-1827
Gaurang Panchal & Devyani Panchal
Abstract | PDF |
202. |
Efficient Attribute Evaluation, Extraction and
Selection Techniques for Data Classification
Pages : 1828-1831
Gaurang Panchal & Devyani Panchal
Abstract | PDF |
203. |
Secure Implementation of Artificial Neural
Networks over Cloud
Pages : 1832-1834
Pallavi Mhatre , Prachi Pimple , Surabhi Shikarkhane ,Poi Tamrakar
Abstract | PDF |
204. |
Survey on Recent Algorithms for Privacy
Preserving Data mining
Pages : 1835-1840
S.Selva Rathna, Dr. T. Karthikeyan
Abstract | PDF |
205. |
Steady State Analysis of a Three Stage Communication
Network with DBA and Batch Arrivals
Pages : 1841-1847
G. Rajendra Kumar, Kuda Nageswara Rao, K. Srinivasa Rao
Abstract | PDF |
206. |
An Incremental Feature Clustering Algorithm for
Text Classification
Pages : 1848-1851
Johny Thomas, Abishek Nair, Arpit Gupta
Abstract | PDF |
207. |
Face Recognition Based Solution For Security
Using Web Technology
Pages : 1852-1854
V.Srinivasarao
Abstract | PDF |
208. |
Profile Management System Pages : 1855-1858
Rajdip kaur Bath, Tyson Fernandes, Akash Jadhav
Abstract | PDF |
209. |
Analysis Clustering Techniques in Biological Data
with R
Pages : 1859-1864
Satish Kumar, Dr.Mohammed Asger
Abstract | PDF |
210. |
A Novel Page Links Prediction Technique for Web
Search Sources
Pages : 1865-1868
Aleem Ansari, Dr. Hemlata Vasishtha
Abstract | PDF |
211. |
Automatic Evaluation System for Student Code
Pages : 1869-1871
Pratik Saraf, Shankar Ramesh, Sachin Patel, Prof. Sujata Pathak
Abstract | PDF |
212. |
Wearable Devices: Google Glass & Smart Watch
Pages : 1872-1873
Lakshay Garg, Abhishek Bhardwaj, Meetu Gupta
Abstract | PDF |
213. |
Custom ROM’s in Android
Pages : 1874-1875
Meetu Gupta, Abhishek Bhardwaj, Lakshay Garg
Abstract | PDF |
214. |
Analytical Approach to Predictive Disease
Diagnosis using K-nn and Kstar
Pages : 1876-1879
Rashmi Madhukar Jadhav, Ms. Roshani Ade
Abstract | PDF |
215. |
Secure Key Distribution Over MANET : A
Cryptographic Approach
Pages : 1880-1883
Vikas Kumar Rana, Rajneesh Gujral
Abstract | PDF |
216. |
Perturb and Observe MPPT Algorithm
Implementation for PV Applications
Pages : 1884-1887
Gangavarapu Mamatha
Abstract | PDF |
217. |
Image Retrieval Based on LBP Pyramidal
Multiresolution using Reversible Watermarking
Pages : 1888-1893
H. Ouahi, K. Afdel,M.Machkour
Abstract | PDF |
218. |
Energy Efficient Protocols Used in Wireless
Sensor Networks
Pages : 1894-1896
PARKAVI. D, Dr. Y.SURESH
Abstract | PDF |
219. |
Essential Characteristics for Ubiquitous Projects
Pages : 1897-1899
Anil kumar Mishra, Pushpa Yadav, Latika Singh
Abstract | PDF |
220. |
Comparative Study of Various Enhancement
Techniques for Finger Print Images
Pages : 1900-1905
Darshan Charan Nayak
Abstract | PDF |
221. |
Handling DDoS attacks in Cloud
Pages : 1906-1912
Yesu Jeya Bensh P, Murugan K
Abstract | PDF |
222. |
Stabilizing Route and Control Overhead by Using
Ad-Hoc Routing Protocol in Vehicular Ad-Hoc
Network (VANET)
Pages : 1913-1916
Bhargavi Dalal and Smita Jangale
Abstract | PDF |
223. |
A Mining Algorithm to Generate the Candidate
Pattern for Authorship Attribution for Filtering
Spam Mail
Pages : 1917-1921
Khongbantabam Susila Devi, Dr. R. Ravi
Abstract | PDF |
224. |
Continuous User Authentication Using Keystroke
Dynamics
Pages : 1922-1925
M.Pavithra, K.B.Sri Sathya
Abstract | PDF |
225. |
A Novel Method for Prediction of Resource
Requirements Using Replica Mechanism
Pages : 1926-1929
Mohini Rai, Rupali Bhartiya
Abstract | PDF |
226. |
Comparison of Different Navigation Prediction
Techniques
Pages : 1930-1939
Prasad J. Koyande, Kavita P. Shirsat
Abstract | PDF |
227. |
Current Image Segmentation Techniques-A
Review
Pages : 1940-1942
Manraj, Amitpal Singh
Abstract | PDF |
228. |
A Competent Situation of Responsive Intrusion
Detection System for Secure Portable Devices
Pages : 1943-1946
Rekha Dwivedi, Priyanka Vijayvargiya
Abstract | PDF |
229. |
Earthquake Damage Assessment of Buildings
Using Pre-event and Post-event Imagery
Pages : 1947-1951
M.R.Archana Jenis,D.G.Enoch Raja,3. D.V.Viji Nirmala
Abstract | PDF |
230. |
Effective Navigation of Query Results Using
Apriori Algorithm
Pages : 1952-1955
Tagore Kumar Tummapudi, Uma M
Abstract | PDF |
231. |
Efficient Processing of Decision Tree Using
ID3 & improved C4.5 Algorithm
Pages : 1956-1961
Sonal Patil, Mayur Agrawal, Vijaya R. Baviskar
Abstract | PDF |
232. |
Active Learning of constraints using incremental
approach in semi-supervised clustering
Pages : 1962-1964
Jamil Ahmed Sk, Manjunath Prasad, Abdullah Gubbi, Hasibur Rahman
Abstract | PDF |
233. |
Wireless Intrusion Detection System
Pages : 1965-1968
Keith Chettiar, Akshay Patil, Arpita Pradhan and Sushama Khanvilkar
Abstract | PDF |
234. |
Efficient Energy Utilization in Wireless Sensor
Networks by installing Relay Stations
Pages : 1969-1970
Rama Krishna Reddy Kallam
Abstract | PDF |
235. |
Supervised and Unsupervised Document
Classification-A survey
Pages : 1971-1974
Deepshikha Kalita
Abstract | PDF |
|
|